1 Modeling a Spatially Correlated Cellular Network with Strong Repulsion arXiv:1701.02261v1 [cs.IT] 9 Jan 2017 Chang-Sik Choi, Jae Oh Woo, and Jeffrey G. Andrews Abstract We propose a new cellular network model that captures both strong repulsion and no correlation between base stations. The base station locations are modeled as the superposition of two independent stationary point processes: a random shifted grid with intensity λg for the repulsive base stations and an independent Poisson point process with intensity λp for the uncorrelated base stations. Assuming that users are associated with base stations that provide the strongest average receive signal power, we obtain the probability that a typical user is associated with either a repulsive base station or an uncorrelated base station. Assuming Rayleigh fading channels, we derive the expression for the coverage probability of the typical user. The following three observations can be made. First, the association and coverage probability of the typical user are fully characterized by two system parameters: the intensity ratio ρλ and the transmit power ratio η. Second, in user association, a bias toward the repulsive base stations exists. Finally, the coverage expression is a monotonically increasing function with respect to the number of repulsive base stations, or the inverse of the intensity ratio ρ−1 λ . I. I NTRODUCTION A. Motivation and Related Work The topological distribution of base stations is a first order effect in terms of the signal-tointerference-and-noise ratio (SINR) of a cellular network. According to studies in [1]–[3] that investigated the topology of cellular networks, base stations (BSs) are usually spread out from Chang-sik Choi, Jae Oh Woo, and Jeffrey G. Andrews are with the Wireless and Networking and Communication Group, Department of Electrical and Computer Engineering, The University of Texas at Austin, Texas, 78701, USA. (e-mail: [email protected], [email protected], [email protected]) Last revised: January 10, 2017 2 one another, which is referred to as repulsion. Studies [1]–[3] provided further evidence of the repulsions by numerically comparing the SINRs of their repulsive models with the SINRs obtained from actual deployment data. However, those works did not analytically derive the SINR expressions, primarily because it is very difficult to do so for repulsive point processes. B. Background: From Poisson to more general models The modeling and analysis of BS locations using Poisson point process (PPP) has become popular in the last five years because the independence of the PPP helps allow computable – and in some cases quite simple – SINR distribution expressions [4]–[11]. The PPP-based models often yield a simple expression for the interference [12], [13]. In [4] the coverage probability of the typical user – meaning the probability that the SINR is above a certain value – was derived in closed-form, and was extended in [5]–[8] to multi-tier heterogeneous cellular networks (HCNs). The benefits of HCNs were studied further in [9]–[11]. However, the PPP ignores the repulsive nature of topology observed in cellular base stations. In order to mathematically represent the repulsion between base stations, [14]–[17] considered repulsive point processes [18, Chapter 5.] and attempted to derive the SINR expressions analytically. Several specific point processes can be introduced. For example, [15] considered the Ginibre point process, [16] provided tractable but complicated analysis for the more general determinantal point process (of which Ginibre is a special case), and [17] used the Matérn hard-core point process, which introduces an exclusion region around each BS. However, the results in [14]–[17] did not explicitly expose how the SINR scales in terms of the level of spatial repulsion. The goal of this paper is to introduce and analyze a novel tractable model that captures both repulsion and randomness in a flexible way. C. Contributions This paper proposes a model comprising a superposition of two independent point processes. The first is a standard PPP with density λp . The second is a random shifted grid with intensity λg . Two realizations of such point processes along with their association regions (Voronoi tessellation) can be seen in Figs. 1 and 2. Possible real-world examples where such a model could be applicable include: 3 • Vehicular networks where fixed road side units (nearly in a grid) and randomly located vehicles (a PPP) can transmit information to another vehicle. • Device-to-device (D2D) networks with fixed base stations and randomly scattered D2D devices. A given mobile receiver could receive transmissions from either one. • HCNs with repulsively (nearly grid) macro base stations are overlaid with more randomly scattered small cells. This paper describes a scalable framework to analyze the these types of cellular networks using stochastic geometry. However, our framework and numerical results are not limited to this case. The results are applicable to any wireless network where a repulsive structure exists. Our theoretical contributions are as follows. Analytical framework capturing the repulsion between base stations. We propose to model cellular networks as a combination of two extreme sub-structures repulsive base stations of transmit power pg are modeled as a random shifted grid with intensity λg ; the uncorrelated base stations with transmit power pp are modeled into a PPP with intensity λp . We measure the relative repulsion with the intensity ratio ρλ = λp . λg Association probability and the signal-to-interference ratio (SIR) coverage probability. Assuming the typical user is associated with the base station that provides the strongest average receive signal power, we derive the association probability. Then, we derive the SIR coverage probability of the typical user, assuming Rayleigh fading channels. The SIR is nearly equivalent to the SINR for sufficiently dense networks. We show that the association and coverage expressions are related to the system parameter as functions of intensity ratio ρλ and the power ratio η = pp . pg Novel observations under the proposed model. First, we show a bias toward the repulsive base stations in user association. For instance, when ρλ = η = 1, the typical user at the origin is more likely to be associated with a repulsive base station than an uncorrelated base station. Secondly, we observe a scale-invariant property of the coverage expression: it is fixed as long as ρλ does not change. In fact, numerical analysis shows that the coverage probability monotonically increases with respect to ρ−1 λ . The result suggests that one might increase (or decrease) the coverage probability of users by adding the repulsive base stations (or by adding the uncorrelated base stations). The rest of this paper is organized as follows. Section II discusses our system model and defines performance metrics. Section III acquires the nearest distance to the proposed point process and computes the association probability of the typical user. Section IV derives the coverage 4 probability of the typical user. Section V introduces the bounds for the coverage probability and Section VI presents numerical and simulation results. Section VII concludes the paper. II. S YSTEM M ODEL In this section, our system model is depicted. This section explains the characterization of repulsive cellular networks using two stationary point processes. This section also discusses the propagation model and the association principle of users in the network. A. Spatial Modeling of Base Stations To model the locations of repulsive base stations, one would consider a deterministic square grid or hexagonal grid that has been considered by practicing engineers [19], [20]. However, the notion of spatial average or typicality is yet unclear for the deterministic lattice. Furthermore, under the framework of stochastic geometry, the typicality is obtained by assuming stationary point processes. For our purposes, the deterministic lattice is not suited for modeling typical repulsive base stations. Therefore, we adopt a random shifted grid. Specifically, the random shifted grid is a standard square lattice shifted by a single uniform random variable. The random locations of the repulsive base stations are given by X δs·k+U , Φg := (1) k∈Z2 2 where s denotes the width of squares and U represents uniform random variable on − 2s , 2s . The above equation shows that all points of the square grid are shifted by a random variable U. The random shifted grid given by (1) is a stationary point process because the joint distribution {Φg (B1 + x), Φg (B2 + x), . . . , Φg (Bk + x)}, (2) does not depend on the location of x ∈ R2 for any finite Borel set Bk ∈ B(R2 ) [21, Definition 3.2.1.]. Since it is stationary point process, it admits the intensity parameter λg defined by the average number of points in a unit area and we have λg = 1/s2 . On the other hand, we assume an independent homogeneous Poisson point process to represent uncorrelated base stations. Φp := X δXi . i∈N We use λp to denote the intensity parameter of Φp . (3) 5 Since the two point processes are stationary, the superposition of the point processes also yields a stationary point process given by Φ := Φg ∪ Φp = X δs·k+U + δXi . (4) k∈Z2 ,i∈N We produce a stationary point process representing all base stations in repulsive cellular networks. It can be easily shown that the intensity parameter of the proposed point process is λg + λp . In addition, we define a key network parameter the intensity ratio ρλ that captures the repulsion by intensities, i.e. ρλ := λp . λg (5) Since the intensity of a point process describes the mean number of its points in a set of volume one, the intensity ratio describes the mean number of the Poisson point process divided by the mean number of the random shifted grid. It is important to note that we can characterize the repulsion of base stations by a function of only intensities; we establish a scalable model for a spatially correlated network. For instance, if the intensity ratio is zero, the proposed network is composed of the repulsive base stations almost everywhere. On the other hand, if the intensity ratio is infinity, the proposed network is composed of the uncorrelated base stations almost everywhere. Figure 1 and 2 demonstrate the proposed point processes and their Voronoi tessellations where intensity ratios are ρλ = 0.6 or 1.6, respectively. In addition to the proposed point process Φ, we consider another independent Poisson point process Φr with intensity parameter λr to describe the locations of users. We assume that all base stations have full-buffered queues and always transmit1. B. Signal Propagation and Receive Power We describe the received signal power P at Y as PX HX /l(kX − Y k), where PX indicates the transmit power of the base station at X, HX indicates fading, and l(kX − Y k) indicates large-scale path loss. We do not consider shadowing. This paper assumes that the small scale fading HX is an independent and identically distributed (i.i.d) exponential random variable with unit mean. We also assume l(kX − Y k) := kX − Y kα , 1 This assumption is justified by assuming λu ≫ λp + λg [4] (6) 6 5 Random shifted grid Poisson point process Voronoi boundary 4 3 2 1 0 -1 -2 -3 -4 -5 -5 -4 -3 -2 -1 0 1 2 3 4 5 Fig. 1. This figure represents Φg (square) and Φp (triangle) when ρλ is 0.6. The dashed lines indicate the Voronoi boundaries created by Φg ∪ Φp where α > 2. The transmit power of base station at X is given by pg if X ∈ Φg . PX := pp if X ∈ Φp . Lower case alphabets are used for the constants. The transmit ratio η is given by pp /pg . C. User Association and Interference Modeling This paper assumes a practical association principle. A user is associated with the base station that provides the strongest average received power among all the base stations. Furthermore, we add a typical user at the origin using the stationarity of the proposed point process and marks on it. Since we consider the typical user at the origin, the associated (or tagged) base station of the typical user is given by P Xi P Xi H Xi ≡ arg max . X := arg max E α kXi k kXi kα Xi ∈Φ Xi ∈Φ ⋆ (7) 7 5 Random shifted grid Poisson point process Voronoi boundary 4 3 2 1 0 -1 -2 -3 -4 -5 -5 -4 -3 -2 -1 0 1 2 3 4 5 Fig. 2. This figure represents Φg (square) and Φp (triangle) when ρλ is 1.6. The dashed lines indicate the Voronoi boundaries created by Φg and Φp . The Voronoi tessellation matches to the user association map if pg = pp . Users in each Voronoi polygon are associated with the base station located in its center. See Figure 1 and 2 for visualization representations of user association in R2 when pg = pp ; which corresponds to the Voronoi tessellation created by Φ. We remark that our association does not incorporate Rayleigh fading. As a result, the received signal power from the tagged base station is given by S := PX ⋆ HX ⋆ kX ⋆ k−α , (8) and the interference is given by I := X Xi ∈Φ\{X ⋆ } PXi HXi kXi k−α . (9) As a result, we have SINR at the typical user given by PX ⋆ HX ⋆ kX ⋆ k−α S P = SINR := −α I +N Xi ∈Φ\{X ⋆ } PXi HXi kXi k where N indicates the noise power at the typical user. (10) 8 D. Performance Metric: SIR In this paper, we use the coverage probability to capture the reliability of the packet transmissions. Provided that noise power is minuscule compared to the signal or interference powers in practice, we use signal-to-interference (SIR) that have no noise term in (10) to measure the reliability of the proposed network. We consider slotted time and in each time slot, we declare successful transmissions if the SIR at the typical user is greater than a threshold value T . The coverage probability of the typical user is defined as pcov := P(SIR ≥ T ). (11) Another rationale behind using the SIR instead of SINR is that the metric emphasizes the impact of topological structure by canceling out the deterministic term N. E. Repulsion and Pair Correlation Function We discuss the pair correlation function of the our proposed model. It is known that the pair correlation function is a very useful measure to explain the repulsion. It basically measures the correlation between two arbitrary points in a point process Ξ. Definition 1: The pair correlation function is given by κ(x, y) := λ(x, y) , λ(x)λ(y) (12) where λ(x, y) is the factorial second moment density of Φ, and λ(x) and λ(y) are intensities of Ξ. Proposition 1: The pair correlation function of our proposed point process Φ is κ(x, y)=1 − 1 (1 + ρλ )2 almost everywhere (a.e.) (13) Proof: First, it suffices to consider points in {(x, y) : x 6= y ∈ R2 } since the set {(x, y) : x = y ∈ R2 } is measure zero and we can assume λ(x, x) = 0. To find the factorial second moment density function λ(x, y), we need to consider four sub-cases where each point can be from either the random shifted grid or the Poisson point process. By the stationarity, we see that λ(x, y) = λ2p + λp λg + λg λp + λg 1{x ∼g y} a.e., (14) where 1{x ∼g y} denotes an indicator function that takes one if both x, y are points of the random shifted grid. Since the event {x ∼g y} is only applied to countably many points, (13) follows immediately. 9 In general, the pair correlation function explains the repulsion between two points and takes a value between zero and one. If κ(x, y) = 0, it shows a strong repulsion and if κ(x, y) = 1, it shows no repulsion. If 0 < κ(x, y) < 1, it shows a moderate repulsion. Since we can adjust ρλ to control κ lying between zero and one, our proposed point process is able to capture repulsion of any stationary point process network model that has a pair correlation function. To establish connection with a point process having no pair correlation function, we can define an average pair correlation κ̂ between two points. i.e. For any increasing convex averaging sets An , 1 κ̂ := lim 2 n→∞ λ ν2 (An )2 Z κ(x, y)λ(x, y)dxdy, (15) An ×An where ν2 (·) is Lebesgue measure in R2 . Given the average pair correlation 0 ≤ κ̂ ≤ 1, one can easily fit into our proposed network using the average κ̂. Then our proposed point process minimizes the quadratic variation cost υ below among all point processes having the same average pair correlation rate: 1 υ := lim 2 n→∞ λ Vol(An )2 III. D ISTANCE TO THE Z An ×An [κ(x, y) − κ̂]2 λ(x, y)dxdy. N EAREST BASE S TATION AND (16) A SSOCIATION P ROBABILITY This section analyzes the distribution of the nearest base station of the proposed point process, i.e., the distance distribution from the origin to the nearest point of the proposed point process. Using the distribution, we can derive the association probability. The distances to the nearest point of Φg and Φp are given by Rg := inf kXi k, (17) Rp := inf kXi k, (18) Xi ∈Φg Xi ∈Φp The cumulative distribution function (CDF) and probability distribution function (PDF) of Rp are well-known and are given by P(Rp ≤ r) = 1 − exp(−πλp r 2 ), (19) fRp (r) = 2πλp r exp(−πλp r 2 ). (20) Now, we discuss the distribution of the nearest distance to the Φg , Rg . 10 Lemma 1: The PDF of Rg is 2πrs−2 fRg (r) = 2πrs−2 − if 0 ≤ r ≤ 2s , √ 8r arccos( 2rs ) if 2s < r ≤ 2s 2, s2 p where the constant s for the width of square lattice is s = 1/ λg . (21) Proof: Denoting a ball of radius r centered at x in R2 by B(x, r), the nearest distance Rg is represented by (a) Rg = inf{R > 0|Φg (B(0, R)) 6= ∅} = inf{R > 0| ∪Xi ∈Φg B(Xi , R) ∩ 0 6= ∅}. (22) where (a) is obtained by using the stationarity of Φg . Let us define s s s s S0 := − , × − , . 2 2 2 2 Then, the CDF of Rg is given by P(Rg < r) = P(inf{R > 0| ∪Xi ∈Φg B(Xi , R) ∩ 0 6= ∅} < r) ν2 (S0 ∩ B(0, r)) ν2 (S0 ) πr 2 if 0 ≤ r ≤ 2s , s2 q s π−4 arccos( 2r 2 ) r2 = 2 s2 − 2 + 4rs2 − 1 if 2s < r ≤ √s2 , 2 1 if r > √s2 (b) = (23) (24) where (b) follows from the fact that CDF of the first touch distance to a stationary point process is equivalent to the volume fraction of the stationary point process [18, Section 6.3.1.]. By taking the derivative of expression given in (24) with respect to r, we obtain the PDF. Corollary 1: The nearest distance distribution of the proposed point process is given by P(R ≤ r) = 1 − (1 − P(Rp ≤ r))(1 − P(Rg ≤ r)), (25) where P(Rg < r) and P(Rp < r) are (19) and (24), respectively. The expressions given in (19), (24) are used to calculate the association probability of the typical user. Throughout this paper, we write Ag and Ap to denote the event that the typical user is associated with either Φg or Φp , respectively. Theorem 1: The probability that the typical user is associated with either Φp or Φp is Z √2 Z √2 √ π 2 2 2 P(Ap ) = (1 − r )f (r) dr + r arccos(1/r) − r − 1 f (r) dr, 4 0 1 P(Ag ) = 1 − P(Ap ), (26) (27) 11 where the probability distribution function f (r) in (26) is ρλ η β 2 ρλ η β r exp −π r . f (r) = 2π 4 4 (28) Proof: If the typical user is associated with the nearest base station of the Poisson point process at distance Rp , it implies that received power from the nearest Poisson point process is greater than the received power from the nearest random shifted grid. The event Ap is described by Ap := whereas the event Ag is described by Ag := pg pp > α α Rp Rg , (29) pp pg < α α Rp Rg . (30) Note that Acp = Ag , Acg = Ap , and Ap ∪ Ag is the universal set. Using the event, we can describe the association probability P(Ap ) as follows. pg pp > α P(Ap ) = E 1 Rpα Rg pg pp (a) = E E 1 α > α Rp = r r Rg Z ∞ = P Rg ≥ rη −1/α fRp (r) dr 0 (b) Z (c) Z = ∞ 0 = ν2 (S0 \ B(0, rη −1/α )) 2 2πλp re−πλp r dr ν2 (S0 ) s 1/α η 2 0 2 (s2 − πr 2 η −2/α )2πλp re−πλp r dr √s η 1/α 2 π 2 s2 − 4rs sin(θ) − 2r 2 − 2θ 2πλp re−πλp r dr s 1/α 2 η 2 √ √ Z 2 Z 2 √ π 2 (d) = (1 − r )f (r) dr + r 2 arccos(1/r) − r 2 − 1 f (r) dr, 4 0 1 + Z (31) where (a) is obtained by conditioning on Rp , (b) is obtained by using the expression given in (23), (c) is given by denoting θ = arccos(s/2r), and (d) follows from the change of variables. Note that the expressions given in (26) or (27) are functions of the intensity ratio ρ and power ratio η. We explicitly quantify the impact of repulsion and transmit powers on the association. In the following, we derive the upper and lower bounds for the association probability. 12 Proposition 2: The association probability that the typical user is associated with Φp is lower and upper bounded by P(Ap ) ≥ 1 + P(Ap ) ≤ 1 + where the variables β, γ, ρ are π/2 − 1 e−πρ/2 − 1 β − γ, +√ √ ρ ρ( 2 − 1) e−πρ/2 − 1 π/2 − 1 +√ √ β, ρ ρ( 2 − 1) ρ = ρλ η 2/α , p p β = erf( πρ/2) − erf( πρ/4), γ = 0.0956(e−πρ/4 − e−πρ/2 ), and erf(z) := √2 π Rz 0 (32) (33) (34) (35) (36) 2 e−t dt. Proof: We develop the bounds by obtaining lower and upper bounds for the second integration in (26). We consider for 1 ≤ r ≤ √ g(r) := r 2 arccos(1/r) − √ r 2 − 1, 2. One can easily check that g(r) is a differentiable function with respect to r and that g(r) is a convex function since its second derivative with respect to r is greater than √ zero for the interval (1, 2). Then by fully exploiting the differentiability and the convexity of g(r), we suppose two linear bounds in the following. √ g( 2) − g(1) √ g(r) ≥ (r − 1.19) + 0.1662, (37) 2−1 √ g( 2) − g(1) √ g(r) ≤ (r − 1), (38) 2−1 √ for 1 ≤ r ≤ 2. We obtain the lower bound by applying the mean value theorem on the √ interval (1, 2) with approximating the tangential line numerically. We obtain the upper bound by finding the smallest linear function greater than g(r). Replacing g(r) of (31) with (37) and (38), we acquire the lower and upper bounds, respectively. For the moment, we assume pg = pp in order to emphasize the impact of topology onto the user association. If λp = λg , then P(Ap ) = 0.36, i.e., approximately two-fifths of users are associated with Φp . In other words, users associated with Φg is about fifty percent greater than users associated with Φp on average. In other words, our repulsive model yields the following. λp = λg =⇒ P(Ap ) ≤ P(Ag ). (39) Probability of being associated with Poisson point process 13 0.7 0.6 0.5 Bias toward Φ g @ ρ λ =1 0.4 0.36 ∆(P(Ap ))=0.14 0.3 λ g =λ p ; E[Φ g ]=E[Φ p ] 0.2 Analytic expression An analytic upper bound An analytic lower bound Simulation Poisson point processes 0.1 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 Intensity ratio Fig. 3. The probability that the typical user is associated with the Poisson point process. The transmit powers are assumed to be the same: pg = pp . The curve with square marks describes P(Âp ) given in (40) This contrasts to the association behavior of the typical user where the cellular network is modeled as Poisson point processes. Specifically, suppose we replace the random shifted grid Φg with an independent Poisson point process Φp′ with intensity λp′ . The association probability of the typical user in the Poisson network was derived in [6, Lemma 2.] and is P(Âp ) = λg λp , P(Aˆp′ ) = . λp ′ + λp λp ′ + λp (40) Therefore, if λp = λp′ , one half of users are associated with Φp . λp = λp′ =⇒ P(Âp ) = P(Aˆp′ ). (41) Figure 3 expresses P(Ap ) and its upper and lower bounds along with numerically obtained simulation results. The figure also delineates P(Âp ) in (40) for comparison. Figure 3 shows no intersection between (26) and (40), respectively. In other words, compared to the Poisson models, we show a bias toward the Φg in user association. Remark 1: Understanding the reasons for the association bias is critical. The bias in user association is originated from a geometrical and probabilistic property of the proposed network. In the proposed network, a randomly located user is always able to find a base station at a 14 p p distance less than 1/(2 λg ); In other words, P(R > 1/(2 λg )) = 0. In mathematical terms, the void probability of the proposed point process has a finite support. This contrasts to the Poisson point process whose void probability has infinite support P(R > r) = exp(−2πλr) where intensity is denoted by λ. As a result, the spatial structure of the random shifted grid produces the bias. It is important to mention the finite support of proposed model is consistent with most practical wireless communications where transmitters are located at distances less than infinity. In addition to characterizing the role of repulsive base stations in user association, Theorem 1 and Proposition 2 provide a practical insight on the deployment design of base stations. For instance, heterogeneous cellular networks are configured to have offloading gains: the macro base stations having many users distribute their users to another base stations with fewer users. The offloading is designed to alleviate heavy loaded queue of the macro base stations. Given that the locations of macro base stations show repulsion [1]–[3], the association probability of this paper proves the existence of biasing toward repulsive macro base stations. It means that the macro base stations would be congested heavier and the offloading affects the network greater than a Poisson model can predict [9]. IV. C OVERAGE P ROBABILITY As we discussed in previous section, the typical user is associated with either Φg or Φp with probability P(Ag ) and P(Ap ), respectively. Since the coverage probability is complex to analyze directly, we use the association probability to describe the coverage probability as pcov = P (SIR > T, Ag ) + P (SIR > T, Ap ) . (42) In fact, the coverage probability intersected with the association means the coverage probability of the typical user when the tagged transmitter is associated with either the random shifted grid or the Poisson point process. To understand the coverage probability in detail, let us suppose two Poisson point processes denoted by Φp and Φp′ . Simple expression for the coverage probability is readily obtained since pcov = P (SIR > T, Ap′ ) + P (SIR > T, Ap ) (43) and for P(SIR > T, Ap′ ) and P(SIR > T, Ap ), the association does not affect the intensity of Poisson point processes forming the interference seen at the typical user thanks to the strong Markov property of Poisson point process. 15 Fig. 4. The Figure depicts the random shifted grid (inverse triangles) and Poisson point process (triangles) seen at the typical user at the origin (star). we assume pg = pp and {Ap }. The exclusion ball of radius Rp is created around the typical user. In addition, the correlated structure of the random shifted grid produces the duplicate exclusion circles around all grid points in R2 . The perfect dependency between points of Φg causes the infinitely repeated circles. In contrast, our spatial model considers Poisson point process and random shifted grid which does not satisfy the strong Markov property; and then, for each association event, we need to consider the conditional point processes such that there are no points inside a certain exclusion area. We introduce notations such as Φ!∼r or Φ!∼r to indicate the point process are conditioned by g p the fact that no points of Φg or Φp exist inside the ball of radius r centered at zero, Φg (B(0, r)) ≡ 0 or Φp (B(0, r)) ≡ 0. Since we assume the nearest maximum receive power association, given that the typical user is associated with Φg at distance kUk, the radius of the exclusion ball for the Poisson point process is kUkη 1/α . On the other hand, given that the typical user is associated with Φp at the distance R, the radius of the exclusion ball for the random shifted grid is Rη −1/α . Now we are ready to work on the coverage probability intersected with the event of association. 16 First, the coverage probability of the typical user when it is associated with random shifted grid is given by P (SIR > T, Ag ) = P P ⋆ H ⋆ /kX ⋆ kα PX X > T, Rp > kX ⋆ kη 1/α α PXi HXi /kXi k Xi ∈Φ\{X ⋆ } P ⋆ H ⋆ /kX ⋆ kα (a) d PX X = EU P > T, Rp > kX ⋆ kη 1/α X ⋆ = U α PXi HXi /kXi k Xi ∈Φ\{X ⋆ } PU HU /kUkα (b) 1/α 1/α P R > kUkη R > kUkη > T = EU P·|U P (44) p p ·|U PXi HXi /kXi kα Xi ∈Φ\{U } (c) = EU P ·|U P pg HU /kUkα P·|U (Rp > kUkη 1/α ) > T PXi HXi /kXi kα (45) !∼kU kη 1/α Xi ∈Φg \{U }∪Φp where (a) is given by conditioning on the random variable U, (b) is obtained by Bayes rule using the notation P·|U := P(·|U), and (c) follows from the fact that given Rp > kUkη 1/α , the Poisson point process has no points inside the ball of radius kUkη 1/α . In addition, P·|U P pg HU /kUkα > T PXi HXi /kXi kα (46) !∼kU kη 1/α Xi ∈Φg \{U }∪Φp (d) = E·|U 1 α pg HU /kUk P >T PXi HXi /kXi kα 1/α !∼kU kη (47) Xi ∈Φg \{U }∪Φp α −1 = E·|U P H > T kUk pg IΦg \{U } + I !∼kU kη1/α Φp (e) α −1 = E·|U exp −T kUk pg IΦg \{U } + I !∼kU kη1/α Φp = LIΦg \{U } T kUkα p−1 LI g !∼kU kη 1/α Φp T kUkα p−1 , g (48) (49) (50) where (d) is given by P(A) = E[1{A}] where 1{·} denotes an indicator function and (e) is obtained by using the distribution of random variable H. Note that in (50) the L· (ξ) is defined 17 to indicate the conditional expectation of the functional on the the conditional point process. Inserting (50) into (45), the coverage probability becomes α −1 α −1 1/α P(SIR > T, Ag ) = EU LIΦg \{U } T kUk pg LI !∼kU kη1/α T kUk pg P·|U (Rp > kUkη ) Φp (51) where the probability P·|U and distribution of U are 2 η 2/α P·|U (Rp > kUkη 1/α ) = e−πλp kU k fU (u) = , 1 . ν2 (S0 ) Then, deriving the coverage probability boils down to finding the conditional expectation of functional on the conditional point process LIΦg \{U } (·) and LI !∼kU kη 1/α Φp (·). Similarly, we derive the coverage probability of the typical user when it is associated with Poisson point process. P (SIR > T, Ap ) = P P ⋆ H ⋆ /kX ⋆ kα PX X > T, Rg > kX ⋆ kη −1/α α PXi HXi /kXi k (52) Xi ∈Φ\{X ⋆ } P ⋆ H ⋆ /kX ⋆ kα d PX X > T, Rg > kX ⋆ kη −1/α kX ⋆ k = R = ER P α PXi HXi /kXi k Xi ∈Φ\{X ⋆ } P = ER ·|R P pg HR /kRkα P·|R (Rg > Rη −1/α ) > T PXi HXi /kXi kα Xi ∈Φ!∼R ∪Φp!∼Rη p (53) (54) −1/α where we use the technique given above. Then the coverage probability becomes h i α −1 −1/α P(SIR > T, Ap ) = ER LIΦ \Rη−1/α T Rα p−1 T R p L P (R > Rη ) , (55) I g ·|R g g Φ!∼R g p where the probability P·|R and distribution R are P·|R (Rg > Rη −1/α ν2 (S0 \ B(0, Rη −1/α )) , )= ν2 (S0 ) 2 FR (r) = 2πλp re−πλp r . and similarly, deriving the coverage probability boils down to finding the conditional expectation of the functional on the conditional point process LI !∼Rη −1/α Φg (·) and LIΦ!∼R (·). p 18 In the next step, we derive the conditional expectation of functional on the conditional point process. In the following, we call the Laplace transforms because of its resemblance to the original Laplace transform. Lemma 2: The Laplace transforms of interference from Poisson point processes are Z ∞ pp ξu1−α du , LIΦ∼R (ξ) = exp −2πλp −α p R 1 + pp ξu Z ∞ pp ξu1−α LI ∼kU kη1/α (ξ) = exp −2πλp du . −α Φp kU kη1/α 1 + pp ξu (56) (57) Proof: Since we assume homogeneous Poisson point process, applying the radius of exclusion ball and the strong Markov property produces the results. Lemma 3: The Laplace transforms of interference from random shifted grids are Z Y 1 PU ′ (du′ ), LI !∼Rη−1/α (ξ) = ′ −α 1 + p ξku + s(z , z )k −1/α Φg g 1 2 S0 \B(0,Rη ) 2 (58) (z1 ,z2 )∈Z LIΦg \kU k (ξ) = Y (z1 ,z2 )∈Z2 \(0,0) 1 , 1 + pg ξkU + s(z1 , z2 )k−α (59) d where U ′ = uniform[S0 \ B(0, rη −1/α )]. Proof: We have −s P p HkXi k−α !∼Rη −1/α g Xi ∈Φg LI !∼Rη−1/α (ξ) := E·|R e Φg −s P p HkXi k−α !∼Rη −1/α g Xi ∈Φg |Φg = EΦg |R EH|R e (a) (b) Y = EΦg |R Xi ∈Φg!∼Rη 1 1 + pg ξkXi k−α −1/α 2 (c) = EU ′ |R = Z Z Y (z1 ,z2 ) 1 + pg ξ||u′ 2 Z Y S0 \B(0,Rη−1/α ) (z ,z ) 1 2 1 + s(z1 , z2 )||−α 1 PU ′ (dv), 1 + pg ξkv + s(z1 , z2 )k−α (60) where (a) is obtained by conditioning on the locations of the random shifted grid, (b) is obtained by the Laplace transform of an exponential random variable H with unit mean, (c) follows from the fact that all points of random shifted grid is measurable with respect to the uniform random variable U ′ that take a value uniformly in S0 \B(0, Rη −1/α ). We denote the set S0 \B(0, Rη −1/α ) into S0′ 19 On the other hand, the Laplace transform of the interference given that the typical user is associated with the nearest shifted grid is i h P −s X ∈Φg \{U } pg H/kXi kα i LIΦg \kU k (ξ) := E·|U e ii h h P −s X ∈Φg \{u} pg HkXi k−α i = E·|U E e 2 Z Y = −α (z1 ,z2 )6=(0,0) 2 = Z Y (z1 ,z2 )6=(0,0) E·|U [e−sHpg kXi k ] 1 . 1 + pg ξkU + s(z1 , z2 )k−α (61) Note that given that the typical user is associated with kUk, the nearest base station of the random shifted grid does not comprise the interference; thus, the nearest point Z2 = (0, 0) should be removed. In addition, the random shifted grid is measurable with respect to the associated base station kUk. Since we have the Laplace transform of the interference, the coverage probability of the typical user is easily obtained. Theorem 2: The coverage probability of the typical user is Z Z2 R∞ Y T ηkukα v 1−α 2 2/α dv −2πλ p kukη 1/α 1+T ηkukα v −α e−πλp kuk η e pcov = S0 + Z 0 ∞ (z1 ,z2 )6=(0,0) ν2 (S0′ ) −2πλp Rr∞ ν2 (S0 ) e T r α v 1−α 1+T r α v −α dv Z S′ 2 Z Y 1+ (z1 ,z2 ) η−1 T r α ||v+s(z1 ,z2 )||α 1 1+ T kukα ||u+s(z1 ,z2 )||α PU (du) PU ′ (dv) fR (r) dr (62) Proof: To obtain P(SIR > T, Ag ), we insert the expressions (57) and (59) evaluated at ξ = T kukα p−1 into the expression in (51). Then use the fact that P(Rg > rη −1/α ) := g ν2 (S0 \B(0,rη−1/α )) ν2 (S0 ) = ν2 (S ′ ) . ν2 (S0 ) To derive P(SIR > T, Ap ), we insert (56) and (58) evaluated at 2 η 2/α 1/α ξ = T r α p−1 ) = e−πλp kuk p into the expression in (55). Then use the fact that P(Rp > kukη . The summation of P(SIR > T, Ag ) and P(SIR > T, Ap ) produces the coverage probability of the typical user at the origin. The above expression for the coverage probability explicitly describes a chance that the typical user is being covered, i.e., the SIR of the typical user is greater than the threshold T . Since the above coverage expression is a function of the network parameters including λg , λp , pg , pp , and α, we know the behavior of coverage probability with respect to those parameters in 20 the proposed repulsive cellular network. The influence of repulsive structure is clarified in the following proposition. Proposition 3: The coverage probability of the typical user at the origin can be rewritten into Z R Y T ηkûkα w1−α 1 2 2/α −2πρλ ∞ 1/α dw kûkη 1+T ηsα kûkα w−α e PÛ (dû) pcov = e−πρλ kûk η T kûkα 1 + Sˆ0 α kû+(z1 ,z2 )k (z ,z )∈Z2 1 2 6=(0,0) + Z 0 ∞ Z T r̂ α w1−α ν2 (Sˆ0′ ) −2πρλ Rr̂∞ 1+T α w−α dw r̂ e ν2 (Sˆ0 ) Ŝ0 \B(r̂η−1/α ) 2 Z Y PÛ ′ (dû′ ) 1+ (z1 ,z2 ) η−1 T r̂ α kû+(z1 ,z2 )kα fRˆp (r̂) dr̂, (63) ′ where Û ′ = uniform[Sˆ0 ] , Sˆ0′ := Sˆ0 \ B(0, r̂η −1/α ), Û = uniform[Sˆ0 ] where Sˆ0 := [−1/2, 1/2] × 2 [−1/2, 1/2], and fRˆp (r̂) := 2πρλ r̂e−πρλ r̂ . Note that the coverage expression given in (62) becomes a function of only the intensity ratio ρλ ,the power ratio η, and α. Proof: Given in Appendix A Remark 2: The coverage probability of the typical user is explicitly given in Theorem 2 and Proposition 3 as a function of intensities and transmit powers. In fact, Proposition 3 capture the repulsive structure of the proposed network into the single variable ρλ and compactly describes the coverage probability using it. Since ρλ is defined as λg /λp or E[Φg (A)]/ E[Φp (A)], Proposition 3 concisely shows the influence of the repulsive base stations. Remark 3: The coverage expression given in Proposition 3 can find its use as a one way of predicting the coverage probability of any repulsive networks mentioned in Section II-E. In those applications, κ or κ̂ can be computed numerically or analytically. Then, using the simple relationship between κ and ρλ that we provided in (13), those networks are projected onto our proposed network and the coverage probability is obtained by using (63) with η = 1. Therefore, the expression in (63) fundamentally address the influence of repulsive structure in any type of wireless networks that adapt the nearest receiver association principle. V. B OUNDS FOR THE C OVERAGE P ROBABILITY In this section, we provide the lower and upper bounds for the coverage probability. First, we derive the upper and lower bounds for the Laplace transforms in (51) and (55). 21 Lemma 4: For an arbitrary square truncation window denoted by W in R2 that satisfies W ⊇ S0 , the Laplace transform of interference from random shifted grid in (51) yields P − z LIΦg \{U } (ξ) ≥ e ξpg 2 α 1 ,z2 ∈Z \(0,0) kU +s(z1 ,z2 )k Y LIΦg \{U } (ξ) ≤ , (64) 1 . 1 + ξpg kU + s(z1 , z2 )k−α 2 (z1 ,z2 )∈Z ∩W (65) The Laplace transform of interference from random shifted grid given in (55) yields 2π − (ξ) ≥ e Z LI !∼Rη−1/α (ξ) ≤ LI !∼Rη −1/α Φg S0′ Φg R∞ Rη −1/α Y ( v log 1+ξpg v −α ) dv ν2 (S ′ ) 0 2 (z1 ,z2 )∈Z ∩W , (66) 1 PU ′ (dv). 1 + ξpg kv + s(z1 , z2 )k−α (67) where Z2 ∩W indicates the set of integer pairs in R2 ∩W . Proof: Given in Appendix B Remark 4: As the size of window kW k increases, both upper bounds given in (65) and (67) become tighter in the expense of a marginal computational complexity. Theorem 3: The coverage probability of the typical user is Z R PZ2 \(0,0) T kukα 2 2/α − −2πλp ∞ 1/α kukη e−πλp kuk η e z1 ,z2 ku+s(z1,z2 )kα e pcov ≥ ηT kukα v 1−α 1+ηT kukα v −α dv PU (du) S0 + Z ∞ 0 ν2 (S0′ ) − e ν2 (S0 ) 2π ( R∞ u log 1+η −1 T r α u−α rη −1/α ν2 (S ′ ) 0 ) du −2πλp R∞ r T r α u1−α 1+T r α u−α du fR (r) dr. (68) The coverage probability of the typical user is pcov ≤ + Z 0 −πλp kuk2 η2/α e e S0 Z ∞ −2πλp ηT kukα v 1−α kukη 1/α 1+ηT kukα v −α R∞ 1+T Z 1−α T rα v ν2 (S0′ ) −2πλp Rr∞ 1+T dv r α v −α e ν2 (S0 ) S′ dv PU (du) 1 PU ′ (du) fRp (r) dr. (1 + η −1 T r α kuk−α ) (69) Proof: The expressions (64) and (65) evaluated at ξ = T kUkp−1 g yield the lower and upper bounds for the P(SIR > T, Ag ); the expressions (66) and (67) evaluated at ξ = T Rp p−1 p produces lower and upper bounds for the P(SIR > T, Ap ). The expressions in (68) and (69) are given by adapting the simplest window W := S0 . They are much simpler than the original coverage expression in (62) and are numerically computable. The upper bounds and lower bounds are numerically validated in Section VI. 22 VI. N UMERICAL A NALYSIS : S YSTEM L EVEL S IMULATIONS In this section, we show the coverage probability of the typical user obtained from simulations, verify the bounds for the coverage probability, and discuss the behavior of typical transmission affected by repulsive structure. We perform Monte Carlo system level simulation with the number of iterations N. Figure 5 and Figure6 showed the simulation results and analytical lower (Figure 5) and upper (Figure 6) bounds given by Theorem 3. In general, both upper and lower bounds are very tight. We consider window W = [−3s/2, 3s/2] × [−3s/2, 3s/2]. It is important to mention that the bounds become tighter as the window size increases. The figures show that changing the intensity ratio shifts the coverage curves. The influence of changing the intensity ratio is greater in α = 4 than α = 3. Almost all users in repulsive networks are affected by topological changes. To clarify the impact of repulsive structure, we introduce extra simulation constraint that nullifies the edge effects. Specifically, for a simulation window W , we maintain the mean number of base stations to be a constant for any intensity ratio. E[Φ(W )] := C(≥ 100) (70) By doing so, the topological influence of repulsive structure is emphasized. Figure 7 and 8 are numerically obtained under this constraint. If ρλ = 3 and C = 100 then, λp = 75 and λg = 25. By doing so, the number of base stations are maintained. In Figure 7, the SIR coverage probability of the typical user is delineated with respect to the inverse of the intensity ratio. We assume α = 4 and pg = pp . The figure demonstrates that at −1 α = 4 and ρ−1 λ = 0.01, about 57% of users have SIRs greater than 0 dB. However, at ρλ = 1.7 about 66% of users have SIRs greater than 0dB. This monotonic increasing property is observed for any α > 2. Furthermore, with no rigorous proof, when η = 1, we observe that the first order derivatives of coverage curves are maximized at ρλ ≈ 1. In other words, if pg = pp , the coverage probability is the most sensitive if the number of repulsive base stations and the number of random base stations are about the same. In the same vein, Figure 8 describes the coverage probability with respect to the power ratio η. The figure demonstrates that at ρλ = 1, α = 3 and η −1 = 0.1, about 30 percent of users have SIR greater than 1. At η −1 = 6.3, 50 percent of users have SIR greater than 1. The monotonic increasing property is observed for α > 2. Remark 5: We find the coverage probability is a monotonically increasing function with respect to the inverse of intensity ratio and/or the inverse of power ratio. The behavior of the typical user 23 1 α=4 ρ =4 (Sim) λ α=4 ρ =4 (LB) 0.9 λ α=3, ρ =4 (Sim) Coverage probability of the typical user λ α=3, ρ =4 (LB) 0.8 λ α=4,ρ =0.25 (Sim) λ α=4,ρ =0.25 (LB) λ 0.7 α=3,ρ =0.25 (Sim) λ α=3,ρ =0.25 (LB) λ 0.6 0.5 0.4 0.3 0.2 0.1 0 -20 -15 -10 -5 0 5 10 15 20 Threshold (dB) Fig. 5. This figure represents the coverage probability obtained by simulations (Sim) and their corresponding analytic lower bounds (LB) given in (68). We consider α = 3 and α = 4 when η = 1. We consider ρλ : 0.25 and 4. The lower bound in Theorem 3 is very tight for α = 3, 4. The truncation window is defined as W = [−3s/2, 3s/2]2 in the proposed model sharply contrasts to the behavior of the typical user in Poisson networks; the coverage probability of the typical user in Poisson networks was derived in [4] and it proves that SIR does not respond to the intensity parameter λ; see [4, Theorem 1]. In other words, the Poisson models predict that SIR does not scale with respect to intensity. However, we find that if repulsive base stations are considered, the SIR scales monotonically with respect to ρ−1 ; in other words, the reliability of any network with repulsive network elements is able to be improved (or be diminished) by allowing (or denying) repulsive transmitters. VII. C ONCLUSIONS In this paper, we developed a scalable modeling technique representing the repulsive base stations and uncorrelated base stations. This paper derived the association probability, the Laplace transform of interference, and the coverage probability of the typical user. Our findings can be summarized into three points. First, the typical user is more likely to be associated with a repulsive base station rather than an uncorrelated base station. Second, the expressions for the 24 1 α=4,ρ =2 (Sim) λ α=4,ρ =2 (UB) 0.9 λ α=3,ρ =2 (Sim) Coverage probability of the typical user λ α=3,ρ λ =2 (UB) 0.8 α=4,ρ =0.5 (Sim) λ α=4,ρ =0.5 (UB) λ 0.7 α=3,ρ =0.5 (Sim) λ α=3,ρ λ =0.5 (UB) 0.6 0.5 0.4 0.3 0.2 0.1 0 -20 -15 -10 -5 0 5 10 15 20 Threshold (dB) Fig. 6. This figure represents the coverage probability obtained by simulations (Sim) and their corresponding analytic upper bounds (UB) given in (69). We consider α = 3 and α = 4 when η = 1. We consider ρλ : 0.5 and 2. The upper bound in Theorem 3 is very tight for α = 3, 4. The truncation window is defined as W = [−3s/2, 3s/2]2 association and the coverage requires only two parameters, intensity ratio and power ratio. Third, the coverage probability scales with respect to the number of repulsive base stations. One can extend these results in many ways including the following directions. The repulsive base stations can be modeled into a hexagonal shifted grid. The Nakagami fading channels or a dual slope path loss function akX − Y kα1 l(kX − Y k) = bkX − Y kα2 0 if 0 ≤ kX − Y k ≤ d1 if d1 ≤ kX − Y k ≤ d2 if D2 ≤ kX − Y k where a, b, α1 , α2 ≥ 0. This assumption can be applied to understand the repulsion in millimeter wave networks or any dense wireless networks. In addition, the numerical observation made in Section VI can be rigorously proved by showing that the expression given in (62) is a monotonic increasing function with respect to the inverse of intensity ratio ρ−1 λ ; its first order derivative with respect to the intensity ratio is always less than zero. 25 1 0.9 0.8 α=2 α=2.5 α=3 α=3.5 α=4 P(SIR>1) 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 10 -2 10 -1 10 0 Inverse of intensity ratio Fig. 7. This figure represents the percentage of user that have SIR greater than one with respect to inverse of the intensity ratio. We assume pg = pp and X, Y axes are log scaled. For α > 2, the coverage probability is monotonically increasing with respect to the inverse of the intensity ratio. A PPENDIX A P ROOF OF P ROPOSITION 3 Therefore, we need to show that P(SIR > T, Ag ) and P(SIR > T, Ap ) are functions of intensity ratio and power ratio. First, P(SIR > T, Ag ) can be given by Z R Y T η||u||α v 1−α 1 2 2/α dv −2πλp ∞ 1/α 1+T ηkukα v −α kukη PU (du) e−πλp kuk η e T kukα 1 + S0 α 2 ||u+s(z1 ,z2 )|| (z1 ,z2 )∈Z \(0,0) Z α α 1−α R Y 1 2 2/α −2πλp ∞ 1/α s T ηkαûk vα −α dv u=sû skûkη 1+T ηs kûk v = e−πρλ kûk η e PÛ (dû) T kûkα 1 + Sˆ0 α 2 kû+(z1 ,z2 )k (z1 ,z2 )∈Z \(0,0) Z R Y T ηkûkα w1−α 1 dw −2πρλ ∞ 1/α v=sw −πρλ kûk2 η2/α 1+T ηsα kûkα w−α k ûkη PÛ (dû), = e e T kûkα 1 + kû+(z1 ,z2 )kα Sˆ0 (z ,z )∈Z2 \(0,0) 1 2 where Û = Uniform([− 21 , 12 ] × [− 21 , 21 ]) and then PÛ (du) = 1 · dx dy. 26 1 α=2.5 α=3 α=3.5 α=4 0.9 0.8 0.7 P(SIR>1) 0.6 0.5 0.4 0.3 0.2 0.1 0 10 -1 10 0 10 1 Inverse of power ratio Fig. 8. This figure represents the percentage of users that have SIR greater than one with respect to the inverse of power ratio. We assume λg = λp . For given α > 2 and T = 1, the coverage probability of the typical user is monotonically increasing with respect to the inverse of the power ratio. On the other hand, P(SIR > T, Ap ) can be given by Z ∞ Z Z2 R ∞ T r α v1−α ′ Y ν2 (S0 ) −2πλp r 1+T rα v−α dv e ν2 (S0 ) 1+ 0 S0 \B(0,rη−1/α ) (z1 ,z2 ) u′ =sû′ = r=sr̂ = v=sw = Z Z ∞ 0 ∞ 0 Z 0 ∞ ν2 (S0′ ) −2πλp Rr∞ T rα vα1−α dv 1+T r v −α e ν2 (S0 ) Z 1 η−1 T r α ||u′ +s(z1 ,z2 )||α 2 −1/α Sˆ0 \B(0, rη s Z Y ) (z ,z ) 1 2 PU ′ (du′ ) fR (r) dr s 1+ s−α η−1 T r α ||û′ +(z1 ,z2 )||α PÛ ′ (dû′ ) fRp (r) dr Z Z2 R ∞ sα T r̂ α v1−α Y ν2 (Sˆ0′ ) −πρλ r̂ 2 −2πλp sr̂ 1+sα T r̂ α v−α dv 2πρλ r̂e e ν2 (Sˆ0 ) Ŝ0 \B(0,r̂η−1/α ) (z ,z ) 1 + 1 2 R α 1−α ν2 (Sˆ0′ ) 2 −2πρλ ∞ T r̂ w dw r̂ 1+T r̂ α w−α 2πρλ r̂e−πρλ r̂ e ˆ ν2 (S0 ) Z 2 Z Y Ŝ0 \B(0,r̂η−1/α ) (z ,z ) 1 2 1 η−1 T r̂ α kû+(z1 ,z2 )kα 1 1+ η−1 T r̂ α kû+(z1 ,z2 )kα PÛ ′ (dû′ ) PÛ ′ (dû′ ) dr̂, where Û ′ = Uniform([− 12 , 12 ] × [− 21 , 12 ] \ B(0, r̂η −1/α )). Therefore, the coverage probability of the typical user is a function of only ρλ and η. 27 A PPENDIX B P ROOF OF L EMMA 4 Firstly, we develop upper and lower bounds for the Laplace transform of the interference given in (51). Note that the interference is comprised of signals from both random shifted grid and Poisson point process. The Laplace transform of interference created by the Poisson point process is well-known and does not require a bound. We need to find the upper and lower bounds for the interference created by the random shifted grid in (51). We have P LIΦg \{U } (ξ) = e ≥ e− where we use log 1 1+x (z1 ,z2 )∈Z2 ∩W \(0,0) P log (z1 ,z2 )∈Z2 ∩W \(0,0) 1 1+ξpg kU +s(z1 ,z2 )k−α ξpg kU +s(z1 ,z2 )k−α (71) , (72) ≥ −x for x ∈ (0, ∞). In order to find an upper bound for (51), we define a measurable function ϕ(·) such that Y 1 ϕ(U, ξ) := . (73) 1 + ξpg ||U + s(z1 , z2 )||−α 2 (z1 ,z2 )∈Z Since the element 1/(1 + ξpg kU + s(z1 , z2 )k−α ) takes a value between zero and one, we have Y 1 , (74) LIΦg \{U } (ξ) = ϕ(U, ξ) ≤ 1 + ξpg kUk−α 2 (z1 ,z2 )∈Z ∩W where the inequality follows by truncating the function ϕ(U, ξ) by finite terms. We denote the truncation window by W . Applying (72) or (74) into (51), we obtain the lower and the upper bounds, respectively. Secondly, we develop lower and upper bounds for the Laplace transform of the interference created by the random shifted grid. In order to find the lower bound for (55), we have P log !∼Rη −1/α LI !∼Rη−1/α(ξ) = E·|R eXi ∈Φg 1 1+ξpg kXi k−α Φg − = E·|R e R R2 log(1+ξpg kxk−α )Φg!∼Rη −1/α (dx) , 28 where we have the second equality by changing the summation into an integration form. Moreover, Z ξpg !∼Rη−1/α Φg (dx) E·|R exp − log 1 + kxkα R2 Z ξpg !∼Rη−1/α ≥ exp − E·|R log 1 + Φg (dx) kxkα R2 Z ξpg !∼Rη−1/α E[Φg (dx)] , = exp − log 1 + kxkα R2 (75) (76) (77) where we use Jensen’s inequality and Campbells mean value formula [13]. We denote the conditional intensity measure of the random shifted grid by M Φg!∼Rη −1/α (dx) and it is S 1{x ∈ / Xi ∈s·Z2 B(Xi , Rη −1/α )} M !∼Rη−1/α (dx) = dx Φg ν2 (S0 \ B(Rη −1/α )) 1{x ∈ R2 \B(0, Rη −1/α )} dx. ν2 (S0 \ B(0, Rη −1/α )) ≤ (78) where 1{A} denote the indicator function for event {A}. In other words, the intensity measure is upper bounded by the same uniform measure in S0 \ B(0, rη −1/α ) that will nonzero for all the grid points except the origin. By inserting (78) into (77), we have 2π LI !∼rη −1/α Φg − (ξ) ≥ e ξpg du u log 1+ α u Rη −1/α ν2 (S0 \B(0,Rη −1/α )) R∞ . In order to find the upper bound for (55), we use the measurable function ϕ(·). Then, Y 1 ϕ(U ′ , ξ) := 1 + ξpg ||U ′ + s(z1 , z2 )||−α 2 (79) (80) (z1 ,z2 )∈Z ≤ Y 2 (z1 ,z2 )∈Z ∩W 1 + ξpg kU ′ 1 . + s(z1 , z2 )k−α Here we also consider the truncation window W . Then applying ϕ(U ′ ) ≤ ϕtrun (U ′ ) E[ϕ(U)] ≤ E[ϕtrun (U ′ )] yields Z LI !∼rη−1/α (ξ) ≤ Φg S0 \B(0,Rη−1/α ) Y (z1 ,z2 )∈Z2 ∩W 1 PU ′ (du). 1 + ξpg ku + s(z1 , z2 )k−α (81) =⇒ (82) Applying the expression given in (79) or (82) into (55), we obtain the lower and upper bounds. 29 R EFERENCES [1] Y. Zhou, Z. Zhao, Q. Ying, R. Li, X. Zhou, and H. Zhang, “Two-tier spatial modeling of base stations in cellular networks,” in Proc. IEEE PIMRC, 2014, pp. 1570–1574. [2] C.-H. Lee, C.-Y. Shih, and Y.-S. Chen, “Stochastic geometry based models for modeling cellular networks in urban areas,” Wireless networks, vol. 19, no. 6, pp. 1063–1072, 2013. [3] Y. J. Chun, M. O. Hasna, and A. Ghrayeb, “Modeling heterogeneous cellular networks interference using Poisson cluster processes,” IEEE J. Sel. Areas Commun., vol. 33, no. 10, pp. 2182–2195, Oct 2015. [4] J. Andrews, F. Baccelli, and R. Ganti, “A tractable approach to coverage and rate in cellular networks,” IEEE Trans. Commun., vol. 59, no. 11, pp. 3122–3134, Nov. 2011. [5] H. S. Dhillon, R. K. Ganti, F. Baccelli, and J. G. Andrews, “Modeling and analysis of K-tier downlink heterogeneous cellular networks,” IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp. 550–560, Apr. 2012. [6] H.-S. Jo, Y. J. Sang, P. Xia, and J. Andrews, “Heterogeneous cellular networks with flexible cell association: A comprehensive downlink SINR analysis,” IEEE Trans. Wireless Commun., vol. 11, no. 10, pp. 3484–3495, Oct. 2012. [7] S. Mukherjee, “Distribution of downlink SINR in heterogeneous cellular networks,” IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp. 575–585, Apr. 2012. [8] R. W. Heath, M. Kountouris, and T. Bai, “Modeling heterogeneous network interference using Poisson point processes,” IEEE Trans. Signal Process., vol. 61, no. 16, pp. 4114–4126, Aug 2013. [9] S. Singh and J. G. Andrews, “Joint resource partitioning and offloading in heterogeneous cellular networks,” IEEE Trans. Wireless Commun., vol. 13, no. 2, pp. 888–901, 2014. [10] H. S. Dhillon, R. K. Ganti, and J. G. Andrews, “Load-aware modeling and analysis of heterogeneous cellular networks,” IEEE Trans. Wireless Commun., vol. 12, no. 4, pp. 1666–1677, Apr. 2013. [11] Q. Ye, B. Rong, Y. Chen, M. Al-Shalash, C. Caramanis, and J. G. Andrews, “User association for load balancing in heterogeneous cellular networks,” IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2706–2716, Jun. 2013. [12] M. Haenggi and R. K. Ganti, Interference in large wireless networks. Now Publishers Inc, 2009. [13] F. Baccelli and B. Blaszczyszyn, Stochastic geometry and wireless networks: Theory. Now Publishers Inc, 2009, vol. 1. [14] I. Nakata and N. Miyoshi, “Spatial stochastic models for analysis of heterogeneous cellular networks with repulsively deployed base stations,” Performance Evaluation, vol. 78, pp. 7–17, 2014. [15] N. Deng, W. Zhou, and M. Haenggi, “The Ginibre point process as a model for wireless networks with repulsion,” IEEE Trans. Wireless Commun., vol. 14, no. 1, pp. 107–121, Jan 2015. [16] Y. Li, F. Baccelli, H. S. Dhillon, and J. G. Andrews, “Statistical modeling and probabilistic analysis of cellular networks with determinantal point processes,” IEEE Trans. Commun., vol. 63, no. 9, pp. 3405–3422, 2015. [17] A. M. Ibrahim, T. ElBatt, and A. El-Keyi, “Coverage probability analysis for wireless networks using repulsive point processes,” arXiv preprint arXiv:1309.3597, 2013. [18] S. N. Chiu, D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic geometry and its applications. John Wiley & Sons, 2013. [19] T. S. Rappaport et al., Wireless communications: principles and practice. [20] A. Goldsmith, Wireless communications. Prentice Hall New Jersey, 1996, vol. 2. Cambridge university press, 2005. [21] D. J. Daley and D. Vere-Jones, An introduction to the theory of point processes: volume II: general theory and structure. Springer Science & Business Media, 2007.
© Copyright 2026 Paperzz