Professional Documents
Culture Documents
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 5, MAY 2013
Manuscript received April 15, 2011; revised November 2, 2012. This paper
was presented in part at the IEEE International Conference on Communications, Budapest, Hungary, June 2013. This research was supported, in
part, by the National Research Foundation of Korea (NRF) grant funded by
the Korea government (MEST) (No. 2012-0005091 and No. 2012-0000919),
SRG ISTD 2012037, CAS Fellowship for Young International Scientists
Grant 2011Y2GA02, and SUTD-MIT International Design Centre under Grant
IDSF1200106OH.
Y. S. Soh was with the Institute for Infocomm Research, and is now with
the Department of Computing and Mathematical Sciences, California Institute
of Technology, 1200 E. California Blvd., Pasadena, CA 91125, USA (e-mail:
ysoh@caltech.edu).
T. Q. S. Quek is with the Singapore University of Technology and
Design and the Institute for Infocomm Research, Singapore (e-mail:
tonyquek@sutd.edu.sg).
M. Kountouris is with SUPELEC (Ecole Superieure dElectricite), Gif-surYvette, France (e-mail: marios.kountouris@supelec.fr).
H. Shin is with the Department of Electronics and Radio Engineering, Kyung Hee University, Gyeonggi-do 446-701, Korea (e-mail:
hshin@khu.ac.kr) (corresponding author).
Digital Object Identifier 10.1109/JSAC.2013.130503.
I. I NTRODUCTION
c 2013 IEEE
0733-8716/13/$31.00
841
842
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 5, MAY 2013
Pt,i hx g(x)
2
y(x) Pt,y hy g(y) +
(1)
(4)
1
.
1 + (, )
(7)
843
i=2
r=0
(8)
where gi (r) is the pdf of the i-th nearest point from a PPP,
2 i r 2i1 iM
such that gi (r) =
exp(r2 M ). For 2 = 0,
(i1)!
PSS (, ) can be simplified as
PSS (, ) =
1 + (, )E{as(a)}/E{a}
.
(1 + E{s}(, ))(1 + (, ))
(9)
(10)
844
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 5, MAY 2013
M q(PM0 + M PM )
min
q
(11)
PRS :
+M (1 q)Psleep
s.t. P (, )
RS
where q is the fraction of MBSs that are still operating. In order to solve the above problem, we first show that the coverage
probability is an increasing function of a certain variable x.
Then, we find the value x that satisfies the constraint tightly,
and finally, we solve the minimization problem subject to the
condition x . Therefore, rewriting qM = S in Theorem 1,
we have
Lemma 3. For 2 > 0 and > 2, the coverage probability
PRS increases with increasing S.
Proof: By
rewriting the success probability,
=
we have S r=0 2r exp(r2 Sc1 ) exp(r c2 )dr
=
obtain
T x=0 2 exp(xT c1 ) exp(x/2 c2 )dx
S y=0 2 exp(ySc1 ) exp(y /2 (S/T )/2 c2 )dx
>
S y=0 2 exp(ySc1 ) exp(y /2 c2 )dx. The last step
makes use of the fact > 2 and c2 = 2 > 0. Hence, we
have PRS increases with S.
From Lemma 3, we may conclude that the minimum power
consumption occurs when qM satisfies the constraint tightly.
Hence, qPC,RS
is given by
= 2qPC,RS
M
r exp(r2 qPC,RS
M (1 + (, )))
r=0
(12)
2) Power Consumption Minimization with Strategic Sleeping: The minimization problem in the case of strategic sleeping is formulated similarly as
M (E{s})(PM0 + M PM )
min
s
(13)
PSS :
+M (1 E{s})Psleep
s.t. PSS (, ) .
Solving the above optimization problem is more challenging
in the case of strategic sleeping since before stating that the
constraint is satisfied by equality, we first need to compute the
optimal strategy as shown in the following lemma.
Lemma 4. For a fixed E{s}, the strategy that optimizes
the success probability per active user is to have s(a) =
1{aa0 } (a) for some a0 . That is to say, the strategy takes
a form of a threshold function where the MBS is switched on
if the activity exceeds a0 .
Proof: See Appendix D.
Therefore, the optimal solution s (a) can be characterized
by a single variable a0 , which we denote as a . The optimization problem is solved using equality for the QoS constraint,
in which case, the solution is characterized based on a .
Theorem 3. The optimal s (a), denoted as a , satisfies
1
1
P(SINR > |Nord = 1)
xfA (x)dx
=
E{a}
a
a
+ P(SINR > |Nord > 1)
xfA (x)dx
(14)
0
where
P(SINR > |Nord = 1)
2
2
e(r M E{s}(,)) e(r /Pt,M ) g1 rdr,
=
r=0
and
P(SINR > |Nord > 1)
2
2
=
e(r M E{s}(,)) e(r /Pt,M ) gi rdr.
i=2
r=0
2
j=i j 1 + Pt,i , . When = 0 we have
2
j
PLOC,2 =0 =
K
i=1
i 2i
Pt,j
2
j j j (1 + Pt,i
.
i
, )
(16)
Theorem 5 ([29]). The coverage probabilities for the instantaneous SINR based scheme are
K
2/
PINS =
i
2r exp((
k Pt,k )C()
r=0
i=1
i=1
845
PINS,2 =0
i=1 i Pi
=
(18)
2/
K
C()
i P
i
i=1
where C() =
2 2
csc(2/).
2/
exp(r (
i Pt,i )(1 + (, )))dr (19)
2
PSIG,2 =0
1
=
1 + (, )
(20)
1/
(22)
This reduces the original minimization problem in (22) to
min
i i (Pi0 + Pi )
0
,i
i
PSIG :
(23)
2/
s.t.
i i Pt,i = S
which is a linear program having as solution the tier that min2/
imizes (Pi0 + Pi )Pt,i . This minimization problem can be
further adapted to include certain constraints on i and it still
gives a linear program (for example, the macro tier structure
846
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 5, MAY 2013
TABLE I
PARAMETER VALUES USED IN NUMERICAL SECTION .
Energy Efficiency Ratio
Parameter
,
Pt,M , Pt,F
2
Psleep
PM0 , PF0
M , F
PM , PF
Value
4
104 m2 ,103 m2
43 dBm, 10 dBm
1
-10 dB
75.0 W (Macro only)
130.0 W, 4.8 W
4.7, 8.0
20.0 W, 0.05 W
Fig. 2.
Success Probability
Uniform, Analytical
Uniform, Simulated
Binary, Analytical
Binary, Simulated
0.8
0.6
0.4
Threshold
x 10
5
4
10
Fig. 1.
Comparison of analytical expressions vs. simulated results for
strategic sleeping mode.
2/ 2/
2/
+F Pt,F 2/
qM Pt,M
max
2/
2/
C()
qM Pt,M +F Pt,F
q
PINS :
log2 (1+)(M q+F )
=1
=2
=5
3
2
1
0
0
0.2
0.1
0.2
0.4
0.6
0.8
847
Coverage Probability
0.6
0.4
0.2
0
0.0001
Fig. 3.
No Sleeping
Random Sleeping
Strategic Sleeping
0.8
0.001
0.01
Noise 2
0.1
Fig. 4.
x 10
Random Sleeping
Strategic Sleeping
2=0, Random Sleeping
3
2
1
0
0
0.2
0.4
0.6
0.8
(24)
(25)
(27)
r=0
VII. A PPENDIX
A. Useful statistics concerning success probabilities
C. Proof of Theorem 2
848
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 5, MAY 2013
of distance from the user, starting from 1.3 Nord denotes the
order of the MBS the user connects to and fA (x) denotes the
pdf of A. The success probability per link is thus given by
1
1
(a)
PSS =
xP(SINR > |x)fA (x)dx
E{a} 0
1
1
(b)
=
{xP(Nord = 1)P(SINR > |Nord = 1)
E{a} 0
+xP(Nord > 1)P(SINR > |Nord > 1)}fA (x)dx
1
1
(c)
=
exp(r2 M E{s})
xs(x)
E{a} 0
r=0
exp(r2 M ) exp(r 2 /Pt,M )dr
+x(1 s(x))P(SINR > |Nord > 1) fA (x)dx (28)
has a higher coverage rate per active user than S1 . Lastly, the
only function where we cannot do this sort of procedure is
precisely the one characterized by S .
E. Proof of Theorem 4
Let fi (r) = 2i r exp(i r2 ) denotes the pdf of the
distance to the nearest BS in tier i. First, we compute the
probability of connecting to tier i, i.e. P(i ri < j rj j = i)
as follows:
P(i ri < j rj j = i)
fi (r)P(i r < j rj j = i)dr
=
r=0
=
fi (r)
fj (rj )drj dr
(a)
=
P(Nord = i|Nord > 1)P( |Nord = i)
i=2
(b)
E{s}(1 E{s})i2
i=2
2
r
exp
Pt,M
r=0
(29)
where (a) splits into the events connect to the ith MBS,
(b) is the Laplace transform of the interference term and the
pdf of the i-th MBS.
In the case where 2 = 0, the term P(SINR > |Nord >
i2
1
1
1) simplifies to i=2 E{s}(1E{s})
= 1+
(1+E{s})i
1+E{s} , which,
combined with (28), leads to (9).
D. Proof of Lemma 4
Once again, we use the notation Nord to denote the order
of the MBS that the user is connected to. In addition, we
impose that all strategies are measurable functions. Firstly,
note that P(SINR > |Nord = 1) is more than P(SINR >
|Nord > 1) or in other words, the success probability when
the nearest active MBS is the nearest MBS than if not. This
is intuitively evident. Next, note that the optimal S (a) is
completely characterized by a . Now, suppose we have a
strategy S1 (a) that is not (almost surely) S (a). Then, by
definition of being different, there exists a > 0 such that
the set B = {x, x a , S1 (x) < 1 } has measure > 0.
Roughly speaking, we just find a set where the strategy is not
1. Next, we construct another strategy S2 (a) from S1 (a) while
retaining E{s}. Roughly, we part from the function S1 (x) for
x < a and S1 (x) > 0 and fill up the set B. Then, using
P(SINR > |Nord = 1) and by the notion that we serve more
people by switching on in areas with higher activity than in
areas with lesser activity, we arrive at the conclusion that S2
3 The
r=0
=
r=0
j=i
rj =ri /j
fi (r)
exp(i (ri /j )2 ) dr
i 2
= i 2.
j j j
j=i
(30)
and
i
j LI(j) (r /Pt,i ) LN fi (r)dr
j 2 ri =0
j
SINR =
(32)
2 + PA + PB + PC + PD
exp ri k i k
. (33)
Pt,i
k,
Li (ri /Pt,i ) =
849
[12] Z. Niu, Y. Wu, J. Gong, and Z. Yang, Cell zooming for cost-efficient
green cellular networks, IEEE Commun. Mag., vol. 48, no. 11, pp.
7479, Nov. 2010.
[13] S. McLaughlin, P.M. Grant, J.S. Thompson, H. Haas, D.I. Laurenson,
C. Khirallah, Y. Hou, R. Wang, Techniques for improving cellular radio
base station energy efficiency, IEEE Wireless Commun. Mag., vol. 18,
no. 5, pp. 1017, Oct. 2011.
[14] T. Chen, Y. Yang, H. Zhang, H. Kim, and K. Horneman, Network
energy saving technologies for green wireless access networks, IEEE
Wireless Commun. Mag., vol. 18, no. 5, pp. 3038, Oct. 2011.
[15] K. Son, H. Kim, Y. Yi, and B. Krishnamachari, Base station operation
and user association mechanisms for energy-delay tradeoffs in green
cellular networks, IEEE J. Sel. Areas Commun., vol. 29, no. 8, pp.
15251536, Sep. 2011.
[16] J. G. Andrews, F. Baccelli, and R. K. Ganti, A tractable approach to
coverage and rate in cellular networks, IEEE Trans. Commun., vol. 59,
no. 11, pp. 31223134, Nov. 2011.
[17] V. Chandrasekhar and J. G. Andrews, Spectrum allocation in tiered
cellular networks, IEEE Trans. Commun., vol. 57, no. 10, pp. 3059
3068, Oct. 2009.
[18] W. C. Cheung, T. Q. S. Quek, and M. Kountouris, Throughput optimization, spectrum sharing, and femtocell access in two-tier femtocell
networks, IEEE J. Sel. Areas Commun., vol. 30, no. 3, pp. 561574,
Apr. 2012.
[19] P. Xia, V. Chandrasekhar, and J. G. Andrews, Open vs. Closed Access
Femtocells in the Uplink, IEEE Trans. Wireless Commun., vol. 9,
no. 12, pp. 37983809, Dec. 2010.
[20] V. Chandrasekhar, J. G. Andrews, T. Muharemovic, Z. Shen, and
A. Gatherer, Power control in two-tier femtocell networks, IEEE
Trans. Wireless Commun., vol. 8, no. 8, pp. 43164328, Aug. 2009.
[21] D. T. Ngo, L. B. Le, T. Le-Ngoc, E. Hossain, and D. I. Kim, Distributed
interference management in two-tier CDMA femtocell networks, IEEE
Trans. Wireless Commun., vol. 11, no. 3, pp. 979989, Mar. 2012.
[22] Y. Jeong, H. Shin, and M. Z. Win, Superanalysis of optimum combining
with application to femtocell networks, IEEE J. Sel. Areas Commun.,
vol. 30, no. 3, pp. 509524, Apr. 2012.
[23] S.-Y. Lien, Y.-Y. Lin, and K.-C. Chen, Cognitive and game-theoretical
radio resource management for autonomous femtocells with QoS guarantees, IEEE Trans. Wireless Commun., vol. 10, no. 7, pp. 21962206,
Jul. 2011.
[24] A. Adhikary, V. Ntranos, and G. Caire, Cognitive femtocells: Breaking
the spatial reuse barrier of cellular systems, in Proc., Information
Theory and its Applications (ITA), San Diego, CA, Feb. 2011, pp. 110.
[25] Y. S. Soh, T. Q. S. Quek, M. Kountouris, and G. Caire, Cognitive
hybrid division duplex for two-tier femtocell networks, IEEE Trans.
Wireless Commun., under revision, Feb. 2012.
[26] M. Z. Win, P. C. Pinto, and L. A. Shepp, A mathematical theory of
network interference and its applications, Proc. IEEE, vol. 97, no. 2,
pp. 205230, Feb. 2009.
[27] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and
M. Franceschetti, Stochastic Geometry and Random Graphs for
the Analysis and Design of Wireless Networks, IEEE J. Sel. Areas
Commun., vol. 27, no. 7, pp. 10291046, Sep. 2009.
[28] A. Rabbachin, T. Q. S. Quek, H. Shin, and M. Z. Win, Cognitive
network interference, IEEE J. Sel. Areas Commun., vol. 29, no. 2, pp.
480493, Feb. 2011.
[29] H. S. Dhillon, R. K. Ganti, F. Baccelli, and J. G. Andrews, Modeling
and analysis of K-tier downlink heterogeneous cellular networks, IEEE
J. Sel. Areas Commun., vol. 30, no. 3, pp. 550560, Apr. 2012.
[30] K. D. Schmidt, On the covariance of monotone functions of a random
variable, 2003.
[31] W. D. Stoyan and J. Mecke, Stochastic Geometry and its Applications,
2nd ed. John Wiley and Sons, 2008.
850
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 5, MAY 2013