You are on page 1of 15

1

Interference Model Similarity Index


and Its Applications to mmWave Networks
Hossein Shokri-Ghadikolaei, Student Member, IEEE,
Carlo Fischione, Member, IEEE, and Eytan Modiano, Fellow, IEEE

AbstractIn wireless communication networks, interference topology. Due to this overwhelming complexity, the design
models are routinely used for tasks such as performance analysis, and analysis of wireless networks based on the actual SINR
optimization, and protocol design. These tasks are heavily af- expression, while being accurate, is very challenging. This
fected by the accuracy and tractability of the interference models.
Yet, quantifying the accuracy of these models remains a major difficulty is further exacerbated in millimeter-wave (mmWave)
challenge. In this paper, we propose a new index for assessing networks, where penetration loss, first-order reflection, and
the accuracy of any interference model under any network antenna pattern introduce further elements of randomness [2]
scenario. Specifically, it is based on a new index that quantifies the [4]. This motivates developing different techniques to mathe-
ability of any interference model in correctly predicting harmful matically model (abstract) various components of the SINR,
interference events, that is, link outages. We consider specific
wireless scenario of both conventional sub-6 GHz and millimeter- e.g., the transmission strategy, wireless channel, and network
wave (mmWave) networks and demonstrate how our index yields topology.
insights into the possibility of simplifying the set of dominant
interferers, replacing a Nakagami or Rayleigh random fading
by an equivalent deterministic channel, and ignoring antenna A. Related Works and Motivations
sidelobes. Our analysis reveals that in highly directional antenna Define an interference model as a set of deterministic
settings with obstructions, even simple interference models (such or stochastic functions that model various components of
as the classical protocol model) are accurate, while with omnidi-
rectional antennas, more sophisticated and complex interference the SINR expression. There have been many attempts in
models (such as the classical physical model) are necessary. Our the literature to design interference models (equivalently, to
new approach makes it possible to adopt the simplest interference approximate the SINR expression) that accurately capture the
model of adequate accuracy for every wireless network. effect of interference while being tractable for the mathemat-
Index TermsWireless communications, interference model, ical analysis. These interference models largely try to answer
performance analysis, millimeter-wave networks. the following questions under various network settings:
Q1. How can we model the set of interferers whose contribu-
tion in the aggregated interference term are dominant?
I. I NTRODUCTION
Q2. How can we simplify the transmission/reception and
Due to the shared nature of a wireless media, interference propagation models to enhance tractability of the inter-
plays a critical role in the design and performance analysis of ference model with a marginal loss in its accuracy?
wireless networks, where the intended signal is combined with Answering Q1 demands a careful balance between the accu-
other undesired wireless signals transmitted at the same (time, racy and the simplicity of the interference model. Considering
frequency, spatial) channel. The receiver typically decodes the effects of more interferers in the SINR model generally
the received signal by canceling parts of the interference and increases the accuracy but also the complexity. In this regard,
treating the rest as noise. Successful decoding at the receiver the simplest model is the primary interference model [5],
depends on the desired signal strength, the ambient noise level wherein an outage event occurs only if two communication
accumulated over the operating bandwidth, and the interfer- links share a common endpoint. In other words, the only
ence level. Signal-to-interference-plus-noise ratio (SINR) is a interference component in this model is self-interference that
common metric to evaluate the outage probability (or the prob- leads to a half-duplex operating mode. Interference range
ability of successful decoding) of a transmission. However, model (IRM) is an attempt to improve the accuracy of the
performance analysis using the SINR expression is complex as primary interference model [6], where an outage event occurs
it depends on the transmission strategies (transmission power, if the closest interferer is located no farther than a certain
antenna pattern, and medium access control (MAC) protocol), distance of the receiver, called the interference range. By set-
often unknown or hard to estimate random channel attenuation, ting this distance to 0, the IRM can be reduced to the primary
receiver design, and the (often partially unknown) network interference model. A modified version of IRM is the protocol
model (PRM), formalized by the seminal work of Gupta and
H. Shokri-Ghadikolaei and C. Fischione are with KTH Royal Institute
of Technology, Stockholm, Sweden (E-mails: {hshokri, carlofi}@kth.se). E. Kumar [7]. The only modification is that the interference
Modiano is with the Laboratory for Information and Decision Systems, range, instead of being a constant value as in the IRM, depends
Massachusetts Institute of Technology, Cambridge, USA (E-mail: modi- on the received power from the intended transmitter and a
ano@mit.edu).
A preliminary version of this paper [1] has been accepted for presentation minimum SINR threshold for successful decoding. Although
at the IEEE International Conference on Communications (ICC), 2016. the IRM and PRM are very simple, they fail to capture
2

the effect of interference aggregation (i.e., the sum of the antenna sidelobe, which affects the SINR distribution. This
interference power from multiple interferers). It might be that, assumption is relaxed in [4], where the antenna sidelobe is
while there is no interferer inside the interference range, the modeled by a small constant value, adding further complexity
aggregated interference from several transmitters outside the into the interference model. As a result, the final derivations,
interference range downs the perceived SINR below the thresh- while being more accurate, are less tractable and provide fewer
old. Thus, these models are generally considered to be overly insights. However, without having a mathematical framework
simplistic. Nonetheless, due to their mathematical tractability, that allows assessing the impact of neglecting antenna side-
the IRM (including the primary interference model) and PRM lobes, it is not clear which approach better balances the
are extensively adopted for the performance analysis and for simplicity-accuracy tradeoff of mathematical analysis.
the system design; e.g., transport capacity [7][9], delay [10], The proper choice of interference model depends on many
[11], throughput [12], [13], topology control [14], routing [15], parameters such as the receiver design, antenna directionality,
and backoff design [16]. network topology, channel model, and the choice of medium
To alleviate the aforementioned problem of IRM and PRM, access protocol [6], [27], [28]. To the best of our knowledge,
the interference ball model (IBM) considers the aggregated there has been no systematic method to analyze the accuracy
impacts of near-field interferers, located no farther than a of various interference models, choose the proper interference
certain distance. The price is a higher complexity of the IBM model, and quantify the amount of error due to adopting other
compared to the IRM and PRM. Nonetheless, the IBM has interference models for a given network scenario. The accu-
been extensively adopted in the performance evaluation of racy of different interference models has been mostly evaluated
wireless networks [4], [17], [18]. The topological interference qualitatively, without fully understanding the mutual impacts
model (TIM) [19] is a natural extension of the IBM that of different parameters of the physical, medium access, and
considers the aggregated impact of all the transmitters whose network layers. This qualitative analysis, however, is often
individual interference level at the receiver side is not below a overly simplistic and may result in the use of interference mod-
certain threshold. In other words, this model neglects weak els that are only marginally more accurate, yet significantly
links based on the topological knowledge. The TIM is more complex than needed. As we will show throughout this
adopted for capacity and degree-of-freedom analysis [19]. The paper, in certain settings of relevant practical interest, even
most accurate and complex answer to Q1 is the physical model the simplest interference models are sufficiently accurate and
(PhyM) [7], which considers the aggregated interference of all can be used to provide significant insights into the network
transmitters in the entire network.1 The PhyM, also known as performance and to enable efficient protocol design.
the SINR model, is adopted mostly at the physical layer; e.g.,
beamforming design [21], [22], capacity evaluation [7], [23],
B. Contributions
power control [24], [25], coverage analysis [4], and spectrum
sharing [26]. In this paper, we substantially extend the preliminary ver-
The answer to Q2 depends heavily on the transmission sion of this study [1] and propose a new framework to assess
and reception strategies and propagation environment. For the distance of two arbitrary SINR distributions. We use this
instance, approximating the random wireless channel gain with framework to develop an interference model similarity index
its first moment (average) is a common technique to simplify that takes on real values between 0 and 1, where higher values
the SINR expression and to design MAC and networking correspond to a higher similarity. This index builds a universal
layers [12], [14], [17], [27][29]. Reference [30] replaced a method to assess the accuracy of any interference model under
Nakagami fading channel by a Rayleigh one for mathematical any network scenario. In other words, instead of introducing
tractability and numerically concluded from its Fig. 5 that a new interference model or a new approach to analyze SINR
such approximation preserves the main properties of the rate distribution, we propose a novel framework to investigate the
coverage performance. Yet, the impact of these mathematical accuracy of the existing interference models. Therefore, our
approximations on the accuracy of the performance analysis study is complementary to the rich literature of interference
is not well understood. Recently, [31] considers the impact analysis.
of such approximation on the scheduling. In particular, the To exemplify the abilities of the proposed index, we math-
authors show that, if we design scheduling for n transmitters ematically evaluate it for the PRM and IBM under three sce-
based on a proper non-fading channel model (deterministic narios: (i) Rayleigh fading channel and omnidirectional com-
approximation of the random channel gain), the network munications (a typical sub-6 GHz system); and (ii) Rayleigh
throughput will be within O(log n) of that of the optimal fading channel and directional communications; and (iii) de-
scheduler, designed based on the actual random channel gains. terministic wireless channel, directional communications, and
This result, however, is limited to the Rayleigh fading model. existence of impenetrable obstacles in the environment (a
As another example, for mmWave communications with many typical mmWave system). Although the applications of the
antenna elements, [12] and [32] assume no emissions from the proposed index is general and goes beyond the examples
provided in this paper, we use these examples to illustrate
1 Under very special network settings (e.g., homogenous Poisson field of fundamental properties of this index and also to provide
interferers exhibiting Rayleigh fading channel), the PhyM may be mathe- insights on the mutual effects of various network parameters
matically more tractable than both PRM and IBM [20]; however, the PRM
and IBM are yet more desirable models for protocol design and for network on the accuracy of the interference model, thus commenting
optimization [18]. on the proper model for a given network scenario.
3

In the first example scenario, served as a baseline, we derive to a certain target bit error rate. An outage on the reference
a closed-form expression for the accuracy index. We show link occurs when < . Different interference models attempt
that the accuracy of the IBM monotonically increases with to approximate the outage probability by ignoring certain
the interference range, at the expense of an increased com- components of the interference (see questions Q1 and Q2 in
plexity. In contrast, we show that there is no such monotonic Section I-A). In particular, the IRM, PRM, IBM, TIM, and
improvement in the accuracy of PRM. Thereby, we find the PhyM characterize the set of interferers I. Neglecting various
optimal interference range that maximizes the accuracy of the components of the channel model translates into different
PRM. distributions for giCh . Power allocation affects pi , and various
In the second example scenario, we show that both the scheduling protocols further affect I.
PRM and IBM are significantly more accurate with directional
antennas. Further, in the third example scenario, we show B. Formal Definition of the Similarity Index
significant accuracy improvement of both PRM and IBM due
to a deterministic channel, directionality, and also blockage. Consider reference interference model y under a given set of
As these conditions hold in mmWave networks, we show that parameters/functions describing the wireless network. Define
the PRM can be used in the analysis of mmWave networks y as the SINR of a reference receiver under this model. We
to significantly improve the mathematical tractability of the define a binary hypothesis test, where hypotheses H0 and H1
problem, with a negligible loss in the analysis accuracy. denote the absence and presence of outage under reference
Furthermore, we use the proposed framework to investigate model y, respectively. That is, H0 if y and H1 if
the feasibility of modeling a random fading channel with a y < . We consider a test interference model x under any
deterministic channel. We show that if the spatial distribution set of parameters/functions describing our wireless network,
of the transmitters follow a Poisson point process on the which are not necessarily equal to those of the reference
plane and if the path-loss exponent is 2, then the average model y. These differences result in possible deviation of
of the fading random variable2 is among the best constant the SINR of the reference receiver under x, denoted by x ,
approximations of the random fading channel to analyze any from y . From the outage point of view, irrespective of the
ergodic function of the SINR (like throughput). differences between individual parameters/functions of x and
The rest of this paper is organized as follows. In Section II, y, we say model x is similar to model y if it gives exactly
we introduce our interference model similarity index, and the same outage result as y. Assume interference model
investigate it under various network scenarios in Sections III x is a detector of outage events under y. To evaluate the
VI. Future works are presented in Section VII, and the paper performance of this detector compared to reference model y,
is concluded in Section VIII. we can use the notions of false alarm and miss-detection. A
false alarm corresponds to the event that x predicts outage
under hypothesis H0 (i.e., y declares no harmful interference);
II. I NTERFERENCE M ODEL S IMILARITY I NDEX
whereas a miss-detection corresponds to the event that x fails
A. Interference Model to predict outage under hypothesis H1 . Now, the performance
We define a link as the pair of a transmitter and its intended of any interference model x can be evaluated using the false
x|y x|y
receiver, where transmitter (receiver) i refers to the transmitter alarm and miss-detection probabilities, namely pfa and pmd :
(receiver) of link i. Without loss of generality and for brevity, x|y x|y
we assume that there is no interference cancellation, so all pfa = Pr [ x < | y ] , pmd = Pr [ x | y < ] .
unintended transmitters act as potential interferers to any (1)
receiver. Consider a reference receiver and label its intended The false alarm and miss-detection probabilities quantify the
transmitter by subscript 0. Denote by I the set of its interferers similarity of any interference model x in detecting outage
(all active transmitters excluding the intended transmitter), by events compared to any reference model y. Next, we define
pi the transmission power of transmitter i, by the power of our index to be a convex combination of these probabilities.
white Gaussian noise, by di the distance between transmitter
i and the reference receiver, and by giCh the channel gain Definition 1 (Interference Model Similarity Index). For any
between transmitter i and the reference receiver. We denote constant 0 1, any SINR threshold , any test
by giTx the antenna gain at transmitter i toward the reference interference model x, and any reference interference model
receiver, and by giRx the antenna gain at the reference receiver y, we define similarity of x to y at as
   
toward transmitter i. Then, the SINR at the reference receiver x|y
S, (xky) = 1 pfa + (1 ) 1 pmd
x|y
is
p0 g0Tx g0Ch g0Rx x|y x|y
= 1 pfa (1 ) pmd , (2)
= P .
pk gkTx gkCh gkRx +
x|y x|y
kI where pfa and pmd are given in (1). Notice that random
The SINR depends on the transmission powers, antenna pat- variables x and y must have a common support.
terns, set of active transmitters, channel model, and network S, (xky) is a unit-less quantity ranging within [0, 1],
topology. Let > 0 denote the SINR threshold corresponding where higher values represents higher similarity between x
2 Rigorously speaking, the fading should be an absolutely continuous and y in capturing outage events at SINR threshold . Setting
x|y x|y
random variable, which holds for almost all wireless channels. = Pr [ y ], pfa + (1 ) pmd is the average error
4

R
in detecting the outage events; therefore, S,Pr[ y ] (xky) where = f x (t)f y (t)dt is the Bhattacharyya coefficient.
shows the probability that interference model x has similar
decision as reference interference model y in detecting the
D. Applications of the Interference Model Similarity Index
outage events.
In the following, we provide two class of illustrative ex-
Remark 1 (Accuracy of an Interference Model). Let reference amples where our index can be used either to simplify the
model y perfectly capture the outage events in reality, namely mathematical analysis or to justify the existing interference
the model y does not make any approximation/simplification. models. Use cases of our index, however, goes beyond these
The accuracy of any interference model x is then S, (xky), examples.
and we call it the accuracy index throughout the paper. 1) Simplifying the Set of Interferers: This is one of the
The proposed index is a universal metric that can be used first steps in choosing an interference model for performance
to quantify the accuracy of any interference models, proposed analysis, protocol design, and network optimization. With om-
in the literature, as we exemplify in the following sections. nidirectional transmission/reception and without interference
cancelation, an outage occurs under
C. Comparison to the Existing Statistical Distance Measures PRM: if there is an active transmitter no farther than an

Interference model similarity index, formulated in (2), is interference range rPRM = (1 + )d0 , where is a
measuring the distance3 of the PDF of x compared to that constant real positive value [7];
of y . Let fX denote PDF of random variable X. In the IBM: if its SINR due to all active transmitters located

following, we highlight two main advantages of using our no farther than an interference range rIBM is less than
index with respect to the existing standard distance measures, [18];
such as the Bhattacharyya distance and the Kullback-Leibler TIM: if its SINR due to all active transmitters with strong

(KL) divergence [33]. Other reasons are highlighted in the links (with individual channel gains higher than ) toward
extended version of this paper [34]. receiver i is less than [19]; and
First, the existing standard distance measures mostly map PhyM: if its SINR due to all active transmitters is less
the distance between f x and f y in their entire support to only than [7].
one real value. It might be that two distribution are very similar To present a unified view, we associate three random variables
in the meaningful ranges of the SINR values (010 dB) but aPRM
k , aIBM
k , and aTIM
k to the link between each transmitter
very different outside this range. Still, the classical statistical k I and the typical receiver. aPRM k is set + if dk
distance measures may result in a high distance between two (1 + )d0 , and otherwise 0. aIBM k is set 1 if dk rIBM , and
distributions, as they compare f x to f y in the entire SINR otherwise 0. Finally, aTIMk is set 1 if gkCh > , and otherwise 0.
range. This is indeed a misleading result that may mistakenly We define a virtual channel gain for those interference models
avoid the use of the simplified interference model x in practice. as
However, our similarity index allows us to investigate whether gkx = axk gkCh , for interference model x , (4)
or not x is accurate at any given SINR threshold.
Moreover, unlike the existing statistical distance metrics where x is a label denoting PRM, IBM, TIM, or PhyM, and
that are not necessarily intended for communication systems, aPhyM
k , 1 for all k I. Despite the virtual channel gain, all
our similarity index is developed for these systems so that other parameters of interference models x and y are identical.
it has a physical meaning and can provide practical insights. The SINR at the typical receiver under interference model x
Specifically, setting = Pr [ y ], our index S, (xky) is given by
evaluates the probability of correct decision of outage events p0 g0Tx g0Ch g0Rx
x = P . (5)
under interference model x. pk gkTx gkx gkRx +
kI
Note that other distance metrics may still be useful to
evaluate the accuracy of an interference model, and they may The design of many key functions of a wireless network such
also have some relationship to our proposed index; see the as scheduling [35] or power allocation [24] need an estimate
following remark as an example. of (5). To this end, a receiver may need to coordinate with
a set of interferers to estimate their individual instantaneous
Remark 2 (Relationship to the Bhattacharyya Coefficient).
contributions to the SINR expression, namely pk gkTx gkx gkRx
Let = Pr [ y ]. By noting that S,Pr[ y ] (xky) is
for all k I. The PhyM may imply that every receiver
the probability of having no hypothesis detection error and
should coordinate with all the interferers in the entire network
following [33, Equation (48)], we get
(global information) whose cost, complexity, and delay may
3 p
be unaffordable in many networking scenarios. Using IBM
(1 ) S, (xky)
2 r implies that each nodes should coordinate with all transmitters
1 within a certain radius (local information), and the PRM
1+ (1 ) 2 ,
4 necessitates coordination only with the closest unintended
(3) transmitter, which are appealing from energy and protocol
3 Rigorously speaking, our similarity index is not a distance measure, as it
overhead perspectives. Our proposed index allows the use of
does not satisfy the subadditivity property. Moreover, we are measuring the the right interference model for a given channel model and
similarity, which could be in general a decreasing function of the distance. network scenario.
5

2) Simplifying the Channel Model: Our accuracy index derive a closed-form expression for the new accuracy index
can be used to adopt tractable channel models (gkCh for and thereby illustrate its fundamental properties that hold in
every transmitter k) of adequate accuracy. This is especially general. Nonetheless, even in this network setting, the PRM
important for mmWave networks, where LoS and non-LoS and IBM are more appealing than PhyM for protocol design
conditions have different channel models, non-LoS (blockage) and for network optimization [18].
probability follows a rather complicated function, the LoS We define by B(, rin , rout ) a geometrical annulus sector
channel may follow a Nakagami fading in general, and realistic with angle , inner radius rin , and outer radius rout , centered
antenna patterns might be a complicated non-linear function. at the location of the typical receiver (origin of the Polar
Various studies tried to simplify those complications without coordinate). To model a wireless channel, we consider a
rigorous analysis on the validity of such simplifications. For constant attenuation c at reference distance 1 m, a distance-
instance, [12] assumed impenetrable obstacles (so commu- dependent attenuation with exponent , and a Rayleigh fading
nication only in the LoS conditions) and neglected antenna component h. To avoid the physically unreasonable singularity
sidelobe, [4] approximated the non-LoS stochastic function by that arises at the origin under power law attenuation, we
a deterministic LoS ball in which there is no obstacle within a change the path loss index to 1B(2,0,a) , where 1{} is
certain range of the receiver and there is no LoS links outside the indicator function assuming value 1 over set {} and
the circle, and [30] replaced the Nakagami fading channel zero otherwise. This modified power law model implies that
by a Rayleigh fading that facilitates mathematical analysis. the signal of all transmitters located outside a disk with
Due to lack of a systematic approach to simplify the channel radius a will be attenuated by traditional power law method;
model, the understanding of the cross-layer dynamics between however, the transmitters inside this disk will observe no
MAC and physical layers of most of the existing standards is channel attenuation. Therefore, the channel gain between
a largely open problem, and the existing frameworks such as transmitter i at radial distance di and the typical receiver is
1
the one in [36] are not usually mathematically tractable. giCh = chi di B(2,0,a) . To avoid unnecessary complications
In the following, we illustrate the utility of our index for four while illustrating the utility of our index, we eliminate the
example scenarios. Although our index poses no limitation to shadow fading from our channel model.
these example scenarios, we may simplify some parameters We are now ready to illustrate the utility of our proposed
of the system model to avoid unnecessary complications. In index using the SINR expression (5).
the first three examples, we focus on simplifying the set of
interferers for various network settings and derive closed-form
expressions for the accuracy index to highlight its fundamental A. Accuracy of the Interference Ball Model
properties. In the last example scenario, we use our index For mathematical tractability, we assume that rIBM a and
to numerically assess the accuracy of various approaches in d0 a, and the extension to the general case is straightfor-
simplifying the channel model. For the rest of this paper, ward. The false alarm probability can be reformulated as
without loss of generality, we assume = Pr [ y ], so IBM|PhyM
= Pr IBM < | PhyM
 
S, (xky) evaluates the probability of correct decision under pfa
   
interference model x. Pr IBM < Pr PhyM | IBM <
= .
1 Pr [ PhyM < ]
(6)
III. E XAMPLE S CENARIO 1: R AYLEIGH FADING C HANNEL
WITH O MNIDIRECTIONAL C OMMUNICATIONS Although the PhyM considers the impacts of all the interferers
in the entire network, the IBM considers only the effects of
Consider a wireless network with Rayleigh fading channel
thenear-field ones. Consequently, PhyM IBM , and thus
and omnidirectional transmission/reception. Assume that the PhyM IBM

Pr | < = 0 in the nominator of (6). This
PhyM can perfectly capture the outage events. In this section, IBM|PhyM
we evaluate the accuracy of IBM, PRM, and TIM (see Sec- results in pfa = 0.
tion II-D where we recalled the definition of these prominent For the miss-detection probability, we have
models) for such scenario. IBM|PhyM
pmd = Pr IBM | PhyM <
 
We consider a reference receiver (called the typical re-
= 1 Pr IBM < | PhyM <
 
ceiver) at the origin of the Polar coordinate, and its intended    
transmitter having geometrical/spatial length d0 . We consider Pr IBM < Pr PhyM < | IBM <
=1
a homogeneous Poisson network of interferers (unintended Pr [ PhyM < ]
transmitters) on the plane with intensity t . We assume that  IBM
Pr <

all the transmitters are active with transmission power p (no =1 , (7)
Pr [ PhyM < ]
power control) and that there is no interference cancellation,
which are natural assumptions in personal and local area where the last equality is from PhyM  IBM 
IBM
.
networks. With omnidirectional transmission and reception, In [34, Appendix  A], we have derived Pr < and
there is no antenna gains, so gkTx = gkRx = 1, k I {0}. Pr PhyM < , given in (8) and (9), respectively, where
Note that, under these assumptions, the PhyM is more tractable (, ) is the incomplete Gamma function, () is the Gamma
for coverage and rate analyses than other models (PRM, function, Eh denotes expectation over random variable h,
IBM, and TIM) [20]; however, we still use this example to and the probability density function of h is fh (x) = ex .
6



d

     

Pr IBM < = 1 exp 0
t Eh a2 1 ed0 h + rIBM 2
1 ed0 hrIBM a2 1 ed0 ha
 
+

pc


   
2/ 2 2/ 2

(d0 h) 1 , d0 hrIBM (d0 h) 1 , d0 ha . (8)





d
    
2

0 d d ha 2/
Pr PhyM 2 h 2
 
< = 1 exp t Eh a 1 e
0 a 1e 0 + (d0 h) 1

pc


 
2/ 2

(d0 h) 1 , d0 ha . (9)


Substituting (8) and (9) into (7), the miss-detection probability and that
can be found. Also, from (2), the accuracy of the interference PRM|PhyM
ball model S, (IBMkPhyM) is derived. A simple extension pmd =
 PRM   
of our analysis gives the accuracy index when d0 is a random 1 Pr < Pr PhyM < | PRM
. (11)
variable. Recall that the purpose of this section is to illustrate Pr [ PhyM < ]
only the utility of our index, and investigating more practical
system models is a subject of our future work; see for In the last two equations, note that Pr[ PhyM < ] is
instance [37]. derived in (9). In the following, we derive Pr[ PRM < ]
and Pr PhyM < | PRM .
Result 1 (Perfect Interference Ball Model). For any constant Event PRM < occurs if there is at least one interferer
0 1 and any , S, (IBMkPhyM) 1 as rIBM . inside B(2, 0, rPRM ). As I is a homogenous Poisson point
IBM|PhyM process with intensity t , we have
Proof: We know that pfa = 0 for any constant
Pr PRM < = 1 exp t rPRM 2
  
0  1 and any . Moreover, as rIBM increases, . (12)
Pr IBM < tends to Pr PhyM < . Considering (7),
IBM|PhyM In [34, Appendix A], we have also derived
Pmd asymptotically goes to zero as rIBM .
Pr[ PhyM < | PRM ], given in (13). Substituting (10)
With zero false alarm and asymptotically zero miss-detection
(13) into (2), we can find S,Pr[ PhyM ] (PRMkPhyM)
probabilities, the proof is concluded from (2).
for Rayleigh fading channel with omnidirectional
Result 1 indicates that the IBM becomes more accurate with transmission/reception.
higher rIBM , and it can be arbitrary accurate for sufficiently
large rIBM . The price, however, is more complicated IBM as Result 2 (Miss-detectionFalse Alarm Tradeoff). Consider the
its approximations at a receiver demands coordination with protocol model of interference with Rayleigh fading channel.
more interferers.4 Also, negotiation with other transmitters Increasing the interference range rPRM reduces the false
(e.g., for MAC layer design) within this larger rIBM becomes alarm probability and increases the miss-detection probability.
more challenging in terms of power consumption, signaling Decreasing the interference range increases the false alarm
overhead, delay, and processing overhead. probability and reduces the miss-detection probability.
 
Proof: Pr PRM < is a strictly increasing function of
rPRM , see (12). Considering the equations of the false alarm
B. Accuracy of the Protocol Model and miss-detection probabilities given in (10) and (11), the
proof concludes.
We now consider the PRM and first note that
Result 3 (Asymptotic Accuracy of the Protocol Model).
PRM|PhyM
pfa = 1 Consider Equations (2) and (10)(12). For any 0 1
  
1 Pr PRM < 1 Pr PhyM < | PRM
 and any > 0, we have the following asymptotic results:
, PRM|PhyM PRM|PhyM
1 Pr [ PhyM < ] rPRM a, a 0 pfa 0 , pmd 1,
(10)
S, (PRMkPhyM) .

4 Note that for special settings of this section, considering the impact of
PRM|PhyM PRM|PhyM
all interferers (PhyM) simplifies the analysis. However, this does not hold rPRM pfa 1 , pmd 0,
in general, e.g., if we change the spatial distribution of the interferers to a
determinantal point process. S, (PRMkPhyM) 1 .
7



d
 


2/ 2
Pr[ PhyM < | PRM ] = 1 exp 0 2
t Eh rPRM 1 ed0 hrPRM + (d 0 h) 1

pc


 
2/ 2

(d
0 h) 1 , d
0 hrPRM
. (13)


Result 3 further confirms the tradeoff between the miss- 1


detection and false alarm probabilities.
0.8

Accuracy index
PRM: Pfa , dt = 30
C. Numerical Illustrations 0.6 PRM: Pfa , dt = 80
To illustrate the accuracy index in Scenario 1 with Monte PRM: Pmd , dt = 30
0.4 PRM: Pmd , dt = 80
Carlo simulation, we consider a spatial Poisson network of
interferers and obstacles with density t and o per unit IBM: Pmd , dt = 80
0.2
area. Length of the typical link is d0 = 20 m. We simulate
a traditional outdoor microwave network [4] with average 0
20 40 60 80 100 120 140
attenuation c = 22.7 dB at the reference distance a = 1 m,
Interference range [m]
path-loss index = 3.6, and noise power = 111 dBm
(around 2 MHz bandwidth). We consider p = 20 dBm (a) Error probabilities
transmission power and = 5 dB minimum SINR threshold. 1
For the ease of illustration, we define
the notion of the average 0.9
PRM: dt = 30
inter-transmitter distance as dt = 1/ t .
Accuracy index

0.8 IBM: dt = 80
Fig. 1 illustrates the impact of the interference range on PRM: dt = 80
the accuracy of both IBM and PRM under Scenario 1. From 0.7
PRM|PhyM
Fig. 1(a), increasing rPRM increases pfa and reduces 0.6
PRM|PhyM
pmd , highlighted as the tradeoff between the miss-
0.5
detection and false alarm probabilities in Result 2. This
tradeoff may lead to increment (see dt = 30) or decrement 0.4
20 40 60 80 100 120 140
(see dt = 80) of the accuracy index of the PRM with the in- Interference range [m]
terference range. The IBM has zero false alarm probability, not
depicted in Fig. 1(a) for sake of clarity of the figure. Moreover, (b) Accuracy index
IBM|PhyM
as stated in Result 1, pmd decreases with rPRM , leading Fig. 1: Impact of the interference range on the accuracy of interference models
to a more accurate IBM, as can be confirmed in Fig. 1(b). under Rayleigh fading channel and omnidirectional communications.
Note that with the same transmitter density and interference
range, the PRM has lower miss-detection probability than the
IBM; however, better false alarm performance of the IBM density through reducing dt decreases the miss-detection prob-
leads to fewer errors in detecting outage events and therefore ability for both IBM and PRM, see Fig. 1(a), improving their
higher accuracy index, see Fig. 1(b). The TIM, not depicted accuracy. For ultra-sparse transmitter deployments, again, both
in the figure, has a very high accuracy in all simulations. In interference models work accurately, as goes to 1 in this case
particular, with = 130 dB, its accuracy is about 0.99. and therefore only the false alarm probability determines the
However, the corresponding TIM considers many interferers accuracy index. This probability is zero for the IBM, and it
inside an irregular geometrical shape, which substantially gets smaller values (asymptotically zero) for the PRM with
decreases the tractability of the resulting interference model. higher dt , see Fig. 1(a). Finally, the TIM with = 130 dB,
Fig. 2 shows the accuracy of the IBM and PRM under Sce- not shown in Fig.2, has a very high accuracy in modeling the
nario 1 against the average inter-transmitter distance. Again, interference. Its accuracy for the same ranges of dt is higher
we can observe an enhancement in the accuracy of the IBM than 0.98.
with rIBM , whereas the accuracy index of the PRM shows a Fig. 3 shows the KL divergence of f IBM (x) from f PhyM (x)
complicated behavior as a function of rPRM . By adopting the and also their Bhattacharyya distance for the same setting of
optimal rPRM that maximizes the accuracy index, as shown in Fig. 2(a), where lower values translates into higher accuracy
Fig. 2(b), we can maintain a good performance for the PRM. of the IBM. From this figure, both the KL divergence and
Both interference models are very accurate at extremely dense the Bhattacharyya distance can identify the higher accuracy
transmitter deployments. The  main reason
 is the very high of the IBM with rIBM = 60 m. However, they both fail
interference level ( = Pr PhyM is almost 0 in this to show that the performance of IBM with rIBM = 20 m
case), implying that the accuracy index is determined only converges to that with rIBM = 60 m once the network gets
by the miss-detection probability. Increasing the transmitter sparser. Moreover, calculating these measures entails almost
8

1 1

0.9 0.8
Accuracy index

Accuracy index
0.8 0.6

0.7 0.4 IBM: dt = 50


rIBM = 20 IBM: dt = 100
0.6 rIBM = 60 0.2 PRM: dt = 50
rIBM = 120 PRM: dt = 100
0.5 0
0 50 100 150 200 10 5 0 5 10 15 20
Average inter-transmitter distance [m] SINR threshold [dB]
(a) Interference ball model Fig. 4: Impact of the SINR threshold on the accuracy of interference models
1 under Rayleigh fading channel and omnidirectional communications.

0.8
IV. E XAMPLE S CENARIO 2: R AYLEIGH FADING C HANNEL ,
Accuracy index

D IRECTIONALITY, AND O BSTACLES


0.6 In this section, we analyze the accuracy of IBM and PRM in
rPRM = 20 modeling a wireless network with Rayleigh fading channels,
0.4 rPRM = 60 where all transmitters and receivers use directional commu-
rPRM = 120 nications to boost the link budget and to reduce multiuser
optimal rPRM
interference. We also consider impenetrable obstacles. The
0.2
0 50 100 150 200 application areas of this scenario include modeling and per-
Average inter-transmitter distance [m] formance evaluation of mmWave networks, where directional
(b) Protocol model of interference communication is inevitable and extreme penetration loss due
to most of the solid materials (e.g., 2035 dB due to the human
Fig. 2: Impact of transmitter density on the accuracy of the interference
models under Rayleigh fading channel and omnidirectional communications. body [38]) justifies the impenetrable obstacle assumption. In
The accuracy of the TIM with = 130 dB is higher than 0.98. the extended version of this paper [34], we show the feasibility
of assuming impenetrable obstacles.
Note that the interference is not the primary limitation of
mmWave networks especially if we take an average over all
0.08 possible realizations of a random topology [4], [32]. However,
KL: rIBM = 20 even if mmWave networks are noise-limited in a statistical
KL: rIBM = 60
0.06 sense (that is, taking an average of the interference over some
BD: rIBM = 20
time or some topologies), there are significant realizations of
Distance

BD: rIBM = 60
0.04 network topologies at given times where some transmitters
can cause strong interference. We cannot use noise-limited
0.02 arguments, which are valid over some time horizons when we
have to optimize in real-time resource allocations or routing. In
0 the following two sections, we show that special characteristics
0 50 100 150 200 of mmWave networks, such as blockage and deafness, can be
Average inter-transmitter distance [m]
exploited to substantially simplify the interference model, so as
Fig. 3: The KL divergence (KL) of the distribution of IBM from that to develop efficient scheduling and routing algorithms, which
of PhyM and their Bhattacharyya distance (BD) corresponding to the may otherwise be impossible. In fact, our results provide, for
accuracy index values of Fig. 2(a).
the first time, mathematical justifications for the use of simpler
interference models in mmWave networks, as extensively done
in the literature [12][14], [39][43].
We assume a homogeneous Poisson network of interferers
the same mathematical/numerical complexity as our similarity as in Section III. If there is no obstacle on the link between
index. Due to these reasons, we investigate only our accuracy transmitter i and the typical receiver located at the origin,
index for the rest of the paper, though one may incorporate we say that transmitter i has line-of-sight (LoS) condition
those metrics in our proposed interference model similarity with respect to the typical receiver, otherwise, it is in non-
analysis framework. LoS condition. We assume that transmitter of every link is
spatially aligned with its intended receiver, so there is no
Fig. 4 illustrates the accuracy index against the SINR beam-searching phase [44]. We model the antenna pattern by
threshold. Increasing the SINR threshold generally increases an ideal sector model [4], where the antenna gain is a constant
the sensitivity of the interference model to any approximation in the main lobe and another smaller constant in the side lobe.
error in x. We assume the same operating beamwidth for all devices
9

in both transmission and reception modes. Then, the antenna


gain for each transmitter/receiver is [44, Equation (3)]

2 (2 ) z
, inside the main lobe
(14)

RM
rP
z, inside the side lobe ,

where 0 z  1 is the side lobe gain. For mathematical
tractability, we assume negligible side lobe gain (i.e., z = 0)
throughout this section, and numerically assess the impact of
this simplification in the extended version of this paper [34,
Section VI-B]. Fig. 5: Illustration of the vulnerable area.
Consider the link between transmitter i and receiver j
with distance dij . It is shown that with a random number of
obstacles, each having random location and size, this link is in of the region B(, 0, R), i.e., the average number of interferers
the LoS condition with probability eo dij , where o is the inside the region. We have
intensity of the obstacles and  is a constant value that depends Z R
2 t  
o R
on the average size of obstacles in the environment [45]. Due B(,0,R) = I (r)r dr = 1(1 + o R) e .
0 22 2o
to the exponential decrease of the LoS probability with the (15)
link length (also see [46, Fig. 4]), very far interferers are Then, for any real R > 0, the number of potential interferer
most likely blocked. For mathematical simplicity, we assume inside the region B(, 0, R), denoted by NB(,0,R) , is a Poisson
independent LoS conditions among the typical receiver and all random variable with probability mass function
other transmitters, and also impenetrable obstacles. Nonethe- n
less, the following analysis can be extended for more realistic B(,0,R) B(,0,R)
Pr[NB(,0,R) = n] = e . (16)
blockage models, introduced in [32]. Notice that we are using n!
this simplified model to investigate the effects of directionality Result 4 (Impact of Directionality). Consider (15), and let
and blockage on the accuracy of the interference models o 0. The average number of potential interferers con-
and to characterize fundamental properties of the proposed verges to
2 t 2
  
accuracy index. The exact value of the accuracy index with 2
R = t R . (17)
a more realistic mmWave channel can be readily numerically 4 2 2
calculated under any system model, as we highlight in the next
To interpret Result 4, with no obstacle in the environment
sections.
(o 0), we will have a homogenous Poisson network
To evaluate the accuracy of IBM and PRM, we first notice of interferers with density t /2. Therefore, the average
that an intended transmitter can cause a significant interference number of interferers over B(, 0, R) is the product of the
contribution to the typical receiver if: (a) the typical receiver is density per unit area and the area of B, which is R2 /2.
inside its main lobe, (b) it has LoS condition with respect to the It can be concluded that adopting narrower beams reduces
typical receiver, and (c) it is inside the main lobe of the typical the average number of potential interferers within a certain
receiver. Due to the random deployment of the transmitters distance R; however, it still tends to infinity almost surely as
and receivers, the probability that the typical receiver locates R .
inside the main lobe of a transmitter is /2. Moreover, we
have independent LoS events among the typical receiver and Result 5 (Impact of Blockage). Consider (15), and let
individual transmitters. Therefore, the interferers for which R . The average number of potential interferers con-
conditions (a)(b) hold follow an inhomogeneous Poisson verges to
point process I with intensity of I (r) = t eo r /2 at 2 t
, (18)
radial distance r. Condition (c) reduces the angular region 22 2o
that a potential interferer should be located to contribute in which is less than infinity almost surely if o > 0.
the interference observed by the typical receiver. We note that
I B(, 0, rPRM ) is the set of potential interferers inside the Result 5 implies that any receiver observes a finite number
vulnerable region of the PRM, shown by red squares in Fig. 5, of potential interferers almost surely if there is a non-negligible
and I B(, rPRM , ) shows the set of potential interferers blockage. This unique feature holds for the mmWave bands,
outside that region, shown by green circles in Fig. 5. Also, as most of the obstacles can severely attenuate the signals.5
I B(, 0, rIBM ) is the set of potential interferers for IBM Therefore, not only the farther transmitters will contribute less
(near-field interferers). on the aggregated interference (due to higher path-loss), but
they will be also thinned by directionality and blockage such
that only a finite number of spatially close transmitters can
A. Impact of Directionality and Blockage cause non-negligible interference to any receiver. Note that,
Before deriving the accuracy of IBM and PRM, we first 5 In the conventional microwave systems where the transmission is less
evaluate the impact of directionality and blockage on the sensitive to blockage, the number of potential interferers is almost surely
number of the interferers. We define by B(,0,R) the measure infinite, as highlighted in Result 4.
10

these fewer interferers may still cause strong interference if Pr[ PhyM < | PRM ], given in (24). Substituting (22)
they are located very close to the receiver. The point is that the (24) into (10) and (11) gives the accuracy index of the PRM.
thinning process due to directionality and blockage makes the Note that Results 2 and 3 hold here.
SINR distribution under PhyM closer to that of the IBM, which
considers only the near-field interferers. To elaborate more, we
characterize the average number of far-field interferers in the D. Numerical Illustrations
following. To numerically illustrate the accuracy index in Scenario 2,
Proposition 1 (Measure of Far-Field Interferers). Let be the we use the same simulation environment of Section III-C.
operating beamwidth, t be the density of the transmitters, o We independently randomly mark some wireless link to be
be the density of the obstacles, and  > 0 be a constant. Then, blocked by obstacles, with the exponential blockage probabil-
the average number of interferers located inside B(, R, ) ity with o = 0.008 [45]. We then assume infinite penetration
is loss for the blocked links, and use the large scale LoS path
2 t loss model at 28 GHz [2, Table I]. System bandwidth is 1 GHz
B(,R,) = (1 + o R) eo R , (19) (noise power = 84 dBm). Without loss of generality, we
22 2o
assume rPRM = 40 m and rIBM = 80 m.
and the probability of having no far-field interferer is
Fig. 6 illustrates the impact of the operating bandwidth
Pr[NB(,R,) = 0] = eB(,R,) . (20) and average inter-transmitter distance on the accuracy index
of both IBM and PRM under Scenario 2. As expected, the
R Proof: To prove, we only need to compute IBM outperforms PRM. More importantly, directionality and
R
I (r) r dr, and (19) follows. Moreover, by substituting
blockage improve the accuracy of both interference models.
B(,R,) into (16) with n = 0, we conclude (20).
We show in the following section that changing the underlying
From Proposition 1, the average number of far-field inter-
channel model from a Rayleigh fading model to a determin-
ferers will be decreased exponentially with distance. Conse-
istic model further enhances their accuracies. Moreover, the
quently, from (20), the probability of having no far-field in-
accuracy of the TIM with = 130 dB, not depicted for the
terferers increases exponentially with the distance. Moreover,
sake of clarity in Fig. 6, is nearly 1 in our simulations. Notice
if there are a few far-field interferers, their contributions to
that a simplified interference model (e.g., PRM, IBM, or TIM)
the total interference term are suppressed by the significant
may not be of sufficient accuracy for all range of parameters,
distance-dependent path-loss. All these facts result in the
still it is substantially improved by directionality and blockage,
following conclusion:
as highlighted by Results 46.
Result 6. Directionality and blockage can substantially in-
crease the accuracy of the interference ball model.
V. E XAMPLE S CENARIO 3: D ETERMINISTIC C HANNEL ,
We can argue similar accuracy improvement in the PRM, D IRECTIONALITY, AND O BSTACLES
as we numerically illustrate in the next subsections.
In this section, we investigate how accurately the IBM and
PRM can model a wireless network with directional commu-
B. Accuracy of the Interference Ball Model nications, blockage, and deterministic wireless channel. The
Assume rIBM a and d0 a. Using similar claims as in last assumption holds generally in mmWave networks, where
IBM|PhyM
Section III-A, it is straightforward to show pfa = 0. To
 IBM sparse scattering characteristic of mmWave frequencies along
find the miss-detection
 probability, we derive Pr < with narrow beam operation makes the mmWave channel more
and Pr PhyM < in [34, Appendix B], given by (21) deterministic compared to that of microwave systems with rich
and (22), and substitute them into (7). scattering environment and omnidirectional operation [46].
Then, S, (IBMkPhyM) can be found using (21), (22),
(7), and then (2). Similar to Remark 1, for any 0 1,
S, (IBMkPhyM) 1 as rIBM . A. Accuracy of the Interference Ball Model
IBM|PhyM
Again, it is straightforward to show pfa = 0.
C. Accuracy of the Protocol Model However, unlike previous cases, we cannot derive closed-form
To derive the accuracy of the PRM, we need to de- expression for the miss-detection probability, and consequently
rive Pr[ PhyM < ], Pr[ PRM ] and Pr[ PhyM < for the accuracy index. In [34, Appendix C], we have derived
| PRM ], and substitute them into (10) and (11). upper bounds on the miss-detection probability using the
Pr[ PhyM < ] is derived in (22). Event PRM < implies Chernoff bound.
that |I B(, 0, rPRM )| 1, namely there is at least one
potential interferer inside B(, 0, rPRM ). Considering (16), the
B. Accuracy of the Protocol Model
probability of this event is Pr[NB(,0,rPRM ) 1], thus
n o Again, deterministic wireless channel prohibits deriving
Pr PRM < = 1 exp B(,0,rPRM ) ,
 
(23) closed-form expressions for the false alarm and miss-detection
probabilities. Nevertheless, we can show that both Remarks 2
Event PRM implies that there is no interferer inside and 3 holds here. Moreover, we have the following result:
B(, 0, rPRM ). Assuming rPRM a, it is easy to find
11



2 d

2    1 ( a + 1) eo a 
0 d o
Pr IBM < = 1 exp h
 
2
t Eh 1 e
0 +

4pc 2 2 2o

Z rIBM  


1 ed0 hr eo r r dr . (21)
a




2 d

2 t
Pr PhyM 0
Eh 1 ed0 h 1 (o a + 1) eo a
  
< = 1 exp 2
2 2

4pc 2 o

Z

2 2 d hr o r
 o e 0 r dr . (22)
a



Z 
2 d 2 t



0 d hr o r
Pr[ PhyM < | PRM ] = 1 exp Eh
1 e 0 e r dr . (24)

4pc 2 2 rPRM

1 Scaling with : For any constant rPRM no larger than


2
1/ , lim0 S, (PRMkPhyM) 1 e C , for
0.98 some constant C 0.
Accuracy index

Scaling with t : For any constant rPRM no larger than


0.96 1/ , limt S, (PRMkPhyM) 1 et C for
IBM: = 20 some constant C 0.
IBM: = 40 Scaling with o : For any constant rPRM no
0.94
PRM: = 20
larger than 1/ , limo 0 S, (PRMkPhyM)
PRM: = 40
0.92
1 exp{C} for some constant C 0, and
2
20 40 60 80 100 limo S, (PRMkPhyM) 1 eo D for
Average inter-transmitter distance [m] some constant D 0.
Fig. 6: Accuracy of IBM and PRM under Rayleigh fading channel and
directional communications with obstruction.
Due to lack of space and complexity of the analysis, we
leave scaling laws of the IBM for a future publication. In [34,
Appendix
 C], we have used the Chernoff bound to bound
Result 7 (Zero False Alarm Probability). Under the determin- Pr PRM < , which is the first step to derive scaling laws
istic channel model, the false alarm probability is zero for any for the IBM.
rPRM 1/ , where
 2 C. Numerical Illustrations
d
= 0 . (25) Using similar setting as in Section IV-D, Fig. 7 shows
pc 2 the accuracy index of both IBM and PRM under Scenario 3
The following proposition characterizes bounds for the ac- against dt . Comparing this figure to Fig. 6, we observe that di-
curacy index for the Example Scenario 3 (mmWave networks): rectionality and blockage can further boost the accuracy index
  when we have a deterministic wireless channel. Surprisingly,
Proposition 2. For = Pr PhyM and any 0 < the PRM is accurate enough to motivate adopting this model
rPRM 1/ , we have to analyze and design of mmWave networks instead of the
Pr PRM < S, (PRMkPhyM) 1 ,
  PhyM, TIM, and even IBM. For relatively pencil-beams (e.g.,
  = 10 20 ), which may be used in wireless backhauling
where Pr PRM < is given in (23). applications, the accuracy of the PRM in detecting outage
events is almost 1 in all our simulations. Compared to the
We have provided a proof for this proposition along with
PRM, the PhyM and IBM respectively have less than 5% and
other bounds in [34, Appendix C], omitted from here due to
2% higher accuracy in modeling the interference and detecting
lack of space. We have the following scaling law results:
the outage events, but with substantially higher complexities.
Result 8 (Scaling laws for the PRM). The following scaling These complexities often result in limited (mostly intractable)
laws are implied by Proposition 2 and inequality ex 1 + x mathematical analysis and little insight. More interestingly, the
for any x 0: relative difference between the average rate of the typical link
12

1 1

0.9995
0.9
Accuracy index

Accuracy index
0.999

0.9985 0.8
IBM: = 20
0.998 IBM: = 40 Nakagami (m = 9)
0.7
PRM: = 20 Nakagami (m = 3)
0.9975
PRM: = 40 Rayleigh
0.997 0.6
20 25 30 35 40 45 50 2 2.5 3 3.5 4 4.5 5
Average inter-transmitter distance [m] Path-loss index

Fig. 7: Accuracy of IBM and PRM under deterministic channel and directional Fig. 8: Impact of modeling a fading channel by a deterministic one on the
communications. rPRM = 1/ where is given in (25), and rIBM = accuracy of the resulting interference model (dt = 80 m).
2rPRM . The relative difference between the average per-user rate computed
by the PRM and that of computed by the PhyM is less than 0.002%. TABLE I: Accuracy of the mathematical analysis when we replace fading
channels with a deterministic one (dt = 80 m). AI refers to our accuracy
index, shown also in Fig. 8. BC refers to the Bhattacharyya coefficient of
the SINR distributions of x and y, and TD refers to the deviation of the
computed by the PRM and that of computed by the PhyM, throughput obtained by interference model x from that of y.
namely E[log2 (1 + x )] and E[log2 (1 + y )] is less than
Fading type =2 =3 =4 =5
0.002%, implying the accuracy of the simple PRM to analyze
AI 0.68 0.881 0.939 0.956
long-term performance metrics (such as throughput and delay).
Rayleigh BC 0.275 0.048 0.014 0.005
TD 13% 9.3% 6.7% 4.5%
Fig. 7 together with Results 4-7 support the validity of AI 0.951 0.985 0.995 0.998
the previously proposed pseudo-wired model [12], at least Nakagami (m = 3) BC 0.01 0.004 0.003 0.002
for sparse networks like mmWave mesh networks [47]. This TD 5.8% 4.1% 3.2% 2%
highlights the importance of having quantitative (not only AI 0.997 0.9991 0.9996 0.9999
qualitative) insight of the accuracy of different interference Nakagami (m = 9) BC 0.001 0.0008 0.0006 0.0003
models we may face in different wireless networks. Thereby, TD 1.4% 1% 0.7% 0.3%
we can adopt a simple yet accurate enough model for link-
level and system-level performance analysis.
So far, we have observed how we can simplify the set of model. We consider the PhyM for both x and y throughout
dominant interferers and how much accuracy loss they entail this section.
under three network scenarios. Besides the set of interferers
I, computing the SINR expression requires modeling the
A. Approximating a Fading Channel with a Deterministic One
wireless channel and the antenna patterns. More accurate
models generally reduce tractability of the SINR expression To design many protocols for wireless networks (such as
and therefore the interference model. In the next section, we power control, scheduling, and routing), it is often preferable
analyze the possibility of adopting simple models for the to use deterministic channel gains that depend only on the
wireless channel and for the antenna pattern. distance among the transmitters and receivers [12], [14],
[28], [29]. In this subsection, we investigate the accuracy of
approximating the fading gain between transmitter i and the
VI. E XAMPLE S CENARIO 4: I MPACT OF OTHER reference receiver (hi ) in y by a deterministic value c0 in
C OMPONENTS OF THE SINR E XPRESSION x. After this approximation, the channel gain in x becomes
In this section, we analyze the accuracy loss due to simpli- giCh = ac0 d
i , and all other parameters of x are identical to
fying wireless channel model and antenna pattern of the SINR those of y. For sake of simplicity, we consider omnidirectional
expression. In particular, we use the proposed accuracy index communications without blockage, as in Section III.
to investigate the feasibility of modeling a random fading Using the same simulation setup as of Section III, we
channel with a constant value without affecting the long- numerically find c0 in x that gives the highest similarity
term performance of the real system (with random fading). between x and y, averaged over all [0, 10] dB. Fig. 8
The importance of this scenario is due to that numerous shows the accuracy index, obtained by the optimal c0 , for
studies develop protocols and optimize the network based Rayleigh and Nakagami fading. Moreover, we report in Table I
on deterministic wireless channels, yet no study focuses on the Bhattacharyya coefficient between SINR distribution of x
the accuracy and validity of this underlying model. In the and that of y, and also the relative difference in corresponding
following, we comment on what this deterministic channel average throughput. From Fig. 8 and Table I, interference
gain should be to maximize its similarity to the actual random model x (with deterministic channel) becomes more similar
wireless channel. We then use the proposed accuracy index to y (with fading channel) as the path-loss index grows. This
to assess the impact of neglecting the reflections, assuming higher similarity manifests itself in higher accuracy indices, in
impenetrable obstacles, and neglecting sidelobe gain of the di- lower Bhattacharyya coefficients, and also in lower errors in
rectional antenna on the accuracy of the resulting interference the rate analysis. Moreover, approximating a random wireless
13

channel gain with Rayleigh fading and a small path-loss have simplified system models of the examples to avoid
index (outdoor environment) by a constant value6 may lead unnecessary complications, our index poses no limitation to
to a non-negligible inaccuracy in the final throughput analysis these example scenarios. We have recently used this index
(up to 13% error in our example). However, a Nakagami- to assess the accuracy of a simple interference model for a
m fading channel with high m can be well approximated mmWave cellular network [37]. Two future directions can be
by a deterministic channel gain, substantially simplifying the envisioned from this paper.
mathematical analysis and protocol development. The error First, one may use our accuracy index to simplify the
due to this approximation will be reduced with m. To highlight existing and develop new interference models for various
the importance of this observation, we note that the directional network settings. In particular, illustrative examples of this
communications will be largely applied in future wireless paper were more suitable for ad hoc networks, and evaluating
networks [48]. Therefore, wireless networks with Nakagami- the generality of the resulting insights is an interesting future
m fading channels will play a major role in future of wireless research line. Moreover, our proposed index can be used to
networks. For mmWave communications, for instance, we assess the accuracy of different blockage models like one-
are already using narrow beams [3], [47], which result in ball [45], two-ball [4], cone [32], and queue-based models [49]
high m in the corresponding Nakagami-m fading channel. and even develop novel accurate yet tractable models.
The following conjecture states how we can approximate a Second, we can extend the index itself. In this paper, we
Nakagami-m fading channel by a deterministic channel gain. have defined the similarity index for any interference model x
based on its ability to correctly predict the outage events; see
Conjecture 1. Consider a 2D network. Assume that the
Definition 1. To generalize our approach, one may aim at mea-
wireless channel attenuation consists of a constant attenuation
suring the similarity based on any other functions of SNIR. For
at a reference distance, a distance-dependent attenuation with
example, given some alternatives for one function inside SINR
path-loss index , and a random fading h. If h has a
(e.g., different set of interferers or different antenna models),
Nakagami-m distribution with m 3, the wireless channel
one may use an extension of our approach to identify which
can be well approximated by a deterministic LoS channel
of them better balances the accuracy-complexity tradeoff for
without a significant drop in the accuracy of the resulting
a throughput/delay analysis.
interference model or in the analysis of the ergodic perfor-
mance metrics such as spectral efficiency, energy efficiency, VIII. C ONCLUSION
throughput, and delay. If h has Rayleigh fading distribution,
replacing h by its 2/-th moment, namely Eh [h2/ ], results We developed a new mathematical framework to address
in a sufficiently accurate analysis of the ergodic performance very fundamental questions in analysis and design of wireless
metrics. networks: how accurate different interference models are and
how to select the right one. We proposed a new accuracy
index that quantifies the ability of any interference model in
B. Neglecting Penetration Loss, Reflection, and Antenna Side- correctly predicting outage events, under any network setting.
lobe We analytically and numerically illustrated the use of our index
In the extended version of this paper [34], we have used via many example scenarios. In particular, we evaluated the
the proposed index to show surprisingly high accuracy of a accuracy of the prominent techniques that model the set of
simple interference model that assumes i) infinite penetration dominant interferers. We then showed that directional antenna
loss, ii) no reflection, and iii) no antenna side lobes in and obstructions (basic characteristics of mmWave networks)
modeling a typical mmWave ad hoc network where none substantially enhance the accuracy of any interference model,
of those assumptions hold. The results suggest that both making the simple classical protocol model accurate enough
neglecting reflection and assuming impenetrable obstacles are for analysis and optimization of such networks. Furthermore,
accurate enough to analyze ergodic performance measures; we measured the accuracy of approximating a random fading
whereas antenna side lobes can be neglected only in sparse wireless channel with a deterministic channel. We conjectured
networks. These results are complementary to [12], [29] where that a Nakagami-m fading channels with m 3 can be well
the authors used this interference model, without a rigorous approximated by a deterministic value without introducing
mathematical justification, for a sparse mmWave networks. a significant gap in the ergodic performance metrics (e.g.,
throughput and delay); whereas, such gap is generally non-
negligible under Rayleigh fading channels.
VII. F UTURE D IRECTIONS
Throughout this paper, we highlighted the tradeoff between R EFERENCES
the accuracy and mathematical tractability of the interference [1] H. Shokri-Ghadikolaei, C. Fischione, and E. Modiano, On the accuracy
models and exemplified the use of our accuracy index to of interference models in wireless communications, in Proc. IEEE
optimize such tradeoff for different wireless network scenarios, International Conference on Communications (ICC), 2016.
[2] M. Akdeniz, Y. Liu, M. Samimi, S. Sun, S. Rangan, T. Rappaport,
with specific reference to mmWave networks. Although we and E. Erkip, Millimeter wave channel modeling and cellular capacity
evaluation, IEEE J. Sel. Areas Commun., vol. 32, no. 6, pp. 11641179,
6 We observed in our simulations that c = E [h2/ ] = (1 + 2/) Jun. 2014.
0 h
is roughly the optimal constant that provides the highest similarity index in [3] H. Shokri-Ghadikolaei, C. Fischione, G. Fodor, P. Popovski, and
Rayleigh fading channel. Notice that it is 2/-th moment of random variable M. Zorzi, Millimeter wave cellular networks: A MAC layer perspec-
h. tive, IEEE Trans. Commun., vol. 63, no. 10, pp. 34373458, Oct. 2015.
14

[4] M. Di Renzo, Stochastic geometry modeling and analysis of multi- [28] L. Badia, A. Erta, L. Lenzini, and M. Zorzi, A general interference-
tier millimeter wave cellular networks, IEEE Trans. Wireless Commun., aware framework for joint routing and link scheduling in wireless mesh
vol. 14, no. 9, pp. 50385057, Sept. 2015. networks, IEEE Netw., vol. 22, no. 1, pp. 3238, Jan. 2008.
[5] A. Ephremides, J. E. Wieselthier, and D. J. Baker, A design concept [29] S. Singh, F. Ziliotto, U. Madhow, E. Belding, and M. Rodwell,
for reliable mobile radio networks with frequency hopping signaling, Blockage and directivity in 60 GHz wireless personal area networks:
Proc. IEEE, vol. 75, no. 1, pp. 5673, 1987. From cross-layer model to multihop MAC design, IEEE J. Sel. Areas
[6] A. Iyer, C. Rosenberg, and A. Karnik, What is the right model for Commun., vol. 27, no. 8, pp. 14001413, Oct. 2009.
wireless channel interference? IEEE Trans. Wireless Commun., vol. 8, [30] A. K. Gupta, J. G. Andrews, and R. W. Heath, On the feasibility of
no. 5, pp. 26622671, May 2009. sharing spectrum licenses in mmwave cellular systems, IEEE Trans.
[7] P. Gupta and P. R. Kumar, The capacity of wireless networks, IEEE Commun., vol. 64, no. 9, pp. 39813995, Jul. 2016.
Trans. Inform. Theory, vol. 46, no. 2, pp. 388404, Mar. 2000. [31] J. Dams, M. Hoefer, and T. Kesselheim, Scheduling in wireless net-
[8] B. Liu, Z. Liu, and D. Towsley, On the capacity of hybrid wireless works withrayleigh-fading interference, IEEE Trans. Mobile Comput.,
networks, in Proc. IEEE International Conference on Computer Com- vol. 14, no. 7, pp. 15031514, Jul. 2015.
munications (INFOCOM), vol. 2, 2003, pp. 15431552. [32] H. Shokri-Ghadikolaei and C. Fischione, The transitional behavior of
[9] P. Kyasanur and N. H. Vaidya, Capacity of multichannel wireless interference in millimeter wave networks and its impact on medium
networks under the protocol model, IEEE/ACM Trans. Netw., vol. 17, access control, IEEE Trans. Commun., vol. 62, no. 2, pp. 723740,
no. 2, pp. 515527, Apr. 2009. Feb. 2016.
[10] A. E. Gamal, J. Mammen, B. Prabhakar, and D. Shah, Throughput- [33] T. Kailath, The divergence and Bhattacharyya distance measures in
delay trade-off in wireless networks, in Proc. IEEE International signal selection, IEEE Trans. Commun., vol. 15, no. 1, pp. 5260, Feb.
Conference on Computer Communications (INFOCOM), 2004, pp. 464 1967.
475. [34] H. Shokri-Ghadikolaei, C. Fischione, and E. Modiano,
[11] A. El Gamal, J. Mammen, B. Prabhakar, and D. Shah, Optimal Interference model similarity index and its applications to
throughput-delay scaling in wireless networkspart I: The fluid model, mmWave networks: Extended version, 2017. [Online]. Available:
IEEE Trans. Inform. Theory, vol. 52, no. 6, pp. 25682592, Jun. 2006. https://arxiv.org/abs/1710.02659
[12] S. Singh, R. Mudumbai, and U. Madhow, Interference analysis for [35] E. Modiano, D. Shah, and G. Zussman, Maximizing throughput in wire-
highly directional 60-GHz mesh networks: The case for rethinking less networks via gossiping, in Proc. ACM SIGMETRICS Performance
medium access control, IEEE/ACM Trans. Netw., vol. 19, no. 5, pp. Evaluation Review, Jun. 2006, pp. 2738.
15131527, Oct. 2011. [36] P. Di Marco, C. Fischione, F. Santucci, and K. H. Johansson, Modeling
[13] Y. Xu, H. Shokri-Ghadikolaei, and C. Fischione, Distributed association ieee 802.15.4 networks over fading channels, IEEE Trans. Wireless
and relaying with fairness in millimeterwaves networks, IEEE Trans. Commun., vol. 13, no. 10, pp. 53665381, Oct. 2014.
Wireless Commun., vol. 15, no. 12, pp. 79557970, Dec. 2016. [37] X. Jiang, H. Shokri-Ghadikolaei, C. Fischione, and Z. Pang, A simpli-
[14] T. Stahlbuhk, B. Shrader, and E. Modiano, Topology control for fied interference model for outdoor millimeter wave networks, in Proc.
wireless networks with highly-directional antennas, in Proc. IEEE EAI International Wireless Internet Conference (EAI WICOM), 2016.
International Symposium on Modeling and Optimization in Mobile, Ad [38] S. Rangan, T. Rappaport, and E. Erkip, Millimeter wave cellular
Hoc, and Wireless Networks (WiOpt), 2016. wireless networks: Potentials and challenges, Proc. IEEE, vol. 102,
no. 3, pp. 366385, Mar. 2014.
[15] K. Jain, J. Padhye, V. N. Padmanabhan, and L. Qiu, Impact of interfer-
[39] S. Singh, M. Mudumbai, and U. Madhow, Distributed coordination with
ence on multi-hop wireless network performance, Wireless Networks,
deaf neighbors: Efficient medium access for 60GHz mesh networks,
vol. 11, no. 4, pp. 471487, 2005.
in Proc. IEEE International Conference on Computer Communications
[16] G. D. Celik, G. Zussman, W. F. Khan, and E. Modiano, MAC for
(INFOCOM), 2010.
networks with multipacket reception capability and spatially distributed
[40] X. An and R. Hekmat, Directional MAC protocol for millimeter
nodes, IEEE Trans. Mobile Comput., vol. 9, no. 2, pp. 226240, Aug.
wave based wireless personal area networks, in Proc. IEEE Vehicular
2010.
Technology Conference (VTC Spring), 2008, pp. 16361640.
[17] S. P. Weber, J. G. Andrews, X. Yang, and G. De Veciana, Transmission [41] I. K. Son, S. Mao, M. X. Gong, and Y. Li, On frame-based scheduling
capacity of wireless ad hoc networks with successive interference for directional mmWave WPANs, in Proc. IEEE International Confer-
cancellation, IEEE Trans. Inform. Theory, vol. 53, no. 8, pp. 2799 ence on Computer Communications (INFOCOM), 2012, pp. 21492157.
2814, Aug. 2007. [42] V. Petrov, M. Komarov, D. Moltchanov, J. M. Jornet, and Y. Kouch-
[18] L. B. Le, E. Modiano, C. Joo, and N. B. Shroff, Longest-queue-first eryavy, Interference and SINR in millimeter wave and terahertz com-
scheduling under SINR interference model, in Proc. ACM International munication systems with blocking and directional antennas, IEEE
Symposium on Mobile Ad hoc Networking and Computing (MobiHoc), Trans. Wireless Commun., vol. 16, no. 3, pp. 17911808, Mar. 2017.
2010, pp. 4150. [43] J. Garca-Rois, F. Gmez-Cuba, M. R. Akdeniz, F. J. Gonzlez-Castao,
[19] S. Jafar, Topological interference management through index coding, J. C. Burguillo, S. Rangan, and B. Lorenzo, On the analysis of
IEEE Trans. Inf. Theory, vol. 60, no. 1, pp. 529568, Jan. 2014. scheduling in dynamic duplex multihop mmwave cellular systems,
[20] M. Haenggi, Stochastic Geometry for Wireless Networks. Cambridge IEEE Trans. Wireless Commun., vol. 14, no. 11, pp. 60286042, Nov.
University Press, 2013. 2015.
[21] M. Schubert and H. Boche, Solution of the multiuser downlink beam- [44] H. Shokri-Ghadikolaei, L. Gkatzikis, and C. Fischione, Beam-searching
forming problem with individual SINR constraints, IEEE Trans. Veh. and transmission scheduling in millimeter wave communications, in
Technol., vol. 53, no. 1, pp. 1828, Jan. 2004. Proc. IEEE International Conference on Communications (ICC), 2015,
[22] H. Dahrouj and W. Yu, Coordinated beamforming for the multicell pp. 12921297.
multi-antenna wireless system, IEEE Trans. Wireless Commun., vol. 9, [45] T. Bai, R. Vaze, and R. Heath, Analysis of blockage effects on urban
no. 5, pp. 17481759, May 2010. cellular networks, IEEE Trans. Wireless Commun., vol. 13, no. 9, pp.
[23] M. Sharif and B. Hassibi, On the capacity of MIMO broadcast channels 50705083, Sept. 2014.
with partial side information, IEEE Trans. Inform. Theory, vol. 51, [46] T. S. Rappaport, G. R. MacCartney, M. K. Samimi, and S. Sun, Wide-
no. 2, pp. 506522, Feb. 2005. band millimeter-wave propagation measurements and channel models for
[24] F. Rashid-Farrokhi, L. Tassiulas, and K. Liu, Joint optimal power future wireless communication system design, IEEE Trans. Commun.,
control and beamforming in wireless networks using antenna arrays, vol. 63, no. 9, pp. 30293056, Sept. 2015.
IEEE Trans. Commun., vol. 46, no. 10, pp. 13131324, Oct. 1998. [47] F. Yaghoubi, J. Chen, A. Rostami, and L. Wosinska, Mitigation of rain
[25] V. Chandrasekhar, J. G. Andrews, T. Muharemovic, Z. Shen, and impact on microwave backhaul networks, in Proc. IEEE International
A. Gatherer, Power control in two-tier femtocell networks, IEEE Conference on Communications (ICC) Workshop, 2016.
Trans. Wireless Commun., vol. 8, no. 8, pp. 43164328, Aug. 2009. [48] F. Boccardi, R. Heath, A. Lozano, T. L. Marzetta, and P. Popovski, Five
[26] H. Shokri-Ghadikolaei, F. Boccardi, C. Fischione, G. Fodor, and disruptive technology directions for 5G, IEEE Commun. Mag., vol. 52,
M. Zorzi, Spectrum sharing in mmWave cellular networks via cell asso- no. 2, pp. 7480, Feb. 2014.
ciation, coordination, and beamforming, IEEE J. Sel. Areas Commun., [49] R. Congiu, H. Shokri-Ghadikolaei, C. Fischione, and F. Santucci, On
vol. 34, no. 11, pp. 29022917, Nov. 2016. the relay-fallback tradeoff in millimeter wave wireless system, in
[27] P. Cardieri, Modeling interference in wireless ad hoc networks, IEEE Proc. IEEE International Conference on Computer Communications
Commun. Surveys Tuts., vol. 12, no. 4, pp. 551572, Fourth Quarter (INFOCOM) Workshop, 2016, pp. 622627.
2010.
15

Hossein Shokri-Ghadikolaei (S10) received the Eytan Modiano (F12) received his B.S. degree in
B.S. and M.S. degrees in communication systems Electrical Engineering and Computer Science from
from Iran University of Science and Technology and the University of Connecticut at Storrs in 1986 and
Sharif University of Technology, Tehran, Iran, in his M.S. and PhD degrees, both in Electrical Engi-
2009 and 2011, respectively. He is currently working neering, from the University of Maryland, College
toward the Ph.D. degree in the School of Electrical Park, MD, in 1989 and 1992 respectively. He was
Engineering, KTH Royal Institute of Technology, a Naval Research Laboratory Fellow between 1987
Stockholm, Sweden. His research interests include and 1992 and a National Research Council Post
machine learning and optimization, with applications Doctoral Fellow during 1992-1993. Between 1993
in communication networks. and 1999 he was with MIT Lincoln Laboratory.
He was a recipient of the Premium Award for Best Since 1999 he has been on the faculty at MIT, where
Paper in IET Communications (2014), Program of Excellence award from he is a Professor and Associate Department Head in the Department of
KTH (2013), and the best paper award from the Iranian Student Conference of Aeronautics and Astronautics, and Associate Director of the Laboratory for
Electrical Engineering (2011). He was selected as an Exemplary Reviewer for Information and Decision Systems (LIDS).
the IEEE T RANSACTIONS ON C OMMUNICATIONS in 2017. He is a member His research is on communication networks and protocols with emphasis on
of working group 1900.1 in the IEEE Dynamic Spectrum Access Networks satellite, wireless, and optical networks. He is the co-recipient of the MobiHoc
Standards Committee (DySPAN-SC). 2016 best paper award, the Wiopt 2013 best paper award, and the Sigmetrics
2006 Best paper award. He is the Editor-in-Chief for IEEE/ACM Transactions
on Networking, and served as Associate Editor for IEEE Transactions on
Information Theory and IEEE/ACM Transactions on Networking. He was the
Technical Program co-chair for IEEE Wiopt 2006, IEEE Infocom 2007, ACM
MobiHoc 2007, and DRCN 2015. He is a Fellow of the IEEE and an Associate
Fellow of the AIAA, and served on the IEEE Fellows committee.

Carlo Fischione (M05) is currently a tenured As-


sociate Professor at KTH Royal Institute of Tech-
nology, Electrical Engineering and ACCESS Lin-
naeus Center, Stockholm, Sweden. He received the
Ph.D. degree in Electrical and Information Engi-
neering (3/3 years) in May 2005 from University of
LAquila, Italy, and the Laurea degree in Electronic
Engineering (Laurea, Summa cum Laude, 5/5 years)
in April 2001 from the same University. He has
held research positions at Massachusetts Institute of
Technology, Cambridge, MA (2015, Visiting Pro-
fessor), Harvard University Cambridge, MA (Associate, 2015), University
of California at Berkeley, CA (2004-2005, Visiting Scholar, and 2007-2008,
Research Associate) and Royal Institute of Technology, Stockholm, Sweden
(2005-2007, Research Associate). His research interests include optimization
with applications to wireless sensor networks, networked control systems,
wireless networks, security and privacy. He has co-authored over 100 publica-
tions, including a book, book chapters, international journals and conferences,
and four international patents. He received or co-received a number of
awards, including the best paper award from the IEEE Transactions on
Industrial Informatics (2007), the best paper awards at the IEEE International
Conference on Mobile Ad-hoc and Sensor System 05 and 09 (IEEE MASS
2005 and IEEE MASS 2009), the Best Paper Award of the IEEE Sweden VT-
COM-IT Chapter (2014), the Best Business Idea awards from VentureCup East
Sweden (2010) and from Stockholm Innovation and Growth (STING) Life
Science in Sweden (2014), the Ferdinando Filauro award from University
of LAquila, Italy (2003), the Higher Education award from Abruzzo
Region Government, Italy (2004), the Junior Research award from Swedish
Research Council (2007), the Silver Ear of Wheat award in history from
the Municipality of Tornimparte, Italy (2012). He is Associated Editor of
Elsevier Automatica, has chaired or served as a technical member of program
committees of several international conferences and is serving as referee for
technical journals. Meanwhile, he also has offered his advice as a consultant to
numerous technology companies such as Berkeley Wireless Sensor Network
Lab, Ericsson Research, Synopsys, and United Technology Research Center.
He is co-funder and CTO of the sensor networks start-up company MIND
(ancient and modern musical instruments networked). He is Member of IEEE
(the Institute of Electrical and Electronic Engineers), and Ordinary Member
of DASP (the academy of history Deputazione Abruzzese di Storia Patria).

You might also like