 Research
 Open Access
 Published:
Analytical modeling of cognitive heterogeneous cellular networks over Nakagamim fading
EURASIP Journal on Wireless Communications and Networking volume 2015, Article number: 61 (2015)
Abstract
In this paper, we present a cognitive radio (CR)based statistical framework for a twotier heterogeneous cellular network (femtomacro network) to model the outage probability at any arbitrary secondary (femto) and primary (macro) user. A system model based on stochastic geometry (utilizing the spatial Poisson point process (PPP) theory) is applied to model the random locations and network topology of both secondary and primary users. A considerable performance improvement can be generally achieved by mitigating interference in result of applying the CR idea over the above model. Novel closedform expressions are derived for the outage probability of any typical femto and macro user considering the Nakagamim fading for each desired and interference links. We also study some important design factors which their important role in the determination of outage and interference cannot be ignored. We conduct simulations to validate our analytical results and evaluate the proposed schemes in terms of outage probability for different values of signaltointerferenceplusnoiseratio (SINR) target.
Introduction
The best solution to the spectrum saturation and bandwidth availability problems in multitier cellular networks is to adopt technologies that make the most efficient use of existing spectrum through frequency reuse schemes [1,2]. In universal frequency reuse scheme, the existing spectrum can be aggressively and effectively reused by all of the coexisting network tiers. This will lead to higher spatial spectrum utilization and network usage capacity at the expense of an increased possibility of interference among network tiers and of a reduced quality of service (QoS). In multitier cellular networks, interference is increasingly becoming a major performancelimiting factor, and hence, interference modeling, coordination, and avoidance are the primary focus of interest for both the industry and academic communities. Applying the cognitive radio (CR) technology in multitier cellular networks to be aware of and adapt to communication environments, some of the above challenges can be tackled. In fact, CR is the key enabling technology for interference management and avoidance in multitier cellular networks [2,3].
On the other hand, the aggregate interference environment is more complicated to model, and evaluating the performance of communication techniques in the presence of heterogeneous interference is challenging. For interference characterization, if the base stations (BSs) of the cellular network follow a regular grid (e.g., the traditional hexagonal grid model), then the signaltointerferenceplusnoiseratio (SINR) characterization will be either intractable [3,4] or inaccurate due to unrealistic assumptions [5]. Moreover, as urban areas are built out, the BS infrastructure is becoming less like points on a hexagonal lattice and more random. Hence, the use of a hexagonal grid to model the BS locations is violated and is considered too idealized [6]. Furthermore, according to [4] and [6] for snapshots of a cellular network at different locations, the positions of the BSs with respect to each other follow random patterns due to the size and unpredictability of the BSs in these kind of networks. Therefore, the need for a powerful mathematical and statistical tool for modeling, analysis, and design of wireless networks with random topologies is quite obvious.
A new modeling approach called ‘stochastic geometry’ has been recently applied to the analysis of multitier cellular networks due to its ability to capture the topological randomness in the network and its aim at deriving accurate and tractable expressions for outage probability [3,6]. Stochastic geometry stems from applied probability and has a wide range of applications in the analysis and design of wireless networks in particular for modeling and analyzing systems with random channel access (e.g., ALOHA [7,8] and carrier sensing multiple access (CSMA) [9]), single and multitier cellular networks [6], and networks with cognitive abilities [7,10]. This paper discusses this new theoretical model to provide a better understanding of the heterogeneous cellular networks of tomorrow and their challenges (interference modeling, coordination, and avoidance) that must be tackled in order for these networks to reach their potential. We focus on a twotier femtomacro network where lowpower and smallcoverage local nodes (femto nodes) are distributed in the coverage of macro nodes. We provide an insight into the role of CR in interference mitigation in twotier heterogeneous networks. We derive closedform expressions for the outage probability of any typical femto and macro user in the network. We also study the effect of several important design factors which play vital roles in the determination of outage and interference.
The main contributions are therefore the following: (1) We analyze the Laplace transforms of all four types of aggregate interference between macro and CR femto networks (including the interference between macro nodes among themselves and femto nodes among themselves, the crossinterference from femto to macro network and vice versa) in perfect and imperfect spectrum sensing CRbased femto networks, considering simultaneously the Nakagami fading, the Poisson point process (PPP) model, and some important design factors which play vital roles in determination and mitigation of outage and interference. (2) This article provides an insight into the role of CR in interference mitigation in orthogonal frequencydivision multipleaccess (OFDMA) twotier heterogeneous networks. (3) Tight closedform expressions are derived for the outage probability of any typical femto and macro user considering the Nakagami fading (Rayleigh fading assumption is used in many studies to relax the difficulty of addressing a closedform expression for the outage probability (see, e.g., [8] and [10])) for all the communication links (desired and interference links) with the possibility of using the CR ability for the femto network.
To the best of our knowledge, no closedform expressions for the outage probability of the femto and macro users exist in the current literature without imposing the Rayleigh fading assumption. On the other hand, most of the available studies in this area are based on the existence of only one macroBS (along with the macro users and the femto network) and the effect of considering multiple macroBSs is ignored in the analysis of outage probability.
System model
Model description
We consider infinite spatially collocated macroBS and femtoBS node heterogeneous networks (see Figure 1). It is assumed that the spatial distribution of the nodes is captured using two collocated and independent homogenous Poisson point processes (HPPPs) [6,7] i.e., Φ_{ M } and Φ_{ F } with intensities λ_{ M } and λ_{ F }, respectively. In other words, the locations of the macroBS nodes constitute an HPPP Φ_{ M }, where λ_{ M } is the average number of the macroBS nodes per unit area. Similar statement can be made for the HPPP formed by the femtoBS nodes Φ_{ F } with intensity λ_{ F } . According to superposition theorem [11], the overall node process over the network formed by both the macroBS and femtoBS nodes also is an HPPP with intensity λ (λ = λ_{ F } + λ_{ M }). Furthermore, the macro and femto users are scattered over the plane according to some independent PPPs with different densities than λ_{ M } and λ_{ F }, respectively. However, our interference analysis is fundamentally concerned with the distribution of the transmitters (BSs).
Since femtoBSs are installed and maintained by the paying home users for better indoor performance, they are only accessible by their own mobile subscribers (femto users) (known as closedaccess policy). On the other hand, macroBSs can be accessed only by unauthorized users (macro users). In practice, macro network is deployed usually without awareness of the distributed femto network. To this end, wireless operators can consider giving priority to the macro users, and the femto network has to be selfoptimized to mitigate its interference to the macro users. Motivated by this insight, the macroBSs (along with the macro users) and the CRenabled femtoBSs (along with the femto users) are analogous to primary and secondary systems in the CR model, respectively.
System structure
In OFDMA, the spectrum is orthogonally divided into timefrequency resource blocks (RBs), which increases flexibility in resource allocation, thereby allowing high spectral efficiency. As shown in Figure 2, we consider a spectrum of N RBs, out of which M (M ≤ N) random RBs are idle or unoccupied by the macro users (primary system). With the CR capability, a femtoBS could actively acquire knowledge about its environment and access to the RBs without the aid of a macrocell in a decentralized fashion (clearly, no synchronization between the macro and femto network is needed any more) and automatically prevent disturbing the macro users [2].

1)
As shown in Figure 2, each femtoBS’s transmission strategy is divided into consecutive slots, each having a duration of T. Each slot is divided into two consecutive stages, i.e., sensing and data transmission, with durations of T _{ S } and T _{ D }, respectively. Each femtoBS periodically senses the spectrum to identify which RBs are occupied by the macro network. Indeed, each femtoBS accomplishes sensing one RB in one unit slot T _{ SRB } within T _{ S }. Each femtoBS senses N _{ s } RBs in sequence which are randomly selected from the N available RBs and detects its idle RB set. Clearly, the time required for sensing the N _{ s } RBs is T _{ s } = T _{ SRB } N _{ s }. Note that the femtoBSs cannot perform data transmission within the sensing time T _{ S }. We assume that all femtoBSs are perfectly synchronized and have the same time as the sensing time. Methods for implementing a perfect synchronization among the femtoBSs are outside the scope of this paper; however, a set of possible candidates exist, including GPS synchronization, the wired backhaul (IEEE 1588), and leveraging synchronization signals broadcasted by the femtoBSs [12].

2)
Each femtoBS senses the received interference power on each RB within the sensing duration.

If the received interference power on an RB exceeds a certain threshold, the RB is identified as being occupied by the macro network since all femtoBSs sense at the same time.

Otherwise, the RB is unoccupied by the macro network.


3)
In the data transmission time (T _{ D }), each femtoBS only allocates an unoccupied RB sensed in the sensing time to its user (by only utilizing these unoccupied RBs, crosstier interference can be consequently avoided). Since the determination of each individual RB status as busy/idle is subject to (occasional) error, determined by the probability of (correct) detection of the presence of PUs’ signals P _{ d } and probability of false alarm P _{ f } (probability of falsely declaring an idle RB as busy), we study the effect of both the ideal detection, i.e., P _{ d } = 1 and P _{ f } = 0, and the cases involving imperfect sensing, i.e., P _{ d } ≠ 1 and P _{ f } ≠ 0 on the outage probabilities of femto and macro users.
As shown in Figure 3, the macro users’ exclusion regions with radius D are used to guarantee that the femtoBSs will, on average, not generate an aggregate interference leading to the outage of macro (primary) users. As shown, for example, those femtoBSs located in the tagged macro user’s exclusion region are not allowed to transmit data whether they pick the same RB as the tagged macro user or a different one. The tagged macro user is not disturbed by the femtoBSs transmitting on different RBs (from that of the tagged macro) even if they are inside its exclusion region. However, we deactivate them to prevent the tagged macro user from any harmful interference as a result of sudden appearance of them on the same RB in next time slots. We consider this law throughout the paper even in the case of the perfect sensing scenario. We also assume that the femto users are informed about the macro users’ exclusion regions.
Stochastic geometrybased network configuration
Femto outage probability
We derive the probability of outage for a typical femto user (p _{ OF }) defined as the probability that a randomly chosen femto user cannot achieve a target SINR θ considering a collocated spectrum sensing CR based femto network and macroBSs as follows [6]:
In fact, the outage probability evaluates the cumulative distribution function (CDF) of SINR over the entire network. The experienced SINR by a typical femto user is calculated as
where P _{ F } is the transmission power from the nearest femtoBS (tagged femtoBS) located in the random distance r _{ F } from its tagged femto user (we assume that the tagged femto user under consideration is located at the origin), and α is the pathloss exponent. I _{ FB } and I _{ MB } are the aggregate interference power at the origin from the other femtoBSs and macroBSs, respectively, and σ^{2} is the noise power.
When the fading distribution is Nakagamim _{ d,F } for the communication channel between the tagged femto user and its corresponding femtoBS, the probability density function (pdf) of the power fading coefficient x = h _{ F } is as follows
where m _{ d,F } describes the severity of the fading for the desired link, and Ω_{ d,F } is the average SNR. By changing m _{ d,F }, we can get a variety of fading conditions. For example, if m _{ d,F } = 1, then the desired link suffers from Rayleigh fading, and m _{ d,F } = ∞ means that there is no fading. Note that we will represent the Nakagami fading parameters for each communication link, separately (see Figure 3b). Even though the fading power gain distributions are identical, we will still use different symbols to distinguish all the existing links for the sake of analytical convenience.
Here, we derive the complementary CDF (CCDF) of SINR as follows
Considering the pdf of the power fading coefficient h _{ F } and the incomplete gamma function (Note that \( \Gamma \left(a,x\right)={\displaystyle \underset{x}{\overset{\infty }{\int }}}{t}^{a1}{e}^{t}\mathrm{d}t \) indicates the incomplete gamma function), we have
where I = σ^{2} + I _{ FB } + I _{ MB }.
We know that \( \frac{\Gamma \left[m, my\right]}{\Gamma (m)}={e}^{ my}{\displaystyle \sum_{k=0}^{m1}}\frac{m^k}{k!}{y}^k \) (m is a positive integer). Therefore, \( P\left[{h}_F>(I)\frac{\theta {r_F}^{\alpha }}{P_F}\right] \) is simplified as follows
From (3) and (4) we have
Finally, the CCDF of SINR when the fading distribution is Nakagamim _{ d,F } for the communication channel between the tagged femto user and its corresponding femtoBS is given by
where I = σ^{2} + I _{ FB } + I _{ MB } and \( s=\frac{m_{d,F}\theta {r_F}^{\alpha }}{\varOmega_{d,F}{P}_F} \).
Proof: See Appendix 1.
Note that due to the assumption of independent PPPs for the femto and macro networks, the aggregate interference received from the femtoBSs is independent of the aggregate interference received from the macroBSs [10]; therefore, we can write
Where \( {\mathrm{\mathcal{L}}}_{I_{FB}}(s) \) and \( {\mathrm{\mathcal{L}}}_{I_{MB}}(s) \) are the Laplace transform of random variables I _{ FB } and I _{ MB } evaluated at \( s\left(s=\frac{m_{d,F}\theta {r_F}^{\alpha }}{\varOmega_{d,F}{P}_F}\right) \) respectively. Therefore, (6) can be rewritten as follows
Computation of \( {\mathbf{\mathcal{L}}}_{{\boldsymbol{I}}_{\boldsymbol{FB}}}\left(\boldsymbol{s}\right) \) and \( {\mathbf{\mathcal{L}}}_{{\boldsymbol{I}}_{\boldsymbol{MB}}}\left(\boldsymbol{s}\right) \) at the tagged femto user
We now calculate the closedform expressions for \( {\mathrm{\mathcal{L}}}_{I_{FB}}(s) \) and \( {\mathrm{\mathcal{L}}}_{I_{MB}}(s) \) (at \( s=\frac{m_{d,F}\theta {r_F}^{\alpha }}{\varOmega_{d,F}{P}_F} \)). The Laplace transform of the aggregate interference (from all the active femtoBSs except the tagged femtoBS denoted by fbs _{0}) is given as follows (Note: some of the femtoBSs located in the macro users’ exclusion regions (with radius D) are deactivated, therefore, \( {\lambda}_F^{\hbox{'}}\le {\uplambda}_F \) (see Figure 3))
where R _{ i } is the distance of the ith interferer from the tagged femto receiver captured by the point process Φ_{ F }. The interference channel gains g _{ i } are assumed to be mutually independent and have identical pdfs (Nakagami m _{ I,F }). Each of the active interfering femtoBSs transmits with the same power P _{ F }. Using the definition of the Generating functional [6] for the PPP, which states for some function f(x) that \( \mathrm{E}\left[{\displaystyle \prod_{x\in \Phi}}f(x)\right]= \exp \Big({\displaystyle \underset{{\mathrm{\mathbb{R}}}^d}{\int}\left(1f(x)\right)\uplambda \mathrm{d}x\Big)} \), (9) can be rewritten as
where we flipped the order of integration and expectation. Since the closest interfering femtoBS is at least at distance r _{ F } from the tagged user, the integration limits are from r _{ F } to ∞. In other words, interference is encountered from all the active femtoBSs located in the area ℝ^{d}\b(0, r _{ F }) (where b(x, y) is ball of radius y centered at point x). Therefore, not all the femtoBSs will contribute towards the aggregate interference, i.e., only those active femtoBSs which are outside the mentioned ball and at minimum satisfy all of the following conditions qualify as potential contributors.
Before explaining the following conditions ((a) and (b)), it is useful to translate the point process into polar coordinates. Therefore, according to [7] and [11] the intensity of the HPPP Φ_{ F } is shown as
where R is the distance between an arbitrary femtoBS and the tagged femto receiver. b _{ d } is the volume of a unit sphere in ℝ^{d} (\( {b}_d=\frac{\sqrt{\pi^d}}{\Gamma \left(1+\raisebox{1ex}{$d$}\!\left/ \!\raisebox{1ex}{$2$}\right.\right)},\ \Gamma (x)={\displaystyle {\int}_0^{\infty }{t}^{x1}{e}^{t}\mathrm{d}t} \) denotes the standard gamma function).
(a) Satisfying the aforementioned condition, any active femtoBS contributes towards the interference at the tagged femto receiver, if it picks the same RB as the tagged femtoBS to communicate with its user, (we show the probability of picking a same RB from a pool of all RBs as p _{ RB } (the calculation of p _{ RB } for this case is derived in Section 4, Scenario I, Case 1)).
(b) We assume that the CR femtoBSs employ a slotted ALOHA MAC (medium access control) protocol to schedule their transmission. Therefore, they only transmit with probability p _{ tx } in the current time slot and defer the transmission with probability 1 − p _{ tx } .
Applying both conditions (a) and (b) which are indeed two independent thinning tools, the thinned point process of Φ_{ F } is formed. In other words, Φ_{ F } is subjected to two thinning processes each presenting an independent deletion/retention of each point of Φ_{ F } with a fixed retention probability. We now formulize this operation, which will in fact result in reducing the number of interferers and hence lowering the outage probability at the tagged femto user. First, Φ_{ F } is reconstructed by p _{ RB }thinning, where each point of Φ_{ F } is retained with probability p _{ RB } (to accommodate condition (a)), and then it is thinned again by applying the second independent thinning (to accommodate condition (b)). Thus, the intensity of the process (the number of interfering CR femtoBSs) becomes
Now, (10) is rewritten as
By changing the variables R ^{d} → x and then \( {x}^{\frac{\alpha }{d}}\to y \), and following a few simple steps, the above expression is simplified as:
where
Similar with the desired link, we consider the Nakagami power fading model for the femto interfering links as well (Nakagami fading links with equal parameters m _{ I,F } and Ω_{ I,F }). Then, following the derivations in Appendix 2, M(θ, α) is expressed as
Using the similar approach, the Laplace transform of the aggregate interference generated by the macroBSs at the tagged femto user is obtained as follows
where L _{ i } is the distance of the ith interfering macroBS from the tagged femto receiver captured by the point process Φ_{ M }. The interference channel gains G _{ i } are assumed to be mutually independent and have identical pdfs (Nakagamim _{ I,M }). Each of the active interfering macroBSs transmits with the same power P _{ M }. Again, using the definition of the Generating functional for the PPP, we can write
The interference is encountered from all the macroBSs located in the area ℝ^{d}\b(0, 0). It should be noted that not all the macroBSs in ℝ^{d} will contribute towards the aggregate interference, i.e., only those macroBSs transmitting on the same RB as the tagged femto user qualify as potential interferers. The intensity of the HPPP Φ_{ M } process can be therefore written as follows
where L is the distance between an arbitrary macroBS and the tagged femto receiver and \( {\lambda}_M^{\hbox{'}} \) is the intensity of those macroBSs transmitting on the same RB as the tagged femto user at a time.
Now, (17) is rewritten as
By changing the variables and following a few simple steps, \( {\mathrm{\mathcal{L}}}_{I_{MB}}(s) \) is obtained as follows [11]
Same as the desired link, we consider the Nakagami power fading model for the macro interfering links as well (Nakagami fading links with equal parameters m _{ I,M } and Ω_{ I,M }). Below, \( \mathrm{E}\left[{(G)}^{\frac{d}{\alpha }}\right] \) is obtained using the definition of expectation and the standard gamma function
Closedform femto outage probability expression
Finally, from (1), (8), (13), and (19) and by replacing \( s=\frac{m_{d,F}}{\varOmega_{d,F}}\frac{\theta {r_F}^{\alpha }}{P_F} \) , and z = r _{ F } ^{α}, the closedform expression for the outage probability of the tagged femto user is obtained as follows
where
\( \exp \left(l(z)\right)={e}^{\left[\mathrm{A}\right]{z}^{\frac{d}{\alpha }}\frac{m_{d,F}\theta {\sigma}^2}{\varOmega_{d,F}{P}_F}z} \) , and z = r _{ F } ^{α}
and A is given by (22).
where
and
Note: m _{ d,F } is constrained to take integer values only, while m _{ I,F } and m _{ I,M } can take any value (bigger than 0.5). The restriction on m _{ d,F } is because of m _{ d,F } − 1, as an upper limit for the summation in (21). However, for noninteger m _{ d,F }, by using the infinite series representation of incomplete gamma function, we also obtain an exact but infinite summation expression for the outage probability of the tagged femto user as in Appendix 3.
The probability of outage averaged over the plane is derived as
where \( {f}_{r_F}\left({r}_F\right)={e}^{{\uplambda}_F\pi {r_F}^2}2\pi {\uplambda}_F{r}_F \) is the pdf of r _{ F } [6].
Here, for example, we present the p _{ ōF } in closedform expressions for three different values of m _{ d,F }:
It should be noted that in all the above expressions (A − λ_{ F }π) < 0, and σ^{2} → 0 (operating in an interferencelimited regime). For m _{ d,F } ≥ 4, obtaining p _{ ōF } is also quite easy due to the fact that exp(l(z)) is a factor common to every term of the all derivatives of exp(l(z)).
Macro outage probability
We derive the outage probability for a typical macro user (p _{ OM }) defined as the probability that a randomly chosen macro user cannot achieve a target SINR γ, considering a collocated spectrum sensing CRbased femto network and macroBSs as follows:
The experienced SINR by a typical macro user is calculated as
where P _{ M } is the transmission power from the nearest macroBS located in the random distance r _{ M } from its tagged macro user, and α is the pathloss exponent. I _{ FB } and I _{ MB } are the aggregate interference power to the tagged macro user (located at the origin) from the surrounding femtoBSs and macroBSs, respectively, and σ^{2} is the noise power.
When the fading distribution is Nakagamim _{ d,M } for the communication channel between the tagged macro user and its corresponding macroBS, the pdf of the power fading coefficient y = h _{ M } is as follows
where m _{ d,M } (a positive integer) is the fading parameter for the desired link, Ω_{ d,M } is the average SNR. Next, the similar approach to obtain the outage probability of the tagged femto user is used for the outage probability calculation of the tagged macro user. Therefore, from (24) and (25) we have
where \( {\mathrm{\mathcal{L}}}_{I_{FB}}(s) \) and \( {\mathrm{\mathcal{L}}}_{I_{MB}}(s) \) are the Laplace transform of random variables I _{ FB } and I _{ MB } evaluated at s \( \left(s=\frac{m_{d,M}}{\varOmega_{d,M}}\frac{\gamma {r_M}^{\alpha }}{P_M}\right) \), respectively. We now calculate the closedform expressions for \( {\mathrm{\mathcal{L}}}_{I_{FB}}(s) \) and \( {\mathrm{\mathcal{L}}}_{I_{MB}}(s) \) (at \( s=\frac{m_{d,M}}{\varOmega_{d,M}}\frac{\gamma {r_M}^{\alpha }}{P_M} \)).
Computation of \( {\mathbf{\mathcal{L}}}_{{\boldsymbol{I}}_{\boldsymbol{MB}}}\left(\boldsymbol{s}\right) \) and \( {\mathbf{\mathcal{L}}}_{{\boldsymbol{I}}_{\boldsymbol{FB}}}\left(\boldsymbol{s}\right) \) at the tagged macro user
Taking a similar approach to what we had before, \( {\mathrm{\mathcal{L}}}_{I_{MB}}(s) \) is obtained as follows
and
in which W is the distance between an arbitrary macroBS (captured by the point process Φ_{ M }) and the tagged macro receiver, and \( {\lambda}_M^{\hbox{'}} \) is the intensity of those macroBSs transmitting on the same RB as the tagged macro user at a time. Similarly, the interference channel gains g _{ p } (between the interfering macroBSs and the tagged macro user) are assumed to be mutually independent and have identical pdfs (Nakagamim _{ I,M }). Each of the active interfering macroBSs transmits with the same power P _{ M } as for the tagged macroBS. It should be noted that only those macroBSs operating on the same RB as the tagged macro user and located in the area ℝ^{d}\b(0, r _{ M }) make interference to the tagged macro user.
Same as before, (27) is simplified as
in which \( V\left(\gamma, \alpha \right)=\mathrm{E}\left[{\left({g}_p\right)}^{\frac{d}{\alpha }}\left(\Gamma \left(\frac{d}{\alpha },\frac{m_{d,M}}{\varOmega_{d,M}}\gamma {g}_p\right)\Gamma \left(\frac{d}{\alpha}\right)\right)\right] \).
The Nakagami power fading model is also considered for the interference links (Nakagami fading links with equal parameters m _{ I,M } and Ω_{ I,M }). The derivation of V(γ, α) is similar to the derivation of M(θ, α) in Appendix 2. Therefore, V(γ, α) is expressed as follows
Based on the same approach as described before, \( {\mathrm{\mathcal{L}}}_{I_{FB}}(s) \) is also given by
Since the closest interfering femtoBS is at least at distance Kr _{ M } from the tagged macro user, the integration limits are from Kr _{ M } to ∞. In other words, interference is encountered from all the femtoBSs located in the area ℝ^{d}\b(0, Kr _{ M }) (see Figure 3). It should be noted that not all the femtoBSs outside this ball will contribute towards the aggregate interference, i.e., only those femtoBSs which are outside the mentioned ball and at minimum satisfy all of the following conditions are considered as potential contributors

(c)
Satisfying the above condition, any arbitrary femtoBS contributes towards the interference at the tagged macro receiver, if it wrongly picks the same RB as the tagged macroBS to communicate with its user (we show the probability of picking a same RB for data transmission from a pool of all RBs as p _{ RB } (the calculation of p _{ RB } for this case is seen in Section 4, Scenario II, Case 2)).

(d)
Same as the condition (b) in subsection 3.1.1.
Applying these two independent thinning, the intensity of the process (the number of the interfering CR femtoBSs at the tagged macro user) becomes
Taking the similar approach, (31) is simplified as follows
in which \( T\left(\gamma, \alpha \right)=\mathrm{E}\left[{\left({G}_p\right)}^{\frac{d}{\alpha }}\left(\Gamma \left(\frac{d}{\alpha },\frac{\frac{m_{d,M}}{\varOmega_{d,M}}\gamma {P}_F{G}_p}{{\mathrm{K}}^{\alpha }{P}_M}\right)\Gamma \left(\frac{d}{\alpha}\right)\right)\right]. \)
The Nakagami power fading model is also applied to the interference links (Nakagami fading links with equal parameters m _{ I,F } and Ω_{ I,F }). The mathematical derivation of T(γ, α) is quite similar to the derivation of M(θ, α) and V(γ, α) (see Appendix 2). Hence, T(γ, α) is expressed as follows
Closedform macro outage probability expression
Finally, from (24), (26), (29), and (33) and by replacing \( s=\frac{m_{d,M}}{\varOmega_{d,M}}\frac{\gamma {r_M}^{\alpha }}{P_M} \) , and z = r _{ M } ^{α}, the closedform expression for the outage probability of the tagged macro user is obtained as follows
where
\( \exp \left(l(z)\right)={e}^{\left[\mathrm{B}\right]{z}^{\frac{d}{\alpha }}\frac{m_{d,M}}{\varOmega_{d,M}}\frac{\gamma {\sigma}^2}{P_M}z} \) and z = r _{ M } ^{α}
and B is given by (36).
where
and
The probability of outage averaged over the plane can also be derived as
where \( {f}_{r_M}\left({r}_M\right)={e}^{{\uplambda}_M\pi {r_M}^2}2\pi {\uplambda}_M{r}_M \) is the pdf of r _{ M }. Such as before, p _{ ōM } can be easily obtained for m _{ d,M } = 1, 2, 3, ….
Outage probability formulation under perfect and imperfect sensing
We now study the effect of both the ideal detection, i.e., P _{ d } = 1 and P _{ f } = 0, and the cases involving imperfect sensing, i.e., P _{ d } ≠ 1 and P _{ f } ≠ 0 on the outage probabilities of femto and macro users.
Scenario I
Ideal detection (P _{ d } = 1 and P _{ f } = 0):
(femto and macro outage probabilities)
Each secondary node (femtoBS) has perfect knowledge of each primary (macroBS) signaling. In other words, sensing at each femtoBS is done perfectly. Therefore, RBs occupied by the macro network are not chosen by any femoBS for data transmission. In this case, the tagged femto user does not experience any interference from the macroBSs. This assumption (P _{ d } = 1 and P _{ f } = 0) is reasonable in the scenarios where interference from other systems is assumed to be negligible.
Therefore, under this assumption, \( \mathrm{E}\left[{e}^{s{I}_{MB}}\right]=1 \) and \( {\mathrm{\mathcal{L}}}_{I_{MB}}(s)=1 \) (in (7)), consequently. Then, for the outage probability of the tagged femto user in (21), A is only equal to A_{1} (see (22)). It should be noted that the calculation of p _{ RB } for this case is presented in Section 4, Scenario I, Case 1.
Clearly, under this scenario and considering the above explanations, the tagged macro user does not experience any interference from the surrounding femtoBSs. Therefore, for the outage probability of the tagged macro user in (35), B is only equal to B_{2} (see (36)).
Scenario II
Imperfect detection (P _{ d } ≠ 1 and P _{ f } ≠ 0):
(femto and macro outage probabilities)
In this scenario, each secondary node (femtoBS) has imperfect knowledge of each primary (macroBS) signaling. In other words, sensing at each femtoBS is done imperfectly and subject to (occasional) error. Therefore, RBs occupied by the macro network may be wrongly chosen by the femoBSs, as well. Two cases can take place under the imperfect sensing scenario:
Case 1. The tagged femtoBS transmits data on an idle RB (in this case, the outage probability formulations (for both the tagged femto and macro users) are the same as in the perfect sensing scenario except for the calculation of p _{ RB } (see Section 4, Scenario II, Case 1))
Case 2. The tagged femtoBS transmits on an occupied RB (in this case, the outage probability formulations for both the tagged femto and macro users are explained as follows and the calculation of p _{ RB } is presented in Section 4, Scenario II, Case 2)
In Case 2, the tagged femto user can experience interference from both the active femtoBSs (which pick the same occupied RB as the tagged femtoBS) and macroBSs. Then, for the outage probability of the tagged femto user in (21), A is equal to A_{1} + A_{2} (see (22)). Clearly, under this scenario and in Case 2, the tagged macro user can experience interference on its RB, from both the femtoBSs and macroBSs. Indeed, for the outage probability of the tagged macro user in (35), B is equal to B_{1} + B_{2}.
Resource block selection probability (p _{ RB }) calculations under perfect and imperfect sensing
In this section, we discuss how the optimal values of the RB selection probability (p _{ RB }) for a secondary transmitter (femtoBS) can be determined under each femtoBS’s perfect and imperfect sensing scenarios.
Scenario I
Ideal detection for all the CR femtoBSs (P _{ d } = 1 and P _{ f } = 0) [13,14]:
Case 1. The tagged femtoBS assigns the ith idle RB to its femto user.
p _{ RB }: The probability that the ith idle RB being selected for data transmission by any of the other active CR femtoBS [14].
where
The first term (p _{ idle }(M _{ s })) indicates the probability of M _{ s } idle RBs sensed by one femtoBS (during the sensing time, T _{ S }) and the second term is the probability that the ith idle RB is inside the M _{ s } idle RBs, and finally the third term indicates that the probability of selecting the ith idle RB (out of the M _{ s } idle RBs) by that femtoBS is equal to \( \frac{1}{M_s} \) (since each of the idle RBs within the M _{ s } idle RBs has an equal probability of being chosen). It should be noted that each CR femtoBS will fail to access when M _{ s } = 0 (the maximum value of M _{ s } is equal to min{M, N _{ s }}). Therefore, from (38),
If the number of RBs sensed by one CR femtoBS (i.e., N _{ s }) is more than or equal to N − M + 1, then at least we have one idle RB within the N _{ s } detected RBs, i.e., p _{ idle }(M _{ s } = 0) = 0. On the other hand, if N _{ s } is smaller than or equal to NM, the CR femtoBS will fail to access when the RBs within the N _{ s } sensed RBs are all occupied by the macroBSs. Therefore, we can write
From (39) and (40), the probability that a CR femtoBS selects the ith idle RB for data transmission is obtained as follows
Scenario II
Imperfect detection for all the CR femtoBSs (P _{ d } ≠ 1 and P _{ f } ≠ 0) [13,14]:
Case 1. The tagged femtoBS assigns the ith idle RB to its femto user.
p _{ RB }: The probability that the ith idle RB being selected for data transmission by any of the other active CR femtoBS [14].
We show the detection result indicator of the nth RBs by D _{ n } (n ∈ {1, 2, …, N}). If D _{ n } = 1, the nth RB is detected as idle RB; otherwise, D _{ n } = 0. The probability of one idle RB detected with no false alarm is 1 − P _{ f } and the probability for an occupied RB detected as an idle RB is 1 − P _{ d }. In other words,
in which P _{ f } is the false alarm probability and can be obtained as follows [1416]
(\( \mathcal{Q}(x)=\frac{1}{\sqrt{2\pi }}{\displaystyle \underset{x}{\overset{\infty }{\int }}} \exp \left(\frac{{t}^2}{2}\right)\mathrm{d}t \) and P _{ d } is the predefined detection probability. τ is the spectrum sensing time, f _{ s } the sampling frequency, and η the received interference power on an RB to each femtoBS).
Indeed, the probability that the ith idle RB is detected with no false alarm by a CR femtoBS is Pr(D _{ i } = 1) = V _{0}.
To obtain the probability that the ith idle RB being selected for data transmission by one CR femtoBS (p _{ RB }), first, we calculate the probability that the ith idle RB is sensed and included in the M _{ s } idle RBs out of the N _{ s } sensed RBs in the sensing period (T _{ S }), and it is expressed as follows
where
Conditioning on M _{ D } (see Table 1) and M _{ s }, the probability that the ith idle RB being detected as idle is obtained as follows
in which Φ is the set of the detected RBs by one femtoBS (see Table 1 for the definitions of m _{ ID } and m _{ OD }). Replacing m _{ OD } with M _{ D } − m _{ ID }, we have
Having the M _{ D } detected idle RBs (including the ith idle RB), the probability of a CR femtoBS accessing the ith idle RB is equal to \( \frac{1}{M_D} \). Thus, the probability that the ith idle RB is selected for data transmission by any CR femtoBS (under imperfect sensing scenario) is obtained as follows
Finally,
Case 2. The tagged femtoBS assigns the ith busy RB (occupied by the macro network) to its femto user.
p _{ RB }: The probability that the ith busy RB being selected for data transmission by any of the other active CR femtoBS.
To obtain the probability of the ith busy RB selected for data transmission by one femtoBS (p _{ RB }), first, we calculate the probability that the ith busy RB is sensed and included in the (N _{ s } − M _{ s }) busy RBs out of the N _{ s } sensed RBs in the sensing period, and it is expressed as follows
Conditioning on M _{ D } and (N _{ s } − M _{ s }), the probability that the ith busy RB being detected as idle is obtained as follows
in which Φ is the set of the detected RBs by a femtoBS. Again, replacing m _{ OD } with M _{ D } − m _{ ID }, we have
Having the M _{ D } detected idle RBs (including the ith busy RB), the probability of a CR femtoBS accessing the ith busy RB is \( \frac{1}{M_D} \). Thus, the probability that the ith busy RB is selected for data transmission by any CR femtoBS (under imperfect sensing scenario) is obtained as follows
Finally,
Simulation results and discussions
Outage probability is considered as a QoS metric to meet a specific connection data rate requirement, or it can be utilized as a performance measure to evaluate the level of meeting the total demands of users in highly dense networks such as the heterogeneous cellular networks. By obtaining an exact closedform expression for the system outage probability, we will be able to take a finer look at the system performance with the end goal of better understanding system design principles for the heterogeneous cellular networks.
Outage probability is affected by many parameters that have impact on the system performance. As mentioned before, cognition can be a potential solution for dynamic spectrum allocation which will adapt to the network geometry, solve the interference management issue, and reduce the outage probability. Therefore, the primary motivations for the femtoBSs to employ this cognition and hence, the p _{ RB } and p _{ tx } parameters in the cellular network are to provide beneficial coverage improvements for different types of users. In practical heterogeneous cellular networks such as LTE, these parameters are networkspecific and not userspecific; thus, there needs to be some optimization techniques, which can be considered as future work, used to select parameters that can provide acceptable QoS for the majority of users and to meet the existing outage constraints.
On the other hand, outage probability is significantly affected by the performance of the spectrum sensing. The performance of the spectrum sensing and the determination of each individual RB as busy/idle is determined by two important parameters mentioned before, namely the probability of (correct) detection (P _{ d }) and probability of false alarm (P _{ f }). Considering the fact that p _{ RB } is a direct function of P _{ f } and P _{ d } in the practical scenarios (see Section 4), a spectrum sensing with high P _{ f } and low P _{ d } results in a lower corresponding QoS and a higher observable outage probability. The ideal sensing procedure is the one with P _{ f } = 0 and P _{ d } = 1. In practice, however, P _{ d } and P _{ f } are related to each other through a receiver operating characteristic (ROC) curve [17], which is a fundamental attribute of each spectrum sensing system.
We will see later that the outage probability is also an increasing function of the SINR threshold as theoretically can be proved. The SINR threshold θ is generally under the control of the system designer and should be chosen reasonably. Clearly, setting a high value for θ maintains the signal quality but increases the outage probability and reduces the network utilization. Therefore, an upper bound of this threshold can be considered [18] in order to guarantee that outage probability is kept below a maximum value. On the other hand, lowering θ is desirable for better resource utilization. However, small θ allows more users to be admitted per RB which can make the system infeasible if the number of admitted users per RB exceeds a certain limit.
First, the accuracy of our analytical results for the downlink analysis in the proposed model is validated by simulations, as shown in Figures 4 and 5. The simulations which are built on Matlab platform are carried out to plot the curves of outage probability versus the SINR threshold for the tagged femto and macro user, as shown in Figures 4 and 5, respectively. The considered scenario is a twotier network (exactly following the network model described in Sections 2 and 3) over an approximately 1 × 1 km square with the locations of different classes of BSs as realizations of independent PPPs of given densities, and the tagged users located at the center. To have an estimate of the outage probability at the tagged users, the simulation results are averaged over both the spatial PPP (500 different positions) and fading distribution (300 realizations), and are conducted using the parameters mentioned in the figures’ captions. Analytical curves are compared with the simulations under both perfect and imperfect sensing. It is observed that the simulation results closely match our analytical model and the curves of analytical and simulation results match fairly well, which confirms our analysis. The plots exhibit slight discrepancies between analytical results and the corresponding simulation results which are mainly due to the boundary effect and the independence assumption used in Section 3.
In Figure 6, the outage probability of the tagged femto user under perfect and imperfect spectrum sensing abilities for the CR femtoBSs is shown for different values of the target SINR θ on the horizontal axis. Our results show that the outage probability at the tagged femto receiver in the absence of a perfect spectrum sensing ability is considerably increased. Either in Scenario I, when all the femtoBSs employ perfect sensing to sense the RBs, or in Scenario II, Case 1, the tagged femto user does not experience any interference from the macroBSs owing to the correct detection at the tagged femtoBS or choice of idle RBs for data transmission (RBs not occupied by the macro network). In this case, the interference seen by the tagged femto user is only the aggregate interference from the other femtoBSs which are transmitting on the same idle RB as the tagged femto. Clearly, the lowest outage probability is for the case of perfect sensing (A = A_{1} in (22)). Now, let’s consider the imperfect sensing scenario for the CR femtoBSs. Obviously, the tagged femto user is now subject to sensing error and therefore picking an occupied RB for its data transmission period. Under this condition, it may receive interference not only from the other femtoBSs which pick the same busy RB (due to the imperfect sensing), but also from those macroBSs communicating with their own users on the same RB as the tagged femto. Therefore, the tagged femto user experiences an interference larger than before and consequently a significant increase in the outage probability. Moreover, the tagged femto user will face an outage with a higher probability whenever it picks an RB (occupied RB) already used by a larger number of macro users (a larger \( {\lambda}_M^{\hbox{'}} \)) (see Figure 6).
Figure 7 depicts the outage probability of the tagged macro user for different values of the target SINR γ and different situations. Considering the results obtained in Figure 6, here, we also investigate the effect of employing the two different sensing scenarios for the CR femtoBSs on the outage probability of the tagged macro user. In the case of perfect sensing, the tagged macro user does not experience any interference from the femtoBSs because only those RBs sensed to be idle (RBs not occupied by the macro network) are always chosen for data transmission by the femto network. In this case, the interference observed at the tagged macro user is only the aggregate interference received from those macroBSs transmitting on the same RB as the tagged macro. Clearly, the lowest outage probability is obtained for this case (B = B_{2} in (36)). Now, the case of imperfect spectrum sensing of the CR femtoBS nodes is considered, when the femtoBSs are subject to sensing error and therefore the possibility of transmitting on the RB occupied by the tagged macro. Under this condition, the tagged macro user may receive interference not only from the other macroBSs communicating with their own users over the same RB (due to the lack of RBs) as the tagged macro, but also from those femtoBSs which pick the same RB. Therefore, the tagged macro user experiences an interference larger than before and consequently a significant increase in the outage probability. Moreover, the tagged macro user will face an outage with a higher probability whenever its own RB is wrongly selected for data transmission by a larger number of femtoBSs (a larger \( {\lambda}_F^{\hbox{'}} \)).
Figure 8 illustrates the effect of K (in D = Kr _{ M }) on the observed outage probability at the tagged macro user in the presence of both the macro and femto networks. Considering the previous explanations and Figure 3, let \( {\Phi}_F^{\hbox{'}} \) include all the points (representing the femtoBSs) in Φ_{ F } except the points inside the exclusion region D of the tagged macro user. Since \( {\Phi}_F^{\hbox{'}}\subset {\Phi}_F \) , the potential aggregate interference at the tagged macro user, caused by the active (considering slotted ALOHA) CR femtoBSs is less than that in the case with no D. Furthermore, as the exclusion region D becomes larger (when K = 10, for example), the probability of outage is significantly reduced. Indeed, the bigger the value of D, the closer the outage probability curve becomes to the black curve which represents the outage probability in the case when no overall interference from the femto network is observed at the tagged macro user due to the perfect sensing ability of the CR femtoBSs. However, the reduction in the outage probability can be less when the number of macroBSs transmitting on the same RB as the tagged macro is larger (see Figure 8b).
For a commercial network, designers must find a way to achieve a lower probability of outage for a certain SINR as the minimum quality needed for a typical femto or macro user to experience an acceptable QoS. A common way to decrease the outage probability is to reduce the number of interfering BSs encountered at the users. This can be done through applying both the (a) and (b) conditions in the perfect sensing scenario (or both the (c) and (d) in the imperfect sensing scenario). As shown in Figure 9, under these constraints, the outage probability is significantly reduced at the tagged femto user (note that the number of interfering macroBSs at the tagged femto user is considered equal for all the curves in the figure). The goal is to see the effect of both p _{ RB } and p _{ tx } (these two parameters are employed at each CR femtoBS) on the outage probability of the tagged femto user. As can be seen, for the case when p _{ RB } = 1 and p _{ tx } = 1, outage occurs with higher probability. In other words, when all the existing femtoBSs (except those who are inside the macro users’ exclusion regions) pick the same RB as the tagged femto (p _{ RB } = 1) and when they all have data to transmit in the current time slot (p _{ tx } = 1), the tagged femto user will experience the maximum value for the outage probability derived for different SINR targets. Clearly, a significant reduction in the outage probability is occurred for the smaller values of p _{ RB } and p _{ tx } (see Figure 9) (the smaller the values of p _{ RB } and p _{ tx }, the closer the outage probability curve becomes to the black curve which represents the outage probability in the case when the received interference at the tagged femto user is only the aggregate interference from the macro network). Indeed, this validates that many studies which do not consider these constraints overestimate the interference encountered by a typical femto user.
It can be seen that even for high values of p _{ tx }, the outage probability is relatively less than that in the case where there is no constraint on the femtoBS’s transmission schedule (p _{ tx } = 1). Also, it is obvious that in the presence of multiple RBs where each RB is picked with probability p _{ RB }, the outage probability is further decreased. Hence, any practical heterogeneous network designed to satisfy both of the mentioned conditions can reap the benefit of opportunistic exploitation of spectrum, while possibly causing little or no harmful interference. The same story exists when the outage probability of the tagged macro user is investigated. Figure 10 shows the effect of p _{ RB } and p _{ tx } (parameters related to the CR femtoBSs) on the outage probability of the tagged macro user. For instance, when all the active femtoBSs select the same RB as the tagged macro (p _{ RB } = 1) and when they all have data to transmit (on this busy RB) in the current time slot (p _{ tx } = 1), the tagged macro user will experience the maximum value for the outage probability. It should be noted that the number of interfering macroBSs at the tagged macro is considered equal for all curves in this figure.
Figure 11 plots the outage probability versus the SINR threshold θ for the tagged femto user. As m _{ d,F } = m _{ I,F } increases, the outage probability of the tagged femto user decreases. This is because as the fading becomes less severe (the bigger the Nakagamim parameter, the smaller fading) for both the desired and interfering links of the femto network, the received power at the tagged femto user from its corresponding femtoBS increases more compared to the total received power from all the interfering femtoBSs. It should be noted that \( {\beta}_F=\frac{\varOmega_{d,F}}{m_{d,F}}=\frac{\varOmega_{I,F}}{m_{I,F}} \) and \( {\beta}_M=\frac{\varOmega_{d,M}}{m_{d,M}}=\frac{\varOmega_{I,M}}{m_{I,M}} \) (the scale parameters) are fixed for all the curves. The interference links between the interfering macroBSs and the tagged femto user are more likely to be severe in terms of fading compared to the femto network’s desired and interfering links. In other words, the interfering signals received at the tagged femto user originated by the macroBSs suffer more serious fading than the received signals from the femtoBSs, in particular when we talk about indoor femto users. Similar arguments and statements can also be made about the outage probability of the tagged macro user observed in Figure 12.
In Figures 13 and 14, we analyze the performance of the authorized links (femto links) in terms of throughput (achievable with a simple ARQ scheme with errorfree feedback) under both the perfect and imperfect sensing scenarios. Considering the slotted ALOHA scheme, we define the following terms [19,20],
Probabilistic link throughput (τ) of a femto user:

(i)
In the halfduplex (HD) communication scenario: it is defined to be the success probability of a femto user (i.e., 1 − p _{ OF }) multiplied by the probability that the corresponding femtoBS actually transmits over a specific RB (i.e., p _{ RB } p _{ tx }), and the probability that the femto receiver actually receives over that RB (i.e., 1 − p _{ RB } p _{ tx })

(ii)
In the fullduplex (FD) communication scenario: it is defined to be the success probability of a femto user (i.e., 1 − p _{ OF }) multiplied by the probability that the corresponding femtoBS actually transmits over a specific RB (i.e., p _{ RB } p _{ tx }).
Femto link throughput (T):
The femto link throughput is defined as the product of the probabilistic link throughput (τ) and the rate of transmission, i.e., T = τ log(1 + θ). Therefore, the femto link throughput for the half and full duplex cases is written as follows
in which p = p _{ RB } p _{ tx }.
In Figure 13, the performance of half and full duplex systems are presented for the femto users. More specifically, the link throughput of any typical femto user (e.g. the link between the tagged femto user and its corresponding femtoBS) under perfect and imperfect spectrum sensing abilities for the CR femtoBSs is shown as a function of the transmission probability over a specific RB (i.e., p = p _{ RB } p _{ tx }). It can be seen that the throughput achieved by the FD system is significantly higher, particularly when p is high. Regarding the performance of the HD system, for both the perfect and imperfect sensing cases, there is a unique optimal p which achieves the maximum throughput (p = 0.3 for the perfect and p = 0.35 for the imperfect sensing scenario). However, for high p, both throughput curves converge to zero due to over many transmissions and interferences on the RB. Obviously, for both the half and full duplex communications, a higher perlink throughput is achieved when the CR femtoBSs employ perfect sensing.
In Figure 14, the performance of half and full duplex systems are presented for femto users. More specifically, the link throughput of any typical femto user (e.g., the link between the tagged femto user and its corresponding femtoBS) under perfect and imperfect spectrum sensing abilities for the CR femtoBSs is shown as a function of the target SINR θ. It can be seen that the perlink throughput achieved by the FD system, for both the perfect and imperfect sensing scenarios, is significantly higher than the HD one. As it is seen, the link throughput curves are concave and there is an optimal point in each curve. With a high target SINR, we can transmit the user data with high spectral efficiency; however, the outage probability of this transmission is high, too. In contrast, with a lowtarget SINR, we can send many packets that include little information. In other words, a high reliable transmission can be experienced at lowtarget SINRs, while the minimum requirements for the transmission rate cannot be met.
Conclusion
In this paper, utilizing the spatial PPP theory, we presented a tractable model to derive the outage probability of a typical femto and macro user in a twotier heterogeneous network which provides insight into system design guidelines. In other words, for the case of the node locations modeled by a PPP and Nakagamim fading channels, we demonstrated the use of the CRbased framework to evaluate the outage probability at any arbitrary user. Exact closedform expressions were obtained as a result. In addition, we observed that in the downlink analysis, the outage probability is a function of the network topology and several important system design parameters such as SINR target, exclusion regions, MAC (medium access control) mechanisms such as ALOHA (p _{ tx }), and the RB selection constraint (p _{ RB }) which is controlled by the spectrum sensing measurements.
References
 1.
J Andrews, H Claussen, M Dohler, S Rangan, M Reed, Femtocells: past, present, and future. IEEE J on Sel Areas in Comm 30(3), 497–508 (2012)
 2.
S Cheng, S Lien, F Hu, K Chen, On exploiting cognitive radio to mitigate interference in macro/femto heterogeneous networks. IEEE Wireless Commun Mag 18(3), 40–47 (2011)
 3.
H ElSawy, E Hossain, M Haenggi, Stochastic geometry for modeling, analysis, and design of multitier and cognitive cellular wireless networks: a survey. IEEE Commun Surveys & Tutorials 15(3), 996–1019 (2013)
 4.
K Gilhousen, I Jacobs, R Padovani, AJ Viterbi, L Weaver, C Wheatley, On the capacity of a cellular CDMA system. IEEE Trans on Veh Technology 40(2), 303–312 (1991)
 5.
J Xu, J Zhang, JG Andrews, On the accuracy of the Wyner model in cellular networks. IEEE Trans on Wireless Commun 10(9), 3098–3109 (2011)
 6.
JG Andrews, F Baccelli, RK Ganti, A tractable approach to coverage and rate in cellular networks. IEEE Trans on Commun 59(11), 3122–3134 (2011)
 7.
SAR Zaidi, DC McLernon, M Ghogho, Outage probability analysis of cognitive radio networks under selfcoexistence constraint. (44th Annual Conf. on Inf. Sciences and Systems (CISS), 2010), pp.1. 6, 17–19
 8.
RK Ganti, M Haenggi, Interference and outage in clustered wireless ad hoc networks. IEEE Trans on Inf Theory 55(9), 4067–4086 (2009)
 9.
A Hasan, JG Andrews, The guard zone in wireless ad hoc networks. IEEE Trans on Wireless Commun 4(3), 897–906 (2007)
 10.
CH Lee, M Haenggi, Interference and outage in Poisson cognitive networks. IEEE Trans on Wireless Commun 11(4), 1392–1401 (2012)
 11.
M Haenggi, RK Gant, Interference in large wireless networks. Foundations and Trends in Networking 3(2), 127–248 (2008). NOW Publisher
 12.
IEEE Instrumentation and Measurement Society, IEEE 1588 standard for a precision clock synchronization protocol for networked measurement and control systems. IEEE Std 1588, (2008)
 13.
Q Chen, M Motani, WC Wong, YC Liang, Opportunistic spectrum access protocol for cognitive radio networks. in Proc. IEEE International Conf. on Commun. (ICC). (2011), pp. 1–6
 14.
X Li, H Liu, S Roy, J Zhang, P Zhang, C Ghosh, Throughput analysis for a multiuser, multichannel ALOHA cognitive radio system. IEEE Trans on Wireless Commun 11(11), 3900–3909 (2012)
 15.
YC Liang, Y Zeng, E Peh, AT Hoang, Sensingthroughput tradeoff for cognitive radio networks. IEEE Trans on Wireless Commun 7(4), 1326–1337 (2008)
 16.
L Luo, C Ghosh, S Roy, Joint optimization of spectrum sensing for cognitive radio networks. in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), (2010), pp. 1–5
 17.
Q Zhao, B Sadler, A survey of dynamic spectrum access: signal processing, networking, and regulatory policy. IEEE Sig Proc Magazine 24(3), 79–89 (2007)
 18.
D Kim, On upper bounds of SIRbased call admission threshold in powercontrolled DSCDMA mobile systems. IEEE Commun Letters 6(1), 13–15 (2002)
 19.
M Haenggi, Outage, local throughput, and capacity of random wireless networks. IEEE Trans on Wireless Commun 8(8), 4350–4359 (2009)
 20.
JM Dricot, G Ferrari, A Panahandeh, Fr Horlin , Ph. De Doncker, Probabilistic coexistence and throughput of cognitive dualpolarized networks. EURASIP Journal on Wireless Commun. and Networking, 2010:387625.
 21.
AA Kilbas, HM Srivastava, JJ Trujillo, Theory and applications of fractional differential equations (Elsevier B.V, Netherlands, 2006)
Author information
Additional information
Competing interests
The authors declare that they have no competing interests.
Appendices
Appendix 1
Proof of equation 6
Proof: From (5), we have
We then have
where s in each integral is equal to \( \frac{m_{d,F}}{\varOmega_{d,F}}\frac{\theta {r_F}^{\alpha }}{P_F} \).
In each part, we have to calculate the Laplace transform of (I ^{n} f _{ I }(i)). We also know that \( {x}^nf(x)\overset{\mathrm{\mathcal{L}}}{\iff }{\left(1\right)}^n\frac{d^n{\mathrm{\mathcal{L}}}_f(s)}{d{s}^n} \). Therefore, we have
Hence, we have
Appendix 2
Proof of equation 15
Proof: From (14), we have
We know that Г(a, x) + γ(a, x) = Г(a), and \( \gamma \left(a,x\right)={x}^a\Gamma (a){e}^{x}{\displaystyle \sum_{k=0}^{\infty }}\frac{x^k}{\Gamma \left(a+k+1\right)} \) , therefore, the above equation is simplified as follows
Hence, we have
Appendix 3
Outage probability expression for noninteger m _{ d,F }
Proof: From Section 3
For noninteger m _{ d,F }, by using the infinite series representation of incomplete gamma function presented in Appendix 2 (\( \frac{\Gamma \left(a,x\right)}{\Gamma (a)}=1\frac{\gamma \left(a,x\right)}{\Gamma (a)} \) , and \( \gamma \left(a,x\right)={x}^a\Gamma (a){e}^{x}{\displaystyle \sum_{k=0}^{\infty }}\frac{x^k}{\Gamma \left(a+k+1\right)} \) ), and following the exact procedure as that in Section 3 (from Eq. (1) to Eq. (21)) to obtain the closedform outage probability expression for the tagged femto user, we obtain an exact but infinite summation expression for the outage probability. In other words, we use the infinite series representation of incomplete gamma not only for the interfering links calculations but also for the desired link to obtain an expression in which the Nakagamim parameters of all the communication links (m _{ d,F }, m _{ I,F } and m _{ I,M }) can take any values (integer or noninteger) bigger than 0.5. Thus, considering the above explanations we have
where
\( \exp \left(l(z)\right)={e}^{\left[\mathrm{A}\right]{z}^{\frac{d}{\alpha }}\frac{m_{d,F}\theta {\sigma}^2}{\varOmega_{d,F}{P}_F}z} \) , and z = r _{ F } ^{α}.
Operating in an interferencelimited regime and using the Taylor series expansions of exponential functions, the above expression is simplified as follows
The fractional derivative, the arbitrary order derivative, is used here to simplify the above expression [21] (the notation \( {D}^{\mu}\left(f(z)\right)=\frac{d^{\mu}\left(f(z)\right)}{d{z}^{\mu }} \) denotes the μth order fractional derivative of the function f(z) where μ > 0). According to [21], D ^{μ}(z ^{γ}) (where γ > − 1) is equal to \( \frac{\Gamma \left(\gamma +1\right)}{\Gamma \left(\gamma \mu +1\right)}{z}^{\gamma \mu } \) , and we also have D ^{μ}(cf(z)) = cD ^{μ}(f(z)) (c is a constant value). Thus, we can write
and finally,
where A is given by (22).
Similar expression can be obtained for the outage probability of the tagged macro user.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0), which permits use, duplication, adaptation, distribution, and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Received
Accepted
Published
DOI
Keywords
 Stochastic geometry
 Cognitive radio
 Outage probability