+ All Categories
Home > Documents > Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some...

Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some...

Date post: 30-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
14
3974 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 6, JUNE 2018 Capacity and Delay Tradeoff of Secondary Cellular Networks With Spectrum Aggregation Lingyu Chen , Chen Liu , Xuemin Hong , Cheng-Xiang Wang , Fellow, IEEE , John Thompson, Fellow, IEEE , and Jianghong Shi Abstract— Cellular communication networks are plagued with redundant capacity, which results in low utilization and cost- effectiveness of network capital investments. The redundant capacity can be exploited to deliver secondary traffic that is ultra-elastic and delay-tolerant. In this paper, we propose an analytical framework to study the capacity-delay tradeoff of elastic/secondary traffic in large scale cellular networks with spec- trum aggregation. Our framework integrates stochastic geome- try and queueing theory models and gives analytical insights into the capacity-delay performance in the interference limited regime. Closed-form results are obtained to characterize the mean delay and delay distribution as functions of per user throughput capacity. The impacts of spectrum aggregation, user and base station densities, traffic session payload, and primary traffic dynamics on the capacity-delay tradeoff relationship are investigated. The fundamental capacity limit is derived and its scaling behavior is revealed. Our analysis shows the feasibility of providing secondary communication services over cellular networks and highlights some critical design issues. Index Terms— Capacity-delay tradeoff, secondary traffic, elas- tic traffic, cellular network, spectrum aggregation. I. I NTRODUCTION T HE capacity of a cellular radio access network (RAN) is fundamentally limited by the density of base sta- tions (BSs), system bandwidth, and spectrum efficiency. Once a particular network is rolled out, its maximum capacity Manuscript received December 26, 2016; revised September 27, 2017 and January 15, 2018; accepted March 6, 2018. Date of publication March 30, 2018; date of current version June 8, 2018. This work was supported in part by the National Natural Science Foundation of China under Grant 61571378 and Grant 61601388, in part by the Engineering and Physi- cal Sciences Research Council of U.K. under Grant EP/L020009/1, Grant EP/P000703/1, and Grant EP/L026147/1, in part by the EU H2020 5G Wire- less Project under Grant 641985, in part by the EU H2020 RISE TESTBED Project under Grant 734325, and in part by the EU FP7 QUICK Project under Grant PIRSES-GA-2013-612652. The associate editor coordinating the review of this paper and approving it for publication was M. Li. (Corresponding author: Xuemin Hong.) L. Chen and C. Liu are with the Department of Communications Engi- neering, School of Information Science and Technology, Xiamen University, Xiamen 361005, China (e-mail: [email protected]; [email protected]). X. Hong and J. Shi are with the Key Laboratory of Underwater Acoustic Communication and Marine Information Technology, Ministry of Education of China, Xiamen University, Xiamen 361005, China (e-mail: [email protected]; [email protected]). C.-X. Wang is with the Institute of Sensors, Signals and Systems, School of Engineering and Physical Sciences, Heriot-Watt University, Edinburgh EH14 4AS, U.K. (e-mail: [email protected]). J. Thompson is with the Institute for Digital Communications, School of Engineering, The University of Edinburgh, Edinburgh EH9 3JL, U.K. (e-mail: [email protected]). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TWC.2018.2818730 is relatively stable. The traffic load, on the other hand, changes dynamically across space and time. Because the capacity of a cellular network is planned to accommodate peak traffic demand, redundant capacity is unavoidable due to traffic fluctuations. Measurements campaigns (e.g., [1]) have shown that redundant capacity is a pervasive problem, which results in low utilization and cost-effectiveness of network capital investments. Measurement also revealed that the major cause of mobile traffic is multi-media consumption [2], which includes differ- ent types of communication services. The first type is stream- ing services that are delay-sensitive but loss-tolerant. Typical applications include voice over IP and video conferencing. The second type is elastic traffic services that are delay- tolerant but loss-sensitive. Typical applications include web browsing and file transfer. In practice, the above two types of traffic have no crucial difference in the delay constraints, which are measured by mini-seconds. However, the emergence of new applications such as proactive caching [3]–[5] brings a third type of traffic that has crucial difference from the first two types. Proactive caching systems are able to push content and cache it closer to end users, exploiting the fact that content demand is predictable and that large cache space is becoming affordable. The traffic generated by proactive caching has two distinct characteristics. First, the delay constraint is very relaxed. This is because a piece of content can be pushed to a user device hours or minutes ahead before the user requests actually happen. The delay constraint for such traffic is several orders larger than the constraints of conventional traffic. Second, the traffic volume is very flexible (i.e., can be arbitrarily small) because proactive caching is opportunistic and transparent to users. Due to these two distinct charac- teristics, we call such a new type of traffic as ultra-elastic traffic. This paper is motivated by an envision that the redundant capacity in cellular networks can be exploited to deliver the ultra-elastic traffic as secondary traffic, which coexists with other higher priority traffic in the same cellular network [6]. This could allow the redundant capacity to be commercialized to offer a new type of communication service. This paper aims to investigate the performance of the secondary traffic in a context of heterogeneous cellular networks (HCNs) [7]. The HCN represents the future trend of cellular networks, where cell densification and spectrum aggregation are prominent features [8], [9]. Cell densification means heterogeneous BSs will be densely deployed, while spectrum aggregation allows 1536-1276 © 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Transcript
Page 1: Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some critical design issues. Index Terms—Capacity-delay tradeoff, secondary traffic, elas-tic

3974 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 6, JUNE 2018

Capacity and Delay Tradeoff of Secondary CellularNetworks With Spectrum AggregationLingyu Chen , Chen Liu , Xuemin Hong , Cheng-Xiang Wang , Fellow, IEEE,

John Thompson, Fellow, IEEE, and Jianghong Shi

Abstract— Cellular communication networks are plagued withredundant capacity, which results in low utilization and cost-effectiveness of network capital investments. The redundantcapacity can be exploited to deliver secondary traffic that isultra-elastic and delay-tolerant. In this paper, we propose ananalytical framework to study the capacity-delay tradeoff ofelastic/secondary traffic in large scale cellular networks with spec-trum aggregation. Our framework integrates stochastic geome-try and queueing theory models and gives analytical insightsinto the capacity-delay performance in the interference limitedregime. Closed-form results are obtained to characterize themean delay and delay distribution as functions of per userthroughput capacity. The impacts of spectrum aggregation, userand base station densities, traffic session payload, and primarytraffic dynamics on the capacity-delay tradeoff relationship areinvestigated. The fundamental capacity limit is derived and itsscaling behavior is revealed. Our analysis shows the feasibilityof providing secondary communication services over cellularnetworks and highlights some critical design issues.

Index Terms— Capacity-delay tradeoff, secondary traffic, elas-tic traffic, cellular network, spectrum aggregation.

I. INTRODUCTION

THE capacity of a cellular radio access network (RAN)is fundamentally limited by the density of base sta-

tions (BSs), system bandwidth, and spectrum efficiency.Once a particular network is rolled out, its maximum capacity

Manuscript received December 26, 2016; revised September 27, 2017 andJanuary 15, 2018; accepted March 6, 2018. Date of publication March 30,2018; date of current version June 8, 2018. This work was supported inpart by the National Natural Science Foundation of China under Grant61571378 and Grant 61601388, in part by the Engineering and Physi-cal Sciences Research Council of U.K. under Grant EP/L020009/1, GrantEP/P000703/1, and Grant EP/L026147/1, in part by the EU H2020 5G Wire-less Project under Grant 641985, in part by the EU H2020 RISE TESTBEDProject under Grant 734325, and in part by the EU FP7 QUICK Project underGrant PIRSES-GA-2013-612652. The associate editor coordinating the reviewof this paper and approving it for publication was M. Li. (Correspondingauthor: Xuemin Hong.)

L. Chen and C. Liu are with the Department of Communications Engi-neering, School of Information Science and Technology, Xiamen University,Xiamen 361005, China (e-mail: [email protected]; [email protected]).

X. Hong and J. Shi are with the Key Laboratory of UnderwaterAcoustic Communication and Marine Information Technology, Ministry ofEducation of China, Xiamen University, Xiamen 361005, China (e-mail:[email protected]; [email protected]).

C.-X. Wang is with the Institute of Sensors, Signals and Systems, School ofEngineering and Physical Sciences, Heriot-Watt University, Edinburgh EH144AS, U.K. (e-mail: [email protected]).

J. Thompson is with the Institute for Digital Communications, School ofEngineering, The University of Edinburgh, Edinburgh EH9 3JL, U.K. (e-mail:[email protected]).

Color versions of one or more of the figures in this paper are availableonline at http://ieeexplore.ieee.org.

Digital Object Identifier 10.1109/TWC.2018.2818730

is relatively stable. The traffic load, on the other hand, changesdynamically across space and time. Because the capacity ofa cellular network is planned to accommodate peak trafficdemand, redundant capacity is unavoidable due to trafficfluctuations. Measurements campaigns (e.g., [1]) have shownthat redundant capacity is a pervasive problem, which resultsin low utilization and cost-effectiveness of network capitalinvestments.

Measurement also revealed that the major cause of mobiletraffic is multi-media consumption [2], which includes differ-ent types of communication services. The first type is stream-ing services that are delay-sensitive but loss-tolerant. Typicalapplications include voice over IP and video conferencing.The second type is elastic traffic services that are delay-tolerant but loss-sensitive. Typical applications include webbrowsing and file transfer. In practice, the above two typesof traffic have no crucial difference in the delay constraints,which are measured by mini-seconds. However, the emergenceof new applications such as proactive caching [3]–[5] bringsa third type of traffic that has crucial difference from the firsttwo types. Proactive caching systems are able to push contentand cache it closer to end users, exploiting the fact that contentdemand is predictable and that large cache space is becomingaffordable. The traffic generated by proactive caching hastwo distinct characteristics. First, the delay constraint is veryrelaxed. This is because a piece of content can be pushedto a user device hours or minutes ahead before the userrequests actually happen. The delay constraint for such trafficis several orders larger than the constraints of conventionaltraffic. Second, the traffic volume is very flexible (i.e., can bearbitrarily small) because proactive caching is opportunisticand transparent to users. Due to these two distinct charac-teristics, we call such a new type of traffic as ultra-elastictraffic.

This paper is motivated by an envision that the redundantcapacity in cellular networks can be exploited to deliver theultra-elastic traffic as secondary traffic, which coexists withother higher priority traffic in the same cellular network [6].This could allow the redundant capacity to be commercializedto offer a new type of communication service. This paper aimsto investigate the performance of the secondary traffic in acontext of heterogeneous cellular networks (HCNs) [7]. TheHCN represents the future trend of cellular networks, wherecell densification and spectrum aggregation are prominentfeatures [8], [9]. Cell densification means heterogeneous BSswill be densely deployed, while spectrum aggregation allows

1536-1276 © 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Page 2: Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some critical design issues. Index Terms—Capacity-delay tradeoff, secondary traffic, elas-tic

CHEN et al.: CAPACITY AND DELAY TRADEOFF OF SECONDARY CELLULAR NETWORKS WITH SPECTRUM AGGREGATION 3975

the BSs and/or users to dynamically operate on multiplenon-overlapping frequency bands.

Capacity and delay are the two most important performancemetrics of a communication service. Given resource con-straints, maximizing capacity and reducing delay are conflict-ing objectives. This is known as the capacity-delay tradeoff,which characterizes the fundamental performance bound ofa communication service. The capacity-delay tradeoff hasattracted significant research attentions for a variety of com-munication systems. Multiple analytical frameworks have beenproposed to study the tradeoff, including the frameworksof scaling law analysis [10]–[14], interference approxima-tion [15]–[17], and timely throughput [18]–[20]. Scaling lawanalysis [10]–[14] is a novel framework that can characterizehow the mean capacity and delay scale with the networksize, but is not able to give an exact quantification on thecapacity or delay. The framework of interference approxi-mation [15]–[17] focused on the session level performanceof multi-cell networks, but can only provide loose boundsfor the estimation of mean delay. The framework of timelythroughput [18]–[20] assumed that a queuing packet will bedropped if the packet passes a critical delay. This frameworkis better suited for the study of loss-tolerant traffic instead ofloss-sensitive traffic. Moreover, it does not provide a detailedcharacterization of the delay distribution.

For performance study of the secondary traffic, it is impor-tant to understand the delay distribution. This is because thesecondary traffic is loss-sensitive and delay-tolerant, so that agood indicator of the user quality-of-experience is the “outagedelay”, which gives the probability of having large delaysthat surpass certain delay-tolerance threshold. Unfortunately,the above-mentioned frameworks for capacity-delay tradeoffstudy [10]–[20] do not offer the capability to analyticallycharacterize the delay distribution of loss-sensitive traffic.

In this paper, we propose a new framework that inte-grates stochastic geometry and queueing models to studythe session level capacity-delay tradeoff of secondary traffic.Our framework can complement existing ones by offering ameans to pinpoint the delay distribution analytically. The meritof our framework comes from the fact that the stochasticgeometry and queueing models are the most tractable modelsin describing the complex spatial and temporal behaviors ofa cellular network, respectively. In the spatial domain, sto-chastic geometry models can yield elegance analytical results[7], [21]–[25] while keeping the same level of accuracycompared with the conventional hexagon models. In thetemporal domain, two other widely used models are thediscrete/continuous-time Markov chain model [26]–[29] andlocal delay model [30], [31]. The former can produce delaydistribution by numerical computation, but fall short in pro-viding closed-form insights. The latter model focuses on theaverage delay and reveals no information about the delaydistribution. None of these two models can offer the sametractability as the well-established queueing model [32], [33].

How to integrate the stochastic geometry models andqueueing models into a coherent framework has long beenrecognized as a challenging task [34]. The challenge lies incapturing the complex coupling of network behavior in the

spatial and temporal domains while preserving the analyticaltractability of the model. To this end, some recent attemptswere reported in [34]–[36]. In [34], the spatial-temporaldependence of a cellular system is captured by some cell-load equations and eventually resolved via static simulations.Although this framework is mathematically rigorous, it lacksthe analytical tractability to reveal closed-form insights. In ourprevious work [35], [36], stochastic geometric and queueingmodels are combined to study the uplink capacity of hybrid ad-hoc networks with user collaboration. However, these worksfocused on a different type of network and did not fullyaddress the issue of multi-user access, which is a critical fea-ture of cellular systems. To our best knowledge, full integrationof stochastic geometry and queueing models for the study ofcellular networks is still an open problem [34].

This paper proposes a new approach of integrating sto-chastic geometry models and priority queuing models for theperformance study of loss sensitive, delay-tolerant secondarytraffic in large scale cellular systems. The main advantageof our approach lies in its analytical tractability to pinpointdelay distributions. Specifically, the following contributionsare made.

• Analytical results are derived to characterize the meandelay and delay distribution as functions of per userthroughput capacity.

• Analytical results are derived to characterize the capacitylimit in some special cases.

• A concise analytical approximation is obtained todescribe how the per user capacity scales with user-BSdensity ratio.

The remainder of this paper is organized as follows.Section II describes the system model. The overall method-ology and some useful approximations are introduced inSection III. The capacity-delay tradeoff and fundamentalcapacity limit are studied in Sections IV and V, respec-tively. Section VI provides numerical results and discussions.Conclusions are drawn in Section VII.

II. SYSTEM MODEL

A. Secondary Access Protocol

We consider the downlink of a large scale cellular net-work that aggregates N non-overlapping frequency bands.We assume that these bands are all usable during the consid-ered time frame. BSs operating in the same band are assumedto have homogeneous bandwidth and transmit power denotedby Wn and Pn, respectively, where n (1 ≤ n ≤ N ) is theband index. A user can operate in one band at a time, butcan handover between different bands. Over the top of sucha multi-band physical layer, two general types of servicesare offered: the primary service that is delay-sensitive andhas a higher priority to access the physical layer resource,and the secondary service that is delay-tolerant and onlyuse vacant physical layer resource after the primary service.Secondary users are assumed to comply with the followingaccess protocol as illustrated in Fig. 1.

• Step 1: Periodically check the buffer of secondary traffic.If the buffer is empty, remain in idle mode. Otherwiseturn into active mode and proceed to Step 2.

Page 3: Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some critical design issues. Index Terms—Capacity-delay tradeoff, secondary traffic, elas-tic

3976 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 6, JUNE 2018

Fig. 1. Flow chart of the secondary multi-user access protocol.

• Step 2: Randomly select one band and associate with thenearest BS operating in the chosen band. This implies thewidely used Poisson-Voronoi cellular network model.

• Step 3: Evaluate whether the associated BS is vacant(i.e., not occupied by primary traffic) and available forsecondary services. If yes, proceed to Step 4, otherwisereturn to Step 2. The probability that a typical BS in thenth band is vacant is called “vacant probability” and isdenoted by Ωn. This parameter indicates the average loadof primary traffic.

• Step 4: Evaluate the link quality with respect to theassociated BS. If the signal-to-noise-and-interferenceratio (SINR) is large enough to support a transmissionrate of R bits/s, proceed to Step 5, otherwise return toStep 2. Here, R is the minimum rate requirement ofsecondary transmission. Such a requirement is imposed torestrict secondary services only to users with high qualitylinks, otherwise the secondary services may become inef-ficient due to excessive interference and energy consump-tion. The probability that a typical user in the nth bandhas good link quality is called “coverage probability” anddenoted by pn,v.

• Step 5: Compete with other in-coverage users for multipleaccess to the same BS. We assume a time-divisionmultiple access (TDMA) scheme for multi-user access,where a band is fully allocated to one user at a timeand multiple contending users have equal opportunitiesto access the band through time sharing. If contention issuccessful, proceed to Step 6, otherwise return to Step 2.The probability that an in-coverage secondary user in thenth band is granted access is called “access probability”and denoted by pn,a.

• Step 6: Transmit secondary traffic with a fixed rate Runtil the buffer is empty. If the buffer is empty, proceedto Step 1. Otherwise if an outage (caused by primarytraffic interruption or coverage outage) occurs duringtransmission, return to Step 2.

For a user to receive secondary service in the nth band, heshould firstly be associated with a vacant BS, secondly have agood coverage, and finally be granted access after multi-usercontention. It follows that the service probability εn is theproduct of vacant probability Ωn, coverage probability pn,v,and access probability pn,a, i.e.,

εn = Ωn · pn,v · pn,a. (1)

The flow chart of the above protocol is illustrated in Fig. 1.We note that this protocol is not a standard-defined proto-col. However, it is simple yet sufficient to capture the essenceof secondary multi-user access procedure and can represent awide range of practical access schemes.

B. Spatial Interference Model

The spatial layout of BSs operating in the nth band ismodeled by a stationary Poisson Point Process (PPP) in R2

with intensity λb,n. This is a commonly used model in theliterature. For analytical tractability, we ignore the case ofco-located BSs and assume that the spatial layout of BSsin different bands are independent. The spatial distributionof secondary users are also assumed to follow a stationaryPPP in R2 with intensity λu. Let us consider a typical userin the nth band, the downlink SINR is a random variable,whose cumulative density function (CDF) has been derivedfor different types of fading channels [38]. For purposes ofclarity and tractability, we consider a representative case inwhich the path loss exponent is 4. The complementary CDFof the user SINR is then given by [38]

Fγ,n(x) =π

32 λb,n√x/Pn

ea2√2b Q

(a

√2 x/Pn

)

(2)

where Q(·) denotes the Q-function and

a = λb,nπ[1 +

√x arctan(

√x)

]. (3)

If the system is interference limited, which implies that Pn

is sufficiently large and the noise is negligible, (2) can befurther simplified to [38]

F limγ (x) =

11 +

√x arctan(

√x)

. (4)

According to the secondary access protocol, a user is incoverage of secondary services if Wn log2(1+γn) ≥ R, whereγn denotes the SINR perceived by the user. The coverageprobability in the nth band is therefore given by

pn,v = Fγ,n(2R/Wn − 1). (5)

C. Temporal Queuing Model

As illustrated in Fig. 2, we model the secondary trafficdynamic as a preemptive priority queue, where the transmis-sion of secondary traffic may be preempted (i.e., immediatelyinterrupted) by outages. An outage can be caused by multiplefactors such as primary traffic interruption, bad coverage, andfailure in multi-user contention. We assume users can handover

Page 4: Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some critical design issues. Index Terms—Capacity-delay tradeoff, secondary traffic, elas-tic

CHEN et al.: CAPACITY AND DELAY TRADEOFF OF SECONDARY CELLULAR NETWORKS WITH SPECTRUM AGGREGATION 3977

TABLE I

MAJOR SYMBOLS AND THEIR PHYSICAL MEANINGS

Fig. 2. Priority queuing model of a typical user with secondary traffic andrandom outage.

between bands with negligible time, hence an outage onlyoccurs when no band is available for secondary services.We propose to model the composite outage effect as a streamof higher priority traffic in the priority queue. The arrival ofoutage events follows a Poisson process with mean interval αo.Each outage event contributes to an additive random outageduration denoted by βo, the mean of which is βo. Let us define

ρo = βo/αo. (6)

This parameter represents the fraction of time that a useris in outage and cannot be served by a BS in all bands. It isworth noting that we do not make any particular assumptionon the distribution of βo, i.e., it can follow an arbitrary form ofcontinuous distribution. This gives our model the flexibility torepresent a wide range of outage phenomenons. We note that inpractice, schemes such as packet-wise vertical handover [42]can be used to reduce the handover time to a negligiblelevel. In addition, our model can be refined to account fornon-negligible handover time by making the random outageduration βo to be dependent on the handover rates.

We consider the secondary traffic behavior at the sessionlevel. Users are assumed to have homogeneous incomingtraffic of sessions that follow i.i.d. Poisson arrival process with

mean interval αs. Each session carries a file of random size Lto be delivered from the BS to the user. The file size L followsa general distribution with mean L. The mean throughputcapacity of a user is given by

C = L/αs. (7)

Under the assumption of constant transmission rate R,the transmission time of a session is a random variableβs = L/R. Let us define

ρs = βs/αs = L/(Rαs) = C/R. (8)

This parameter represents the fraction of time that a userreceives transmission from a BS. The file size L is assumedto follow a general distribution.

The transmission of a secondary session is forced to stopimmediately once an outage occurs. Once the secondary ser-vice is available again, a session may adapt a ‘resume’ policyto transmit from where it stopped, or adapt a ‘repeat’ policy toretransmit from the beginning. Our paper is restricted to theresume policy, noting that an extension to the repeat policyis straightforward. Based on the above modeling assumptions,the queuing process at a typical secondary user can be capturedby a M/G/1 two-level priority queuing model with a pre-emptive resume policy [43]. The queuing model can be fullycharacterized by the four random variables shown in Fig. 2.

For the convenience of readers, Table I summarizes themajor symbols in our system model.

III. METHODOLOGY AND APPROXIMATIONS

Our system model describes a large scale, dynamic systemin the spatial and temporal domains. These two domainsare inherently coupled and correlated. Existing work resortedto static simulation to yield results without revealing muchtheoretical insight [34]. In this paper, instead of trying tocapture the detailed relationships between the spatial and tem-poral domains, we propose a methodology that connects thesetwo domains by establishing analytical relationships amongthe first-order statistic measure (i.e., mean values) of some

Page 5: Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some critical design issues. Index Terms—Capacity-delay tradeoff, secondary traffic, elas-tic

3978 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 6, JUNE 2018

Fig. 3. Connections among parameters in the spatial and temporal domains.

critical parameters. When higher order statistics are in concern,we can still use the M/G/1 queueing model (with generaldistributions) to offer sufficient flexibility to match practicalmeasurements. This section will first explain our overallmethodology and then introduce some useful approximationsas preliminaries.

A. Overall Methodology

Fig. 3 illustrates our overall approach to address the con-nections between spatial and temporal domains. Our analy-sis implies two underlying assumptions. First, the queueingprocesses of users are assumed to be independent and homo-geneous. This assumption is reasonable because in the macrotime-scale, users are assumed to have independent mobilitytraces; while in the micro time-scale, users are allowed to hoprandomly between independent bands. The composite effectsof random mobility and band selection renders the queueingprocess of a user to be independent from others in the longterm. In this case, we can consider a typical user with a typicalqueueing process, at a typical location and associated with atypical BS. A typical user can be understood as an arbitraryuser or a randomly selected user. A probability space canthen be defined for the typical user for its status. The secondassumption is that all BSs constantly transmit with power Pn.This assumption decouples the interference statistics with userbehavior and represents the worst-case interfering scenario.It is reasonable because the combined load of primary andsecondary traffic is likely to keep BSs busy.

According to the ergodic theory, when the queueing processof the typical user has a statistical equilibrium, the queueingprocess is ergodic [43] and hence the time average of a queue-ing parameter is identical to the average over the probabilityspace. This allows us to map time-domain parameters to theprobability space. Moreover, according to the theory of Palmprobability in stochastic geometry, the spatial average of alarge scale network is identical to the probabilistic averageover the typical user/BS [37]. This allows us to map spatial-domain parameters to the probability space. Based on thesemappings, we are able to deduce a chain of relations in Fig. 3as follows.

Let us consider the outage time fraction in a typical queue,which is the average fraction of time that secondary servicesis not available. The outage time fraction affects the queueing

dynamics and hence the user active time fraction, which is theaverage fraction of time that there is secondary traffic bufferedin the queue. The user active time fraction is identical to theactive probability of a typical user, which affects the activeuser density in the spatial domain. Active user density andspatial interference statistics both affect the distribution of thenumber of contending users in a typical cell, which determinesthe multi-user access probability. Spatial interference statisticsalso affects the coverage probability of a typical user. More-over, as shown in (1), the access probability and coverageprobability affects the service probability, which ultimatelydetermines the outage time fraction. In other words, we have

ε = 1 − ρo (9)

where ε is the service probability, ρo is the outage timefraction, and ρo can be expressed as a function of ε. Theabove chain of relations allows us to establish an equilibriumequation that connects first-order statistics of multiple para-meters in the spatial and temporal domains. To establish theequation in an analytical form, two approximations are furtherintroduced.

B. Approximation to the Number of In-Coverage Users in aTypical Cell

The PDF of the size of a typical Poisson Voronoi cell isanalytically intractable but can be approximated using theMonte Carlo method. Let λ be the density of the underlyingPoisson process and V denote the random size of a typicalVoronoi cell normalized by 1/λ. The PDF of V is givenby [39]

fV (x) =3.53.5

Γ(3.5)x2.5e−3.5x (10)

where Γ(·) is the gamma function. Moreover, consider anarbitrary user and the random size U of the Voronoi cell towhich the user belongs to. The PDF of U normalized by 1/λis given by [40]

fU (x) =3.54.5

Γ(4.5)x3.5e−3.5x. (11)

The difference between fV (x) and fU (x) comes from thefact that a user has a higher chance to be covered by largerVoronoi cells.

Let us consider a single band of the network with BS densityλb and user density λu. Denoting K1 as the random numberof users in a non-empty Voronoi cell, the probability massfunction (PMF) of K1 is given by

fK1(k) =∫ ∞

0

(λu

λbx)k

k!e−λu

λbxfU (x)dx. (12)

Let K be the random number of ‘in-coverage’ users in aVoronoi cell. The distribution of K is related to the size andshape of the cell and it is difficult to obtain its exact PMF.Keeping the basic form of (12), we propose an approximation

Page 6: Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some critical design issues. Index Terms—Capacity-delay tradeoff, secondary traffic, elas-tic

CHEN et al.: CAPACITY AND DELAY TRADEOFF OF SECONDARY CELLULAR NETWORKS WITH SPECTRUM AGGREGATION 3979

Fig. 4. Approximation on the probability density function of in-coverageusers in a typical cell (λb = 10−6).

to the PMF of K given by

fK(k) ≈∫ ∞

0

(pΛλu

λbx)k

k!e−pΛ λu

λbxfU (x)dx (13)

=3.54.5Γ(4.5 + k)

Γ(4.5)k!(Λλup/λb)k

(3.5 + Λλup/λb)4.5+k.

where the parameters p and Λ are introduced to capture theeffect of colored thinning on the original user point process.Here, p is the probability that an arbitrary user falls withincoverage (with target rate R) and can be calculated by (5).The coefficient Λ is an artificial constant to capture the effectof colored thinning. The value of Λ is obtained by searchingfor the best fit of (14) to the empirical PMF obtained via MonteCarlo simulations. Through extensive simulations, we find thatgiven Λ = 2/3, the approximation in (14) is valid for a widerange of practical values for λu and λb. Fig. 4 illustrates theaccuracy of this approximation.

C. Approximation to User Active Time Fraction

A user is active when there are sessions buffered or beingtransmitted in the queue. We are interested in the probabilitypactive that a typical user stays active. This probability alsorepresents the fraction of time for a user to be active. Let T bethe total transmission time of a session (including interruptedtime). The mean value of T is given by [43]

T =βs

1 − ρo. (14)

The exact PDF of T is not exponential, but for the purposeof calculating the user active probability, we assume that Tfollows an exponential distribution with mean T . The accuracyof this approximation is illustrated in Fig. 5, where we assumeexponentially distributed βo and βs, set αo = 0.1, αs = 1,εo = 0.3, and let εs varies from 0.1 to 0.5. The exact PDFof T is obtained from its Laplace transform LT (s), which isgiven by [43]

LT (s) = Lβs [K (s)] (15)

where Lβs(·) is the Laplace transform of βs and

K (s) = s +1 − G (s)

αo. (16)

Fig. 5. Exponential approximation for the CDF of session transmissiontime T (αo = 0.1, αs = 1, ρo = 0.3).

Here, G(s) is the solution with the smallest absolute valuethat satisfies the following equation

x − Lβo

(s +

1 − x

αo

)= 0 (17)

where Lβo(·) is the Laplace transform of βo.We find that the exponential approximation is valid under

the condition that the arrival rate of outage is greater thanthe arrival rate of secondary traffic session. This condition isrealistic because our system model considers the secondarytraffic delay at the session level, which has a larger time scalethan outages caused by packet-level primary traffic.

Now let us consider a discrete-value stochastic processrepresenting the number of sessions staying in the queue.Based on the above mentioned exponential approximation,it is easy to see that this process is a classic birth-deathprocess [43] characterized by an uniform birth rate 1/αs anddeath rate 1/T . Let φk (k = 0,1,2,3...) denote the steadystate probability that there are k sessions in the queue.The equilibrium condition of the birth-death process givesφk = (T /αs)kφ0. By further considering the constraint oftotal probability Σ∞

k=0φk = 1, we have φ0 = 1 − T /αs.It follows that

pactive = 1 − φ0 = T /αs =βs

(1 − ρo)αs=

ρs

1 − ρo=

ρs

ε.

(18)

IV. CAPACITY-DELAY TRADEOFF ANALYSIS

A. Useful LemmasLemma 1: Let εn denote the probability that a user can be

served with a target rate R by the nearest BS operating in thenth band. We have

εn =Ωn

Λλn

[

1 −(

1 +Λpn,vλn

3.5

)−3.5]

(19)

where pn,v is given by (5), Λ = 2/3, and

λn =λu

λb,n· ρs

ε· Ωnpn,v∑N

n=1 Ωnpn,v

. (20)

Proof: See Appendix I.

Page 7: Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some critical design issues. Index Terms—Capacity-delay tradeoff, secondary traffic, elas-tic

3980 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 6, JUNE 2018

Lemma 2: When the cellular system independently operatesa total number of N bands, the probability that a user can beserved by at least one band with a targeted rate R is

ε = 1 −N∏

n=1

(1 − εn). (21)

Proof: It is straightforward to see that (1 − ε) equals thejoint probability that all bands fail to provide service to a userwith the target rate R.

According to Lemma 1, εn is itself a function of ε.Therefore Lemma 2 gives a non-linear equation of ε, basedon which the value of ε can be calculated by solving the non-linear equation via numerical methods. In the special case thatall bands have the same characteristics in terms of bandwidth,transmit power, and availability, (21) can be simplified to

εN = 1 − (1 − εn)N . (22)

In case when N = 1, (21) can be solved to give ε as anexplicit function related to capacity C and target rate R asfollows

ε1 =pn,v

3.5Λλu

λb,n

C

R

[

1 −(

1 − ΛλuC

Ωnλb,nR

)−2/7]−1

. (23)

B. General Results for Capacity-Delay Tradeoff

Once the value of ε is obtained, we can evaluate the meandelay and delay distribution of a session. Established resultsfor two-class M/G/1 priority queues with preemptive-resumepolicy [43] can be directly applied to give the following twopropositions.

Proposition 1: The mean delay of a session is given by

D =1

2ε(ε − CR )

(βs

αs+

βo

αo

)

+L

Rε(24)

where βs and βo are the second-order moments of randomvariables βs and βo, respectively.

The delay of a session is the total time the session spendsin the queue and consists of two parts. The first part is waitingtime W , which is the duration from the moment of arrival tothe moment when the transmission starts. The second part istransmission time T , which is the duration from the momentwhen transmission starts to the moment when the transmissionends. It follows that D = W + T , where W and T areindependent RVs [43]. The PDF of D cannot be obtaineddirectly. However, the Laplace transforms of the PDFs ofW and T can be evaluated. Let LX(·) denote the Laplacetransform to the PDF of random variable X , we have thefollowing proposition.

Proposition 2: The Laplace transform of the random delayD of a typical session is given by

LD(s) = LT (s)LW (s). (25)

Here, LT (s) is given by (15). The second term LW (s) in(25) is given by

LW (s) = (1 − ρo − ρs)αsK (s)

Lβs [K (s)] + αss − 1. (26)

C. Capacity-Delay Tradeoff in Special Cases

1) Exponential Distribution: Propositions 1 and 2 areapplicable when both the file size L and outage duration βo

follow general distributions. In the special case where both Land βo follow exponential distributions, we have βs = 2(βs)2

and βo = 2(βo)2. The mean delay becomes

D =1

ε(ε − CR )

(CL

R2+ (1 − ε)2αo

)+

L

Rε. (27)

Moreover, given an exponential random variableX ∼ exp(X), its Laplace transform is

Lexp(s) =1

1 + sX. (28)

Based on (28), closed-form Laplace transforms ofβs = L/R and βo can be obtained in (15) and (17). It followsthat Eqn. (17) can be solved explicitly to give

G (s) =

(1 + εo + sβo

) −√(

1 + εo + sβo

)2 − 4εo

2εo. (29)

2) Gamma Distribution: A more general distribution we canconsider for L and βo is Gamma distribution, which providesmore flexibility to model a variety of practical scenarios. ThePDF of Gamma distribution is given by

Γ(k, θ) =1θk

1Γ (k)

tk−1e−tθ (30)

where k and θ are the shape and scale parameters, respectively.The first and second moments of the Gamma distribution arekθ and k(k + 1)θ2, respectively. Let L ∼ Γ(kL, L/kL) andβo ∼ Γ(kβo , βo/kβo). Here we introduce two new parameterskL and kβo to characterize the shape of distributions of L andβo, respectively. It follows that βs = L/R ∼ Γ(kL, L/(kLR)),and the mean delay in (24) becomes

D =1

2ε(ε − CR )

(CL

R2

kL + 1kL

+ (1 − ε)2αokβo + 1

kβo

)+

L

Rε.

(31)

It is easy to see that when kL = 1 and kβo = 1, the Gammadistribution is reduced to exponential distribution and (31) isreduced to (27).

To evaluate the delay distribution, we have the Laplacetransform of G ∼ Γ(k, θ) given by

Lgamma (s) = (1 + θs)−k. (32)

Based on (32), closed-form Laplace transforms of βs =L/R and βo can be obtained according to (15) and (17).It follows that when k is an integer or a rational fraction,Eqn. (17) yields a polynomial form. Therefore the functionG(s) in (17) can be easily solved using existing root-findingalgorithms for polynomials.

Page 8: Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some critical design issues. Index Terms—Capacity-delay tradeoff, secondary traffic, elas-tic

CHEN et al.: CAPACITY AND DELAY TRADEOFF OF SECONDARY CELLULAR NETWORKS WITH SPECTRUM AGGREGATION 3981

Fig. 6. Theoretical and simulation values of the active user probabilitypactive and service probability pservice ( λb = 10−6/m2, λu/λb=50,C=1 bit/s/Hz, R=3 bits/s, N=5, L=10, αo=1, L and αo follow exponentialdistributions.)

D. Simulation Validation

This subsection aims to validate the previously derivedtheoretical results via Monte Carlo simulations. We note that asufficient characterization of the spatial interference requiresa large number of BSs and users (tens of thousands) to besimulated. The computational burden prohibits a full-scale,dynamic simulation of the queuing processes of all the users.We therefore adapt a methodology to simulate a typical userin a typical cell following the structure illustrated in Fig. 3.Our simulation includes two Monte-Carlo engines: a temporalengine that simulates a preemptive-resume M/G/1 priorityqueueing process at a typical user, and a spatial engine thatsimulates the perceived interference and multi-user accessprocess of a typical user located in a random cell. In eachsimulation run, both engines will conduct a large numberof Monte-Carlo experiments until the performances are con-verged. The temporal engine then outputs the empirical useractive probability (i.e., pactive) as an input of the spatialengine, while the spatial engine outputs the empirical serviceprobability (i.e., pservice or ε) as an input of the temporalengine. Such an iteration process stops after a few simulationruns when the engine outputs are converged. Without loss ofgenerality, Fig. 6 illustrates the iteration process with a typicalparameter setting and compares the two empirical probabilitieswith their theoretical counterparts calculated by Eqns. (18)and (22). It the observed that the empirical probabilities areable to converge to the theoretical ones. The fluctuations ofthe empirical probabilities are caused by random deviations ofthe Monte-Carlo simulation engines. The simulation validatesthat given the modeling assumptions described in Section II,our approximations in Section III and theoretical derivationsin Section IV are accurate.

V. CAPACITY LIMIT AND SCALING

This section studies the fundamental capacity limit at theinterference limited regime and investigates how the capacitylimit scales with bandwidth and user-BS density ratio. Thecapacity limit is defined as the maximum capacity that permits

a stable queue at a typical user. It is also the capacity thatgives infinite mean delay. Interference-limited regime meansthat power Pn is sufficiently large to justify the closed-formSINR CCDF in (4). For simplicity, we assume that the Nbands have homogeneous characteristics in terms of bandwidthand BS density. Two different cases are considered. The firstcase assumes a fixed bandwidth of each band, which meansthe system bandwidth scales linearly with N . This case isuseful when we want to investigate the impact of spectrumaggregation on the system capacity. The second case assumesa fixed system bandwidth, which means the bandwidth perband is inversely proportional to N . This case is relevantwhen we are interested in the impacts of spectrum sharingand channelization on the system capacity. Throughout thissection, we use the capital letter ‘N’ as the footnote ofparameters to emphasize that we consider homogeneous bands.For example, Wn, εn and λn are replaced by WN , εN andλN , respectively.

A. Fixed Bandwidth per Band

Proposition 3: In the case of fixed bandwidth per band,the capacity limit C lim

I is a function of R, λu, λb, and Ngiven by

ClimI = R

[1 − (1 − εN )N

](33)

where

εN =ΩN

ΛλN

[

1 −(

1 +ΛλNpI

N

3.5

)−3.5]

. (34)

Here, pIN is given by

pIN =

(1 +

√2R/WN − 1 arctan

√2R/WN − 1

)−1

(35)

and λN = λu/(λb,nN).Proof: A stable queue requires 1 − ρo − ρs > 0, which

gives ε > ρs = C/R. The capacity limit is achieved when theequality holds, i.e., ε = C/R or ρd/(1−ρo) = 1. Substitutingthis equation into Lemma 1 yields εN in (34).

We note that by considering the limiting condition, εN

can be expressed as an explicit function of other parameters(as opposed to numerically solving a non-linear equation inLemma 2). This allows us to express the capacity limit as aclosed-form function of R, N , λu, and λb, as shown in (33).In the case of fixed bandwidth per band, we are interested inthe following optimization problem: given N and the networkenvironment λu and λb, how can we choose a proper targetrate R to maximize the capacity limit? This optimizationproblem can be formally stated as Cmax

I = maxR

(C limI ).

To better understand the nature of this optimization problem,representative numerical examples are presented in Fig. 7to show Clim

I as a function of R. We see that there is anunique maximum value of Clim

I , which is achieved whenthe first-order derivative dC lim

I /dR equals zero. Accordingto Proposition 3, the derivative function dC lim

I /dR can beobtained in closed-form to give the following corollary.

Page 9: Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some critical design issues. Index Terms—Capacity-delay tradeoff, secondary traffic, elas-tic

3982 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 6, JUNE 2018

Fig. 7. Capacity limit ClimI and its first-order derivative as a function of R

(fixed bandwidth per band, N=5).

Corollary 1: The optimum value R for the optimizationproblem Cmax

I = maxR

(C limI ) is given by the root of the

following non-linear equation:

dC limI

dR= Rf

′o(R) + f0(R) = 0 (36)

where

f0(R) = 1 − (1 − εN )N (37)

f′0(R) = f1(R) · f2(R) · f3(R) · f4(R) (38)

f1(R) = N(1 − εN)N−1 (39)

f2(R) =(

1 +λNpI

N

3.5

)−4.5

(40)

f3(R) = −arctan(χN ) + (1 + χ2N )( − 1)

(1 + χN arctan(χN ))2(41)

f4(R) =ln 22

2R(2R − 1

)−1/2(42)

χN =√

2R − 1. (43)

In the above equations, pIN is defined in (35) and εN is defined

in (34).Based on the above corollary, the first-order derivative

function dC limI /dR is calculated and shown in Fig. 7. The

root is obtained by solving the non-linear equation and shownto be accurate for achieving the maximum value of Clim

I .

B. Fixed System Bandwidth

In this case, the total system bandwidth is normalized to1 and the bandwidth of each band becomes 1/N . Definethe capacity limit Clim

II as the maximum achievable capacityfor a stable queue given R, N , λu, and λb. Further definethe maximum capacity as Cmax

II = maxR

(C limII ). We have the

following two propositions.Proposition 4: The capacity limit C lim

II can be calculatedaccording to Proposition 3 by replacing pI

N with pIIN , where

pIIN =(1+

√2RN/WN −1 arctan

√2RN/WN −1)−1. (44)

Fig. 8. Mean delay D as a function of R with varying N (fixed bandwidthper band, C=1 bit/s/Hz, λu/λb=50, L=10, αo=10).

Proof: The proof is straightforward by following theproof of Proposition 3 and setting the channel bandwidthto 1/N .

Proposition 5: The maximum capacity is given by

CmaxII = Cmax

I /N (45)

where CmaxI can be calculated from Corollary 1.

Proof: According to Propositions 3 and 4, we can writeC lim

II (R) = C limI (RN)/N . Further considering the fact that

adding a scaling on R will not change the maximum valueof C lim

I , i.e., maxR

C limI (R) = max

RC lim

I (RN) = CmaxI ,

Proposition 5 can be proved.

VI. NUMERICAL RESULTS AND DISCUSSIONS

This section presents numerical results and discussestheir implications. First, we aim to understand the impactsof various parameters on the capacity-delay tradeoff(Fig. 8 to Fig. 12). Second, we want to investigate howthe fundamental capacity limit scales with the number ofbands N and user-BS density ratio (Fig. 13 and Fig. 14).For illustration purpose, we consider an interference-limitedsystem and homogeneous bands with WN = 1 and ΩN = 1.

A. Capacity-Delay Tradeoff

Due to page limits, we restrict our discussions to the meandelay and the case of fixed bandwidth per band. Except whenotherwise mentioned, the default parameter values are set tobe N = 5, λu/λb = 50, L = 10, and αo = 10. Moreover,the distributions of L and αo are treated as exponential.Therefore, our subsequent discussions are primarily basedon Eqn. (27).

Fig. 8 shows the mean delay D as a function of R withvarying N while the capacity is fixed to C = 1 bits/s. U-shapecurves are observed, indicating that given other parameters,there is an optimal value for R to minimize the mean delay.Because we are interested in the fundamental capacity-delaytradeoff, it is desirable to consider the minimized delay overfeasible values of R. Define Dmin = min

R(D), we will

Page 10: Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some critical design issues. Index Terms—Capacity-delay tradeoff, secondary traffic, elas-tic

CHEN et al.: CAPACITY AND DELAY TRADEOFF OF SECONDARY CELLULAR NETWORKS WITH SPECTRUM AGGREGATION 3983

Fig. 9. Mean delay D as a function of per user capacity C with varyingλu/λb (fixed bandwidth per band, N=5, L=10, αo=10).

Fig. 10. Mean delay D as a function of per user capacity C with varyingN (fixed bandwidth per band, λu/λb=50, L=10, αo=10).

subsequently evaluate Dmin as a function of C. The valueof Dmin is obtained by performing a numerical optimizationover R.

Fig. 9 shows the impact of λu/λb on the capacity-delaytradeoff curve. Two interesting phenomena are observed. First,when the user-BS density ratio is relatively high (100 ≤λu/λb ≤ 1000), the capacity per user (at a fixed delay) appearsto scale linearly with λb/λu. We called this “infrastructure-limited” regime, in which the investment in BS infrastructureyields linear returns on the capacity. In contrast, when the user-BS density is relatively low (10 ≤ λu/λb ≤ 100), investmentin BS infrastructure only yields sub-linear returns. Second,in the low delay regime, there is minimum delay even whenC approaches zero. Such a minimum delay is caused bycoverage outage and primary traffic interruption, which capsthe secondary service probability.

Fig. 10 shows the impact of the number of channels Non the capacity-delay tradeoff curve. The capacity limits withrespect to different values of N are also shown. The delaysare shown to rise quickly when C approaches the capacitylimits. It is observed that in the medium to high delay regime,capacity at a fixed delay scales linearly with N . In the lowdelay regime, increasing N contributes slightly to reducing theminimum delay. Fig. 10 indicates that spectrum aggregation is

Fig. 11. Mean delay D as a function of per user capacity C with varyingL (fixed bandwidth per band, λu/λb=50, N=5, αo=10).

Fig. 12. Mean delay D as a function of per user capacity C with varyingαo (fixed bandwidth per band, λu/λb=50, N=5, L=10).

effective for both capacity enhancement and delay reduction.Fig. 11 shows the impact of average file size L on the

capacity-delay tradeoff curve. The capacity limit is also shown,which is unrelated to the value of L. In the low to mediumcapacity regime, L is shown to have a significant effect onthe delay. A smaller value of L leads to a smaller delaybecause the file transmission has a lower probability of beinginterrupted by an outage. In the high delay regime, the impactof L diminishes as all delay curves eventually converge tothe capacity limit. Fig. 11 suggests that file/session sizemanagement is an important factor to consider if a systemis designed for low delay performance.

Fig. 12 shows the impact of mean outage arrival intervalαo on the capacity-delay tradeoff curve. The capacity limit,which is independent from the values of αo, is also shown.In the low delay regime, the curves converge to a minimumdelay. In the high delay regime, we can predict that the curvesalso slowly converge to the capacity limit. However, significantdifferences are observed in the low to medium delay regimes.A smaller value of αo leads to smaller delays. This is becausean interrupted session is less likely to be prolonged for a longperiod. Fig. 12 implies that introducing extra dynamics intothe system (such as dynamic scheduling) can potentially helpto reduce the delay.

Page 11: Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some critical design issues. Index Terms—Capacity-delay tradeoff, secondary traffic, elas-tic

3984 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 6, JUNE 2018

TABLE II

APPROXIMATIONS OF CmaxII AND OPTIMAL N AS FUNCTIONS OF USER-BS DENSITY RATIO

Fig. 13. Maximum capacity CmaxI as a function of N with varying λu/λb

(fixed bandwidth per band).

B. Capacity Limit and Scaling

This subsection investigates how the capacity limit scaleswith N and user-BS density ratio. Consider the case of fixedbandwidth per band, Fig. 13 applies Corollary 1 to show themaximum capacity Cmax

I as a function of N with varyingλu/λb. We see that the capacity increases monotonically withincreasing N , indicating the benefits of spectrum aggrega-tion. However, increasing N shows diminishing returns onthe capacity gain. It is also interesting to observe that thecurves with different values of λu/λb converge to the samevalue when N becomes large. These observations differ fromthe common intuition that user capacity scales linearly withsystem bandwidth (i.e., the number of bands). The reason forthis counter-intuitive result is because we assume that a useris allowed to access only one band. The capacity per userdepends on the bandwidth per band and the (successful) multi-user access probability. When N is relatively small comparedto the average number of users per cell, the multi-user accessprobability scales roughly linearly with N . However, when Ntends large, the multi-user access probability saturates to oneand the capacity is limited by the bandwidth per band ratherthan the number of bands. Fig. 13 suggests that to achieve thefull potential of spectrum aggregation, it is important to allowusers to access multiple bands simultaneously, although thiswould introduce extra hardware cost and power consumption.

Considering the case of fixed system bandwidth, Fig. 14applies Proposition 5 to show the maximum capacity Cmax

II

as a function of N with varying λu/λb. It is shown that withincreasing N , the capacity increases initially but eventuallydeclines. For each value of λu/λb, there exists an optimalvalue of N to maximize the capacity. Fig. 14 reveals adesign tradeoff between maximizing single channel capacityand maximizing multi-user access probability. It implies that

Fig. 14. Maximum capacity CmaxII as a function of N with varying λu/λb

(fixed system bandwidth).

proper channelization of the available spectrum resource isimportant, particularly when λu/λb is small. By performing anumerical search for the optimal value of N based on resultsin Fig. 14, Table II shows the corresponding maximum valuesof Cmax

II as a function of λu/λb. We find that there exists aconvenient approximation given by

C∗maxII ≈ 0.6359− 0.052 log2(λu/λb). (46)

The actual values obtained from numerical calculation andthe approximated values obtained from (46) are comparedin Table II. It is shown that the approximation is reasonablyaccurate for 2 < λu/λb < 500. In addition, we find thata convenient approximation exists to give the optimal valueof N as N = �√λu/λb�, where �·� is the ceiling function.The accuracy of this approximation is also shown in Table II.It shows that the optimal number of channels is roughly pro-portional to the square-root of the user-BS density ratio. Thisobservation provides a useful guideline for system designersin practice.

C. Discussions and Future Work

Finally, we would like to address the aspect of modelingaccuracy and limitations. The proposed analytical model inthis paper is based on an integration of two well-establishedmodels: the spatial Poisson Point Process model and thetemporal M/G/1 queueing model. The accuracies of thesetwo models have been evaluated against real-world mea-surement data in [38] and [45]. We note that more real-istic models are also available, such as clustered PoissonPoint Process [37] and Ginibre point process [25] in thespatial domain, G/G/1 queue [43] and self-similarity trafficmodels [44] in the temporal domain. Providing analyticallytractable results based on these realistic models is challenging

Page 12: Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some critical design issues. Index Terms—Capacity-delay tradeoff, secondary traffic, elas-tic

CHEN et al.: CAPACITY AND DELAY TRADEOFF OF SECONDARY CELLULAR NETWORKS WITH SPECTRUM AGGREGATION 3985

and will be considered in our future work. Other directionsof future work include considering more advanced secondaryaccess protocols, evaluating the energy-efficiency, and address-ing practical aspects such as channel sensing and handover.

VII. CONCLUSIONS

An analytical framework has been proposed for the studyof the capacity-delay tradeoff in cellular networks withspectrum aggregation. The framework compliments existingones by focusing on the secondary traffic and offeringtractable analytical insights. Analytical results have beenderived to characterize the capacity-delay tradeoff and thefundamental capacity limit. Numerical studies have shownthat while spectrum aggregation primarily affects the capacityin the high-delay regime, session size management anddynamic scheduling have bigger impacts on the capacityin the low delay regime. Moreover, when different bandshave homogeneous configurations, it has been shown thatthe per user throughput per Hertz is upper bounded by aconstant and reduces at a rate proportional to the logarithmof user-BS density ratio. Our analysis offers useful guidelinesfor providing novel secondary services over cellular networksto improve the overall capacity utilization.

APPENDIX

PROOF FOR LEMMA 1

We assume that an active user randomly selects a band foraccess, in an equilibrium state, the density of users in a bandis proportional to the area fraction of coverage of this band.The density of active users in the nth band is then given by

λu,n = λu · pactive · Ωnpn,v∑N

n=1 Ωnpn,v

=λuρs

ε· Ωnpn,v∑N

n=1 Ωnpn,v

.

(47)

Now consider an active user in band n, the number ofcontenting users in the same cell can be evaluated accordingto (14) with user density λu,n and BS density λb,n. Whenstrict fairness is assumed, the access probability of a user isgiven by

pn,a

=∞∑

k=0

1k + 1

fK(k)

=∞∑

k=0

1k + 1

∫ ∞

k=0

(λnΛpn,vx)k

k!e−λnΛpn,vxfU (x)dx

=∞∑

k=0

1λnΛpn,vx

[∫ ∞

k=1

(λnΛpn,vx)k

k!

]e−λnΛpn,vxfU (x)dx

=∞∑

k=0

1λnΛpn,vx

(1−e−λnΛpn,vx

)fU (x)dx

=3.54.5

Γ(4.5)1

λnΛpn,v

[∫ ∞

0

x2.5(e−3.5x−e(−3.5+λnΛpn,v)x

)dx

]

=3.54.5

Γ(4.5)1

λnΛpn,v

[Γ(3.5)3.53.5

− Γ(3.5)(3.5 + λnΛpn,v)3.5

]

=1

λnΛpn,v

[

1−(

1 +Λpn,vλn

3.5

)−3.5]

. (48)

Finally, Lemma 1 can be obtained by substituting (48)into (1).

REFERENCES

[1] D. Lee, S. Zhou, X. Zhong, Z. Niu, X. Zhou, and H. Zhang, “Spatialmodeling of the traffic density in cellular networks,” IEEE WirelessCommun., vol. 21, no. 1, pp. 80–88, Feb. 2014.

[2] Forecast, Cisco VNI, “Cisco visual networking index: Global mobiledata traffic forecast update 2015–2020,” Cisco Public Information,Feb. 2016. [Online]. Available: https://www.cisco.com/c/dam/m/en_in/innovation/enterprise/assets/mobile-white-paper-c11-520862.pdf

[3] S. Zhou, J. Gong, Z. Zhou, W. Chen, and Z. Niu, “GreenDelivery:Proactive content caching and push with energy-harvesting-based smallcells,” IEEE Commun. Mag., vol. 53, no. 4, pp. 142–149, Apr. 2015.

[4] X. Wang, M. Chen, T. Taleb, A. Ksentini, and V. C. M. Leung, “Cachein the air: Exploiting content caching and delivery techniques for 5Gsystems,” IEEE Commun. Mag., vol. 52, no. 2, pp. 131–139, Feb. 2014.

[5] U. Niesen, D. Shah, and G. W. Wornell, “Caching in wireless networks,”IEEE Trans. Inf. Theory, vol. 58, no. 10, pp. 6524–6540, Oct. 2012.

[6] Y. Zhang, H. Lu, H. Wang, and X. Hong, “Cognitive cellular contentdelivery networks: Cross-layer design and analysis,” in Proc. VTC-Spring, Nanjing, China, May 2016, pp. 1–6.

[7] H. S. Dhillon, R. K. Ganti, F. Baccelli, and J. G. Andrews, “Modelingand analysis of K-tier downlink heterogeneous cellular networks,” IEEEJ. Sel. Areas Commun., vol. 30, no. 3, pp. 550–560, Apr. 2012.

[8] C.-X. Wang et al., “Cellular architecture and key technologies for 5Gwireless communication networks,” IEEE Commun. Mag., vol. 52, no. 2,pp. 122–130, Feb. 2014.

[9] X. Ge, S. Tu, T. Han, and Q. Li, “Energy efficiency of small cellbackhaul networks based on gauss-Markov mobile models,” IET Netw.,vol. 4, no. 2, pp. 158–167, 2015.

[10] M. Neely and E. Modiano, “Capacity and delay tradeoffs for adhoc mobile networks,” IEEE Trans. Inf. Theory, vol. 51, no. 6,pp. 1917–1937, Jun. 2005.

[11] A. Gamal, J. Mammen, B. Prabhakar, and D. Shah, “Optimal throughput-delay scaling in wireless networks—Part I: The fluid model,” IEEETrans. Inf. Theory, vol. 52, no. 6, pp. 2568–2592, Jun. 2006.

[12] A. Gamal, J. Mammen, B. Prabhakar, and D. Shah, “Throughput-delaytrade-off in wireless networks part II: Constant-size packets,” IEEETrans. Inf. Theory, vol. 52, no. 11, pp. 5111–5116, Nov. 2006.

[13] P. Li, C. Zhang, and Y. Fang, “Capacity and delay of hybrid wirelessbroadband access networks,” IEEE J. Sel. Areas Commun., vol. 27, no. 2,pp. 117–125, Feb. 2009.

[14] X. Ta, G. Mao, and B. D. O. Anderson, “On the giant component ofwireless multihop networks in the presence of shadowing,” IEEE Trans.Veh. Technol., vol. 58, no. 9, pp. 5152–5163, Nov. 2009.

[15] A. J. Fehske and G. P. Fettweis, “Aggregation of variables in load modelsfor interference-coupled cellular data networks,” in Proc. ICC, Ottawa,ON, Canada, May 2012, pp. 5102–5107.

[16] I. Siomina and D. Yuan, “Analysis of cell load coupling for LTE networkplanning and optimization,” IEEE Trans. Wireless Commun., vol. 11,no. 6, pp. 2287–2297, Jun. 2012.

[17] A. J. Fehske and G. P. Fettweis, “On flow level modeling of multi-cellwireless networks,” in Proc. IEEE 11th Int. Modeling Optim. Mobile AdHoc Wireless Netw., Tsukuba, Japan, May 2013, pp. 572–579.

[18] I.-H. Hou, V. Borkar, and P. R. Kumar, “A theory of QoS for wireless,” inProc. IEEE INFOCOM, Rio de Janeiro, Brazil, Apr. 2009, pp. 486–494.

[19] S. Lashgari and A. S. Avestimehr, “Timely throughput of heterogeneouswireless networks: Fundamental limits and algorithms,” IEEE Trans. Inf.Theory, vol. 59, no. 12, pp. 8414–8433, Dec. 2013.

[20] G. Zhang, T. Q. S. Quek, A. Huang, and H. Shan, “Delay and reliabilitytradeoffs in heterogeneous cellular networks,” IEEE Trans. WirelessCommun., vol. 15, no. 2, pp. 1101–1113, Feb. 2016.

[21] M. Di Renzo, A. Guidotti, and G. E. Corazza, “Average rate of down-link heterogeneous cellular networks over generalized fading channels:A stochastic geometry approach,” IEEE Trans. Commun., vol. 61, no. 7,pp. 3050–3071, Jul. 2013.

[22] A. Guo and M. Haenggi, “Spatial stochastic models and metrics for thestructure of base stations in cellular networks,” IEEE Trans. WirelessCommun., vol. 12, no. 11, pp. 5800–5812, Nov. 2013.

[23] X. Lin, J. G. Andrews, and A. Ghosh, “Modeling, analysis and designfor carrier aggregation in heterogeneous cellular networks,” IEEE Trans.Commun., vol. 61, no. 9, pp. 4002–4015, Sep. 2013.

[24] X. Zhang and M. Haenggi, “A stochastic geometry analysis of inter-cellinterference coordination and intra-cell diversity,” IEEE Trans. WirelessCommun., vol. 13, no. 12, pp. 6655–6669, Dec. 2014.

Page 13: Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some critical design issues. Index Terms—Capacity-delay tradeoff, secondary traffic, elas-tic

3986 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 6, JUNE 2018

[25] N. Deng, W. Zhou, and M. Haenggi, “The Ginibre point process asa model for wireless networks with repulsion,” IEEE Trans. WirelessCommun., vol. 14, no. 1, pp. 107–121, Jan. 2015.

[26] V. Tumuluru, P. Wang, D. Niyato, and W. Song, “Performance analysisof cognitive radio spectrum access with prioritized traffic,” IEEE Trans.Veh. Technol., vol. 61, no. 4, pp. 1895–1906, May 2012.

[27] J. Wang, A. Huang, W. Wang, and T. Q. S. Quek, “Admission control incognitive radio networks with finite queue and user impatience,” IEEEWireless Commun. Lett., vol. 2, no. 2, pp. 175–178, Apr. 2013.

[28] M. Rashid, M. Hossain, E. Hossain, and V. Bhargava, “Opportunisticspectrum scheduling for multiuser cognitive radio: A queueing analy-sis,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5259–5269,Oct. 2009.

[29] S. L. Castellanos-Lopez, F. A. Cruz-Perez, M. E. Rivero-Angeles, andG. Hernandez-Valdez, “Joint connection level and packet level analysisof cognitive radio networks with VoIP traffic,” IEEE J. Sel. AreasCommun., vol. 32, no. 3, pp. 601–614, Mar. 2014.

[30] M. Haenggi, “The local delay in Poisson networks,” IEEE Trans. Inf.Theory, vol. 59, no. 3, pp. 1788–1802, Mar. 2013.

[31] Z. Gong and M. Haenggi, “The local delay in mobile Poisson net-works,” IEEE Trans. Wireless Commun., vol. 12, no. 9, pp. 4766–4777,Sep. 2013.

[32] Q. Liu, S. Zhou, and G. B. Giannakis, “Queuing with adaptive modula-tion and coding over wireless links: Cross-Layer analysis and design,”IEEE Trans. Wireless Commun., vol. 4, no. 3, pp. 1142–1153, May 2005.

[33] L. B. Le, E. Hossain, and T. S. Alfa, “Delay statistics and throughputperformance for multi-rate wireless networks under multiuser diver-sity,” IEEE Trans. Wireless Commun., vol. 5, no. 11, pp. 3234–3243,Nov. 2006.

[34] B. Baszczyszyn, M. Jovanovic, and M. K. Karray, “Performance lawsof large heterogeneous cellular networks,” in Proc. 13th Int. Symp.Modeling Optim. Mobile, Ad Hoc, Wireless Netw. (WiOpt), Mumbai,Maharashtra, 2015, pp. 597–604.

[35] H. Ye, C. Liu, X. Hong, and H. Shi, “Uplink capacity-delay trade-off inhybrid cellular D2D networks with user collaboration,” in Proc. IEEEWPMC, Shenzhen, China, Nov. 2016, pp. 470–475.

[36] L. Chen, W. Luo, C. Liu, X. Hong, and J. Shi, “Capacity-delay trade-offin collaborative hybrid ad-hoc networks with coverage sensing,” Sensors,vol. 17, no. 2, p. 232, 2017.

[37] D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic Geometry and itsApplications, 2nd ed. Hoboken, NJ, USA: Wiley, 2008.

[38] J. G. Andrews, F. Baccelli, and R. K. Ganti, “A tractable approach tocoverage and rate in cellular networks,” IEEE Trans. Commun., vol. 59,no. 11, pp. 3122–3134, Nov. 2011.

[39] J.-S. Ferenc and Z. Néda, “On the size distribution of Poisson Voronoicells,” Phys. A, Statist. Mech. Appl., vol. 385, no. 2, pp. 518–526,Nov. 2007.

[40] S. M. Yu and S.-L. Kim, “Downlink capacity and base station densityin cellular networks,” in Proc. WiOpt, Tsukuba Science City, Japan,May 2013, pp. 119–124.

[41] X. Hong, Y. Jie, C.-X. Wang, J. Shi, and X. Ge, “Energy-spectralefficiency trade-off in virtual MIMO cellular systems,” IEEE J. Sel.Areas Commun., vol. 31, no. 10, pp. 2128–2140, Oct. 2013.

[42] J. Gambini, O. Simeone, Y. Bar-Ness, U. Spagnolini, and T. Yu, “Packet-wise vertical handover for unlicensed multi-standard spectrum accesswith cognitive radios,” IEEE Trans. Wireless Commun., vol. 7, no. 12,pp. 5172–5176, Dec. 2008.

[43] J. W. Cohen, The Single Server Queue. Amsterdam, The Netherlands:North Holland, 1982.

[44] A. Feldmann, A. C. Gilbert, P. Huang, and W. Willinger, “Dynamics ofIP traffic: A study of the role of variability and the impact of control,”ACM SIGCOMM Comput. Commun. Rev., vol. 29, no. 4, pp. 301–313,Oct. 1999.

[45] S. B. Fredj, T. Bonald, A. Proutiere, G. Regnie, and J. W. Roberts,“Statistical bandwidth sharing: A study of congestion at flow level,”ACM SIGCOMM Comput. Commun. Rev., vol. 31, no. 4, pp. 111–122,Aug. 2001.

Lingyu Chen received the B.S. degree in softwareengineering and the Ph.D. degree in communicationand information systems from Xiamen University,China, in 2006 and 2011, respectively. He is cur-rently an Assistant Professor with the School ofInformation Science and Technology, Xiamen Uni-versity. His research interests include vehicular andwireless sensor networks, acoustic sensor networks,edge computing, and wireless signal processing.

Chen Liu received the B.S. and M.Eng. degreesfrom Wuhan University, China, in 2010 and 2012,respectively. He is currently pursuing the Ph.D.degree with the School of Information Scienceand Engineering, Xiamen University. His researchinterests include cognitive radio networks and fifth-generation mobile communications, with emphasison cross-layer design and resource allocation.

Xuemin Hong (S’05–M’12) received the Ph.D.degree from Heriot-Watt University, U.K., in 2008.He is currently a Professor with Xiamen University,China. He has published one book chapter andover 60 papers in refereed journals and conferenceproceedings. His research interests include cognitiveradio networks, wireless channel modeling, and fifth-generation mobile communications.

Cheng-Xiang Wang (S’01–M’05–SM’08–F’17)received the B.Sc. and M.Eng. degrees in commu-nication and information systems from ShandongUniversity, Jinan, China, in 1997 and 2000, respec-tively, and the Ph.D. degree in wireless communica-tions from Aalborg University, Aalborg, Denmark,in 2004.

He was a Research Assistant with the HamburgUniversity of Technology, Hamburg, Germany, from2000 to 2001, a Research Fellow with the Universityof Agder, Grimstad, Norway, from 2001 to 2005, and

a Visiting Researcher with Siemens AG-Mobile Phones, Munich, Germany,in 2004. He has been with Heriot-Watt University, Edinburgh, U.K., since2005, and became a Professor in wireless communications in 2011. He isalso an Honorary Fellow with The University of Edinburgh, U.K., a ChairProfessor with Shandong University, and a Guest Professor with SoutheastUniversity, China. He has co-authored two books, one book chapter, andover 320 papers in refereed journals and conference proceedings. His currentresearch interests include wireless channel measurements/modeling and (B)5Gwireless communication networks, including green communications, cognitiveradio networks, high mobility communication networks, massive MIMO,millimeter wave communications, and visible-light communications.

Dr. Wang is a fellow of the IET and HEA. He received nine Best PaperAwards from the IEEE GLOBECOM 2010, the IEEE ICCT 2011, ITST 2012,the IEEE VTC 2013-Spring, IWCMC 2015, IWCMC 2016, the IEEE/CICICCC 2016, and WPMC 2016. He has served as a technical program commit-tee (TPC) member, the TPC chair, and a general chair for over 80 internationalconferences. He has served as an editor for nine international journals,including the IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS from2007 to 2009, the IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY

since 2011, and the IEEE TRANSACTIONS ON COMMUNICATIONS since2015. He was the Lead Guest Editor of the IEEE JOURNAL ON SELECTEDAREAS IN COMMUNICATIONS Special Issue on Vehicular Communicationsand Networks. He was also a Guest Editor of the IEEE JOURNAL ON

SELECTED AREAS IN COMMUNICATIONS Special Issue on Spectrum andEnergy Efficient Design of Wireless Communication Networks and the SpecialIssue on Airborne Communication Networks, and a Guest Editor of the IEEETRANSACTIONS ON BIG DATA Special Issue on Wireless Big Data. He isrecognized as a Web of Science 2017 Highly Cited Researcher.

Page 14: Capacity and Delay Tradeoff of Secondary Cellular Networks ... · networks and highlights some critical design issues. Index Terms—Capacity-delay tradeoff, secondary traffic, elas-tic

CHEN et al.: CAPACITY AND DELAY TRADEOFF OF SECONDARY CELLULAR NETWORKS WITH SPECTRUM AGGREGATION 3987

John Thompson (M’94–SM’13–F’16) is currentlya Professor with the School of Engineering, TheUniversity of Edinburgh. He specializes in antennaarray processing, cooperative communications sys-tems and energy efficient wireless communications.He has published in excess of 300 papers on thesetopics. He was a coordinator for the recently com-pleted EU Marie Curie Training Network ADVAN-TAGE, which studies how communications andpower engineering can provide the future smartgrid systems). He currently leads two U.K. research

projects which study new concepts for fifth generation wireless communi-cations. In 2016, he was elevated to a fellow of the IEEE for contributionsto antenna arrays and multi-hop communications. From 2015 to 2017, hewas recognized as a Highly Cited Researcher by Thomson Reuters. In 2018,he will be a Technical Programme Co-Chair of the IEEE SmartGridCommConference to be held in Aalborg, Denmark.

Jianghong Shi received the Ph.D. degree fromXiamen University, China, in 2002. He is currentlya Professor with the School of Information Scienceand Engineering, Xiamen University. He is alsothe Director of the West Straits CommunicationsEngineering Center, Fujian, China. His researchinterests include wireless communication networksand satellite navigation systems.


Recommended