SpringerOpen Newsletter

Receive periodic news and updates relating to SpringerOpen.

This article is part of the series Femtocells in 4G Systems.

Open Access Open Badges Research

Coordinated TDD-Underlay for Self-organizing Femtocells in Two-Tier Coexistence Scenarios

Carlos HM de Lima*, Mehdi Bennis and Matti Latva-aho

Author Affiliations

Centre for Wireless Communications (CWC), University of Oulu, Oulu, Finland

For all author emails, please log on.

EURASIP Journal on Wireless Communications and Networking 2013, 2013:3  doi:10.1186/1687-1499-2013-3

The electronic version of this article is the complete one and can be found online at: http://jwcn.eurasipjournals.com/content

Received:21 November 2011
Accepted:23 November 2012
Published:2 January 2013

© 2013 de Lima et al.; licensee Springer.

This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


In this contribution, we investigate the concept of time division duplexing (TDD) mode as an alternative to underlay short-range femtocells on the uplink of legacy macrocell deployments. To mitigate the resulting co-channel interference, the underlaid femtocell tier uses a distributed mechanism which is based on regular busy tones and relies on minimal signaling exchange. Stochastic geometry is used to model practical scenarios by capturing network dynamics and channel variations. The impact of the fading correlation on the performance of the coordination mechanism is examined as well. Higher-order statistics through the cumulants concept are used to recover the distribution of the co-channel interference and evaluate the system performance in terms of the outage probability and average channel capacity. We observe that our analytical framework matches well with numerical results obtained using Monte Carlo simulations. In contrast to the uncoordinated frequency division duplexing mode, the coordinated TDD-underlay solution shows a reduction in the outage probability of nearly 80%, while the average spectral efficiency increases by approximately 90% in high loads.


Lately, the femtocell concept has emerged as a promising solution to achieve the stringent requirements of the next generation of cellular systems owing to the intrinsic better link quality of short range communications. Femtocells indeed constitute an inexpensive alternative to provide better indoor coverage, fairness at cell border and offloading of the overlaid macrocells [1,2]. Unfortunately, the unplanned deployment and uncoordinated operation of such small cells leads to harsh Co-channel interference (CCI) in both macro and femtocell tiers [3].

To deal with the interference problem in two-tier networks, various solutions have been proposed. For instance, López–Pérez et al. first characterize the cross-tier interference problem and then provide a comprehensive summary of candidate solutions wherein the use of dynamic spectrum allocation in conjunction with self-configuration and optimization of femtocells play a determinant role [4]. Similarly, a sub-band scheduling and interference cancelation mechanism is proposed in [5] by which the macrocell bandwidth is partitioned and femtocells use load-spillage to control their power across the sub-bands. As an alternative to the typical spectrum partitioning solutions, the time division duplexing (TDD)-underlay concept is proposed in [6] to take advantage of the natural traffic asymmetry between the downlink (DL) and uplink (UL), as well as the user spatial diversity. Unfortunately, time-multiplexed communicating links operating in universal frequency reuse are still exposed to the CCI generated by dominant interferers transmitting in an uncoordinated manner. Thus, we augment the TDD-underlay concept by incorporating a distributed mechanism which dynamically coordinates inter-cell time-slot allocation to avoid strong interference from nearby conflicting transmitters [5,7].

In this study, the coordination policy consists of a decision criterion (whether to coordinate or not) and an interference avoidance algorithm. According to the adopted policy, short-range femtocells then coordinate their transmissions with co-channel interferers by means of regular busy tones. Additionally, we evaluate the two-tier coexistence scenarios considering a practical radio channel propagation model which includes path loss attenuation, shadowing and multi-path fading. Furthermore, an analytical framework which captures the impact of channel variations and network dynamics on the system performance is introduced. The main contributions of this study are summarized in the following list:

1. Comprehensive channel model: we employ a detailed radio channel propagation model that includes path loss attenuation, log-normal (LN) shadowing and Nakagami-m fading as described in Section 2.

2. Analytical framework: in Section 2.4, stochastic geometry and higher-order statistics are combined into an stochastic framework which captures channel effects and network algorithms on the performance of the two-tier network under study.

3. Dynamic evaluation scenarios: by combining the channel model of Section 2. with network algorithms and strategies through the proposed framework, we examine practical evaluation scenarios as described in Section 4.

4. Coordinated TDD-underlay strategy: as described in Section 3., self-organizing femtocells communicate in the TDD mode and coordinate so as to reduce the interference that is generated towards the overlaid tier and among themselves.

In Section 5., the outage probability and average channel capacity of the tagged receiver are used to assess the performance of the two-tier coexistence scenarios under consideration. Thereafter, we draw conclusions and make final remarks in Section 6.

System model and analytical framework

In this section we make definitions, present assumptions and characterize our system model. Thereafter, we resort to the theory of stochastic geometry and recall the concept of spatial point processes to establish our analytical framework.

Definitions and notation

Definition 1

(Tagged receiver) A femto base station (FBS) that is taken as the reference (typical node) to compute the CCI on the UL of the evaluation scenarios.

Definition 2

(Observation region) An annular region around the tagged receiver over which we account for the interference contribution. The observation region is denoted by <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M1','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M1">View MathML</a> and defined by the minimum and maximum radii which are denoted by Rm and RM, respectively.

Definition 3

(Partial moment of a random variable) Let Y be a random variable (RV), then <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M2','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M2">View MathML</a> denotes the nth partial moment of that RV with ym and yM denoting the lower and upper integration limits, respectively.

Propagation channel model

Radio links are degraded by path loss and shadowed fading, which is assumed to be independent over distinct network entities and positions. A signal strength decay function, l(r)=rα, where α is the path loss exponent, describes the path loss attenuation (unbounded path loss model [8]), while the received squared-envelop due to multi-path channel fading and shadowing is represented by a RV <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M3','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M3">View MathML</a> with cumulative distribution function and probability density function (PDF) denoted by FX(x) and fX(x), respectively. An interferer disrupts the communication of the tagged receiver with an interfering component given by

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M4','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M4">View MathML</a>


where p represents the interferer’s transmit power, r is the separation distance from that interferer to the tagged receiver, and x corresponds to the channel shadowed fading.

The composite distribution of the received squared-envelop due to LN shadowing and Nakagami-m fading has a Gamma-LN distribution with PDF,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M5','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M5">View MathML</a>


where m is the shape parameter of the Gamma distribution, ξ=ln (10)/10, Ωp is the mean squared-envelop, <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M6','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M6">View MathML</a> and <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M7','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M7">View MathML</a> is the mean and standard deviation of Ωp, respectively.

Ho and Stüber show in [9] that a composite Gamma–LN distribution can be approximated by a single LN distribution with mean and variance (in logarithmic scale) given by

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M8','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M8">View MathML</a>


<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M9','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M9">View MathML</a>


where ψ (m) is the Euler psi function and ζ (2,m) is the generalized Riemann zeta function [10]. In what follows, we use this single LN approximation to simplify our mathematical treatment and then characterize the radio channel attenuations in various coexistence scenarios.

Network deployment model

Spatial point processes are the common approach to model and analyze random point patterns. For instance, point processes are used in statistical ecology to model locations of trees and bird nests, in astrostatistics to study the relative disposition of stars and galaxies, in stereology to provide spatial interpretations of planar sections of materials and tissues, and in wireless systems to account for the effect of the random distribution of communicating nodes in the network performance [11-15]. Herein, we use the stochastic geometry framework to model the two-tier coexistence scenarios wherein a reference macro base station (MBS) is underlaid with FBS which operate in closed access mode [16]. The underlaid tier is composed of femtocells uniformly scattered over the network area (unplanned deployment). In other words, the homogeneous Poisson point process (PPP) Φ with density λ (FBS/m2) in <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M10','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M10">View MathML</a> consists of the locations of all femto base stations in the network at any given time instant. Thus, the number of active femtocells in an arbitrary region <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M11','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M11">View MathML</a> of area A is a Poisson RV with parameter λA[17]. The fading effect is incorporated into the model as a random mark associated with each point of Φ[18]. By virtue of the Marking theorem [17], the resulting process corresponds to a marked point process (MPP) on the product space <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M12','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M12">View MathML</a> with intensity λfX (x) [17]. A MPP <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M13','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M13">View MathML</a> can be formalized as a pair (φx) [11] and defined as

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M14','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M14">View MathML</a>


where φ is the point location (an element of the original PPP Φ) and x is the shadowed fading mark attached to it.

Approximating the aggregate interference

In this section, stochastic geometry is used to model the network deployments [17,19], while the cumulants concept is used to recover the distribution of the aggregate CCI at tagged receiver [10,18]. As pointed out in [11], a point process is often characterized by the conditional probabilities of events given there exist a point of the process in a specific location—the typical point. The Palm probability [20] formalizes this concept of conditioning on a point of the process, while the Campbell’s theorem is used to compute the associated moment measures ([21], Chapter 16). By using the above concepts, a mathematical framework is established to characterize the aggregate interference perceived by the tagged receiver within the observation region <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M15','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M15">View MathML</a>. We begin by applying Campbell’s theorem [17] to determine the characteristic function (CF) of the aggregate CCI distribution for the MPP <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M16','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M16">View MathML</a> defined in (5).

Definition 4

Let <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M17','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M17">View MathML</a> be a RV representing the interference perceived by the tagged receiver from active transmitters, and <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M18','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M18">View MathML</a> be the imaginary unity; then, the function <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M19','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M19">View MathML</a> defined as,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M20','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M20">View MathML</a>


is called the CF of I.

The corresponding nth cumulant is obtained from (6) using the formulation presented in the following Proposition [10].

Proposition 1

Let I be a RV and ΨI (ω) its CF. Let <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M21','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M21">View MathML</a>. Provided that the nth moment exists and is finite. Then, ΨI (ω) is differentiable n times and,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M22','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M22">View MathML</a>



See ([22], Section 9.4). □

Unfortunately, there is no general closed-form expression for the PDF of the sum of LN RV, though a plethora of analytical approximations have been suggested in the literature [23-26] and references thereof. Motivated by the fact that the PDF of the aggregate interference is positively skewed [9,18], we use a single “equivalent” LN RV to approximate the summation of the individual components. The parameters of this LN approximation are estimated from the cumulants of the aggregate CCI as presented next.

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M23','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M23">View MathML</a>


where μ and σ2 are the location and scale parameters of the distribution <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M24','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M24">View MathML</a>, respectively.

Coordinated TDD-underlay

In the two-tier network under study, MBS are underlaid with standalone FBS operating in the closed access mode [2]. Communications follow two transmission schemes: (i) either macro and femtocells operate in the frequency division duplexing (FDD) mode where they interfere with each other on DL and UL frequency bands [27]; (ii) or femtocell transmissions are time multiplexed in the UL of the macrocell tier which operates in the FDD mode. In either scheme, serving cells schedule only one of their associated users per frequency-time resource block allocation (transmission interval). Furthermore, simultaneous transmissions are assumed to be synchronized and communicating nodes use omni-directional antennas. We also consider that all deployments operate under the partial co-channel configuration wherein the available spectrum is split into clear and shared parts [27] which are denoted Bc and Bs, respectively. From Figure 1, the clear part is allocated such that the macrocell traffic requirements are guaranteed, while active femtocells in the shared part compete for the remaining spectrum and are exposed to the uncoordinated CCI. Thereby, the macrocell user (MU) does not interfere with the tagged receiver but opportunistic strategies which allow femtocells to dynamically coordinate their transmissions so as to reduce the CCI are still needed. In the following, we introduce such a strategy which is based on regular busy tones [28] and enables nearby femtocells to coordinate their simultaneous transmissions. The scenarios with the coordination mechanisms are denoted as coordinated, whereas the uncoordinated term is used to designate deployments that do not use such collaborative procedures.

thumbnailFigure 1. Spectrum arrangement. TDD-underlaid in the UL of the Macrocell tier with partial co-channel configuration [27].

Coordination mechanism

Inspired by the concept of reservation busy tones which are used in [28-30] to effectively mitigate interference, we define the Coordination mechanism (CM) to control the CCI in the uncoordinated scenarios under study. Following our approach, the tagged femtocell user (FU) triggers the coordination of surrounding FBS by issuing an in-band requesting signal to advertise its presence. To achieve that, the victim user momentarily suspend its reception and transmit a requesting signal that surrounding interferers detect [5,29]. Different from the original busy burst solution whereby detecting transmitters estimate their interference parcel from the received feedback; herein, surrounding femtocells only use the busy tone as an indication of the nearby victim receiver presence. To reduce the likelihood that multiple simultaneous requests trigger the coordination procedure, an interference margin can be introduced in order to reduce the sensitivity of potential interferers to the triggering criterion. The beacon power is maintained low so as to ideally restrict the group of detecting femtocells to the dominant set of interferers. It is also worth noting that any FBS that has already triggered the coordination procedure ignores further requests that may occur while transactions related to the first request are still ongoing.

Therefore, transmitters use the CM to control their CCI parcel which is inflicted on the macrocell tier and themselves. The tagged femtocell receiver initiates the coordination procedure by experiencing the aggregate CCI above a predefined triggering threshold [31]. Notice that the network performance is assessed provided that the triggering criterion has been already satisfied. Potential interferers use the tagged receiver requesting beacon to decide about their participation in the ongoing coordination procedures. In this study, there are two distinct decision criteria which interferers employ in a distributed manner. On the one hand, potential interferers coordinate based solely on the received signal strength from the tagged receiver and we refer to it as CM1. On the other hand, we call CM2 the scenario where potential interferers use the received beacon to estimate their channel gain to the tagged receiver and then use their intending transmit power to compute the interference they would cause on that receiver similar to the busy burst solution introduced in [7]. In fact, surrounding interferers do not coordinate only by detecting the victim receiver, but use the received beacon to estimate if their interference component is above the coordination threshold ρth. Notice that the channel gain between each such interferer and the tagged receiver is assumed to be perfectly estimated (this is important to guarantee that CM2 encompasses the coordination criterion of CM1).

In the CM1, the event that surrounding interferers detect the victim receiver’s beacon signal pb above the predefined coordination threshold ρth is denoted by

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M25','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M25">View MathML</a>


Without loss of generality, we introduce the following indicator function,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M26','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M26">View MathML</a>


which defines the first coordination region denoted by <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M27','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M27">View MathML</a>, and is composed of FBS that do detect under the assumptions of Υ1 the victim receiver in their vicinity. In accordance with the formulation of Section 2.3, femtocells within this region constitute a MPP denoted by <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M28','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M28">View MathML</a>. Similarly, femtocells in <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M29','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M29">View MathML</a>, which do not detect the victim MU, form a process <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M30','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M30">View MathML</a>. The coordination regions <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M31','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M31">View MathML</a> and <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M32','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M32">View MathML</a> are disjoint and statistically independent by construction, therefore it follows immediately from the Superposition theorem [17] that <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M33','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M33">View MathML</a>. The coordination regions for Υ2 are obtained in a similar way and the coordination criterion for the CM2 becomes,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M34','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M34">View MathML</a>


where P yields the potential interferer’s transmit power RV. With (11) we can develop an analysis similar to the previous case and find corresponding coordination regions.

Figure 2 illustrates the non-coordination region <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M35','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M35">View MathML</a> for both coordination criteria. It is worth noticing that after coordinating, the tagged receiver is only interfered by active transmitters in <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M36','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M36">View MathML</a>, since nodes in <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M37','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M37">View MathML</a> switch to non-conflicting resource allocations.

thumbnailFigure 2. Coordination regions. Illustration of the coordination regions. The circles identify interferers within <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M38','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M38">View MathML</a> after coordinating with CM1, while crosses represent non-detecting interferers by following CM2. The black shaded square identifies the tagged FBS at the origin.

Evaluation scenarios

Herein, we apply the framework of Section 2. to compute the aggregate interference in distinct evaluation scenarios. These scenarios are identified by the transmission mode (either FDD or TDD) and by the coordination mechanism used by nodes to autonomously avoid interference. In the UL of such scenarios, higher-order statistics are used to characterize CCI distribution at the tagged receiver. Campbell’s theorem is employed to determine the CF of the aggregate interference generated by the Poisson field of transmitters. Thereafter, Proposition 1 is used to compute the cumulants of the actual distribution of the interference perceived by the tagged receiver. Then, (8) is used to estimate the parameters of the LN approximation from the respective cumulants.

Uncoordinated scenarios

Herein, co-channel transmitters use Bs without exchanging any information about their intending transmissions. In this section, we initially address the FDD configuration and thereafter the TDD-underlay mode.

FDD mode

In this uncoordinated deployment, FU transmit in the FDD mode lacking any sort of coordination with other co-channel transmitters in surrounding femtocells. As a consequence, communicating links are exposed to the highest interference levels. The resulting uncoordinated IP1 accounts for the interference that is caused by interferers within <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M39','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M39">View MathML</a> and belonging to the point process <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M40','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M40">View MathML</a> as defined by (5). The nth cumulant is computed as follows.

Proposition 2

Consider the IP1; then, the nth cumulant of the aggregate CCI perceived by the tagged receiver within <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M41','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M41">View MathML</a> and with respect to <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M42','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M42">View MathML</a> is given by,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M43','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M43">View MathML</a>



See Appendix Appendix 1. □

TDD-underlay mode

This is an uncoordinated deployment where FU are time multiplexed in the UL of the macrocell tier. Without loss of generality, we assume that the tagged receiver operates in the first of the two slots which compose the UL frame structure [6]. The aggregate interference is represented by IP2 and is caused by transmitters which operate in the first time slot within <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M44','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M44">View MathML</a> and belong to the point process <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M45','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M45">View MathML</a> with intensity ϑλfX (x). Hence, by observing that transmitters independently access either slot with equal probability (ϑ = 50%) and that all interfering nodes communicate with the fixed transmit power p, we extend the result in (12) to derive the cumulants for the uncoordinated TDD-underlay case as follows.

Corollary 1

Under the assumption of the IP2, the nth cumulant of the aggregate CCI perceived by the tagged receiver within <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M46','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M46">View MathML</a> and with respect to <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M47','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M47">View MathML</a> is given by,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M48','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M48">View MathML</a>


Coordinated scenarios

In these scenarios, self-organizing femtocells coordinate with nearby potential interferers so as to reduce the overall CCI. When operating in the FDD mode, femtocells use the coordination criterion 1, while in the TDD underlay the femtocell tier benefits from both criteria as described in Section 3.

FDD mode with CM1

In this scenario, femtocells coordinate through the CM of Section 3. given that Υ1 is satisfied. In the FDD mode, UL and DL operate over distinct frequency bands which gives rise to uncorrelated fading between beacon and data (signaling and communication) channels. We consider that data and signaling channels have shadowed fading with composite Gamma and LN distributions and are indicated by independent and identically distributed RV X and Y , respectively. The remaining CCI at the tagged receiver is characterized by IP3 and its nth cumulant is,

Proposition 3

Consider the IP3, then the nth cumulant of the aggregate CCI perceived by the tagged receiver in <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M49','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M49">View MathML</a> with respect to <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M50','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M50">View MathML</a> has the following form,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M51','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M51">View MathML</a>


where <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M52','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M52">View MathML</a> is the normalized coordination threshold.


See Appendix Appendix 2. □

TDD-underlay with CM1

In this scenario, femtocells still follow the coordination criterion Υ1 as indicated in (9). Recall that the coordination is carried out through in-band signaling exchange, so that data and signaling channels are fully correlated (channel reciprocity). As described in Section 3., non-detecting femtocells of <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M53','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M53">View MathML</a> in <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M54','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M54">View MathML</a> constitute the remaining set of interferers identified by IP4.

Proposition 4

Consider the IP4, then the nth cumulant of the aggregate CCI perceived by the tagged receiver in <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M55','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M55">View MathML</a> with respect to <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M56','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M56">View MathML</a> has the following form,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M57','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M57">View MathML</a>



See Appendix Appendix 3. □

TDD-underlay with CM2

This scenario is represented by the IP5 wherein transmitters decide whether or not to coordinate based on their interference contribution to the aggregate CCI at the tagged receiver [7]. Working under the assumption that Υ2 is met, the coordination procedure is carried out in the two following steps. After detecting the tagged receiver, intending transmitters rely on the channel reciprocity and use the received beacon strength to estimate their channel attenuation to that victim receiver. Thereafter, transmitters adapt their link to meet the minimum requirement of their desired receivers and still being able to transmit together with the tagged link. The standard power control (PC) algorithm is used by FU to adjust their power so as to compensate for the desired receiver channel attenuations [32]. We assume that FU are uniformly distributed within the transmission range of serving cells which schedule a random user in every transmission interval. The transmit power is set as a function of the distance between transmitter and receiver pairs, but independently of the interference at that receiver.

Lemma 1

Under the assumptions given above, the distribution of the femtocells transmit power is,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M58','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M58">View MathML</a>


where dM=(pM/β) 1/α is the radio range of FBS, such that the received power at the desired user is β, pm, and pM are the minimum and maximum FU transmit powers, respectively, and dm = 1 m is the minimum distance between an FU and its serving FBS.


Let P and R be RV representing the FBS transmit power and the distance to a random user within range, respectively. The PC fully compensates for the desired channel attenuations (channel inversion), so that P = βRα. The density function of R is <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M59','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M59">View MathML</a>, where the radii rm and rM define an annular region centered at a serving femtocell. Thereby, after using the standard procedure of the change of variates in probability theory, we obtain (16). □

The nth cumulant of the resulting aggregate CCI is then written as follows,

Proposition 5

Consider the IP5, then the nth cumulant of the aggregate CCI perceived by the tagged receiver in <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M60','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M60">View MathML</a> with respect to <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M61','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M61">View MathML</a> has the following form,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M62','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M62">View MathML</a>


where <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M63','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M63">View MathML</a>, <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M64','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M64">View MathML</a>, and <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M65','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M65">View MathML</a> are derived in Appendix Appendix 4.


See Appendix Appendix 4. □

Approximating the aggregate CCI

For each one the evaluation scenarios, the analytical framework of Section 2.4 is used to recover the respective aggregate CCI. In this example, the observation region is determined with Rm = 1 m and RM = 100 m. The density of interferers is λ = 0.05 FBS/m2. As aforesaid, when operating in the TDD-underlay mode, femtocells choose either slot with equal probability ϑ = 50%. The radio channel is affected by path loss with exponent α = 3, LN shadowing with σdB = 6 dB, and Nakagami fading with shape factor m = 16. In the femtocell tier, transmitters use a fixed power level of p = 20 dBm. When using PC with full compensation, femtocells control their transmit power to fully compensate for the average value of the desired receivers’ large-scale fading.

Figure 3 compares the CCDF of the aggregate CCI from Monte Carlo simulations with those from the LN. As can be seen from these figures, the LN approximation matches quite well with the simulation results, though the proposed approximations work slightly better with lower fading variance (m = 16). In the coordinated scenarios, a coordination threshold of ρth = −40 dBm and an MU requesting power of pb = 0 dBm are used. Comparing the aggregate CCI of uncoordinated scenarios with that of coordinated ones, we observe that the two-tier networks under study benefit most from avoiding dominant interferers through the CM. Indeed, the coordinated cases provide gains due to the formation of dynamic exclusion regions around the tagged receiver.

thumbnailFigure 3. Aggregate CCI at the tagged receiver. Complementary cumulative distribution function (CCDF) of the aggregate CCI at the tagged FBS under shadowed fading with σdB = 6 dB and m = 16 (corresponds to a Rician factor K = 14.8 dB).

Performance analysis

We evaluate the performance of the scenarios under study in terms of the outage probability and average channel capacity with respect to the tagged receiver. Next, closed-form expressions to approximate the aforementioned figures of merit are introduced.

Signal-to-interference ratio and outage probability

The outage probability is given by Pr [Γ < γth], where Γ is the perceived signal-to-interference ratio (SIR) at the tagged receiver, and γth is the SIR detection threshold. Notice that the scenarios under study are interference limited and hence the thermal noise is negligible in comparison to the resulting CCI [33].

Theorem 1

Let Z0 and Z be LN RV representing the power received from the tagged transmitter and the aggregate CCI at the tagged receiver, respectively. Under the assumption of the shadowed fading with composite Gamma-LN distribution, the SIR at the tagged receiver is

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M66','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M66">View MathML</a>


and the outage probability is given by

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M67','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M67">View MathML</a>



The SIR distribution is given by the quotient of two independent LN RV, namely, <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M68','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M68">View MathML</a> that is the power received from the tagged transmitter, and Z = eV that is an equivalent LN RV approximating the aggregate CCI at the tagged receiver. Hence, we apply the multiplicative reproductive property of LN RV to obtain the SIR distribution [34]. □

Average spectral efficiency

We also evaluate how the CM perform in the two-tier coexistence scenarios by means of the location-dependent average channel capacity of the tagged receiver [35]. By using the analytical framework previously established, and assuming that all users are allocated on the same bandwidth, W , we initially recover the SIR distribution of the tagged receiver, and then compute the corresponding capacity.

Theorem 2

Under the assumption of the shadowed fading channel regime, the average channel capacity of the tagged receiver is given as,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M69','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M69">View MathML</a>



To compute the location-dependent average channel capacity,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M70','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M70">View MathML</a>


we use the PDF of the SIR with respect to the tagged receiver, which is indicated by fΓ (γ).

To do that, we use the Gauss-Hermite quadrature [10],

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M71','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M71">View MathML</a>


where ηk is the kth zero of the Hermite polynomial HK (η) of degree K, ωk is the corresponding weight of the function f ( · ) at the kth abscissa, and RK is the remainder value. K corresponds to the number of sample points which are used to approximate f (η) [10,26]. After that, by using the substitution <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M72','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M72">View MathML</a> in (21), we obtain expression (20). □

Numerical results

Herein, we consider the same assumptions and configuration parameters of Section 4.3. In Figure 4, we use Theorem 1 to plot the outage probability for an increasing density of FU. The uncoordinated scenarios present the poorest performance, while in the time-multiplexing scenario the tagged receiver experiences slightly better performance since the CCI is reduced by a factor that is proportional to the number of time-slots available in a UL frame. By avoiding the dominant interferers through the coordination procedure, the tagged receiver performance significantly improves, whereas the extent of the coordination gains depend on the correlation between beacon and data channels. When nodes coordinate by fulfilling Υ1, the time-multiplexed scenarios outperform the typical FDD transmission mode. However, by comparing the coordination criteria in the TDD-underlay case, we observe an interesting trade-off between individual link quality and overall spectrum efficiency. In fact, when nodes coordinate following the criterion given by Υ1, the tagged receiver experiences better link quality since less interferers are active. However, when nodes follow Υ2, the overall utilization of radio resources is increased since more simultaneous transmissions are allowed at the expense of slightly worse outage figures for the tagged link.

thumbnailFigure 4. Outage probability. Outage probability at the tagged receiver for increasing density of interfering FU. We consider a Nakagami-m shape parameter m = 16 (that corresponds to the Rice parameters K = 14.8 dBm) and network radius of 100 m.

We use Theorem 2 to present the ergodic capacity of the tagged link for an increasing density of interfering nodes in Figure 5. As previously observed with the outage probability, the coordinated scenarios outperform the uncoordinated ones. The uncoordinated TDD-underlay case presents ergodic channel capacity comparable to the FDD deployment with the CM1. Moreover, by assessing the configuration with TDD-underlay and CM2, it becomes clear that the tagged link experiences lower average channel capacity owing to the higher number of simultaneous transmission which are allowed in this case.

thumbnailFigure 5. Average spectral efficiency. Average spectral efficiency at the tagged receiver for increasing density of interfering FU. We consider a Nakagami shape parameter m = 16 (that corresponds to the Rice parameters K = 14.8 dBm) and network radius of 100 m.

Conclusions and final remarks

In this article, we address the CCI problem in two-tier coexistence scenarios. As opposed to the typical spectrum partitioning approaches, the TDD concept is assessed as an alternative to underlay short-range femtocell communications on the UL of legacy macrocell deployments. Herein, we consider distributed mechanisms based on the regular busy tones and that rely on minimal signaling exchange to coordinate the underlaid femtocell tier to reduce the co-channel interference. An analytical framework based on stochastic geometry and higher-order statistics through the cumulants concept which captures network dynamics and channel variations is introduced. We use this framework to recover the distribution of the co-channel interference and to evaluate the system performance in terms of the outage probability and average spectral efficiency of the tagged link. Our analytical model matches well with numerical results obtained using Monte Carlo simulations. When compared to the uncoordinated FDD deployment, the outage probability of the evaluation scenarios with the coordinated TDD-underlay solution is reduced by nearly 80%, while the average spectral efficiency increases by approximately 90% at high loads.

Appendix 1

Proof of Proposition 2

Using Definition 4, the CF of the aggregate CCI perceived by the tagged receiver is written as

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M73','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M73">View MathML</a>


By evaluating (7) using (23), and integrating with respect to r, we obtain

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M74','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M74">View MathML</a>


as the nth cumulant of the CCI distribution. Since transmissions are affected by the shadowed fading, the LN approximation of Section 2.4 is used with Definition 3 to obtain <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M75','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M75">View MathML</a> and from there derive (12).

Appendix 2

Proof of Proposition 3

Considering interfering FBS in <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M76','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M76">View MathML</a>, the nth cumulant of the aggregate interference is determined from the CF as follows

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M77','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M77">View MathML</a>


where <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M78','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M78">View MathML</a> corresponds to the event of not detecting a victim receiver.

The nth cumulant is then given by

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M79','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M79">View MathML</a>


where ϱth = ρth/pb, <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M80','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M80">View MathML</a> and <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M81','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M81">View MathML</a>. By integrating (26) with respect to r, we obtain

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M82','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M82">View MathML</a>


Finally, we obtain the expression (14) after computing the partial moments of the approximating LN RV X and Y by repeatedly applying Definition 3, and by using the change of variable Y = eμ + σZ, where ZNormal (0,1), along with the substitutions <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M83','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M83">View MathML</a> and <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M84','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M84">View MathML</a>.

Appendix 3

Proof of Proposition 4

By considering the indicator function in (10), we write the CF of the aggregate CCI for the <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M85','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M85">View MathML</a> as,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M86','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M86">View MathML</a>


And from (7), the nth cumulant is

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M87','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M87">View MathML</a>


Similar to the derivation of (27), we first integrate with respect to r and obtain

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M88','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M88">View MathML</a>


Likewise the previous case, after computing the following partial moments with respect to X, and using the change of variable X=eμ + σZ, we obtain the expression (15).

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M89','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M89">View MathML</a>


<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M90','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M90">View MathML</a>


<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M91','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M91">View MathML</a>


where <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M92','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M92">View MathML</a>.

Appendix 4

Proof of Proposition 5

By using the indicator function of (11), we write the CF of the aggregate CCI for the resulting <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M93','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M93">View MathML</a> as,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M94','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M94">View MathML</a>


And from (7), the corresponding nth cumulant becomes

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M95','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M95">View MathML</a>


where <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M96','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M96">View MathML</a> and <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M97','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M97">View MathML</a>. After integrating (35) with respect to r, we obtain

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M98','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M98">View MathML</a>


Using the change of variate from Appendix Appendix 2 we can rewrite the cumulant expression as,

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M99','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M99">View MathML</a>


where <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M100','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M100">View MathML</a>, <a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M101','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M101">View MathML</a>, and

<a onClick="popup('http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M102','MathML',630,470);return false;" target="_blank" href="http://www.jwcn.eurasipjournals.com/content/2013/1/3/mathml/M102">View MathML</a>


The cumulant in (37) can be computed in a closed form expression, but unfortunately it is final format is overly cumbersome. Thereby, we decide to simply indicate the corresponding operation in (17).

Competing interests

The authors declare that they have no competing interests.


Authors would like to thank the Finnish funding agency for technology and innovation (Tekes), Elektrobit, Renesas Mobile, and Nokia Siemens Networks for supporting this study. This study had been also conducted in the framework of the ICT project ICT-4-248523 BeFEMTO, which is partly funded by the EU.


  1. H Claussen, L Ho, L Samuel, An overview of the femtocell concept. Bell Labs Tech. J 13, 221–245 (2008). Publisher Full Text OpenURL

  2. V Chandrasekhar, JG Andrews, A Gatherer, Femtocell networks: a survey. Commun. Mag., IEEE 46(9), 59–67 (2008)

  3. CHM de Lima, M Bennis, M Latva-aho, Coordination mechanisms for stand-alone femtocells in self-organizing deployments. Globecom Global Telecommunications Conference (GLOBECOM 2011), 2011 IEEE (Houston, TX, USA, 2011)

  4. D López-Pérez, A Valcarce, G de la Roche, J Zhang, OFDMA femtocells: a roadmap on interference avoidance. Commun. Mag., IEEE 47(9), 41–48 (2009)

  5. S Rangan, Femto-macro cellular interference control with subband scheduling and interference cancelation. Globecom (Miami, Florida, USA, 2010)

  6. Z Bharucha, H Haas, Application of the TDD underlay concept to home NodeB scenario. in 67th IEEE Vehicular Technology Conference (VTC), 2008, ed. by . VTC Spring 2008. IEEE (Calgary, Canada, 2008)

  7. P Omiyi, H Haas, G Auer, Analysis of TDD cellular interference mitigation using busy-bursts. Wireless Commun., IEEE Trans. on 6(7), 2721–2731 (2007)

  8. H Inaltekin, M Chiang, HV Poor, SB Wicker, On unbounded path-loss models: effects of singularity on wireless network performance. Sel. Areas Commun., IEEE J. on 27(7), 1078–1092 (2009)

  9. MJ Ho, GL Stüber, Capacity and power control for CDMA microcells. ACM J. Wirel. Netw 1(3), 355–363 (1995). Publisher Full Text OpenURL

  10. M Abramowitz, IA Stegun, Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables (Dover, 1965)

  11. A Baddeley, I Bárány, R Schneider, W Weil, Stochastic Geometry (Springer, 2006)

  12. J Illian, A Penttinen, H Stoyan, D Stoyan, Statistical Analysis and Modelling of Spatial Point Patterns (Wiley-Interscience, 2004)

  13. F Baccelli, B Btaszczyszyn, NoW—The essence of knowledge. in Stochastic Geometry and Wireless Networks—Theory, vol, ed. by Baccelli F, Blaszczyszyn B. 1 of Foundations and Trends in Networking (NoW Publishers, 2009) PubMed Abstract | Publisher Full Text OpenURL

  14. F Baccelli, B Btaszczyszyn, NoW—The essence of knowledge. in Stochastic Geometry and Wireless Networks—Applications, vol, ed. by Baccelli F, Blaszczyszyn B. 2 of Foundations and Trends in Networking (NoW Publishers, 2009) PubMed Abstract | Publisher Full Text OpenURL

  15. J Andrews, R Ganti, M Haenggi, N Jindal, S Weber, A primer on spatial modeling and analysis in wireless networks. Commun. Mag., IEEE 48(11), 156–163 (2010)

  16. P Xia, V Chandrasekhar, JG Andrews, Open vs. closed access femtocells in the uplink. Wireless Commun., IEEE Trans. on 9, 3798–3809 (2010)

  17. JFC Kingman, Poisson Processes (Oxford University Press, 1993)

  18. A Ghasemi, ES Sousa, Interference aggregation in spectrum-sensing cognitive wireless networks. Sel. Topics Signal Process., IEEE J. of 2, 41–56 (2008)

  19. D Stoyan, WS Kendall, J Mecke, Stochastic Geometry and Its Applications (Wiley-Blackwell, 1995)

  20. F Baccelli, P Bremaud, Elements of Queueing Theory (Springer, 2003)

  21. AE Gelfand, P Diggle, P Guttorp, M Fuentes (eds.), Handbook of Spatial Statistics (CRC Press, 2010)

  22. S Resnick, A Probability Path (Birkhäuser, Boston, 1999)

  23. NC Beaulieu, Q Xie, An optimal lognormal approximation to lognormal sum distributions. Vehicular Technol., IEEE Trans. on 53(2), 479–489 (2004). Publisher Full Text OpenURL

  24. L Felton, An optimal lognormal approximation to lognormal sum distributions. IRE Trans. Commun. Systs 8, 57–67 (1960)

  25. JCSS Filho, P Cardieri, MD Yacoub, Simple accurate lognormal approximation to lognormal sums. Electron. Lett 41(18), 5–6 (2005)

  26. J Wu, NB Mehta, J Zhang, A flexible lognormal sum approximation method. Globecom (St. Louis, MO, 2005)

  27. H Yao, 3GPP: Home Node B Radio Frequency RF Requirements (FDD) (Tech), . rep., TR25.967, version 9.0.0 release 9 (2009)

  28. H Haas, V Nguyen, P Omiyi, N Nedev, G Auer, Interference aware medium access in cellular OFDMA/TDD networks. 2006 IEEE International Conference on Communications (2006)

  29. S Sinanovic, G Auer, H Haas, Power control and interference awareness using busy bursts. IEEE Globecom (Anchorage, Alaska, USA, 2010)

  30. S Sinanovic, G Auer, H Haas, Interference analysis of busy burst enabled interference avoidance. IEEE Globecom (Miami, Florida, USA, 2010)

  31. S Sinanovic, H Burchardt, N Serafimovski, G Auer, H Haas, Local information busy burst thresholding. IEEE International Conference on Communications (2009)

  32. H Yao, 3GPP: Radio Resource Control (RRC); Protocol specification (Tech), . rep., TS25.331, version 10.5.0 release 10 (2011)

  33. S Weber, J Andrews, N Jindal, An overview of the transmission capacity of wireless networks. Commun., IEEE Trans. on 58(12), 3593–3604 (2010)

  34. M Dale, The Algebra of Random Variable (Wiley & Sons, Inc., 1979)

  35. WCY Lee, Estimate of channel capacity in rayleigh fading environment 39(3), 187–189