Abstract
Interference is the main performance-limiting factor in most wireless networks. Protocol interference model is extensively used in the design of wireless networks. However, the setting of interference range, a crucial part of the protocol interference model, is rather heuristic and remains an open problem. In this paper, we use the stochastic geometry and the direct approach to obtain the associated feasibility distributions. After that, we use the binary hypothesis testing to achieve the Bayes risk under binomial point process (BPP) and Poisson point process (PPP), respectively. According to the first derivative of the Bayes risk, we provide the equation to achieve the optimal interference range for minimum Bayes risk. We extend the method proposed by Wildman et al. to a more general situation. Furthermore, we show that for infinite PPP, those two methods converge to the same results. Several numerical results for wireless networks under BPP, finite PPP, and infinite PPP are given. Simulation results show that in the finite wireless network, the BPP method performs better than the PPP method.
Similar content being viewed by others
1 Introduction
Interference range is a crucial part of the protocol interference model. Under the protocol interference model, the transmission between the reference receiver and the reference transmitter is successfully received, when there is no interference transmitter within the interference range of the reference receiver [1]. In the last two decades, interference range is widely used in wireless networks, such as ad hoc networks [2–5], wireless mesh networks [6–10], sensor networks [11, 12], cellular networks [13, 14], and WiMAX networks [15]. The setting of interference range has a large effect on the performance of wireless networks [10, 11, 16, 17]. In wireless networks based on the IEEE 802.11 standard, interference range is usually set to be twice as large as the transmission range [7, 8, 18, 19]. In CSMA-based wireless networks, the interference range is set equal to the carrier sensing range [4, 6, 9, 20]. Several works [2, 4, 21–23] set the interference range by restricting the signal-to-interference-and-noise ratio (SINR) to a threshold. In their works, only one interference transmitter is considered when calculating the SINR. The interference ranges in the mentioned literature are set without fully considering the effect of the networks. However, the optimal interference range may be a function of network parameters, and the casual setting of the interference range will depress the performance of wireless networks. The setting of the interference range is rather heuristic and remains an open problem [24].
Several works have further studied the setting of the interference range. Hasan and Andrews [25] study the optimal interference range (guard zone) to maximize transmission capacity in CDMA-based wireless ad hoc networks. Iyer et al. [26] study the minimum interference range under the additive interference model, the capture threshold model, and the interference range model, respectively. Zhou et al. [15] deduce the probability density of the ratio between the interference range and the one-hop distance. The randomness of the ratio is due to the random thermal noise. Besides, they only consider one interference transmitter. Shi et al. [24] discuss the bounds for the maximum interference range. They deduce the lower bound of the maximum interference range with the maximum transmission range, and the upper bound with the maximum range that a band can be reused. Their work gives the span of maximum interference range. However, the exact value of the interference range remains unknown.
Zhang et al. [27] propose the physical-ratio-K (PRK) interference model as a reliability-oriented instantiation of the protocol model. Furthermore, they study the effect of K on the reliability and throughput. Hasan and Ali [28] present the optimal interference range (guard zone) expression that maximizes the density of successful transmissions under an outage constraint. Wildman and Weber [29] study the optimal interference range to minimize the Bayes risk of the protocol interference model in wireless Poisson networks. In [30], they also investigate the interference range to maximize the correlation of the physical interference model and protocol interference model in Poisson networks. The authors use the binary hypothesis testing to achieve the interference range for minimum Bayes risk. However, their works are only suitable for Poisson networks. The Poisson point process has two deficiencies when modeling finite networks. The first one is no consideration of the network boundary. The second one is the allowance of unbounded nodes in a finite area. The optimal interference range for finite network needs further study.
In this paper, our main contribution is proposing a method of setting the optimal interference range which is applicable for a more general situation. We employ the binary hypothesis testing framework to outline the relationship between the physical and protocol interference model. The optimal interference range is configured to minimize the Bayes risk of the protocol interference model.
The first contribution of this paper is proposing a method to achieve the optimal interference range for binomial wireless networks. We adopt the direct approach to obtain the associated feasibility distributions for wireless networks under BPP. Furthermore, we calculate Bayes risk with those distributions and deduce the optimal interference range to minimize the Bayes risk.
Next, we derive the optimal interference range for finite and infinite Poisson wireless networks. Furthermore, we demonstrate that the optimal interference range found by Wildman et al. [30] is the special case of the infinite PPP.
Finally, we present several numerical results of Bayes risks, receiver operating characteristic (ROC), and area under curve (AUC) under BPP, finite PPP, and infinite PPP. Our results reveal that the BPP method and the finite PPP method achieve smaller optimal interference range than the infinite PPP method. In the finite wireless network, the BPP method performs better than the PPP methods.
The rest of this paper is organized as follows. In Section 2, we introduce the wireless network model, including the propagation model, physical interference model, and protocol interference model. In Section 3, we introduce the binary hypothesis testing and Bayes risk. In Section 4, we provide the feasibility distributions under binomial wireless networks and Poisson wireless networks, respectively. In Section 5, we deduce the Bayes risk and optimal interference range. In Section 6, we give some numerical results for BPP and PPP. Section 7 concludes this paper. Finally, for clarity, long proofs are presented in the Appendix.
2 Network model
We consider a network, in a two-dimensional region A, with a reference receiver RX0, a reference transmitter TX0, and M interference transmitters TX1,⋯,TXM. Assume that all interference transmitters are active and consist of a point process in a snapshot. In this paper, we concentrate on analyzing the performance (the Bayes risks) of the networks at a snapshot with stochastic geometry tool. For the analyzing of the long-term metrics, queuing theory should also be incorporated [31]. Without a loss of generality, due to the stationarity of the point process, we may take the reference receiver to be at the origin. The distance is normalized by the distance from TX0 to RX0, denoted by d0=1. Let di denote the distance from TXi to RX0. The area of the network region is denoted by |A|. As the power allocation is not considered in this paper, we assume that all transmitter’s power Pi for all i∈{0,⋯,M} is the same.
2.1 Propagation model
Our signal propagation model considers the path loss with Rayleigh fading. The signal received by RX0 from TXi, denoted by PRi, is
where hi is the i.i.d. unit-mean exponential shadowing factor for all i∈{0,⋯,M}, α>2 is the path loss exponent. The value of α is typically between 2 and 8 as in [32] and [33].
2.2 Physical interference model
Under physical interference model, transmission from TX0 is successfully received by RX0 if the SINR is no less than a defined SINR threshold β, which can be expressed as follows:
where SNR is the average signal-to-noise ratio. The interference range is mainly affected by interference, and we mainly interest in the effect of interference in this paper. As wildly assumed in [25–34], we calculate the noise with the average. Remember that distance is normalized by d0, and the SNR−1 is achieved by dividing the transmitter power P0 with the average noise.
Let random variables H=1{SINR≥β} represent the physical model feasibility, denoted by H1, of the transmission from TX0 to RX0. The indicator 1A has the value 1 for all elements of A and the value of 0 for all elements not in A. The physical model failure is denoted by H0.
2.3 Protocol interference model
Under protocol interference model, a transmission from TX0 to RX0 is successful, if there are no interference transmitters within the interference range of RX0, denoted by RI. Let random variables D=1{di≥RI,∀i≠0} represent the protocol model feasibility, denoted by D1, of the transmission from TX0 to RX0. The protocol model failure is denoted by D0.
3 Binary hypothesis testing and Bayes risk
In wireless networks, the physical interference model is considered as a more realistic description of the effects of interference [35]. Appropriate setting of the interference range of the protocol interference model can maximize the similarity between the two models. The appropriate setting here means to set the interference range to be the optimal interference range which maximizes the similarity. In this paper, we employ the binary hypothesis testing framework in [36] to describe the relationship between the two models. The minimum Bayes risk maps the maximum similarity. The optimal interference range to maximize the similarity between the two models is equivalent to minimize the Bayes risk.
In the binary hypothesis testing, the two hypotheses (null hypothesis H0 and alternate hypothesis H1) represent the possible outcomes (failure and success) under the physical interference model. The two decisions (D0 and D1) represent the possible observations (failure and success) under the protocol interference model. For this binary hypothesis testing problem, four possible cases can occur:
(1) Decide D0 when H0 is true.
(2) Decide D0 when H1 is true.
(3) Decide D1 when H0 is true.
(4) Decide D1 when H1 is true.
In order to use the Bayes’ criterion, we assume that a cost is assigned to the possible decisions. We can define Cij(i,j=0,1) as the cost associated with the decision Di, when hypothesis Hj is true. In particular, the costs for this binary hypothesis test problem are C00 to case (1), C01 to case (2), C10 to case (3), and C11 to case (4). The goal in our Bayes’ criterion is to determine the optimal interference range to minimize the average cost E[C], also known as Bayes risk r in [29]. Denote P(Di|Hj) as the joint probability that we decide Di when the hypothesis Hj is true. The Bayes risk is
The cost Cij may be chosen to be particular network performances. In this paper, we use the uniform cost model (C00=C11=0 and C01=C10=1) for simplicity. This assumption is reasonable, as there is no cost of similarity when the two models make the same decision, as in [29] and [30]. From Bayes’ rule, the Bayes risk can be expressed as follows:
where P(H1) and P(D1) are the probabilities of physical and protocol feasibility distribution, respectively. P(H1|D1) is the conditional feasibility distribution of physical model given successfully received of the protocol model. Those feasibility distributions will be deduced in the following section.
4 Feasibility distributions
Based on the network model and according to the stochastic geometry, we provide the feasibility distributions of binomial and Poisson wireless networks.
4.1 Binomial wireless networks
Assume that M interference transmitters are independently and uniformly distributed over A. A is a circle center at the origin with radius of R. Thus, the interference transmitters are drawn from a BPP of density λ=M/(πR2). We denote the BPP by ΦM. According to the coverage probability of [34] and the standard results in stochastic geometry [37], following three distributions can be obtained.
Lemma 1
The feasibility distribution of the physical model under BPP is
where ζ=β/SNR, \(\Phi \left (x \right) = \frac {2}{\beta }\Psi \left (x \right) - {x^{2}}\),
\(\Psi \left (x \right) = \int _{0}^{x} {\frac {{{t^{\alpha + 1}}}}{{1 + {\beta ^{- 1}}{t^{\alpha } }}}} dt \\ = \left ({\frac {{{x^{\alpha + 2}}}}{{\alpha + 2}}} \right){}_{2}{F_{1}}\left ({\left [ {1,\frac {2}{\alpha } + 1} \right ];\frac {2}{\alpha } + 2, - \frac {{{x^{\alpha } }}}{\beta }} \right)\), and 2F1 is the Gauss hypergeometric function,
\({}_{2}{F_{1}}\left ({\left [ {a,b} \right ];c,x} \right) \\ = \frac {{\Gamma \left (c \right)}}{{\Gamma \left (b \right)\Gamma \left ({c - b} \right)}}\int _{0}^{1} {{v^{b - 1}}{{\left ({1 - v} \right)}^{c - b - 1}}{{\left ({1 - xv} \right)}^{- a}}dv} \),
and Γ(·) is the gamma function.
Proof
This result follows from [34], by setting the exclusion zone radius (the area of no active interference transmitters) rin to be zero and the transmitting probability (the active probability of interference transmitters) p to be one. In the physical interference model, there is no location constraint for the transmitters, and it is reasonable to set rin to be zero. For the simplicity of derivation, we set the transmitting probability to be one, as in [29] and [30]. When considering transmitting probability, the feasibility distribution can also be calculated. More complex and challenging cases with spatio-temporal traffic, where p is decided by a stochastic process, can be investigated by combining stochastic geometry and queuing theory as in [38]. □
Lemma 2
The feasibility distribution of the protocol model under BPP is
Proof
According to [37], for a binomial point process with M points in a compact set A, the void probabilities of a point process are the probabilities of there being no point of the process in given test sets B:
where N(B) is the number of point in B, vd(B) is the volume of B.
The feasibility distribution of the protocol model under BPP, denoted by PBPP(D1), is the probability of there being no point of interference transmitter in the interference range of the reference receiver. The interference range in this paper is the circle centered at the reference receiver with radius RI. Substitute the interference range for B, \(\pi R_{I}^{2}\) for vd(B), and πR2 for vd(A) achieves Lemma 2. □
Lemma 3
The conditional feasibility distribution of physical model given successfully received of protocol model under BPP is
Proof
Similar to the proof of Lemma 1, this is achieved by setting the exclusion zone radius rin to be RI and the transmitting probability p to be one. Here, we set the exclusion zone radius to be RI, means there being no interference transmitter in the interference range. □
Other distributions, derived from H and D, are expressible in terms of PBPP(H1|D1),PBPP(H1), and PBPP(D1).
4.2 Poisson wireless networks
Assume that the interference transmitters are drawn from a PPP, denoted by Φ, with density λ over A. A is a circle center at the origin with a radius of R. The number of interference transmitters M within region A is Poisson with mean E[M]=λπR2. The feasibility distributions can be obtained by taking the expectation of the three distributions in BPP with respect to M.
Lemma 4
The feasibility distribution of the physical model under PPP is
Proof
Similar to the proof of Lemma 1, this result follows from [34], by setting the exclusion zone radius rin to be zero and the transmitting probability p to be one. □
Lemma 5
The feasibility distribution of the protocol model under PPP is
Proof
From [37] we know, in a homogeneous Poisson point process with density λ, the void probabilities of a point process are the probabilities of there being no point of the process in given test sets B:
where N(B) is the number of point in B, vd(B) is the volume of B.
The feasibility distribution of the protocol model under PPP, denoted by PPPP(D1), is the probability of there being no point of interference transmitter in the interference range of the reference receiver. The interference range in this paper is the circle centered at the reference receiver with radius RI. Substitute the interference range for B, and \(\pi R_{I}^{2}\) for vd(B) achieves Lemma 5. □
Lemma 6
The conditional feasibility distribution of physical model given successfully reception of protocol model under PPP is
Proof
Similar to the proof of Lemma 3, this result follows from [34], by setting the exclusion zone radius rin to be RI and the transmitting probability p to be one. □
Other distributions, derived from H and D, are expressible in terms of PPPP(H1|D1), PPPP(H1), and PPPP(D1).
5 Optimal interference range
Combining the binary hypothesis testing and the feasibility distributions for binomial and Poisson wireless networks, we obtain the Bayes risk for protocol interference model under the physical interference model. By studying the first derivative of the Bayes risk, we achieve the equation for optimal interference range for minimum Bayes risk in binomial and finite Poisson wireless networks. Furthermore, the Bayes risk and optimal interference range in infinite Poisson wireless networks can be found by taking the limit of those in the finite Poisson wireless networks as R→∞.
5.1 Binomial wireless networks
Proposition 1
The Bayes risk in binomial wireless networks, denoted by rBPP, under the uniform cost model is
Proof
The result is immediate from (4) and substituting feasibility distribution expression from (5), (6), and (8). □
Theorem 1
(Optimal interference range for minimum Bayes risk) Under the uniform cost model, the optimal interference range for minimum Bayes risk in binomial wireless networks always exists. When ζ≥ log2, the optimal interference range is R. This can hardly be set as interference range, as only the reference transmitter is allowed to transmit. When ζ< log2, the optimal interference range is the unique solution to
Proof
The proof is in Appendix A □
5.2 Finite poisson wireless networks
Proposition 2
The Bayes risk under finite PPP, denoted by rPPP, under the uniform cost model is
Proof
Similar to Proposition 1 by substituting feasibility distribution expression from (9), (10), and (12). □
Theorem 2
(Optimal interference range for minimum Bayes risk) Under the uniform cost model, the optimal interference range for minimum Bayes risk under finite PPP is the unique solution to
The solution exists if and only if
Proof
The proof is in Appendix B. □
5.3 Infinite poisson wireless networks
For the PPP on the entire plan, the corresponding results can be obtained from the PPP over a finite region A by taking the limit as R→∞. The results are as follows. The feasibility distributions of infinite PPP are similar to those of finite PPP by replacing Φ(R) to \(\underset {R \to \infty }{\lim } \Phi \left (R \right) = {{ - 2\pi {\beta ^{2 / \alpha }}\csc \left ({{{2\pi } / \alpha }} \right)} / \alpha }\csc \left ({{{2\pi } / \alpha }} \right)/ \alpha \).
The Bayes risk is
Corollary 1
(Optimal interference range for minimum Bayes risk) Under the uniform cost model, the optimal interference range for minimum Bayes risk under infinite PPP is the unique solution to
The solution exists if and only if
Proof
This result follows from Theorem 2 by taking the limit as R→∞. □
Corollary 2
For two dimension networks, when the reference transmitter is at unit distance from the receiver and uniform cost model is adopted, the Bayes risk and the optimal interference range under infinite PPP are the same with those in [30].
Proof
The proof is in Appendix C. □
6 Numerical results
In our simulation, we use the similar environment parameters of [30]. Notice that distance is normalized to the distance from TX0 to RX0, and the transmitter density is one hundred times of that in [30]. Numerical results for Bayes risk, optimal interference range, receiver operating characteristic (ROC), and area under curve (AUC) for both BPP and PPP are shown as follows. The proposed methods can be adopted to achieve the interference range for wireless networks. We utilize the ROC and AUC to evaluate the performance of each method. The ROC is used to show the tradeoff between type I (false rejection PI=P(D1|H0)) and type II (false acceptance PII=P(D0|H1)) error rates. The AUC is the area under the ROC curve and is a useful numerical value to evaluate the performance of the proposed method.
6.1 Bayes risks and first derivatives
The Bayes risks and the first derivatives under BPP, finite PPP, and infinite PPP are shown in Fig 1. In order to show the difference of the three point processes, we set the area to be a disk of radius R=10. When the area is sufficiently large, the results of BPP and finite PPP converge to those of infinite PPP. The density of interference transmitter is λ=2×10−2. The path loss exponent is α=3. The SINR threshold is β=5. We first investigate the case without noise, where the power of background noise is set to be 0, and the SNR is infinite, i.e., SNR=+∞.
Figure 1a shows the Bayes risks decrease firstly then increase with the increment of the interference range. The minimum Bayes risks are achieved at the optimal interference range. From the numerical results, we know that there is a unique optimal interference range which can minimize the Bayes risk for BPP, finite PPP, and infinite PPP, respectively. For BPP, the optimal interference range is \(R^{\text {BPP}}_{I} = 2.00\). For finite PPP, the optimal interference range is \(R^{\text {PPP}}_{I} = 2.02\). For infinite BPP, the optimal interference range is \(R^{\text {inf PPP}}_{I} = 2.11\). This indicates the BPP has the smallest optimal range, which allows more transmitters to be active simultaneously. Besides, with small interference range, the Bayes risk of BPP is almost the same as the Bayes risk of finite PPP, and obviously smaller than that of infinite PPP. This means, for finite networks with small interference range, using the infinite PPP method will overestimate the Bayes risk.
As shown in Fig 1b, with the growth of interference range, the first derivatives turn from negative to positive. For 0<RI<10, there is a unique zero point, which acts as the optimal interference range, for the BPP, finite PPP, and infinite PPP, respectively. It can be found that the first derivative of the BPP is the first to reach the zero point, and follows the first derivative of the finite PPP, and the last is the first derivative of the infinite PPP.
When SNR is sufficiently large \(\left ({\text {SNR}}>\frac {\beta }{{\log 2}}\right)\), similar results can be achieved. For the case with large noise \(\left ({\text {SNR}} \le \frac {\beta }{{\log 2}}\right)\), we set SNR=7 as an example in Fig 1c. It is obvious that the Bayes risks are monotonously decreasing, and the optimal interference ranges for the minimum Bayes risks are at the maximum network radius R. This indicates that only the reference transmitter can be active, which is inefficiency for a practical network. Consequently, the Bayes methods cannot be directly applied to the network with heavy noise, and more effort should be taken in this aspect.
6.2 Parameters influence the optimal interference range
Figure 2 shows the optimal interference range influenced by parameters (λ,β,α), under BPP, finite PPP, and infinite PPP. The area is a disk of radius R=10. The power of background noise is set to be 0, and the SNR is infinite, i.e., SNR=+∞.
Figure 2a shows the optimal interference ranges increase with the density λ growing from 2×10−3 to 2×10−1. The settings of other parameters are α=3 and β=5. This is quite hard to understand. As the physical feasibility decreases with λ, in order to minimize the Bayes risks, the protocol feasibility must likewise be decreased by increasing RI or λ. Notice that, in order to minimize the Bayes risks, only increasing λ is not enough, and it must be additionally increased by expanding RI. It is quite obvious that the optimal interference range of BPP and finite PPP are smaller than that of infinite PPP. As in infinite PPP, the network radius is infinite, which leads to more interference compared with BPP and finite PPP. In order to minimize the risk, a relatively larger interference range is needed for infinite PPP. Besides, the optimal interference range of BPP is slightly lower than that of finite PPP.
Figure 2b shows the optimal interference ranges increase with the SINR threshold β growing from 0.5 to 50. The settings of other parameters are λ=2×10−2 and α=3. This is because the physical feasibility decreases with SINR threshold β, and the protocol model feasibility must be decreased by increasing RI. Similar to Fig. 2a, the optimal interference range of BPP and finite PPP are smaller than that of infinite PPP, and the optimal interference range of BPP is slightly lower than that of finite PPP.
Figure 2c shows the optimal interference ranges decrease with the path loss exponent α growing from 2 to 8. The settings of other parameters are λ=2×10−2 and β=5. Bigger path loss exponent means higher power attenuation, which leads to lower interference and higher protocol feasibility. In order to minimize the Bayes risks, the protocol feasibility must likewise be increased by decreasing RI. Again, the optimal interference range of BPP and finite PPP are smaller than that of infinite PPP, and the optimal interference range of BPP is slightly lower than that of finite PPP.
Those simulation results indicate the optimal interference range should be appropriately chosen according to the network parameters. The casual setting of the interference range will raise the Bayes risk and depress the performance of wireless networks.
6.3 ROC and AUC compare
Figure 3 compares the ROC and AUC of BPP, finite PPP, and infinite PPP. The path loss exponent is α=3. The SINR threshold is β=5 and SNR=+∞. Figure 3a shows the ROC curves travel from bottom-right to top-left, as the interference range RI grows. The network radius is R=10. The density of interference transmitter is λ=2×10−2. The ROC of BPP is in the lowest place and close to the ROC of finite PPP. It is obvious that the ROC of both BPP and finite PPP is under that of infinite PPP, which means the BPP and finite PPP methods have a lower error rate than the infinite PPP method. That is to say, the BPP method and the finite PPP methods perform better in the finite networks. Figure 3b shows the AUC of BPP, finite PPP, and infinite PPP vary with the different network radiuses. The network radiuses range from 10 to 200, and the density of interference transmitter is set to be λ=2×10−2, λ=1×10−1, and λ=3×10−1. From the simulation results, we know the AUC of BPP and finite PPP is smaller than the AUC of infinite PPP when the network radius is small. With a larger network radius, those AUCs are nearly the same. Those results indicate that the BPP method and the finite PPP method have better performance in small networks and have similar performance to infinite PPP in large networks. Furthermore, when λ=1×10−1 and λ=3×10−1, there is an obvious advantage of the BPP method over the finite PPP method. That is to say, the BPP method performs better than the PPP methods in small networks with high node density. When λ=2×10−2, the AUC of finite PPP and infinite PPP are nearly the same. This implies that the two PPP methods have the same performance in wireless networks with large density.
7 Conclusion
In this paper, we provide methods to achieve the optimal interference range for minimum Bayes risk, under the assumptions of both binomial and Poisson wireless networks. For Poisson wireless networks, both finite and infinite networks are concerned. Following that, several numerical results are provided. Simulation results show that in the finite wireless network, the BPP method performs better than the PPP methods. The analytical and numerical results may assist in the more accurate and effective use of the protocol interference model.
In future work, it is of interest to relate the risk with what a user of networks may care, e.g., throughput, delay, and reliability. This may directly indicate the effect of interference range setting on the network performance. Additionally, networks with medium access control (MAC) protocol (e.g., ALOHA and CSMA), unsaturated traffic(e.g., spatio-temporal traffic), and more fading factors (e.g., Rician and Nakagami) need further studied.
8 Appendix
9 Appendix A
9.1 Proof of theorem 1
Proof
The first derivative of rBPP to interference range RI is
In order to analyze the first derivative, the following two functions are defined.
The first derivative of rBPP to interference range RI can be expressed as follows:
where \(g_{1}\left ({{R_{I}}} \right) = M{e^{- \zeta }}\left ({ - \frac {{2{R_{I}}}}{{{R^{2}}}}} \right){\left ({1 - \frac {{R_{I}^{2}}}{{{R^{2}}}}} \right)^{M - 1}}{h\left ({{R_{I}}} \right)}\), and \(h\left ({{R_{I}}} \right) = {\left ({1 + \frac {{\Phi \left (R \right) - \Phi \left ({{R_{I}}} \right)}}{{{R^{2}}}}} \right)^{M}}\). It is easy to know that g1(RI)<0 for all RI, as h(RI)>0 (Φ(x) is monotonous decreasing). The monotonicity of rBPP can be easily decided by analyzing f1−f2.
For 1/f1, the first derivative is
From (24), we know 1/f1 is monotonously increasing, and f1 is monotonously decreasing. The limiting values are \(\underset {R_{I} \to 0}{\lim } f_{1} = e^{\zeta }\left (1 + \Phi \left (R \right) / R^{2} \right)^{- M}\), and \(\underset {R_{I} \to R}{\lim } {f_{1}} = e^{\zeta }\).
For f2, the first derivative is
From (25), we know f2 is monotonously increasing, and the limiting values are \(\underset {{R_{I}} \to 0}{\lim } {f_{2}} = 2 - {{2{R^{2}}} / {\left ({{R^{2}} - \Phi \left (R \right)}\right)}}\) and \(\underset {{R_{I}} \to R}{\lim } {f_{2}} = 2\).
In summary, f1 is decreasing from \({e^{\zeta } }{\left ({1 + \frac {{\Phi \left (R \right)}}{{{R^{2}}}}} \right)^{- M}}\) down to eζ, and f2 is increasing from \(2 - \frac {{2{R^{2}}}}{{{R^{2}} - \Phi \left (R \right)}}\) up to 2. It is clear that f1 and f2 have a unique intersection, which minimizes the Bayes risk, if and only if eζ<2, i.e., ζ< log2. That is to say, when ζ< log2, the optimal interference range is achieved at f1=f2. Denote the point f1=f2 by \(R^{\text {BPP}}_{I}\). When RI<RIBPP, f1>f2, \(\frac {{{d{r^{\text {BPP}}}}}}{{{d{R_{I}}}}} < 0\), and rBPP is monotonously decreasing. When RI>RIBPP, f1<f2, \(\frac {{{d{r^{\text {BPP}}}}}}{{{d{R_{I}}}}} > 0\), and rBPP is monotonously increasing. As a consequence, the minimum Bayes risk rBPP is achieved at \(R^{\text {BPP}}_{I}\), which is the optimal interference range of BPP. If ζ≥ log2, f1 will always be bigger than f2, and \(\frac {{{d{r^{\text {BPP}}}}}}{{{d{R_{I}}}}} \le 0\) is tenable for all RI∈[0,R]. Under this situation, the optimal interference range for minimum rBPP is R. □
10 Appendix B
10.1 Proof of theorem 2
Proof
The first derivative of rPPP to interference range RI is
where c=ζ−λπΦ(R) is a variable that irrelevant to RI. Similar to the Appendix A, we define the following two functions to analyze the derivative.
The first derivative of rPPP to interference range RI can be expressed as follows:
where \({g_{2}}\left ({{R_{I}}} \right) = \exp \left \{ { - \lambda \pi R_{I}^{2}} \right \} \left ({\frac {{ - 4\lambda \pi R_{I}^{\alpha + 1}}}{{\beta + R_{I}^{\alpha } }}} \right) < 0\), for all RI. The monotonicity of rPPP can be easily decided by analyzing f3−f4.
For f3, the first derivative is
From (29), we know f3 is monotonously decreasing, and the limiting values are \(\underset {{R_{I}} \to 0}{\lim } {f_{3}} = + \infty \) and \(\underset {{R_{I}} \to R}{\lim } {f_{3}} = \frac {{\beta + {R^{\alpha } }}}{{2{R^{\alpha } }}}\).
For f4, the first derivative is
From (30), we know f4 is monotonously increasing, and the limiting values are \(\underset {{R_{I}} \to 0}{\lim } {f_{4}} = e^{-c}\) and \(\underset {{R_{I}} \to R}{\lim } {f_{4}} = \exp \left \{ { - c - \lambda \pi \Phi \left (R \right)} \right \} = e^{-\zeta }\).
In summary, f3 is decreasing from +∞ down to (β+Rα)/(2Rα), and f4 is increasing from e−c up to e−ζ. It is clear that f3 and f4 have a unique intersection, which minimizes the Bayes risk, if and only if ζ< log((2Rα)/(β+Rα)).That is to say, when ζ< log((2Rα)/(β+Rα)), the optimal interference range is achieved at f3=f4. Denote the point f3=f4 by \(R^{\text {PPP}}_{I}\). When RI<RIPPP, f3>f4, \(\frac {{{d{r^{\text {PPP}}}}}}{{{d{R_{I}}}}} < 0\), and rPPP is monotonously decreasing. When RI>RIPPP, f3<f4, \(\frac {{{d{r^{\text {PPP}}}}}}{{{d{R_{I}}}}} > 0\), and rPPP is monotonously increasing. As a consequence, the minimum Bayes risk rPPP is achieved at \(R^{\text {PPP}}_{I}\), which is the optimal interference range of PPP. If ζ≥ log((2Rα)(β+Rα)), f3 will always be bigger than f4, and \(\frac {{{d{r^{\text {PPP}}}}}}{{{d{R_{I}}}}} \le 0\) is tenable for all RI∈[0,R]. Under this situation, the optimal interference range for minimum rPPP is R. □
11 Appendix C
11.1 Proof of corollary 2
proof We show the coincidence of the Bayes risk and the optimal interference range in turn.
11.1.1 Bayes risk
For two dimension network, when the reference transmitter is at unit distance from the receiver and uniform cost model are adopted, the Bayes risk in [30] is
where \(I\left ({u,v} \right) = v\int _{0}^{u} {{{{t^{v}}} / {\left ({1 + t} \right)}}} {d_{t}}\).
This is achieved from [30] by letting n=2, rt=1, r0=RI, η=1/SNR, c01=c10=1, and c00=c11=0. The only different between (31) and (18) is the last part of the third exponent. To prove the coincidence of (31) and (18), we only have to demonstrate \({\beta ^{{2 / \alpha }}}I\left ({R_{I}^{\alpha }} / \beta,{2 / \alpha } \right) = \Phi \left (R_{I}\right) + R_{I}^{2}\). The proof is as follow:
11.1.2 Optimal interference range
For two dimension network, when the reference transmitter is at unit distance from the receiver and uniform cost model are adopted, the optimal interference range in [30] is the unique solution to
This solution exists if and only if
This is achieved from [30] by letting n=2, rT=1, rO=RI, ζ=1/SNR, c01=c10=1, and c00=c11=0. Recalling (32), we can easily prove the right hand side of (33) coincides with that of (19). The equality of the left hand sides is obvious. The condition that optimal interference range exists (34) is the same as (20). □
Availability of data and materials
Not applicable.
Abbreviations
- AUC:
-
Area under curve
- BPP:
-
Binomial point process
- i.i.d.:
-
Independent and identically distributed
- PPP:
-
Poisson point process
- PRK:
-
Physical-ratio-K
- ROC:
-
Receiver operating characteristic
- SINR:
-
Signal-to-interference-and-noise ratio
- SNR:
-
Average signal-to-noise ratio
References
P. Gupta, P. R. Kumar, The capacity of wireless networks. IEEE Trans. Inf. Theory. 46(2), 388–404 (2000).
K. Shih, Y. Chen, C. Chang, A physical/virtual carrier-sense-based power control mac protocol for collision avoidance in wireless ad hoc networks. IEEE Trans. Parallel Distrib. Syst.22(2), 193–207 (2011).
W. Ren, Q. Zhao, A. Swami, Connectivity of heterogeneous wireless networks. IEEE Trans. Inf. Theory. 57(7), 4315–4332 (2012).
A. Argyriou, Cross-layer and cooperative opportunistic network coding in wireless ad hoc networks. IEEE Trans. Veh. Commun.59(2), 803–812 (2010).
X. Li, P. Kong, K. Chua, Tcp performance in ieee 802.11-based ad hoc networks with multiple wireless lossy links. IEEE. Trans. Mob. Comput.6(12), 1329–1342 (2007).
J. Wang, W. Shi, K. Cui, F. Jin, Y. Li, Partially overlapped channel assignment for multi-channel multi-radio wireless mesh networks. EURASIP J. Wirel. Commun. Netw.25:, 1–12 (2015).
Y. Ding, Y. Huang, G. Zeng, L. Xiao, Using partially overlapping channels to improve throughput in wireless mesh networks. IEEE. Trans. Mob. Comput.11(11), 1720–1733 (2012).
J. Wang, W. Shi, Y. Xu, F. Jin, Uniform description of interference and load based routing metric for wireless mesh networks. EURASIP J. Wirel. Commun. Netw.132:, 1–11 (2014).
H. Ma, R. Vijayakumar, S. Roy, J. Zhu, Optimizing 802.11 wireless mesh networks based on physical carrier sensing. IEEE-ACM Trans. Netw.17(5), 1550–1563 (2009).
Y. Feng, M. Li, M. Wu, A weighted interference estimation scheme for interface switching wireless mesh networks. Wirel. Commun. Mob. Comput.9:, 773–784 (2009).
R. Kapelko, On the maximum movement to the power of random sensors for coverage and interference. Pervasive Mob. Comput.51:, 174–192 (2018).
G. Zhou, T. He, J. A. Stankovic, T. Abdelzaher, in IEEE INFOCOM 2005. The Conference on Computer Communications - 24th Annual Joint Conference of the IEEE Computer and Communications Societies: 13-17 March 2005; Miami, FL, United States. Rid: radio interference detection in wireless sensor networks (IEEEMiami, 2005), pp. 891–901. https://doi.org/10.1109/INFCOM.2005.1498319.
N. Lee, S. Bahk, in COMSWARE 2007. Proceedings of the 2007 2nd International Conference on Communication System Software and Middleware and Workshops: 7-12 January 2007; Bangalore, India. Channel allocation considering the interference range in multi-cell ofdma downlink systems, (2007), pp. 1–6. https://doi.org/10.1109/comswa.2007.382616.
N. Lee, S. Bahk, in WCNC 2007. 2007 IEEE Wireless Communications and Networking Conference: 11-15 March 2007; Kowloon, China. Dynamic channel allocation using the interference range in multi-cell downlink systems, (2007), pp. 1716–1721. https://doi.org/10.1109/wcnc.2007.323.
M. Zhou, H. Harada, P. Kong, J. S. Pathmasuntharama, in WCNC 2010.2010 IEEE Wireless Communications and Networking Conference: 18-21 April 2010; Sydney, NSW, Australia. Interference range analysis and scheduling among three-hop neighborhood in maritime wimax mesh networks, (2010), pp. 1–6. https://doi.org/10.1109/wcnc.2010.5506227.
K. Lee, P. Mitchell, D. Grace, Energy efficient distributed reservation multiple access with adaptive switching requests for wireless networks. IEEE Trans. Wirel. Commun.13(1), 259–267 (2014).
C. Sum, M. A. Rahman, L. Lu, F. Kojima, H. Harada, in WCNC 2012. 2012 IEEE Wireless Communications and Networking Conference: 1-4 April 2010; Paris, France. On communication and interference range of IEEE 802.15.4g smart utility networks, (2012), pp. 1169–1174. https://doi.org/10.1109/wcnc.2012.6213953.
S. Xu, T. Saadawi, Does the ieee 802.11 mac protocol work well in multihop wireless ad hoc networks?. IEEE Commun. Mag.39(6), 130–137 (2001).
K. Xu, M. Gerla, S. Bae, in GLOBECOM’02. IEEE Global Telecommunications Conference: 17-21 November 2002; Taipei, Taiwan, China. How effective is the ieee 802.11 rts/cts handshake in ad hoc networks, (2002), pp. 72–76. https://doi.org/10.1109/glocom.2002.1188044.
S. Wang, V. Venkateswaran, X. Zhang, Fundamental analysis of full-duplex gains in wireless networks. IEEE-ACM Trans. Netw.25(3), 1401–1416 (2017).
J. YAO, W. Lou, C. Yang, K. Wu, Efficient interference-aware power control for wireless networks. Comput. Netw.136:, 68–79 (2018).
J. YAO, W. Lou, C. Yang, K. Wu, in ICC 2017. 2017 IEEE International Conference on Communications: 21-25 May 2017; Paris, France. Efficient interference-aware power control in wireless ad hoc networks, (2017), pp. 1–6. https://doi.org/10.1109/icc.2017.7997363.
K. Park, J. Choi, J. C. Hou, Y. Hu, H. Lim, Optimal physical carrier sense in wireless networks. Ad Hoc Netw.9(1), 16–27 (2011).
Y. Shi, Y. T. Hou, J. Liu, S. Kompella, Bridging the gap between protocol and physical models for wireless networks. IEEE. Trans. Mob. Comput.12(7), 1404–1416 (2013).
A. Hasan, J. G. Andrews, The guard zone in wireless ad hoc networks. IEEE Trans. Wirel. Commun.6(3), 897–906 (2007).
A. Iyer, C. Rosenberg, A. Karnik, What is the right model for wireless channel interference?. IEEE Trans. Wirel. Commun.8(5), 2662–2671 (2009).
H. Zhang, X. Che, X. Liu, X. Ju, Adaptive instantiation of the protocol interference model in wireless networked sensing and control. ACM Trans. Sensor Netw.10(2), 1–48 (2014).
A. Hasan, A. Ali, Guard zone-based scheduling in ad hoc networks. Comput. Commun.56:, 89–97 (2015).
J. Wildman, S. Weber, in WiOpt 2016. 14th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks: 9-13 May 2016; Tempe, AZ, United States. Minimizing the bayes risk of the protocol interference model in wireless poisson networks, (2016), pp. 1–8. https://doi.org/10.1109/wiopt.2016.7492923.
J. Wildman, S. Weber, On protocol and physical interference models in poisson wireless networks. IEEE Trans. Wirel. Commun.17(2), 808–821 (2018).
Y. Zhong, X. Ge, H. H. Yang, T. Han, Q. Li, Traffic matching in 5g ultra-dense networks. IEEE Commun. Mag.56(8), 100–105 (2018).
X. Liu, Closed-form coverage probability in cellular networks with poisson point process. IEEE Trans. Veh. Technol.68(8), 8206–8209 (2019).
M. Salehi, H. Tabassum, E. Hossain, Accuracy of distance-based ranking of users in the analysis of noma systems. IEEE Trans. Commun.67(7), 5069–5083 (2019).
M. C. Valenti, D. Torrieri, S. Talarico, A direct approach to computing spatially averaged outage probability. IEEE Commun. Lett.18(7), 1103–1106 (2014).
P. Cardieri, Modeling interference in wireless ad hoc networks. IEEE Commun. Surveys Tuts.12(4), 551–572 (2010).
M. Barkat, Signal Detection and Estimation (Artech House, London, 2005).
S. N. Chiu, D. Stoyan, W. S. Hendall, J. Mecke, Stochastic Geometry and Its Applications (John Wiley Sons Ltd, Chichester, 2013).
Y. Zhong, G. Wang, T. Han, M. Wu, X. Ge, Qoe and cost for wireless networks with mobility under spatio-temporal traffic. IEEE ACCESS. 7(1), 47206–47220 (2019).
Acknowledgements
The authors wish to acknowledge the helpful comments of the Associate Editor and the anonymous reviewers.
Funding
This work was supported in part by the National Science Foundation of Jilin Province of China (No.20180101045JC) and in part by the National Natural Science Foundation of China (No.61373124)
Author information
Authors and Affiliations
Contributions
Authors’ contributions
All authors contribute to the concept, design, and developments of the theory analysis and the simulation results in this manuscript. All authors read and approved the final manuscript.
Authors’ information
Min Ouyang received his B.S. degree in Communication Engineering from Jilin University, China, in 2014. He is currently working toward the Ph.D. degree in Communication Engineering in the same university by postgraduate recommendation. He has been devoted to researching on capacity analysis for wireless networks. His current research interests include capacity analysis and stochastic geometry modeling in wireless networks.
Wenxiao Shi received the B.S. degree in Communication Engineering from Changchun Institute of Posts and Telecommunications, China, in 1983; the M.S. degree in Electrical Engineering from Harbin Institute of Technology, China, in 1991; and the Ph.D. degree in Communication and Information Systems from Jilin University, China, in 2006. He is a Professor in the College of Communication Engineering, Jilin University, China, since 2000. His research interests include radio resource management, access control and load balance of heterogeneous wireless networks, wireless mesh networks, free-space optical communication, mobile edge computing, etc.
Corresponding author
Ethics declarations
Competing interests
The authors declare that they have no competing interests.
Additional information
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Ouyang, M., Shi, W., Zhang, R. et al. Optimal interference range for minimum Bayes risk in binomial and Poisson wireless networks. J Wireless Com Network 2019, 247 (2019). https://doi.org/10.1186/s13638-019-1585-z
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13638-019-1585-z