Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and...

15
Interference Functionals in Poisson Networks Udo Schilcher, Stavros Toumpis, Member, IEEE, Martin Haenggi, Fellow, IEEE, Alessandro Crismani, G¨ unther Brandner, Christian Bettstetter, Senior Member, IEEE Abstract—We propose and prove a theorem that allows the calculation of a class of functionals on Poisson point processes that have the form of expected values of sum-products of functions. In proving the theorem, we present a variant of the Campbell-Mecke theorem from stochastic geometry. We proceed to apply our result in the calculation of expected values involving interference in wireless Poisson networks. Based on this, we derive outage probabilities for transmissions in a Poisson network with Nakagami fading. Our results extend the stochastic geometry toolbox used for the mathematical analysis of interference-limited wireless networks. Index Terms—Wireless networks, stochastic geometry, inter- ference, correlation, Poisson point process, Rayleigh fading, Nakagami fading, time diversity. I. I NTRODUCTION AND CONTRIBUTIONS I NTERFERENCE in wireless networks occurs if the com- munication from a transmitter to a receiver is disturbed by additional nodes transmitting in the vicinity of the receiver on the same frequency band and at the same time. Interference occurs even if code division multiple access (CDMA) is used, in which case multiple users are not separated in time or space but though the use of spreading codes; in this case, as well, interference powers, albeit reduced by the spread- ing, add up at the receiver. Interference can be mitigated or even exploited [1], [2] in networks with central entities using scheduling and signal processing techniques, such as multiuser detection [3] and interference cancellation [4]. In non-centralized systems, however, when no dedicated control entities can regulate the access to the shared wireless medium, interference remains a performance-limiting factor, partly be- cause it is subject to considerable uncertainty [5]. For these reasons, the stochastic modeling of interference in wireless networks — in particular its dynamic behavior over time and space [6]–[8], which we will refer to in this work as the interference dynamics — has recently attracted the interest of the research community. Temporal and spatial dependencies introduced by interference cause the events that different transmissions are correctly decoded to be dependent, which in turn influences system performance. It leads to reduced Udo Schilcher, G¨ unther Brandner, and Christian Bettstetter are with the Institute of Networked and Embedded Systems, University of Klagenfurt, Klagenfurt, Austria. E-Mail: [email protected] Stavros Toumpis is with the Department of Informatics, Athens University of Economics and Business, Athens, Greece. Martin Haenggi is with the Department of Electrical Engineering, Univer- sity of Notre Dame, IN, USA and with the ´ Ecole Polytechnique F´ ed´ erale de Lausanne (EPFL), Switzerland. Alessandro Crismani was with the Institute of Networked and Embedded Systems, University of Klagenfurt, Klagenfurt, Austria, and is now with u- blox, Trieste, Italy. Copyright (c) 2015 IEEE. Personal use of this mate- rial is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to pubs- [email protected] diversity [9] and degraded performance of many communica- tion techniques, such as cooperative relaying, multiple-input multiple-output (MIMO), and medium access protocols [8], [10], [11]. When modeling interference and its dynamics in wireless networks, researchers often use tools from stochastic geom- etry [12]. These tools include the Campbell-Mecke theorem, Campbell’s theorem, and expressions for the probability gener- ating functional (pgfl) (see [13]–[15]) applied to Poisson point processes (PPPs). A comprehensive overview on applying stochastic geometry to the analysis of wireless networks can be found in books by Baccelli and Blaszczyszyn [16], [17] and by Haenggi [13]. The article at hand extends the tools of stochastic ge- ometry by calculating general sum-product functionals for PPPs. While proving our results, we present a variant of the Campbell-Mecke theorem applied to PPPs. Furthermore, we apply our results to calculate expected values that occur in the analysis of the interference in wireless networks. Notably, we derive link outage probabilities in a Poisson network with Nakagami fading [18] caused by multipath propagation. A. Related Work In networks, in which the nodes’ locations are modeled via a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore, we call such networks Poisson networks. This class of net- works was the first in which the correlation of interference levels at different times and locations was analytically studied. Notably, mathematical expressions for interference dynamics are presented in [6], [7], [19], [20]. Analytical studies of cooperative diversity under correlated interference are per- formed in [8], [10], [11], [21], [22] using different assump- tions concerning diversity combining (selection combining and maximum ratio combining) and small-scale fading (Rayleigh and Nakagami fading). In Poisson networks, many different research works study the impact of interference dynamics on network performance. The article [23] investigates the effects of the channel model and scheduling on the SIR, the outage probability, and the transmission capacity. From a more theoretical perspective, the diversity gain of retransmissions under correlated interference is analyzed in [9] by means of diversity polynomials. Results show that the diversity gain is equal to unity even for lightly correlated interference despite independently fading channels in each transmission. The impact of node mobility on interference dynamics is investigated in [24]. The authors conclude that mobility not only reduces the temporal correlation of the interference but affects other statistics as well (e.g., it changes the expected value of interference).

Transcript of Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and...

Page 1: Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore,

Interference Functionals in Poisson NetworksUdo Schilcher, Stavros Toumpis, Member, IEEE, Martin Haenggi, Fellow, IEEE, Alessandro Crismani, Gunther

Brandner, Christian Bettstetter, Senior Member, IEEE

Abstract—We propose and prove a theorem that allows thecalculation of a class of functionals on Poisson point processesthat have the form of expected values of sum-products offunctions. In proving the theorem, we present a variant of theCampbell-Mecke theorem from stochastic geometry. We proceedto apply our result in the calculation of expected values involvinginterference in wireless Poisson networks. Based on this, wederive outage probabilities for transmissions in a Poisson networkwith Nakagami fading. Our results extend the stochastic geometrytoolbox used for the mathematical analysis of interference-limitedwireless networks.

Index Terms—Wireless networks, stochastic geometry, inter-ference, correlation, Poisson point process, Rayleigh fading,Nakagami fading, time diversity.

I. INTRODUCTION AND CONTRIBUTIONS

INTERFERENCE in wireless networks occurs if the com-munication from a transmitter to a receiver is disturbed by

additional nodes transmitting in the vicinity of the receiver onthe same frequency band and at the same time. Interferenceoccurs even if code division multiple access (CDMA) is used,in which case multiple users are not separated in time orspace but though the use of spreading codes; in this case,as well, interference powers, albeit reduced by the spread-ing, add up at the receiver. Interference can be mitigatedor even exploited [1], [2] in networks with central entitiesusing scheduling and signal processing techniques, such asmultiuser detection [3] and interference cancellation [4]. Innon-centralized systems, however, when no dedicated controlentities can regulate the access to the shared wireless medium,interference remains a performance-limiting factor, partly be-cause it is subject to considerable uncertainty [5].

For these reasons, the stochastic modeling of interferencein wireless networks — in particular its dynamic behavior overtime and space [6]–[8], which we will refer to in this work asthe interference dynamics — has recently attracted the interestof the research community. Temporal and spatial dependenciesintroduced by interference cause the events that differenttransmissions are correctly decoded to be dependent, whichin turn influences system performance. It leads to reduced

Udo Schilcher, Gunther Brandner, and Christian Bettstetter are with theInstitute of Networked and Embedded Systems, University of Klagenfurt,Klagenfurt, Austria. E-Mail: [email protected]

Stavros Toumpis is with the Department of Informatics, Athens Universityof Economics and Business, Athens, Greece.

Martin Haenggi is with the Department of Electrical Engineering, Univer-sity of Notre Dame, IN, USA and with the Ecole Polytechnique Federale deLausanne (EPFL), Switzerland.

Alessandro Crismani was with the Institute of Networked and EmbeddedSystems, University of Klagenfurt, Klagenfurt, Austria, and is now with u-blox, Trieste, Italy. Copyright (c) 2015 IEEE. Personal use of this mate-rial is permitted. However, permission to use this material for any otherpurposes must be obtained from the IEEE by sending a request to [email protected]

diversity [9] and degraded performance of many communica-tion techniques, such as cooperative relaying, multiple-inputmultiple-output (MIMO), and medium access protocols [8],[10], [11].

When modeling interference and its dynamics in wirelessnetworks, researchers often use tools from stochastic geom-etry [12]. These tools include the Campbell-Mecke theorem,Campbell’s theorem, and expressions for the probability gener-ating functional (pgfl) (see [13]–[15]) applied to Poisson pointprocesses (PPPs). A comprehensive overview on applyingstochastic geometry to the analysis of wireless networks canbe found in books by Baccelli and Błaszczyszyn [16], [17]and by Haenggi [13].

The article at hand extends the tools of stochastic ge-ometry by calculating general sum-product functionals forPPPs. While proving our results, we present a variant of theCampbell-Mecke theorem applied to PPPs. Furthermore, weapply our results to calculate expected values that occur inthe analysis of the interference in wireless networks. Notably,we derive link outage probabilities in a Poisson network withNakagami fading [18] caused by multipath propagation.

A. Related WorkIn networks, in which the nodes’ locations are modeled

via a Poisson point process and that employ ALOHA, theinterferers’ locations form a Poisson point process. Therefore,we call such networks Poisson networks. This class of net-works was the first in which the correlation of interferencelevels at different times and locations was analytically studied.Notably, mathematical expressions for interference dynamicsare presented in [6], [7], [19], [20]. Analytical studies ofcooperative diversity under correlated interference are per-formed in [8], [10], [11], [21], [22] using different assump-tions concerning diversity combining (selection combining andmaximum ratio combining) and small-scale fading (Rayleighand Nakagami fading). In Poisson networks, many differentresearch works study the impact of interference dynamicson network performance. The article [23] investigates theeffects of the channel model and scheduling on the SIR, theoutage probability, and the transmission capacity. From a moretheoretical perspective, the diversity gain of retransmissionsunder correlated interference is analyzed in [9] by means ofdiversity polynomials. Results show that the diversity gainis equal to unity even for lightly correlated interferencedespite independently fading channels in each transmission.The impact of node mobility on interference dynamics isinvestigated in [24]. The authors conclude that mobility notonly reduces the temporal correlation of the interference butaffects other statistics as well (e.g., it changes the expectedvalue of interference).

Page 2: Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore,

2

Similar results can also be derived for cellular networks, ifwe assume Poisson distributed base stations. In this case, aswell, interference is correlated across time and space, and itsdynamics should be carefully taken into consideration whendesigning a system. For example, in [25] it is shown how inter-cell interference coordination and intra-cell diversity impactthe performance of a cellular network. In particular, it is shownthat, depending on the SIR regime under consideration, oneor the other of these techniques should be selected. Further,in [26] coordinated multipoint transmissions in cellular net-works are analyzed; by employing the coverage probabilityas a performance metric, the authors show that multipointtransmissions are more beneficial for the worst-case user thanfor the average user.

There is currently not as much theoretical work available oninterference dynamics for Poisson networks employing carrier-sense multiple access (CSMA). When modeling CSMA, aminimum distance between sending nodes is introduced, whichis typically modeled by hard-core processes.

Matern’s model is based on a dependent thinning processof a PPP, where each point is marked with a random num-ber and the point with the highest number within a certainrange is sustained; the others are removed. It is applied formodeling CSMA networks in many different publications:The authors of [17] derive some theoretical results on thismodeling assumption, although a comprehensive analysis ofthe interference dynamics is still subject to future work. Themean interference in CSMA networks is discussed in [27]. Ananalysis of coverage and throughput per user in IEEE 802.11networks based on Matern’s model is presented in [28]; theresults of this analysis are also used to solve some optimizationproblems. In [29] an analysis of dense CSMA networks ispresented; the authors employ performance metrics such asaverage throughput to show that different spatial models leadto a significant change in network performance.

Approaches not based on Matern’s model have also beenconsidered. For example, a modified hard-core point processis proposed in [30] to model the transmitters in a CSMAnetwork; the authors derive closed-form solutions that approx-imate mean and variance of the interference; a simulationshows the accuracy of their approximations. Also, in [31]the authors discuss how to model the spatial distribution oftransmitting nodes showing that simple sequential inhibitionprocesses are more accurate for modeling CSMA networksthan Matern’s model.

Work on how to design protocols that take advantage of theknowledge about interference correlation is still very sparse.For example, in [32] its impact on MAC protocol design isdiscussed. We therefore work toward a better understandingof the impact of correlated interference by presenting verygeneral results on interference functionals.

In the article at hand we present mathematical tools thatallow researchers to further generalize the modeling assump-tions when studying interference dynamics. This allows to gaininsights on interference dynamics in realistic scenarios.

B. Summary of Contributions

The main contributions of this article are as follows. Firstly,in Section II we provide and prove a theorem for calculatinga functional that has the form of the expected value ofa combined sum and product of functions over a PPP. Inparticular, let us consider a PPP Φ on Rn with a locallyfinite and diffuse intensity measure Λ and q + 1 non-negativemeasurable functions fi, g : Rn × X → R with X ⊆ R,i ∈ [q] = {1, . . . , q}, and g(x, χ) ≤ 1 for all x ∈ Rnand χ ∈ X . Let the exponents pi for i ∈ [q] (q ∈ N)be non-negative integers. We assume 0 ∈ N throughout thearticle. Finally, let X = (Xu) for all u ∈ Φ be X -valuedi.i.d. random marks to the points in Φ. These marks can beused to model, e.g., the effects of multi-path propagation inan wireless network. Throughout this article, the notation EXindicates that the expected value is calculated with respect toX . Our contribution is to calculate the functional

EΦ,X

[q∏i=1

(∑u∈Φ

fi(u,Xu)

)pi ∏u∈Φ

g(u,Xu)

]. (1)

In the following, we call functionals of this form sum-productfunctionals. The expression we arrive at is given in (16) ofTheorem 1. As part of the proof, we also present a variant ofthe Campbell-Mecke theorem applied to PPPs in Lemma 1.

Secondly, in Section III we apply this result to deriveexpressions for certain functionals related to interference inwireless networks with slotted ALOHA. In particular, weconsider a setting where the interference power at the origin oat time slot i is Ii =

∑u∈Φ hi(u) `(u)1

(u ∈ Φi) with hi(u)

being the fading coefficient for node u at time slot i (assumedto be temporally and spatially i.i.d.), `(u) being the path gainof node u, and 1

(u ∈ Φi) being the indicator function with

Φi ⊆ Φ denoting the nodes transmitting at time slot i. We areable to calculate

EΦ,h,1

[q∏i=1

Ipii exp(− cIi

)](2)

for some constant c ∈ R and p = (p1, . . . , pq) ∈ Nq . Here, theexpectation is taken over the PPP Φ, the fading coefficientsh, and the indicator function 1. We call functionals of thisform interference functionals. The result is given in (23) ofTheorem 2. We then highlight some special cases particularlyuseful to wireless communications by employing commonlyused models for path loss and small-scale fading into thegeneral result of (2). For example, for a stationary PPP, thesingular path loss model `s(u) = ‖u‖−α2 with path lossexponent α, Rayleigh fading, and slotted ALOHA, we obtain

EΦ,h,1[I exp(−I)] =δ2λπ2 exp

(− δλπ2

sin(δπ)

)sin (δπ)

(3)

with δ = 2α . Other examples can be obtained by substituting

the expressions presented in Table III into (25).Finally, in Section IV we show how these results can be

used in the performance analysis of wireless networks. Forexample, we derive the probability of a successful reception ina Poisson network with Nakagami fading, where the reception

Page 3: Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore,

3

is successful iff the signal-to-interference ratio (SIR) is abovea certain threshold θ. The result is given in (35). We alsoderive the joint probability for the successful reception of twotransmissions at the same receiver in different time slots.

II. SUM-PRODUCT FUNCTIONALS ON PPPS

A. Theorems from Stochastic Geometry

Let Φ denote a PPP on Rn with a locally finite and diffuseintensity measure Λ. Stochastic geometry provides a set ofhelpful tools to calculate certain expected values involvingΦ. One well-known tool is Campbell’s theorem (see [13],Section 4.5), which states that

[∑u∈Φ

f(u)

]=

∫Rnf(x) Λ(dx) (4)

for any non-negative measurable function f on Rn. Anothertool is the following theorem on probability generating func-tionals (pgfls) of PPPs (see [13], Section 4.6):

[ ∏u∈Φ

g(u)

]= exp

(−∫Rn

(1− g(x)

)Λ(dx)

)(5)

for any measurable function g on Rn with 0 ≤ g(x) ≤ 1for all x such that the integral in (5) is finite. A third tool isthe following form of the Campbell-Mecke theorem (see [13],Section 8.4), which is a combination of (4) and (5) and states

[∑u∈Φ

f(u)∏v∈Φ

g(v)

]= (6)

exp

(−∫Rn

(1− g(x)

)Λ(dx))∫

Rnf(x)g(x) Λ

(dx).

These theorems are very helpful in the analysis of wirelessnetworks and many other systems. None of them, however,can be applied to calculate an expected value of the formgiven in (1). Such expected values are required in the analysisof wireless networks with interference, e.g., when calculatingthe outage probabilities under Nakagami fading. We thereforeprovide an expression for (1) in this section.

B. Higher-order Campbell-Mecke Theorem for PPPs

In the following we prove two variants of the higher-orderCampbell-Mecke theorem [13] for PPPs (which is a specialcase of Corollary 9.2.3 in [16]).

Lemma 1 (Higher-order Campbell-Mecke Theorem forPPPs): Let Φ denote a PPP with a locally finite and diffuseintensity measure Λ. Further, let f : Rnd ×N → R+ denotea measurable function, where N is the space of countingmeasures. Then we have

6=∑u∈Φd

f(u,Φ)

= (7)∫Rn. . .

∫Rn

∫Nf(x, ϕ)P{x1,...,xd}(dϕ)Λ(dx1) · · ·Λ(dxd) ,

where the symbol 6= on top of the sum denotes summing onlyover u = (u1, . . . , ud) with ui 6= uj for all i 6= j. Further, x =

(x1, . . . , xd) and P{x1,...,xd} denotes the Palm distribution ofΦ with respect to the points x1, . . . , xd.

Proof: We get the result by iteratively applying theCampbell-Mecke theorem [13]:

6=∑u∈Φd

f(u,Φ)

(8)

(a)= EΦ

[ ∑u1∈Φ

∑u2∈Φ\{u1}

· · ·∑

ud∈Φ\{u1,...,ud−1}

f((u1, . . . , ud),Φ

)](b)=

∫N

∑u1∈Φ

∑u2∈Φ\{u1}

· · ·∑

ud∈Φ\{u1,...,ud−1}

f((u1, . . . , ud), ϕ

)P (dϕ)

(c)=

∫Rn

∫N

∑u2∈ϕ

· · ·∑ud∈ϕ

f((x1, u2, . . . , ud), ϕ

)P{x1}(dϕ)Λ(dx1)

(d)=

∫Rn· · ·∫Rn

∫Nf((x1, . . . , xd), ϕ

)P{x1,...,xd}(dϕ)Λ(dx1) · · ·Λ(dxd) ,

where (a) holds due to the definition of∑6=; in (b) we

substitute the definition of the expected value over Φ; andin (c) and (d) we apply the Campbell-Mecke theorem.

Corollary 1: With the same assumptions as in Lemma 1 andf : Rn ×N → R+ we have

∑U⊆Φ|U|=d

∏u∈U

f(u,Φ)

(9)

=1

d!

∫Rn. . .

∫Rn

∫N

d∏i=1

f(xi, ϕ)P{x1,...,xd}(dϕ)

Λ(dx1) · · ·Λ(dxd) .

Proof: We have

∑U⊆Φ|U|=d

∏u∈U

f(u,Φ)

=1

d!EΦ

6=∑u∈Φd

d∏i=1

f(ui,Φ)

,

(10)since the sum on the right hand side considers each productof the left hand side exactly d! times due to the ordering ofthe elements and since the coordinates are distinct. ApplyingLemma 1 yields the result.

C. Sum-Product Functionals on PPPs

In this section we derive an expression for the expectedvalue given in (1). The following lemma serves as preparation.

Lemma 2: Let U ⊆ Rn be a countable set and q ∈ N. Letthe vector of exponents p = (p1, . . . , pq) ∈ Nq with ‖p‖1 =∑qi=1 pi. We assume ‖p‖1 > 0. Further, let pc(i) =

∑ij=1 pj

for all i ∈ [q] be the cumulative sum of the exponents pi;we set pc(0) = 0. Let u =

(u(1), . . . , u(q)

)∈ U‖p‖1 with

Page 4: Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore,

4

u(i) =(upc(i−1)+1, . . . , upc(i)

). Finally, let fi : Rn → R with

1 ≤ i ≤ q be non-negative functions. Then we have∑u∈U‖p‖1

q∏i=1

pi∏j=1

fi

(u

(i)j

)(11)

=

min(‖p‖1,|U |)∑l=1

∑M∈Mp

l

CM∑V⊆U|V |=l

q∏i=1

l∏j=1

fmiji

(vj),

where Mpl ⊆ Nq×l is the class of all q× l matrices for which

the columns ‖m·j‖1 > 0 for j = [l] and the rows ‖mi·‖1 = pifor all i = [q], M = (mij) with 1 ≤ i ≤ q and 1 ≤ j ≤ l,and V = {v1, . . . , vl} without any specific ordering and thevariable CM is defined as

CM =

q∏i=1

pi!∏lj=1mij !

. (12)

Proof: We prove the lemma by showing that the sameproducts are summed on the left and on the right hand side.Note that all terms in each sum are non-negative and hence thesums on both sides are either absolutely convergent or divergeto infinity irrespective of the order of the summation; in bothcases we can exchange the order of the summation.

We define the function F (u) = (l, V,M), as follows: l isthe number of distinct coordinates of u, i.e., l = |{ui | 1 ≤ i ≤‖p‖1}|. Clearly, 1 ≤ l ≤ min(‖p‖1, |U |), covering the rangefrom all ui being the same to all ui being different. The set Vis the set of all distinct elements in u, i.e., V = {ui | 1 ≤ i ≤‖p‖1}. Hence, V ⊆ U with |V | = l. We denote the elementsof V = {v1, . . . , vl} without any specific ordering. The matrixM is of size q × l with entries mij , defined as follows: mij

is the number of coordinates in the vector u(i) that are equalto vj , i.e., mij = |{k |u(i)

k = vj , 1 ≤ k ≤ pi}|. Note thatthese numbers must sum to

∑lj=1mij = pi for all i ∈ [q],

and each element vj must occur at least once in the product,i.e.,

∑qi=1mij > 0 for all j ∈ [l].

The function F (u) is not injective, i.e., there can be differentvectors u 6= u′ with F (u) = F (u′). Let (l, V,M) be arbitrary,but fixed. In the following we calculate the size of the preim-age F−1(l, V,M). Toward this goal, let u ∈ F−1(l, V,M) bean arbitrary member of this preimage. Further, let us use thenotation

f⊗i(u(i))

=

pi∏j=1

fi

(u

(i)j

). (13)

Observe that the product∏qi=1 f

⊗i

(u(i))

is invariant to per-mutations inside the vectors u(i). For each u(i), the numberof such permutations is pi!, but whether such permutationsactually result in a different u(i) (and thus u) depends on howmany distinct elements of U appear in u(i). This is determinedby the ith row of M . Hence, the number of permutationsresulting in a different u(i) is

di =pi!∏l

j=1mij !. (14)

The number of permutations of u, which lead to thesame products (13) is hence CM =

∏qi=1 di. Hence, the

preimage F−1(l, V,M) of a given vector (l, V,M) contains|F−1(l, V,M)| = CM =

∏qi=1 di elements. Note that the

union of all these preimages gives U‖p‖1 .Each of the elements in a preimage leads to the same

product on the left hand side of (11), i.e.,

q∏i=1

f⊗i(u(i))

=

q∏i=1

l∏j=1

fmiji

(vj). (15)

Hence, in the right hand side we sum over all combinations(l, V,M), for each combination multiplying one element ofthe corresponding preimage F−1(l, V,M) by the size CM ofthis preimage.

Next, we state our main result on sum-product functionalson PPPs of the general form (1).

Theorem 1 (Sum-product functionals for PPPs): Let Φ bea PPP with a locally finite and diffuse intensity measure Λ.Also, let fi, g : Rn × X → R with X ⊆ R and 1 ≤ i ≤ qbe non-negative measurable functions with g(x) ≤ 1 for allx ∈ Rn and pi ∈ N with ‖p‖1 > 0. Furthermore, let X· =(Xu : u ∈ Φ) be a family of X -valued i.i.d. random marks ofthe points in Φ. Then we have

EΦ,X·

[q∏i=1

(∑u∈Φ

fi(u,Xu)

)pi ∏v∈Φ

g(v,Xv)

](16)

= exp

(−∫Rn

(1− EX

[g(x,X)

])Λ(dx)

)E|Φ|

[min(‖p‖1,|Φ|)∑

l=1

∑M∈Mp

l

CMl!

l∏i=1

∫Rn

EX

[g(x,X)

q∏j=1

fmijj (x,X)

]Λ(dx)

],

where X denotes a random variable with the same distributionas the i.i.d. random variables Xu. Further,Mp

l is the class ofall q × l matrices with non-negative integer entries for whichthe columns ‖m·j‖1 > 0 for j ∈ [l] and the rows ‖mi·‖1 = pifor all i ∈ [q], and CM =

∏qr=1

pr!∏ls=1 mrs!

. Note that the

expected value E|Φ| can be omitted iff Λ(Rn)

=∞ a.s.Proof:

EΦ,X·

[q∏i=1

(∑u∈Φ

fi(u,Xu)

)pi ∏v∈Φ

g(v,Xv)

](17)

(a)= EΦ,X·

∑u∈Φ‖p‖1

q∏i=1

pi∏j=1

fi

(u

(i)j , X

u(i)j

) ∏v∈Φ

g(v,Xv)

(b)= EΦ,X·

[min(‖p‖1,|Φ|)∑

l=1

∑M∈Mp

l

CM∑U⊆Φ|U|=l

q∏i=1

l∏j=1

fmiji

(uj , Xuj

) ∏v∈Φ

g(v,Xv

)]

(c)= EK

min(‖p‖1,K)∑l=1

∑M∈Mp

l

CMEΦ,X·

[ ∑U⊆Φ|U|=l

q∏i=1

l∏j=1

Page 5: Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore,

5

fmiji

(uj , Xuj

) ∏v∈Φ

g(v,Xv

) ∣∣∣∣ |Φ| = K

](d)= EK

min(‖p‖1,K)∑l=1

∑M∈Mp

l

CMEΦ,X·

[ ∑U⊆Φ|U|=l

l∏j=1

g(uj , Xuj

) q∏i=1

fmiji

(uj , Xuj

)∏

v∈Φ\{uk}lk=1

g(v,Xv)

∣∣∣∣ |Φ| = K

](e)= EK

min(‖p‖1,K)∑l=1

∑M∈Mp

l

CMEΦ

[ ∑U⊆Φ|U|=l

l∏j=1

EX·

[g(uj , Xuj

) q∏i=1

fmiji

(uj , Xuj

)]∏

v∈Φ\{uk}lk=1

EX· [g(v,Xv)]

∣∣∣∣ |Φ| = K

](f)= EK

min(‖p‖1,K)∑l=1

1

l!

∑M∈Mp

l

CM∫Rn. . .

∫Rn

∫NK

l∏j=1

EX·

[g(xj , Xj

) q∏i=1

fmiji

(xj , Xj

)]∏

v∈ϕ\{xk}lk=1

EX· [g(v,Xv)]P{xk}lk=1(dϕ)

Λ(dx1) · · ·Λ(dxl)

(g)= EK

min(‖p‖1,K)∑l=1

1

l!

∑M∈Mp

l

CM∫Rn. . .

∫Rn

l∏j=1

EX·

[g(xj , Xj

) q∏i=1

fmiji

(j,Xxj

)]∫NK

∏v∈ϕ

EX· [g(v,Xv)]P (dϕ)Λ(dx1) · · ·Λ(dxl)

= EK

min(‖p‖1,K)∑l=1

1

l!

∑M∈Mp

l

CMl∏

j=1

∫Rn

EX

[g(x,X

) q∏i=1

fmiji

(x,X

)]

[∏v∈Φ

EX [g(v,Xv)]

∣∣∣∣ |Φ| = K

]Λ(dx)

.In (a) we apply Lemma 3 presented in Appendix A, whereU = j(i) is defined as in Lemma 2. In (b) we have u ={u1, . . . , u‖p‖1} and Lemma 2 is applied; in (c) we conditionon the number of points |Φ|; in (d) we factor out all g(v)

from the rightmost product for which v = uj for some j.This is possible since all uj are distinct (This property madenecessary the use of Lemma 2). In (e) we move the expectedvalue of the random variables X inside the sum/product sincethe X are i.i.d. In (f), X and Xj denote i.i.d. random variableswith the same distribution as the marks Xu of Φ. Further, weapply Corollary 1, and P{xk}lk=1

denotes the Palm distributionof Φ conditioning on the points xk, k = 1, . . . , l. The symbolNK denotes the space of counting measures with at most Kpoints in all Borel sets B. Note that NK ⊆ N . (g) holds dueto Slivnyak’s theorem.

Calculating the probability generating functional accordingto (5) yields the result.

Note that in Theorem 1 there is no requirement that the fi aredifferent. Hence, without loss of generality we could set allpi = 1 and q = ‖p‖1 instead. We decided, however, to presentthe more general case, since it reduces the number of termsthat have to be evaluated on the right hand side due to thepowers mij .

D. Some Special Cases

We now highlight some special cases of Theorem 1, whichare of interest for the following sections.

Corollary 2 (Stationary PPPs): When the PPP is stationarywith intensity λ, under the same assumptions as in Theorem 1,we have

EΦ,X

[q∏i=1

(∑u∈Φ

fi(u,Xu)

)pi ∏u∈Φ

g(u,Xu)

](18)

= exp

(−λ∫Rn

(1− EX

[g(x,Xx)

])dx

) ‖p‖1∑l=1

∑M∈Mp

l

CMl!

l∏i=1

λ

∫Rn

EX

[g(x,Xx)

q∏j=1

fmijj (x,Xx)

]dx ,

where Mpl is the class of all q × l matrices with non-

negative integer entries for which the columns ‖m·j‖1 > 0for j ∈ [l] and the rows ‖mi·‖1 = pi for i ∈ [q], andCM =

∏qr=1

pr!∏ls=1 msr!

.Proof: Substituting Λ(B) = λµ(B) for all Borel sets

B ⊆ Rn, where µ(B) denotes the Lebesgue measure of B, inTheorem 1 yields the result.

Corollary 3 (Stationary PPPs with q = 1): When the PPPis stationary with q = 1, under the same assumptions as inTheorem 1, we have

EΦ,X

[(∑u∈Φ

f(u,Xu)

)p ∏u∈Φ

g(u,Xu)

](19)

= exp

(−λ∫Rn

(1− EX

[g(x,Xx)

])dx

) p∑l=1

∑M∈Mp

l

CMl!

l∏i=1

λ

∫Rn

EX

[g(x,Xx)fmi(x,Xx)

]dx ,

Page 6: Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore,

6

whereMpl is the class of all vectors of length l having strictly

positive integer coordinates which sum up to p, and CM =p!∏l

s=1 ms!.

Proof: Substituting q = 1 in Corollary 2 yields the result.

Corollary 4 (Stationary PPPs with q = 1 and p = 1):When the PPP is stationary and q = 1, p = 1, under thesame assumptions as in Theorem 1, we have

EΦ,X

[∑u∈Φ

f(u,Xu)∏u∈Φ

g(u,Xu)

](20)

= exp

(−λ∫Rn

(1− EX

[g(x,Xx)

])dx

∫Rn

EX

[f(x,Xx)g(x,Xx)

]dx .

Proof: Substituting p = 1 in Corollary 3 implies thatMp

l = {(1)} and CM = 1.Note that Corollary 4 also follows from the Campbell-Mecketheorem [13] as given in (6).

III. INTERFERENCE FUNCTIONALS

A. Modeling Assumptions

We consider a wireless network with interferers distributedaccording to a PPP Φ with a locally finite and diffuse intensitymeasure Λ. All interferers transmit with the same transmissionpower, which we set to one. Time is slotted, and slottedALOHA is employed for medium access control, i.e., eachnode in Φ accesses the channel in each time slot independentlywith a certain probability ℘. Let Φi ⊆ Φ denote the set ofinterferers that are active in slot i. The interference powerreceived at the origin o in slot i is modeled by

Ii =∑u∈Φ

hi(u)`(u)1(u ∈ Φi) . (21)

Here, 1 denotes the indicator function, i.e.,

1(u ∈ Φi) =

{1, u ∈ Φi,

0, else.(22)

The term `(u) denotes the path gain from node u to o,which is assumed to be a non-negative function that decreasesmonotonically with ‖u‖2 with lim‖u‖2→∞ `(u) = 0. Table Isummarizes some commonly used models for the path gain,where u ∈ Φ is an arbitrary point, α is the path lossexponent, and ε > 0. The fading coefficient hi(u) denotesthe channel fading state, i.e., hi(u) is a random variable thatfollows some distribution that depends on the fading model.Note that hi(u) are i.i.d. for different points u or differenttime slots i. We assume that the fading coefficients have anexpected value E[hi(u)] = 1. Table II shows various well-known fading models. The symbol Bk(x) denotes the secondmodified Bessel function.

TABLE IPATH GAIN MODELS

Model Expression

Singular model `s(u) = ‖u‖−α2

Minimum model `m(u) = min(1, ‖u‖−α2 )

ε model `ε(u) = 1ε+‖u‖α2

Distance+1 model `d(u) = 1(1+‖u‖2)α

TABLE IIFADING MODELS

Fading model Probability density function of the power, x ≥ 0

Rayleigh fh(x) = exp(−x)

Erlang fh(x) = xk−1 exp(−x)(k−1)!

for k ∈ N\{0}

Rice fh(x) = exp(−(x+ ψ)/2)(xψ

) k4− 1

2B k

2−1

(√ψx)

2

for k ∈ N and ψ ∈ R+

Nakagami fh(x) = xm−1 exp(−xm)Γ(m)

mm for m ∈ R+

B. The General Case

In the following we derive an expression for the expectedvalue E

[∏qi=1 I

pii exp

(− cIi

)]with general models for fad-

ing and path loss. This is an important result for analyzinginterference in wireless networks, as it occurs in the derivationof transmission success probabilities in many scenarios. Anexample is the success probability in Poisson networks withNakagami fading, as is presented in Section IV.

Theorem 2 (Interference functionals): Let c ∈ R be aconstant, p = (p1, . . . , pq) ∈ Nq with ‖p‖1 > 0, and let Iidenote the interference at the origin o at time slot i as definedin (21). Then we have

EΦ,h,1

[q∏i=1

Ipii exp(− cIi

)](23)

= exp

(−∫Rn

(1−

q∏j=1

(℘Ehj(x)

[exp

(− chj(x)`(x)

)]+1− ℘

))Λ(dx)

)E|Φ|

[min(‖p‖1,|Φ|)∑

l=1

∑M∈Mp

l

CMl!

l∏i=1

∫Rn

q∏j=1

(℘Ehj(x)

[exp

(− chj(x)`(x)

)(hj(x)`(x)

)mij ]+ (1− ℘)1(mij = 0)

)Λ(dx)

],

where Mpl is the class of all q× l matrices with non-negative

integer entries for which the columns ‖cj‖1 > 0 for j =1, . . . , l and the rows ‖ri‖1 = pi for all i = 1, . . . , q.Note that the term (1−℘)1(mij = 0) can be omitted if q = 1,since all exponents mij > 0.

Page 7: Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore,

7

TABLE IIIEXPECTED VALUES FOR DIFFERENT FADING MODELS. VALUES CAN BE SUBSTITUTED INTO (25).

Fading model Eh(x)[exp(−h(x)`(x)

)] Eh(x)[h(x)`(x) exp

(−h(x)`(x)

)]

Rayleigh 11+`(x)

`(x)

(1+`(x))2

Erlang with k = 2 1(1+`(x))2

2`(x)

(1+`(x))3

Erlang 1(1+`(x))k

k`(x)

(1+`(x))k+1

Rice exp(− ψ`(x)

1+2`(x)

) (1 + 2`(x)

)− k2 exp

(− ψ`(x)

1+2`(x)

)`(x)

k+ψ+2k`(x)(1+2`(x)

)2+ k2

Nakagami(

mm+`(x)

)m`(x)

(m

m+`(x)

)m+1

Proof: The proof is based on Theorem 1. We have

EΦ,h,1

[q∏i=1

Ipii exp(− cIi

)](24)

= EΦ,h,1

q∏i=1

Ipii

q∏j=1

exp(− cIj

)= EΦ,h,1

q∏i=1

Ipii exp

(− c

q∑j=1

Ij

)= EΦ,h,1

[q∏i=1

(∑u∈Φ

hi(u)`i(u)1(u ∈ Φi)

)pi

exp

(− c

q∑j=1

∑v∈Φ

hj(v)`j(v)1(v ∈ Φj)

)]

= EΦ,h,1

[q∏i=1

(∑u∈Φ

hi(u)`i(u)1(u ∈ Φi)

)pi∏v∈Φ

exp

(− c

q∑j=1

hj(v)`j(v)1(v ∈ Φj)

)](a)= exp

(−∫Rn

(1− Eh(x),1

[exp

(− c

q∑j=1

hj(x)

`j(x)1(x ∈ Φj)

)])Λ(dx)

)E|Φ|

[min(‖p‖1,|Φ|)∑

l=1∑M∈Mp

l

CMl!

l∏i=1

∫Rn

Eh(x),1

[exp

(− c

q∑j=1

hj(x)`j(x)

1(x ∈ Φj)

) q∏k=1

(hk(x)`k(x)1

(x ∈ Φk)

)mik]Λ(dx)

](b)= exp

(−∫Rn

(1−

q∏j=1

(℘Ehj(x)

[exp

(− chj(x)

`(x))]

+ 1− ℘))

Λ(dx)

)E|Φ|

[min(‖p‖1,|Φ|)∑

l=1

∑M∈Mp

l

CMl!

l∏i=1

∫Rn

q∏j=1

(℘Ehj(x)

[exp

(− chj(x)`(x)

)(hj(x)`(x)

)mij]+ (1− ℘)1(mij = 0)

)Λ(dx)

],

where (a) holds due to Theorem 1 with substi-tuting fi

(u, hi(u)

)= hi(u)`i(u), g

(u, h(v)

)=

exp(−c∑qj=1 hj(v)`j(v)

), and h(v) =

(h1(v), . . . , hq(v)

).

The terms 1(x ∈ Φj) denote Bernoulli random variables with

E[1(x ∈ Φj)

]= ℘. (b) holds due to the independence of the

fading coefficients hj(x) and 1(x ∈ Φj).

Note that, as in Theorem 1, we can omit E|Φ| iff Λ(Rn)

=∞ a.s.

C. Case Studies: Results for Specific Fading and Path LossModels

In the following we calculate the expected valueEΦ,h,1[I exp(−I)] for a stationary PPP Φ with intensity λ.This expression has to be evaluated when analyzing the outageprobability in certain scenarios, e.g., in the case of Nakagamifading with m = 2. We have

EΦ,h,1[I exp(−I)] (25)

= exp

(−℘λ

∫Rn

(1− Eh(x)

[exp

(− h(x)`(x)

)])dx

)℘λ

∫Rn

Eh(x)[h(x)`(x) exp(− h(x)`(x)

)] dx

as a special case of Theorem 2 with q = 1, p1 = 1, and c = 1.The expected values within the integrals depend on the

specific fading model. The results for the fading models inTable II and the singular path gain are presented in Table III.Substituting these expressions yields the final results.

As an example, for Rayleigh fading, the singular path gain,and a two-dimensional stationary PPP Φ with intensity λ wehave

EΦ,h,1[I exp(−I)] (26)

= ℘λ

∫R2

`(x)

(1 + `(x))2dx

exp

(−℘λ

∫R2

(1− 1

1 + `(x)

)dx

)= δκ exp (−κ) ,

where δ = 2α , κ = ℘λπ

sinc(δ) , and sinc(x) = sin(πx)πx . Fig. 1

shows a plot of (26) over the intensity λ for different pathloss exponents α with ℘ = 1. As can be seen, the expectedvalue possesses a peak at a certain density of interferers,which depends on α. For increasing densities the expected

Page 8: Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore,

8

0 0.2 0.4 0.6 0.80

0.1

0.2

0.3

Intensity λ

E[I

exp

(−I)]

α = 2.5

α = 3

α = 4

α = 5

Fig. 1. Expected value E[I exp(−I)] given in (26) over the intensity ofinterferers for different path loss exponents α with ℘ = 1.

value approaches zero, i.e., limλ→∞ E[I exp(−I)] = 0 for allα > 2.

For the special case of α = 4 (i.e., δ = 12 ) we get

EΦ,h,1[I exp(−I)] =1

4℘λπ2 exp

(−℘λπ

2

2

), (27)

which coincides with the result calculated using the pdf of theinterference (Equation (3.22) in [5]).

Next, we generalize this result by computing the expectedvalue E[Ik exp(−I)] for k ∈ N. As an intermediate result, fori ∈ N, the expected value Eh[(h(u)`(u))i exp

(− h(u)`(u)

)]

is given by

Eh[(h(u)`(u)

)iexp

(− h(u)`(u)

)]=

i! `i(u)(1 + `(u)

)i+1. (28)

Substituting this expression into (23) allows the calculation ofEΦ,h[Ik exp(−I)]. Some example expressions for k = 2, 3, 4are presented in (29), (30), and (31), respectively. Here, againδ = 2

α , κ = ℘λπsinc(δ) , and sinc(x) = sin(πx)

πx .Note that the results for calculating E[Ik exp(−I)] for

k ∈ N for Rayleigh fading can be generalized to any fadingdistribution with the property E[hδ] < ∞ due to the equiv-alence of the propagation process [33]. This can be done byreplacing λ by λ′ = λ

E[hδi (x)]Γ(δ+1) in (26), (27), and (29)-(31).

For example, in the case of Nakagami fading, where hi(x)follows a Gamma distribution (see Table II), the correspondingmoment is given by

E[hδi (x)] = mδ Γ(δ +m)

Γ(m). (32)

D. Derivations using the Laplace Transform

An alternative approach for deriving the expected valueE[Ik exp(−sI)

], for k ∈ N and s ∈ R+, which is a special

case of the results derived in the previous sections, is by

applying the Laplace transform of the interference (cf. [5]).We have

EΦ,h,1

[Ik exp(−sI)

]= (−1)kL

(k)I (s) , (33)

where LI(s) is the Laplace transform of the interference.As an example, we consider the Laplace transform for the

singular path-loss model and Rayleigh fading (see [5], (3.21))with transmitter density ℘λ given by

LI(s) = exp

(−℘λπsδ πδ

sin(πδ)

), (34)

with δ = 2/α. When taking the first derivative of thisexpression and evaluate −L′I(1), this yields (26). For thesecond, third and fourth derivative we get (29)-(31).

IV. TEMPORAL DEPENDENCE OF OUTAGE UNDERNAKAGAMI FADING

The temporal correlation of link outages under Rayleighfading has been derived in [9]. In the following we derivethe result for the more general Nakagami fading model. Forsimplicity we assume m ∈ N throughout this section.

A. Derivation of Outage Probabilities

In this section we apply the following network model: Asource S transmits data packets to a destination D within astationary Poisson field Φ of interferers with intensity λ. Letd = ‖D− S‖2 denote the distance between S and D. SlottedALOHA is employed, i.e., each interferer transmits in eachslot with probability ℘. Fading is assumed to be Nakagamiwith parameter m, i.e., h ∼ Γ(m, 1

m ) with m > 0. Let Akdenote the event that a transmission from S to D is successfulat slot k. We assume that the event Ak occurs iff SIR ≥ θfor some constant threshold θ, where SIR = hk`(d)

Ikdenotes

the signal-to-interference ratio. Here, Ik is defined as in (21).Further, let θSD = θ

`(d) denote the receiver threshold divided bythe path gain from S to D. We start by deriving an expressionfor P[Ak].

Theorem 3 (Transmission success probability): The successprobability of a single transmission assuming Nakagami fad-ing is

P[Ak] (35)

= exp

(−℘λ

∫R2

(1−

(1 + θSD`(x)

)−m)dx

)1 +

m−1∑i=1

1

i!

i∑l=1

∑M∈M(i)

l

CMl!

l∏j=1

℘λΓ(m+mj1)

Γ(m)

∫R2

(θSD`(x)

)mj1(1 + θSD`(x)

)m+mj1dx

,

where M(i)l ⊆ Nl is the set of vectors M ∈ M(i)

l that haveonly positive coordinates and ‖M‖1 = i.

Proof: The probability of the event Ak in an arbitrarytime slot k is given by

P[Ak] (36)

Page 9: Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore,

9

E[I2 exp(−I)] = exp (−κ)κ(δ(1− δ) + 2κδ

). (29)

E[I3 exp(−I)] = exp (−κ)κδ2(α− 1)(α− 2) + 2κ (6(α− 2) + 4κ)

α. (30)

E[I4 exp(−I)] = exp (−κ)κ4α(α− 1)(α− 2)(3α− 2) + 2κ (2α(α− 2)(11α− 14) + 8κ (3α(α− 2) + κα))

α5. (31)

= P[hk > θSDIk]

(a)= EΦ,h,1

[m−1∑i=0

1

i!(mθSDIk)

iexp (−mθSDIk)

]

=

m−1∑i=0

1

i!(mθSD)

iEΦ,h,1

[Iik exp (−mθSDIk)

](b)= exp

(−℘λ

∫R2

(1−

(1 + θSD`(x)

)−m)dx

)1 +

m−1∑i=1

1

i!

i∑l=1

∑M∈M(i)

l

CMl!

l∏j=1

℘λΓ(m+mj1)

Γ(m)

∫R2

(θSD`(x)

)mj1(1 + θSD`(x)

)m+mj1dx

,

where in (a) the sum representation of the ccdf of the gammadistribution for integer m is substituted. (b) holds due toTheorem 2 for i > 0 and (5) for i = 0. Further, we calculatethe expected values Eh (see Table III, Nakagami fading).

Note that in this section the letter m is used in two ways:we use m as the parameter for fading while mij indicates anelement in the matrix M .

Next, we derive the joint probability of success in twodifferent time slots r, s.

Theorem 4 (Joint transmission success probability): Letr, s ∈ N with r 6= s denote two time slots. Then the probabilityof transmission success in both slots is given by

P[Ar, As] (37)

= exp

(−λ∫R2

1−(℘(1 + θSD`(x)

)−m+ 1− ℘

)2

dx

)1 +

m−1∑i=0

m−1∑j=0i+j>0

1

i!j!

i+j∑l=1

∑M∈M(i,j)

l

CMl!

l∏k=1

λ

∫R2

(℘

Γ(m+mk1)(θSD`(x)

)mk1

Γ(m)(1 + θSD`(x)

)m+mk1+ (1− ℘)

1(mk1 = 0)

)(℘

Γ(m+mk2)(θSD`(x)

)mk2

Γ(m)(1 + θSD`(x)

)m+mk2

+(1− ℘)1(mk2 = 0)

)dx

with symbols defined as in Theorem 2. Here, 1(mk1 = 0)denotes the indicator variable being one for mk1 = 0, andelse zero.

Proof: We start the derivation by substituting the defini-tion of the events Ar and As and get

P[Ar, As] (38)= P[hr > θSDIr, hs > θSDIs]

= EΦ,h,1

m−1∑i=0

1

i!(mθSDIr)

iexp (−mθSDIr)

m−1∑j=0

1

j!(mθSDIs)

jexp (−mθSDIs)

=

m−1∑i=0

m−1∑j=0

1

i!j!(mθSD)

i+j

EΦ,h,1

[IirI

js exp (−mθSD(Ir + Is))

].

To be able to calculate this probability we have to derivean expression for the expected value in the last line. Herewe distinguish two cases: For the case i + j > 0 we applyTheorem 2, which gives

EΦ,h,1

[IirI

js exp (−mθSD(Ir + Is))

](39)

= EΦ,h,1

[(∑u∈Φ

hr(u)`(u)1(u ∈ Φr)

)i(∑v∈Φ

hs(v)`(v)1(v ∈ Φs)

)jexp

(−mθSD

∑w∈Φ

`(k)(hr(w)1

(w ∈ Φr) + hs(w)1

(w ∈ Φs)

))](a)= exp

(− λ

∫R2

(1−

(℘Ehr(x)

[exp

(−mθSDhr(x)

`(x))]

+ 1− ℘)(℘Ehs(x) [exp (−mθSDhs(x)`(x))]

+1− ℘))

dx

)i+j∑l=1

∑M∈M(i,j)

l

CMl!

l∏k=1

λ

∫R2

(℘Ehr(x)

[exp (−mθSDhr(x)`(x))

(hr(x)`(x)

)mk1]

+ (1− ℘)

1(mk1 = 0)

)(℘Ehs(x)

[exp (−mθSDhs(x)`(x))(

hs(x)`(x))mk2

]+ (1− ℘)1(mk2 = 0)

)dx

(b)= exp

(−λ∫R2

1−(℘(1 + θSD`(x)

)−m+ 1− ℘

)2

dx

)i+j∑l=1

∑M∈M(i,j)

l

CMl!

l∏k=1

λ

∫R2

Page 10: Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore,

10 (℘

Γ(m+mk1)(θSD`(x)

)mk1

Γ(m)(1 + θSD`(x)

)m+mk1+ (1− ℘)

1(mk1 = 0)

)(℘

Γ(m+mk2)(θSD`(x)

)mk2

Γ(m)(1 + θSD`(x)

)m+mk2

+(1− ℘)1(mk2 = 0)

)dx ,

In the above expression, (a) holds due to Theorem 2, wherep = (i, j), and in (b) we calculated the expected values of thegamma distributed random variables h ∼ Γ

(m, 1

m

).

For the case i+ j = 0 we apply (5), such that

EΦ,h,1 [exp (−mθSD(Ir + Is))] (40)

(a)= exp

− λ ∫R2

(1−

(℘Ehr(x)

[exp

(−mθSDhr(x)

`(x))]

+ 1− ℘)

(℘Ehs(x) [exp (−mθSDhs(x)`(x))] + 1− ℘

))dx

(b)= exp

(− λ

∫R2

1−(℘(1 + θSD`(x)

)−m+1− ℘

)2

dx

).

Here, (a) holds due to (5) and in (b) we calculate the expectedvalues over h ∼ Γ

(m, 1

m

).

If we, for example, substitute the singular path-loss modelinto (35), we get the following result.

Corollary 5 (Transmission success probability with singularpath loss): For the singular path loss model `(x) = ‖x‖−α2

we have

P[Ak] = exp

(−℘λ πθ

δSDΓ(1− δ)Γ(m+ δ)

Γ(m)

)(41)(

1 +m−1∑i=1

1

i!

i∑l=1

(℘λδπθδSDΓ(m+ δ)

Γ(m)

)l∑

M∈M(i)l

CMl!

l∏j=1

Γ(mj1 − δ)

).

Proof: Substituting `(x) = ‖x‖−α2 into Theorem 3 yieldsthe result.

Next, we substitute the singular path-loss model and ℘ = 1into (37).

Corollary 6 (Joint transmission success probability withsingular path loss): For the singular path loss model `(x) =‖x‖−α2 and ℘ = 1 we have

P[Ar, As] (42)

= exp

(−λπθ

δSDΓ(1− δ)Γ(2m+ δ)

Γ(2m)

)1 +

m−1∑i=0

m−1∑j=0i+j>0

1

i!j!

i+j∑l=1

(λδπθδSDΓ(2m+ δ)

Γ2(m)

)l ∑M∈M(i,j)

l

CMl!

l∏k=1

Γ(m+mk1)Γ(m+mk2)Γ(mk1 +mk2 − δ)Γ(mk1 +mk2 + 2m)

.

Proof: Substituting `(x) = ‖x‖−α2 and ℘ = 1 intoTheorem 4 yields the result.

B. Outage Probability for the Singular Path Loss

In the following, plots of (41) and (42) are presented.Fig. 2 shows the outage probability P[Ak] = 1− P[Ak] overthe interferers’ intensity λ. The following observations canbe made: Firstly, the outage probability is higher for higherintensity λ and hence higher interference, with a non-lineardependence. In the limit, the outage probability approachesone, i.e., limλ→∞(1− P[Ak]) = 1. Secondly, for high valuesof the path loss exponent α the attenuation of both the received

0.005 0.01 0.015 0.02 0.025 0.0310−3

10−2

10−1

1

Intensity λ

Out

age

prob

abili

tyP

[Ak]

α = 2.5

α = 3

α = 4

α = 5

Fig. 2. Outage probability P[Ak] given in (41) over the interferer intensityλ. Lines indicate the theoretical results while marks are simulation results.Parameters are m = 3, θ = 0.5, and d = 2.

2 2.5 3 3.5 40

0.1

0.2

0.3

0.4

0.5

0.6

0.7

Path loss exponent α

Succ

ess

prob

abili

tyP

[Ak]

m = 1

m = 2

m = 3

m = 4

m = 5

Fig. 3. Transmission success probability P[Ak] given in (41) over the pathloss exponent α. Parameters are λ = 0.03, θ = 1, and d = 2.

Page 11: Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore,

11

0.02 0.04 0.06 0.08 0.110−3

10−2

10−1

1

Intensity λ

Out

age

prob

abili

tyP

[Ak]

m = 1

m = 2

m = 3

m = 4

m = 5

Fig. 4. Outage probability P[Ak] given in (41) over the interferer intensityλ. Parameters are α = 3, θ = 0.5, and d = 2.

2 3 4 510−2

10−1

1

Path loss exponent α

Out

age

prob

abili

tyP

[Ak]

m = 1

m = 2

m = 3

m = 4

m = 5

Fig. 5. Outage probability P[Ak] given in (41) over the path loss exponentα. Parameters are λ = 0.01, θ = 0.5, and d = α

√4, i.e., the mean power of

the desired signal is 1/4.

signal and the interference is higher than for low values. In thescenario presented in Fig. 2, the attenuation effect is strongerfor interference than for the received signal. Hence, the outageprobability is lower for high path loss exponents α.

In addition to the theoretical results, Fig. 2 also showssimulation results. As can be seen, simulations and theory doindeed match very well. Only for the case α = 2.5 simulationsdeviate slightly from the theoretical curve. This is due to thefact that for values of α close to 2 the simulation area has tobe extremely large to obtain exact results. However, such largeareas exceed the computational capabilities of our computers.

Fig. 3 shows the impact of the path loss exponent α on thesuccess probability. As can be seen, the dependence of P[Ak]on α is monotonic for the plotted parameters. For α closeto two the success probability is very low and approachingzero, as expected in case of a stationary PPP of interferers

on the plane; for higher values it is monotonically increasing.If we further increase α beyond the range of the plot, thesuccess probability approaches a limiting value, which is givenby limα→∞ P[Ak] = exp(−µ) with µ = d2πλ being theexpected number of interferers in a circle with radius d aroundD. This behavior can be explained by recalling the modelingassumptions: A successful transmission is defined as the eventthat the SIR is above a certain threshold, i.e., neither considernoise nor receiver sensitivity. As the path loss gets large, thesuccess probability exhibits a hard-core behavior, since anynode closer to the receiver than the transmitter would causeoverwhelming interference. Hence, the success probability isequal to the probability that there is no interferer in the diskof radius d centered at the destination.

Another interesting observation can be made in Fig. 3: Thetwo parameters α and m have a joint impact on the successprobability. For small α, more severe fading, i.e., smallervalues of m, leads to high success probabilities. This can beexplained by the fact that small α lead to strong interference,which can be partly mitigated by harsh fading conditions.Hence, in this regime fading diminishes interference strongerthan it diminishes the received signal. For higher values of αthis trend is inverted. Here, although interference can still bereduced by severe fading, its impact on the received signal isdominant. In between there is a certain value of α for whichthe parameter m plays no role at all. This value depends onthe parameters λ, θ, and d.

Further, in Fig. 4 a plot of the outage probability over theinterferer intensity λ for different values of the Nakagamiparameter m is shown. Again, we see that for a certain valueof λ (which is at about λ = 0.0742), similar as for α inFig. 3, the curves for different m intersect at a common point.For densities λ below this threshold outage increases with m,while for λ above this threshold this trend is inverted.

Finally, Fig. 5 shows a plot of the outage probability overthe path loss exponent α for different values of m. The specialfeature of this plot is that the distance between transmitterand receiver d is chosen in a way such that dα = 4 overthe whole range of values for α. Again, the lines overlapat a common point, which is at about α = 2.1. Whenfurther increasing α, the difference of the outage probabilitiesfor different m increases to a maximum, and then startsdecreasing. When further increasing the path loss exponent α,with the given parameters the outage probability approachesthe limit limα→∞ P[Ak] ≈ 0.0309276, independent of m.

C. Joint Outage Probability for the Singular Path Loss

Next, we investigate the joint outage probability of twotransmissions in different time slots. Let therefore Ar denotethe complementary event of Ar, i.e., that the transmission inslot r is in outage. We can calculate the joint outage probabilityby P[Ar, As] = 1 − P[Ar] − P[As] + P[Ar, As], which isshown in Fig. 6. Overall, the plot shows similar trends as theone in Fig. 2, with the obvious difference that for the givenparameters the joint outage probability P[Ar, As] is smallerthan the outage probability 1−P[Ak] of a single transmissionfor all λ > 0.

Page 12: Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore,

12

0.005 0.01 0.015 0.02 0.025 0.0310−3

10−2

10−1

1

Intensity λ

Join

tou

tage

prob

abili

tyP

[Ar,A

s]

α = 2.5

α = 3

α = 4

α = 5

Fig. 6. Probability of two transmissions being in outage P[Ar, As] givenin (42) over interferer intensity λ. Lines indicate theoretical results whilemarks show simulation results. Parameters are m = 3, θ = 0.5, and d = 2.

0 0.02 0.04 0.06 0.08 0.10

0.2

0.4

0.6

0.8

1

Intensity λ

Succ

ess

prob

abili

ties

(P[Ak])

2,P

[Ar,A

s]

P[Ar, As], α = 5

P[Ar, As], α = 3

P[Ar, As], α = 2.5

(P[Ak])2, α = 5

(P[Ak])2, α = 3

(P[Ak])2, α = 2.5

Fig. 7. A comparison between the dependent interference case P[Ar, As]given in (42) and the independent interference case (P[Ak])2 given in (41)over interferer intensity λ. Lines indicate analytical results while marksindicate simulation results. Parameters are m = 3, θ = 0.5, and d = 2.

There is one small detail, which is very interesting inFig. 6: Similar to the impact of the fading parameter m (seeFig. 3), also the influence of the path loss exponent α onthe outage probability is determined by the values of otherparameters. In particular, for small intensities λ — in the lowinterference regime — lower path loss exponents are beneficial(left side of the plot). For high intensities λ — in the highinterference regime — this trend is inverted (right side of theplot). Here, high path loss exponents α significantly reduce theinterference; and this effect is stronger than the degradationof the received signal due to the higher α. Between these twoextremes there is a non-monotonic dependence on α, as canbe seen in the plot, e.g., for λ = 0.015.

Next, we compare the probability of two transmissions

0 0.02 0.04 0.06 0.08 0.10

0.2

0.4

0.6

0.8

1

Intensity λ

Succ

ess

prob

abili

ty

independent , α = 5

independent , α = 3

independent , α = 2.5

dependent , α = 5

dependent , α = 3

dependent , α = 2.5

Fig. 8. The probability that at least one out of two transmissions issuccessfully received over interferer intensity λ. Lines indicate independentinterference while marks indicate dependent interference. Parameters arem = 3, θ = 0.5, and d = 2.

both being successful for the following two cases: Firstly,interference is dependent due to the same set of interferers. Inthis case the joint success probability is given by P[Ar, As].Secondly, interference is assumed to be independent. Here,the joint success probability can be simply calculated by(P[Ak]

)2. This case is presented for comparison reasons and

to highlight the impact of correlated interference on the suc-cess probabilities. It resembles the scenario where interferersare mobile and the time slots a far away from each other. Aplot of these expressions is presented in Fig. 7. We can see thatfor equal parameters the dependent interference case alwaysshows higher values than the independent interference case.This effect stems from the positive correlation of interferencein the two time slots r and s. Similar effects occur in the caseof Rayleigh fading and cooperative relaying, as shown in [10].

Finally, we investigate the probability that at least one out oftwo transmissions is successful, again for both the dependentand the independent interference case. This scenario is some-times denoted as time diversity or retransmission scenario. Forthe dependent interference case, the probability of at least onesuccessful transmission is given by P[Ar]+P[As]−P[Ar, As].For the independent interference case, we can calculate thisprobability by 1− (1−P[Ak])2. A plot of these probabilitiesis presented in Fig. 8. As can be seen, the success probabilitiesfor independent interference are higher than the ones for thedependent interference. Note that it is the other way aroundin Fig. 7. This can be explained by the fact that for highlycorrelated interference (which is the case in the plot dueto ℘ = 1) the probability that at lease one transmissionis successful is approximately equal to P[Ar], and we haveP[Ar] < 1− (1− P[Ar])

2.

Note that the success probabilities monotonically depend onθ and hence similar trends will occur for different values of θ.

Page 13: Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore,

13

V. CONCLUDING REMARKS AND FUTURE WORK

Interference is considered to be one of the key factorslimiting the performance of wireless networks. A good modelof the interference and its space-time dynamics is an importantasset for performance assessments. This paper contributes tothis aspect in multiple ways.

Firstly, we extended the toolbox of stochastic ge-ometry to allow the calculation of very general func-tionals of PPPs. In particular, we proved a theoremthat provides an expression for the general functionalEΦ,X

[∏qi=1

(∑u∈Φ fi(u,Xu)

)pi∏u∈Φ g(u,Xu)

]. This re-

sult can be seen as an extension of the well-known Campbell-Mecke theorem for the PPP.

Secondly, we applied this general result, which has abroad range of applications, to interference in wireless net-works. This allowed us to calculate the expected valueE[∏q

i=1 Ipii exp

(− cIi

)]. This result can be applied to dif-

ferent scenarios: Similar expressions occur, e.g., when calcu-lating the outage probability of cooperative communications.

Thirdly, we highlighted one of these examples, namelycalculating the joint outage probability of several transmissionsunder Nakagami fading. This derivation holds for any path lossmodel; as a case study, we presented the result for the singularpath loss model. The intention is to sketch the path going fromthe general result to the final expression for a particular pathloss model.

Our goal for future work is to further extend the tools ofstochastic geometry for use in wireless settings. In particular,we will consider more sophisticated medium access, departingfrom ALOHA and aiming for CSMA. Modeling a CSMAnetwork will involve hard-core point processes, for whichfewer mathematical tools are available.

ACKNOWLEDGMENTS

This work has been supported by the Austrian Science Fund(FWF) grant P24480-N15 (Dynamics of Interference in Wire-less Networks) and KWF/EFRE grant 20214/20777/31602(Research Days), the European social fund, a research leavegrant from the University of Klagenfurt, and Greek nationalfunds through the program “Education and Lifelong Learning”of the NSRF program “THALES investing in knowledge soci-ety through the European Social Fund”. Also the support of theU.S. NSF (grant CCF 1216407) is gratefully acknowledged.

REFERENCES

[1] S. Katti, S. Gollakota, and D. Katabi, “Embracing wireless interference:Analog network coding,” ACM SIGCOMM Comput. Commun. Rev.,vol. 37, pp. 397–408, Aug. 2007.

[2] B. Kellogg, A. Parks, S. Gollakota, J. R. Smith, and D. Wetherall, “Wi-Fi backscatter: Internet connectivity for RF-powered devices,” in Proc.ACM SIGCOMM, (Chicago, IL, USA), Aug. 2014.

[3] M. Honig, U. Madhow, and S. Verdu, “Blind adaptive multiuser detec-tion,” IEEE Trans. Inf. Theory, vol. 41, pp. 944–960, July 1995.

[4] J. Andrews, “Interference cancellation for cellular systems: a contempo-rary overview,” IEEE Wireless Commun. Mag., vol. 12, pp. 19–29, Apr.2005.

[5] M. Haenggi and R. Ganti, Interference in Large Wireless Networks. nowpublishing, 2009.

[6] R. Ganti and M. Haenggi, “Spatial and temporal correlation of theinterference in ALOHA ad hoc networks,” IEEE Commun. Lett., vol. 13,pp. 631–633, Sept. 2009.

[7] U. Schilcher, C. Bettstetter, and G. Brandner, “Temporal correlation ofinterference in wireless networks with Rayleigh fading,” IEEE Trans.on Mobile Computing, vol. 11, pp. 2109–2120, Dec. 2012.

[8] R. Tanbourgi, H. S. Dhillon, J. G. Andrews, and F. K. Jondral, “Effectof spatial interference correlation on the performance of maximum ratiocombining,” IEEE Trans. Wireless Commun., vol. 13, pp. 3307–3316,June 2014.

[9] M. Haenggi and R. Smarandache, “Diversity polynomials for the analy-sis of temporal correlations in wireless networks,” IEEE Trans. WirelessCommun., vol. 12, pp. 5940–5951, Nov. 2013.

[10] U. Schilcher, S. Toumpis, A. Crismani, G. Brandner, and C. Bettstetter,“How does interference dynamics influence packet delivery in coopera-tive relaying?,” in Proc. ACM/IEEE Intern. Conf. on Modeling, Analysisand Simulation of Wireless and Mobile Systems (MSWiM), Nov. 2013.

[11] R. Tanbourgi, H. S. Dhillon, J. G. Andrews, and F. K. Jondral, “Dual-branch MRC receivers under spatial interference correlation and Nak-agami fading,” IEEE Trans. Commun., vol. 62, pp. 1830–1844, June2014.

[12] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, andM. Franceschetti, “Stochastic geometry and random graphs forthe analysis and design of wireless networks,” IEEE Journal onSelected Areas in Communications, vol. 27, pp. 1029–1046, Sept. 2009.

[13] M. Haenggi, Stochastic Geometry for Wireless Networks. CambridgeUniversity Press, 2013.

[14] D. Stoyan, W. S. Kendall, and J. Mecke, Stochastic Geometry and ItsApplications. John Wiley & Sons Ltd, 1995.

[15] N. A. C. Cressie, Statistics for Spatial Data. John Wiley & Sons, 1993.[16] F. Baccelli and B. Błaszczyszyn, Stochastic Geometry and Wireless

Networks, Volume I: Theory. now publishing, 2009.[17] F. Baccelli and B. Błaszczyszyn, Stochastic Geometry and Wireless

Networks, Volume II: Applications. now publishing, 2009.[18] M. Nakagami, “The m-distribution — a general formula of intensity

distribution of rapid fading,” in Proc. Statistical Methods in Radio WavePropagation, (Los Angeles, CA, USA), pp. 3–36, June 1958.

[19] M. Haenggi, “Outage, local throughput, and capacity of random wirelessnetworks,” IEEE Trans. Wireless Commun., vol. 8, pp. 4350–4359, Aug.2009.

[20] U. Schilcher, C. Bettstetter, and G. Brandner, “Temporal correlation ofinterference: Cases with correlated traffic,” in Proc. ITG Conf. Syst.,Commun. and Coding (SCC), (Munich, Germany), Jan. 2013.

[21] A. Crismani, U. Schilcher, S. Toumpis, G. Brandner, and C. Bettstet-ter, “Packet travel times in wireless relay chains under spatially andtemporally dependent interference,” in Proc. IEEE Intern. Conf. onCommunications (ICC), (Sydney, Australia), June 2014.

[22] A. Crismani, S. Toumpis, U. Schilcher, G. Brandner, and C. Bettstetter,“Cooperative relaying under spatially and temporally correlated interfer-ence,” IEEE Trans. Veh. Technol., vol. 64, pp. 4655–4669, Oct. 2015.

[23] S. Weber, J. Andrews, and N. Jindal, “The effect of fading, channelinversion, and threshold scheduling on ad hoc networks,” IEEE Trans.Inf. Theory, vol. 53, pp. 4127–4149, Nov. 2007.

[24] Z. Gong and M. Haenggi, “Interference and outage in mobile randomnetworks: Expectation, distribution, and correlation,” IEEE Trans. Mo-bile Comput., vol. 13, pp. 337–349, Feb. 2014.

[25] X. Zhang and M. Haenggi, “A stochastic geometry analysis of inter-cellinterference coordination and intra-cell diversity,” IEEE Trans. WirelessCommun., vol. 13, pp. 6655–6669, Dec. 2014.

[26] G. Nigam, P. Minero, and M. Haenggi, “Coordinated multipointjoint transmission in heterogeneous networks,” IEEE Trans. Commun.,vol. 62, pp. 4134–4146, Nov. 2014.

[27] M. Haenggi, “Mean interference in hard-core wireless networks,” IEEECommun. Lett., vol. 15, pp. 792–794, Aug. 2011.

[28] H. Q. Nguyen, F. Baccelli, and D. Kofman, “A stochastic geometryanalysis of dense IEEE 802.11 networks,” in Proc. IEEE INFOCOM,pp. 1199–1207, May 2007.

[29] G. Alfano, M. Garetto, and E. Leonardi, “New insights into thestochastic geometry analysis of dense CSMA networks,” in Proc. IEEEINFOCOM, pp. 2642–2650, April 2011.

[30] H. ElSawy, E. Hossain, and S. Camorlinga, “Characterizing randomCSMA wireless networks: A stochastic geometry approach,” in Proc.IEEE Intern. Conf. on Communications (ICC), pp. 5000–5004, June2012.

[31] A. Busson and G. Chelius, “Point processes for interference modelingin CSMA/CA ad-hoc networks,” in Proc. ACM Symp. on PerformanceEval. of Wireless Ad Hoc, Sensor, and Ubiquitous Netw. (PE-WASUN),(New York, NY, USA), pp. 33–40, Oct. 2009.

Page 14: Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore,

14

[32] Y. Zhong, W. Zhang, and M. Haenggi, “Managing interference correla-tion through random medium access,” IEEE Trans. Wireless Commun.,vol. 13, pp. 928–941, Feb. 2014.

[33] B. Błaszczyszyn and H. P. Keeler, “Equivalence and comparison ofheterogeneous cellular networks,” in Proc. IEEE Symp. on Personal,Indoor and Mobile Radio Commun. (PIMRC Workshops), pp. 153–157,Sept. 2013.

APPENDIX A

Lemma 3: Let fi : Rn → R with i ∈ [k] denote non-negative functions and U ⊆ Rn be a finite or countable set.Then we have ∑

u∈Uk

k∏i=1

fi(ui) =

k∏i=1

∑u∈U

fi(u) . (43)

Proof: The result holds due to the distributive law. Weprove the lemma by induction. For k = 1 the result is trivial.Let us assume the result holds for k; we show that it alsoholds for k + 1. Indeed, we have

k+1∏i=1

∑u∈U

fi(u) =

(k∏i=1

∑u∈U

fi(u)

)∑v∈U

fk+1(v) (44)

(a)=

∑u∈Uk

k∏i=1

fi(ui)

∑v∈U

fk+1(v)

=∑v∈U

fk+1(v)

∑u∈Uk

k∏i=1

fi(ui)

=

∑v∈U

∑u∈Uk

(fk+1(v)

k∏i=1

fi(ui)

)

=∑

u∈Uk+1

k+1∏i=1

fi(ui) ,

where (a) holds due to the induction assumption.

Udo Schilcher Udo Schilcher studied applied com-puting and mathematics at the University of Kla-genfurt, where he received two Dipl.-Ing. degreeswith distinction (2005, 2006). Since 2005, he hasbeen research staff member at the Networked andEmbedded Systems institute at the University ofKlagenfurt. His main interests are interference andnode distributions in wireless networks. His doc-toral thesis on inhomogeneous node distributionsand interference correlation in wireless networks andhas been awarded with a Dr. techn. degree with

distinction in 2011. He received a best paper award from the IEEE VehicularTechnology Society.

Stavros Toumpis Stavros Toumpis received theDiploma in Electrical and Computer Engineeringfrom the National Technical University of Athens,Greece, in 1997, the M.S. degrees in ElectricalEngineering and Mathematics from Stanford Uni-versity, CA, in 1999 and 2002, respectively, and thePh.D. degree in Electrical Engineering, also fromStanford University, in 2003. He is currently an As-sistant Professor at the Department of Informatics ofthe Athens University of Economics and Business,Athens, Greece. His research is on wireless ad hoc

networks, with an emphasis on their capacity and performance evaluation,using tools from network optimization, probability theory, and informationtheory.

Martin Haenggi Martin Haenggi (S’95-M’99-SM’04-F’14) received the Dipl.-Ing. (M.Sc.) andDr.sc.techn. (Ph.D.) degrees in electrical engineeringfrom the Swiss Federal Institute of Technology inZurich (ETH) in 1995 and 1999, respectively. Aftera postdoctoral year at the University of California inBerkeley, he joined the University of Notre Dame,IN, USA, in 2001, where he currently is a Professorof electrical engineering and a Concurrent Profes-sor of applied and computational mathematics andstatistics. In 2007-2008, he was a visiting professor

at the University of California at San Diego, and in 2014-2015 he was anInvited Professor at EPFL, Switzerland. He is a co-author of the monograph”Interference in Large Wireless Networks” (NOW Publishers, 2009) and theauthor of the textbook ”Stochastic Geometry for Wireless Networks” (Cam-bridge University Press, 2012). His scientific interests include networkingand wireless communications, with an emphasis on cellular, amorphous,ad hoc, cognitive, and, sensor networks. He served an Associate Editor ofthe Elsevier Journal of Ad Hoc Networks from 2005-2008, of the IEEETransactions on Mobile Computing (TMC) from 2008-2011, and of the ACMTransactions on Sensor Networks from 2009-2011, and as a Guest Editorfor the IEEE Journal on Selected Areas in Communications in 2008-2009and the IEEE Transactions on Vehicular Technology in 2012-2013. He alsoserved as a Steering Committee member of the TMC from 2011-2013, as aDistinguished Lecturer for the IEEE Circuits and Systems Society in 2005-2006, as a TPC Co-chair of the Communication Theory Symposium of the2012 IEEE International Conference on Communications (ICC’12) and ofthe 2014 International Conference on Wireless Communications and SignalProcessing (WCSP’14), as a General Co-chair of the 2009 InternationalWorkshop on Spatial Stochastic Models for Wireless Networks (SpaSWiN’09)and the 2012 DIMACS Workshop on Connectivity and Resilience of Large-Scale Networks, and as a Keynote Speaker of SpaSWiN’13, WCSP’14, and the2014 IEEE Workshop on Heterogeneous and Small Cell Networks. Presentlyhe is the Chair of the Executive Editorial Committee of the IEEE Transactionson Wireless Communications. For both his M.Sc. and Ph.D. theses, he wasawarded the ETH medal, and he received a CAREER award from the U.S.National Science Foundation in 2005 and the 2010 IEEE CommunicationsSociety Best Tutorial Paper award.

Alessandro Crismani Alessandro Crismani receivedthe master degree in telecommunications engineer-ing, from the University of Trieste, Italy, in 2009(summa cum laude). From June 2009 to November2009 he was with the Communications ResearchGroup of the University of Southampton, UnitedKingdom, as a visiting student, and from January2010 to December 2012 he was with the Telecom-munication Group of the University of Trieste, wherehe worked towards his Ph.D. In 2013 he was withthe Mobile Group at the Networked and Embedded

Systems of the University of Klagenfurt as a researcher. From January 2014he works as a Test and Measurement engineer at u-blox Italia S.p.A.

Page 15: Interference Functionals in Poisson Networksmhaenggi/pubs/tit15.pdfvia a Poisson point process and that employ ALOHA, the interferers’ locations form a Poisson point process. Therefore,

15

Gunther Brandner Gunther Brandner studied ap-plied computing and mathematics at the Universityof Klagenfurt, where he received two Dipl.-Ing.degrees with distinction (2007, 2008). Since 2007 hehas been a research and teaching staff member anddoctoral student at the Networked and EmbeddedSystems institute at the University of Klagenfurt.His main interests are relay selection methods forcooperative relaying and the implementation andevaluation of protocols on hardware platforms.

Christian Bettstetter Christian Bettstetter (S’98-M’04-SM’09) received the Dipl.-Ing. degree in 1998and the Dr.-Ing. degree (summa cum laude) in 2004,both in electrical engineering and information tech-nology from the Technische Universitat Munchen(TUM), Munich, Germany.

He was a Staff Member with the Communica-tions Networks Institute, TUM, until 2003. From2003 to 2005, he was a Senior Researcher with theDOCOMO Euro-Labs. Since 2005, he has been aProfessor and Head of the Institute of Networked

and Embedded Systems, University of Klagenfurt, Austria. He is also Scien-tific Director and Founder of Lakeside Labs, Klagenfurt, a research clusteron self-organizing networked systems. He coauthored the textbook GSM-Architecture, Protocols and Services (Wiley).

Mr. Bettstetter received Best Paper Awards from the IEEE VehicularTechnology Society and the German Information Technology Society (ITG).