18
On the Benefits of Network-Level Cooperation in Millimeter-Wave Communications Cristian Tatino, Nikolaos Pappas, Ilaria Malanchini, Lutz Ewe and Di Yuan The self-archived postprint version of this journal article is available at Linköping University Institutional Repository (DiVA): http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161190 N.B.: When citing this work, cite the original publication. Tatino, C., Pappas, N., Malanchini, I., Ewe, L., Yuan, Di, (2019), On the Benefits of Network-Level Cooperation in Millimeter-Wave Communications, IEEE Transactions on Wireless Communications, 18(9), 4408-4424. https://doi.org/10.1109/TWC.2019.2924432 Original publication available at: https://doi.org/10.1109/TWC.2019.2924432 Copyright: Institute of Electrical and Electronics Engineers (IEEE) http://www.ieee.org/index.html ©2019 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

On the Benefits of Network-Level Cooperation in Millimeter

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: On the Benefits of Network-Level Cooperation in Millimeter

On the Benefits of Network-Level Cooperation in

Millimeter-Wave Communications Cristian Tatino, Nikolaos Pappas, Ilaria Malanchini, Lutz Ewe and Di Yuan

The self-archived postprint version of this journal article is available at Linköping

University Institutional Repository (DiVA):

http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-161190

N.B.: When citing this work, cite the original publication. Tatino, C., Pappas, N., Malanchini, I., Ewe, L., Yuan, Di, (2019), On the Benefits of Network-Level Cooperation in Millimeter-Wave Communications, IEEE Transactions on Wireless Communications, 18(9), 4408-4424. https://doi.org/10.1109/TWC.2019.2924432

Original publication available at: https://doi.org/10.1109/TWC.2019.2924432 Copyright: Institute of Electrical and Electronics Engineers (IEEE) http://www.ieee.org/index.html ©2019 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Page 2: On the Benefits of Network-Level Cooperation in Millimeter

1

On the Benefits of Network-Level Cooperation inMillimeter-Wave Communications

Cristian Tatino, Student Member, IEEE, Nikolaos Pappas, Member, IEEE, Ilaria Malanchini, Member, IEEE,Lutz Ewe, and Di Yuan, Senior Member, IEEE

Abstract—Relaying techniques for millimeter-wave wirelessnetworks represent a powerful solution for improving the trans-mission performance. In this work, we quantify the benefitsin terms of delay and throughput for a random-access multi-user millimeter-wave wireless network, assisted by a full-duplexnetwork cooperative relay. The relay is equipped with a queue forwhich we analyze the performance characteristics (e.g., arrivalrate, service rate, average size, and stability condition). Moreover,we study two possible transmission schemes: fully directional andbroadcast. In the former, the source nodes transmit a packeteither to the relay or to the destination by using narrow beams,whereas, in the latter, the nodes transmit to both the destinationand the relay in the same timeslot by using a wider beam, butwith lower beamforming gain. In our analysis, we also take intoaccount the beam alignment phase that occurs every time atransmitter node changes the destination node. We show howthe beam alignment duration, as well as position and number oftransmitting nodes, significantly affect the network performance.We additionally discuss the impact of beam alignment errors andimperfect self-interference cancellation technique at the relay forfull-duplex communications. Moreover, we illustrate the optimaltransmission scheme (i.e., broadcast or fully directional) forseveral system parameters and show that a fully directionaltransmission is not always beneficial, but, in some scenarios,broadcasting and relaying can improve the performance in termsof throughput and delay.

Index Terms—Millimeter-waves, network cooperative relaying,beam alignment, random access networks, directional communi-cations.

I. INTRODUCTION

In the recent years, millimeter-wave (mm-wave) commu-nications have attracted the interest of many researchers,who see the abundance of spectrum resource in the mm-wave frequency range (30-300 GHz) as a possible solutionto the longstanding problem of spectrum scarcity. For thisreason, mm-wave wireless networks have been identified asone of the key enabler technologies for the next generationof mobile communications, i.e., 5G [2]. Although mm-wavescommunications can reach tremendous high data rates [3],the signal propagation is subject to higher path loss andpenetration loss [4], [5], in comparison to lower frequencycommunications. Such high losses cause frequent interrup-tions, especially when obstacles block the signal path [6].Directional communications and narrow beams provide highbeamforming gains that contribute to mitigate the path lossissue. By using narrow beams, the transmitters focus the signal

This work extends the preliminary study in [1]. This project has receivedfunding from the European Union’s Horizon 2020 research and innovationprogramme under the Marie Sklodowska-Curie grant agreement No. 643002.

energy along only few directions and paths and, usually, theline-of-sight (LOS) path is characterized by the lowest pathloss [4], [5]. When the LOS path is blocked by an obstacle, theuse of reflected transmission paths can overcome the blockageissue [7].

Other solutions for avoiding interruptions caused by block-ages provide alternative transmission paths by using additionalnodes, e.g., multi-connectivity [8], [9] and relaying techniques.In the latter, a source node (user equipment, UE) transmitsa packet to an intermediate node (relay) when the source-destination path is blocked. Though relaying and cooper-ative communications have been extensively analyzed formicrowave frequencies [10]–[20], mm-wave communicationspresent some peculiarities, such as the use of narrow beamsand the beam alignment phase, that make further analysisnecessary. For instance, by using narrow beams, UEs mightnot be able to transmit simultaneously to both the relayand the destination node, which is usually the case withomnidirectional transmissions at lower frequencies. By usingnarrow beams in mm-waves, in each timeslot the UE maytransmit a packet either to the destination or the relay. Thisis particularly true for UEs that are equipped with a singlephased antenna array, which is a common solution for mm-wave communications in order to minimize the cost and energyconsumption [21]. Moreover, every time the UEs change thereceiver (i.e., from the destination to the relay and vice-versa),a new beam alignment might be required [22], [23]. This canboth cause further delays and affect the throughput.

We propose a novel analysis of network-level cooperativecommunications in mm-wave wireless networks with a mm-wave access point (mmAP) as transmission target and onenetwork cooperative full-duplex relay that is equipped with aqueue. We analyze the impact of directional communicationsby evaluating two possible transmission schemes: broadcast(BR) and fully directional (FD). Using the former, the UEstransmit simultaneously to both the mmAP and the relay bymeans of wider beams at lower beamforming gains, whereas,with the FD scheme, the UEs transmit either to the mmAPor to the relay by using narrow beams. Moreover, we takeinto account the beam alignments that occur every time thetransmitters change receiver and scheme.

A. Related Work

Several works have been proposed for evaluating the ben-efits of relaying techniques in mm-wave communications,e.g, [24]–[33]. In [24], the authors propose a physical layer

Page 3: On the Benefits of Network-Level Cooperation in Millimeter

2

analysis of cooperative communications for frequencies above10 GHz and evaluate the outage probability of several multipleaccess protocols, combining techniques, and relay transmis-sion techniques. The study shows that the use of relays dras-tically improves the coverage probability and the correlationbetween the source-relay and relay-destination links can beexploited to increase the performance. The authors of [25],[26] use stochastic geometry to show the improvements in thesignal-to-interference-plus-noise ratio (SINR) distribution andcoverage probability for a mm-wave cellular network that isassisted by a relay. The results of [26] show the asymptoticgain that can be achieved by using the best relay selectionstrategy over random relay selection.

Stochastic geometry is also used in [27]–[30]. In [27], theconnection probability for mm-wave wireless networks withmulti-hop relaying is analyzed. The authors show that theconnection probability is strictly correlated to the obstacledensity and the width of the region where the relays arepotentially selected. In [28], the coverage probability for adecode-and-forward relay is analyzed; the authors considerthe relay that has the highest signal-to-noise ratio (SNR) tothe receiver among the set of relays that can decode thesource message. In [29] and [30], the authors focus on relayingtechniques for device-to-device (D2D) scenarios and analyze,by using stochastic geometry, the coverage probability andthe relay selection problem, respectively. The relay selec-tion strategy is further evaluated in [31], [32]. The formerproposes a two-hop relay selection algorithm for mm-wavecommunications to take into account the dependency betweenthe source-destination and relay-destination paths in terms ofline-of-sight (LOS) probability. The work in [32] considersa joint relay selection and mmAP association problem. Inparticular, the authors propose a distributed solution that takesinto account the load balancing and fairness aspects amongmultiple mmAPs.

None of the aforementioned studies considers the beamalignment phase. This aspect is taken into account in [33], fora single source-destination pair and a single half-duplex relay.When the source-destination link is blocked, the source nodecan transmit either to the relay by using mm-waves or to boththe relay and the destination by using lower frequencies. In theformer case a beam alignment occurs. The authors comparethe two approaches in terms of throughput and delay, butdifferently from our approach they assume continuous timeand single UE scenario.

In general, analysis of relaying techniques in mm-wavewireless networks regarding network-level performance needfurther studies. However, it is worth mentioning works thatpropose similar analysis for lower frequencies, such as [14]–[20]. In [14], [15], benefits and challenges of cooperativecommunications for wireless networks are extensively dis-cussed. In [16], the authors consider a multi-user scenariowith a full-duplex relay and a destination that have multi-packet reception capability, whereas, the studies in [17], [18]analyze a similar scenario, but with two relays. In [16]–[18],the relays are equipped with infinite size queue for whichthe performance are analyzed as well as the per-user andnetwork throughput, and the delay per packet. Buffer-aided

relays are also considered by [19], [20]. The former illustratesand compares several buffer-aided relaying protocols, whereas,the latter analyzes presents a comprehensive study of relayselection techniques for lower frequencies wireless networks.

B. Contributions

We provide a novel analysis of delay and throughputfor random access multi-user cooperative relaying mm-wavewireless networks. We show the tradeoff between using theaforementioned transmission schemes, i.e., FD and BR, bytaking into account the different beamforming gains andinterference caused by both types of transmissions. Namely, incontrast to the FD scheme, BR transmissions use wider beamsthat provide a lower beamforming gain, but they can allowto transmit simultaneously both to the relay and the mmAP.Furthermore, switching transmission scheme involves a beamalignment phase between the transmitter and the receiver and,therefore, we show how the duration of this phase impacts theperformance.

In more detail, at first, we compute the analytical expressionof the user transmit probability, which, as we show, is de-creased by the beam alignment. Then, by using queueing the-ory, we study the performance characteristics of the queue atthe relay. More precisely, we consider what is called network-level cooperation at the relay. This forward the successfullydecoded packets that are stored in a queue, whose operationsare analyzed in details. This analysis includes stability condi-tion, as well as the service and the arrival rate. Moreover, wemodel the evolution of the queue as a discrete time MarkovChain in which each state denotes the number of the packetsin the queue. Since we derive the transition probabilities thenwe can provide the probability that the queue is empty andthe average queue size.

Finally, we identify the optimal transmission scheme (i.e.,FD and BR) with respect to several system parameters, e.g.,number and positions of nodes, and beam alignment duration.In addition, we also analyze and discuss the impact of imper-fect beam alignment and imperfect self-interference cancella-tion on the network performance. Namely, we investigate whenit is more beneficial for the UEs to transmit simultaneously toboth the mmAP and the relay by using wider beams, and wheninstead it is better to use narrow beams and transmit either tothe mmAP or the relay. To the best of our knowledge, suchanalysis has not been investigated yet.

The rest of the paper is organized as follows. In SectionII we describe the system model. In Section III, we presentthe queue analysis at the relay and, in Section IV-A, weevaluate the aggregate network throughput. In Section IV-B wederive the delay per packet expression and, in Section V, weprovide performance evaluation. Finally, Section VI concludesthe paper.

Page 4: On the Benefits of Network-Level Cooperation in Millimeter

3

II. SYSTEM MODEL AND ASSUMPTIONS

A. Network Model

We consider a set N , with cardinality N , of symmetric1

UEs, which are characterized by the same mm-wave net-working characteristics such as propagation conditions andtopology. We assume multiple packet reception capability bothat the mmAP and the relay (R), which can form multiplebeams at the same time for multiple packets reception [34].Each UE however is considered to be equipped with oneanalog beamformer and it can form only one beam at a time.We assume slotted time and each packet transmission takes onetimeslot. The relay has no packets of its own, but it stores thesuccessfully received packets from the UEs in a queue, whichhas infinite size2. The UEs have saturated queues, i.e., theynever empty. We assume that acknowledgements (ACKs) areinstantaneous and error free and successfully received packetsare removed from the queues of the transmitting nodes, i.e.,both the UEs and R.

In a given timeslot, the relay transmits a packet to themmAP with probability qr , whereas, the UEs decide totransmit a packet with probability qu . Then, the UEs randomlyselect one of the two transmission schemes, i.e., BR or FD,with probability qub and qu f , respectively, with qu f +qub = 1.If a UE uses a BR transmission and the transmission to thedestination fails, the relay stores the packet (that is correctlydecoded) in its queue and is responsible to transmit it to thedestination. This technique is also known as network levelcooperation relaying [10], [13], [16], [17]. In contrast, if theFD scheme is selected, then the UEs choose to transmit eitherto the relay, with probability qur , or to the mmAP, withprobability qum , where qur + qum = 1.

We can summarize this process by defining the set oftransmission strategies, S = { f m, f r, b}, where, f m, f r and brepresent the cases in which a UE transmits to the mmAP, toR, and to both, respectively. Let P(s = i) be the probability ofusing strategy i, with i ∈ S. These probabilities do not dependon the particular timeslot and are given by: P(s = f m) =qu f qum , P(s = f r) = qu f qur and P(s = b) = qub . If theselected strategy is the same as in the previous transmissionattempt, then the UE can directly transmit, otherwise it has toperform a beam alignment. The alignment is done by the UEsevery time they decide to transmit and change strategy. Weassume that the beam alignment duration is independent fromthe selected strategy and equals to Da timeslots and, while aUE is performing an alignment, it can not transmit. Thus, theprobability that a UE is actually transmitting, qt x , is affectedby the beam alignment, and its derivation is presented in thenext section. In Fig. 1, we illustrate an example of the FD andBR transmissions, where dur and dud represent the distancesof the paths UE-R and UE-mmAP, respectively. The parameterθrd is the angle formed by R and the mmAP with a UE as

1This study can be generalized to the asymmetric case; however, theanalysis will be dramatically involved without providing any additionalmeaningful insight.

2The analysis with infinite size is more general, and it can also provideinsights on the optimal design of the queue size based on the distribution ofthe occupancy of the queue. Moreover, the analysis is still valid if the queueis large enough

mmAP

UE1

UE2

R

𝑑"#𝑑"$ 𝜃$#

𝜃&'

𝑑$#

Fig. 1: FD (UE1) and BR (UE2) transmissions for a scenario with twoUEs, one relay and one mmAP. In this example, UE1 is transmittingto the mmAP.

vertex and θBW is the beamwidth. Hereafter, we indicate theprobability of the complementary event by a bar over the term(e.g., qu = 1 − qu). Moreover, we use superscripts f and b toindicate the FD and BR transmissions, respectively.

B. SINR Expression and Success Probability

A packet is considered to be successfully received if theSINR is above a certain threshold γ. Ideally, multiple trans-missions at the receiver side of a node do not interferewhen they are received on different beams. However, in realscenarios, interference cancellation techniques are not perfect.Therefore, we introduce a coefficient 0 ≤ α ≤ 1 that modelsthe interference between received beams3. The cases α = 0and α = 1 represent perfect interference cancellation andno interference cancellation, respectively. Moreover, giventhe negligible interference between transmissions of differentpairs of nodes in mm-waves [35], we assume that an FDtransmission to the mmAP does not interfere with the packettransmitted to R and vice-versa. On the other hand, when aUE uses a BR transmission, its transmission interferes withthe transmissions of the other UEs for both the mmAP and R.

We assume that the links between all pairs of nodes areindependent and can be in two different states, line-of-sight(LOS) and non-line-of-sight (NLOS). Specifically, LOSi j andNLOSi j are the events that node i is in LOS and NLOS withnode j, respectively. The associated probabilities are denotedas P(LOSi j ) and P(NLOSi j ). Note that, hereafter, we usesubscripts i and j to indicate generic nodes, while, u, r , andd to indicate the UEs, the relay, and the mmAP, respectively.

In order to compute the SINR for link i j, we first identifythe sets of interferers that use FD and BR transmissions, whichare If and Ib , respectively. Then, we partition each of theminto the sets of nodes that are in LOS and NLOS with nodej. These sets are If l and If n , for the nodes that use the FDtransmission and Ibl and Ibn for the UEs that use the BRtransmission.

Thus, when link i j is in LOS, we can derive the SINR,conditioned to If l,If n,Ibl,Ibn , as in (1), where, gi and g j are

3Our work can be easily generalized to the case where α depends on thetransmission strategy. However, in order to keep the clarity of the presentationwe consider α to be constant.

Page 5: On the Benefits of Network-Level Cooperation in Millimeter

4

SINR f

i j/If l ,If n,Ibl ,Ibn|LOSi j =

ptgfi g

fj hl (i, j)

pN + α( ∑k ∈If l

p fr/l

(k, j) +∑

m∈Ibl

pbr/l (m, j) +∑

u∈If n

p fr/n

(u, j) +∑

v∈Ibn

pbr/n (v, j)) , (1)

the transmitter and receiver beamforming gains, respectively.They are computed in according to the ideal sectored antennamodel [36], which is given by: gi = g j =

2πθBW

in the mainlobe, and 0 otherwise. The transmit and noise power are pt andpN , respectively and hl (i, j) is the path loss on link i j whenthis is in LOS. The terms pr/l (i, j) and pr/n (i, j) representthe received power by node j from node i, when the first isin LOS and NLOS, respectively. Similar expressions of theSINR can be derived also in case of BR and NLOS.

Finally, the success probabilities for a packet sent on linki j by using FD and BR transmissions are represented by theterms P f

i j/If ,Iband Pb

i j/If ,Ib, respectively. Here, we consider

only the conditioning on the sets If and Ib because we averageon all the possible scenarios for the LOS and NLOS linkconditions. The expression for the FD transmission and N UEsis given in Appendix A, where we assume perfect beam align-ment and relay self-interference cancellation. Imperfect beamalignment and Imperfect relay self-interference cancellationcases are discussed in Section V-B and V-C, respectively.

III. PERFORMANCE ANALYSIS

A. UE Transmit Probability

In this section, we first derive the actual transmit probabilityof a UE in a given timeslot, i.e., qt x , when beam alignmentis taken into account. Then, we evaluate the performance ofthe queue at the relay and we analyze the network throughputand the delay per packet.

Theorem 1. For each timeslot k, the probability distributionsof the transmission strategy selection P(sk = i) are identicaldistributed (i.d.) with i ∈ S, then, the transmit probability fora UE in a timeslot k, with constant alignment duration Da ,is given by:

qt x = P(Ik

)qu =

qu1 + Da

(1 − P(sk = i ∩ sk = i)

) , (2)

where, qu is defined in Section II-A and P(Ik

)is the proba-

bility that the UE has not started an alignment in the previousDa timeslots. The term P(sk = i ∩ sk = i) is the probabilityto use the i-th strategy in timeslot k while using the samestrategy for the previous transmission attempt, which occursin the k-th timeslot.

Proof. The proof is given in Appendix B. �

From (2), one can notice that qt x is inversely proportional tothe beam alignment duration Da as well as to the probabilityof changing strategy 1−P(sk = i∩ sk = i). Assuming that theprobabilities of the transmission strategy selection, P(sk = i),

are independent in each timeslot k and have values as reportedin Section II-A, P

(Ik

)can be written as:

P(Ik

)=

11 + Daqu

(1 − (qu f qum )2 − (qu f qur )2 − (qub )2) .

(3)

B. Queue Analysis

In this section, we evaluate the arrival rate, λr , the servicerate, µr , and the stability condition for the queue at the relayR. First, we compute λr that can be expressed as follows:

λr = P(Q = 0)λ0r + P(Q , 0)λ1

r

= P(Q = 0)N∑k=1

kr0k + P(Q , 0)

N∑k=1

kr1k, (4)

where, λ0r and r0

krepresent the arrival rate at R and the

probability that it receives k packets in a timeslot when thequeue is empty. Whereas, when the queue is not empty,these two terms assume different values, i.e., λ1

r and r1k. The

probabilities that the queue is either empty or not empty,P(Q = 0) and P(Q , 0), respectively, are derived in appendixD. When the queue is not empty, R may transmit and interferewith the other transmissions to the mmAP. This interferenceaffects the probability to successfully transmit a packet to themmAP and therefore the number of received packets by R.Thus, In order to compute λ0

r and λ1r , we first compute the

success transmission probability by identifying the nodes thatbelong to the sets of interferers If and Ib . Since the UEs aresymmetric, it is sufficient to indicate the number of UEs thatare interfering and whether R is transmitting; i.e., we indicatewith {|If |, r } f and {|If |} f the sets of interferers that use FDtransmissions when R is transmitting or not, and with {r } f theset of interferers when only the relay R is transmitting. Forthe sake of clarity, we first present hereafter the results fortwo UEs and then, in Appendix D, we generalize the analysisto N UEs. When N = 2, we can have at maximum twointerferers, i.e., the relay and one UE (|If | ≤ 1). Moreover, Rcan receive at maximum two packets per timeslot, i.e., whenboth the UEs successfully transmit to R. Thus, by consideringall the possible transmission strategies, s ∈ S, and all thepossible combinations of successfully received packets, we cancompute λ0

r and λ1r :

λ0r = 2qt xqt xqu f qur P f

ur + 2qt xqt xqubPbur P

b

ud

+ q2t xq2

u f q2urq2

ur

[2P f

ur/ {1} fPf

ur/ {1} f + 2(P f

ur/ {1} f

)2]

+ 2q2t xq2

u f qurqumP fur + 2q2

t xqubqu f qumPbur P

b

ud/ {1} f

+ 2q2t xqu f qubqur

[P f

ur/ {1}b

(1 − Pb

ur/ {1} f Pb

ud

)+ P

f

ur/ {1}b Pbur/ {1} f P

b

ud + 2(Pbur/ {1} f P

b

ud

)2]

Page 6: On the Benefits of Network-Level Cooperation in Millimeter

5

TABLE I: Summary of the notation.

UE user equipment N number of UEsmmAP mm-wave access point (destination) R relayDa beam alignment duration qr relay transmit probabilityqu UE transmit probability qt x actual UE transmit probabilityqub probability to use a BR transmission qu f probability to use an FD transmissionqum probability to transmit to the mmAP when qur probability to transmit to R when

using FD transmissions using FD transmissionsS set of transmission strategies b broadcast transmissionsf m fully directional transmission to the mmAP f r fully directional transmission to the relayddr mmAP-relay distance dud UE-mmAP distancedur UE-relay distance α interference cancellation parameterγ SINR threshold for successful transmissions gs

i beamforming gain at node i while using strategy sIb set of interferers that use BR transmissions If set of interferers that use FD transmissionsλr arrival rate at the relay µr service rate at the relayPbi j/If ,Ib

success probability of a transmission from the i-th Pfi j/If ,Ib

success probability of a transmission from the i-th

to the j-th nodes by using a BR transmission to the j-th nodes by using an FD transmissionθrd angle between the mmAP θbBW beamwidth for BR transmissions

and R with the UE as vertex θfBW beamwidth for FD transmissions

+ q2t xq2

ub

[2Pb

ur/ {1}b Pb

ud/ {2}b(1 − Pb

ur/ {1}b Pb

ud/ {1}b)

+ 2(Pbur/ {1}b P

b

ud/ {1}b)2]

, (5)

where, qt x , qub , qu f , qud , and qur are introduced in Sec-tion II-A and a summary of the notation is available inTable I. In order to compute λ1

r , we must consider the possibleinterference of R. Thus, λ1

r = qr λ0r + qr Ar and Ar is given

by:

Ar = 2qt xqt xqu f qur P fur + 2qt xqt xqubPb

ur Pb

ud

+ q2t xq2

u f q2urq2

ur

[2P f

ur/ {1} fPf

ur/ {1} f + 2(P f

ur/ {1} f

)2]

+ 2q2t xq2

u f qurqumP fur + 2q2

t xqubqu f qumPbur P

b

ud/ {1,r } f

+ 2q2t xqu f qubqur

[P f

ur/ {1}b

(1 − Pb

ur/ {1} f Pb

ud/ {r } f

)+ P

f

ur/ {1}b Pbur/ {1} f P

b

ud/ {r } f + 2(Pbur/ {1} f P

b

ud/ {r } f

)2]

+ q2t xq2

ub

[2Pb

ur/ {1}b Pb

ud/ {r } f , {1}b(1 − Pb

ur/ {1}b Pb

ud/ {r } f , {1}b)

+ 2(Pbur/ {1}b P

b

ud/ {r } f , {1}b)2]

. (6)

As introduced in Section II-A, R can transmit a packet tothe mmAP by using the FD scheme. This transmission maybe subject to the interference of the UEs that are transmittingto the mmAP. Therefore, we compute the service rate as µr =qr Br , where Br is given by:

Br = P frd

(q2t x + 2qt xqt xqu f qur + q2

t xq2u f q2

ur

)+ P f

rd/ {1} f

(2qt xqt xqu f qum + 2q2

t xq2u f qumqur

)+ P f

rd/ {1}b

(2qt xqt xqub + 2q2

t xqubqu f qur)+P f

rd/ {2}bq2t xq2

ub

+ P f

rd/ {2} fq2t xq2

u f q2um + P f

rd/ {1} f , {1}b2qt xqu f qubqum . (7)

By applying the Loyne’s criterion [37], we can now obtainthe range of values of qr for which the queue is stable bysolving the following inequality: λ1

r < µr . Thus, we have thatthe queue at R is stable if and only if qrmin < qr ≤ 1, whereqrmin is given by:

qrmin =λ0r

λ0r + Br − Ar

. (8)

0 1 2 3 ...

p01

p1−1

p02

p11

p12

p11

p1−1 p1−1

p10 p10 p10

p00

Fig. 2: The DTMC model for the two UE case.

The evolution of the queue at the relay can be modelled asa discrete time Markov Chain (DTMC), see Fig. 2. The termsp0k

and p1k, derived in Appendix C, are the probabilities that

the queue size increases by k packets in a timeslot when thequeue is empty or not. The expressions for the probability thatthe queue is empty, P(Q = 0), and the average relay queuesize, Q, are derived in Appendix D that contains the queueperformance analysis for N symmetric UEs.

IV. THROUGHPUT AND DELAY ANALYSIS

A. Throughput Analysis

In this section, we derive the network aggregate throughput,T , for N UEs. More specifically, T represents the end-to-endthroughput from the UEs to the mmAP and can be computedby considering the following cases: i) when the queue at R isstable and ii) otherwise. In the former case, T can be expressedas follows:

T = Nqt xTu

= Nqt xqu f(qumT f

ud+ qurT f

ur

)+ Nqt xqub

(Tbud + Tb

ur

), (9)

where, Tu is the per-user throughput conditioned to the eventthat the UE is transmitting. On the other hand, when the queueat R is unstable, the aggregate throughput becomes:

T = Nqt x(qu f qumT f

ud+ qubTb

ud

)+ µr . (10)

The terms, T fud

, Tbud

, T fur , and Tb

ur represent the contributionsto Tu given by the packets received directly by the mmAP

Page 7: On the Benefits of Network-Level Cooperation in Millimeter

6

or by R, when the FD and the BR transmissions are used,respectively and can be expressed as follows:

T fud=

(1 − qr P(Q , 0)

)T f 0ud+ qr P(Q , 0)T f 1

ud, (11)

Tbud =

(1 − qr P(Q , 0)

)Tb0ud + qr P(Q , 0)Tb1

ud, (12)

Tbur =

(1 − qr P(Q , 0)

)Tb0ur + qr P(Q , 0)Tb1

ur , (13)

where, we show the contributions to Tu when R is interferingor not. These two cases are indicated with the superscripts 0and 1, respectively (e.g., T f 0

udand T f 1

ud). The term P(Q = 0)

is derived in Appendix D. Note that the expression of T fur is

not affected by the interference of R because, in the followinganalysis, we assume perfect self-interference cancellation at R.This assumption is relaxed in Section V-C, where we presentresults for imperfect self-interference cancellation. In order tocompute the throughput components (e.g., T f 0

udand T f 1

ud), we

follow the same reasoning that is done for µr in (7). Morespecifically, we average the number of successfully transmittedUEs packets on all the possible interference scenarios.

Hereafter, we indicate by m the number of UEs that interfereand with i the number of those that use FD transmissions(m − i UEs use the BR transmission). Moreover, among theinterfering UEs that use FD transmissions, a certain numberj transmit to R and i − j to the mmAP. Thus, we obtain thefollowing:

T f 0ud=

N−1∑m=0

(N − 1

m

)qmtxq N−1−m

tx

m∑i=0

(mi

)qiu f qm−i

ub

×

i∑j=0

(ij

)q jurqi− j

um P f

ud/ {i− j } f , {m−i }b, (14)

Tb0ud =

N−1∑m=0

(N − 1

m

)qmtxq N−1−m

tx

m∑i=0

(mi

)qiu f qm−i

ub

×

i∑j=0

(ij

)q jurqi− j

um × Pbud/ {i− j } f , {m−i }b

, (15)

T f 1ud=

N−1∑m=0

(N − 1

m

)qmtxq N−1−m

tx

m∑i=0

(mi

)qiu f qm−i

ub

×

i∑j=0

(ij

)q jurqi− j

um P f

ud/ {i− j,r } f , {m−i }b, (16)

Tb1ud =

N−1∑m=0

(N − 1

m

)qmtxq N−1−m

tx

m∑i=0

(mi

)qiu f qm−i

ub

×

i∑j=0

(ij

)q jurqi− j

um Pbud/ {i− j,r } f , {m−i }b

. (17)

Finally, we derive the terms T fur , Tb0

ur and Tb1ur as follows:

T fur =

N−1∑m=0

(N − 1

m

)qmtxq N−1−m

tx

m∑i=0

(mi

)qiu f qm−i

ub

×

i∑j=0

(ij

)q jurqi− j

um P f

ur/ { j } f , {m−i }b, (18)

Tb0ur =

N−1∑m=0

(N − 1

m

)qmtxq N−1−m

tx

m∑i=0

(mi

)qiu f qm−i

ub

×

i∑j=0

(ij

)q jurqi− j

um Pbur/ { j } f , {m−i }b

Pb

ud/ {i− j } f , {m−i }b , (19)

Tb1ur =

N−1∑m=0

(N − 1

m

)qmtxq N−1−m

tx

m∑i=0

(mi

)qiu f qm−i

ub

×

i∑j=0

(ij

)q jurqi− j

um Pbur/ { j } f , {m−i }b

Pb

ud/ {i− j,r } f , {m−i }b .

(20)

B. Delay AnalysisWe now compute the average delay for a packet that is in

the head of the queue of a UE. The delay is constituted ofthree components: i) the transmission delay (i.e., on the linksUE-mmAP, UE-R, and R-mmAP), ii) the queueing delay atthe relay Dq , and iii) the beam alignment phase duration Da .After a successful transmission, a new packet arrives at thehead of the queue. At this point, as explained in Section II-A,the UE decides to transmit the packet with probability qu .

Depending on the selected transmission strategies in thecurrent timeslot and in the previous transmission attempt, thepacket can be subject to different delays, Di with i ∈ S, where,S = { f m, f r, b} and P(s = f m), P(s = f r), and P(s = b) aredefined in Section II-A. Given that the probability distributionsof the transmission strategy selection P(s = i) are independentand identical distributed (i.i.d.) for each timeslot, we can writethe probability to use the i-th strategy in timeslot k – condi-tioned to using the j-th strategy in timeslot h – as follows:P(sk = i ∩ sh = j) = P(sk = i)P(sh = j) = P(s = i)P(s = j).Thus, we can express the average delay per packet as follows:

D =∑i∈S

P(s = i)(Di + (1 − P(s = i))Da

), (21)

Then, we compute the terms Di of (21), which are givenby:

D f m = quT fud+ qu

(1 − T f

ud

) (1 + qu f qumD f m (22)

+ qu f qur (Da + D f r ) + qub (Da + Db ))+ qu

(1 + D f m

),

D f r = quT fur (1 + Dr ) + qu

(1 − T f

ur

) (1 + qu f qur D f r (23)

+ qu f qum (Da + D f m ) + qub (Da + Db ))+ qu

(1 + D f r

),

Db = quTbud + quTb

ur (1 + Dr ) + qu(1 − Tb

ud − Tbur

(1 + qubDb + qu f qum (Da + D f m ) + qu f qur (Da + D f r )

)+ qu

(1 + Db

), (24)

Page 8: On the Benefits of Network-Level Cooperation in Millimeter

7

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

N

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1Through

put[packets/slot]

Analytical model qu = 0.1Analytical model qu = 0.5Analytical model qu = 0.9Simulations qu = 0.1Simulations qu = 0.5Simulations qu = 0.9

(a) Da = 0

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

N

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Through

put[packets/slot]

Analytical model qu = 0.1Analytical model qu = 0.5Analytical model qu = 0.9Simulations qu = 0.1Simulations qu = 0.5Simulations qu = 0.9

(b) Da = 5

Fig. 3: Throughput, T , while varying the number of UEs for severalUE transmit probability values, i.e., qu , when a) Da = 0 and b)Da = 5, respectively.

where, T fud

, Tbud

, T fur and Tb

ur are several contributions to theconditioned per-user throughput Tu that are given in IV-A.Since a UE transmits at most one packet per timeslot, Tu

can be also interpreted as the probability that a packet issuccessfully transmitted by a UE. The term Dr is the totaldelay at the relay that is defined as the time when the packetentering the relay queue reaches the mmAP and it is given by:

Dr = Dq +1µr=

Qλr+

1µr. (25)

where, Dq in (25) is the queueing delay at the relay. Thelatter is the time when the packet being received by the relayreaches the head of its queue and it is computed by using theLittle’s law. More precisely, Q represents the average relayqueue size and λr the average arrival rate, which are given inAppendix D. Finally, by considering (25) and replacing (22),(23), and (24) in (21), the average delay per packet D can bewritten as follows:

D =1 + quDr

(qu f qurT f

ur + qubTbur

)+ DaquC

quTu, (26)

C = 1 + q2u f q2

um

(T fud− Tu − 1

)+ q2

u f q2ur

(T fur − Tu − 1

)+ q2

ub

(Tbud + Tb

ur − Tu − 1). (27)

V. NUMERICAL & SIMULATION RESULTS

In this section, we provide a numerical evaluation of theperformance analysis derived for throughput and delay. Fur-thermore, we assess the validity of the analysis by comparing

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

N

0

10

20

30

40

50

60

70

80

90

100

Delay

per

packet

[slots]

Analytical model, qu = 0.1Simulations, qu = 0.1Analytical model, qu = 0.5Simulations, qu = 0.5Analytical model, qu = 0.9Simulations, qu = 0.9

(a) Da = 0.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

N

0

20

40

60

80

100

120

140

Delay

per

packet

[slots]

Analytical model, qu = 0.1

Analytical model, qu = 0.5

Analitycal model, qu = 0.9

Simulations, qu = 0.1

Simulations, qu = 0.5

Simulations, qu = 0.9

(b) Da = 5.

Fig. 4: Delay per packet, D, while varying the number of UEs forseveral UE transmit probability values, i.e., qu , when a) Da = 0 andb) Da = 5, respectively.

the numerical results of the analytical model with simulations.To compute the path loss and the LOS and NLOS probabilities,we use the 3GPP model for urban micro cells in outdoor streetcanyon environment [38], whose path loss term includes alognormal shadowing whose variance depends on whether thelink is in LOS or NLOS. Moreover, the path loss depends onthe height of the mmAP, 10 m, the height of the UE, 1.5 m,the carrier frequency, fc = 30 GHz, and the distance betweenthe transmitter and the receiver. The transmit power and thenoise power are set to Pt = 24 dBm and PN = −80 dBm,respectively. Furthermore, we consider a scenario where therelay R is chosen to be a node that is placed in a positionthat guarantees the LOS with the mmAP, therefore we assumethat P(LOSrd ) = 1. Then, the SINR in (1) and the successprobability in (30) are numerically computed by considering100, 000 instances of the lognormal shadowing. This successprobability represents the input for both the numerical evalu-ations of the analytical model and simulations results, whichare computed over 100, 000 timeslots.

Moreover, unless otherwise specified, we set dur = 30 m,dud = 50 m, γ = 10 dB, α = 0.1 and, in case of FDtransmissions, θBW = θ

fBW = 5◦. Instead, when a BR

transmission is used, we set θBW = θbBW = θrd , which isthe angle between the mmAP and R with the UE as vertex.Throughout this section, we use solid lines for numericalevaluations of the analytical model and dotted lines for thesimulation results.

In Fig. 3a and Fig. 3b, we show the throughput, T , while

Page 9: On the Benefits of Network-Level Cooperation in Millimeter

8

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

N

0

10

20

30

40

50

60

70Delay

per

packet

[slots]

Transmission delay (UEs)Transmission delay (Relay)Queuieng delayAlignment delay

(a) γ = 10 dB.

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

N

0

5

10

15

20

25

30

35

Delay

per

packet

[slots]

Transmission delay (UEs)Transmission delay (Relay)Queueing delayAlignment delay

(b) γ = 15 dB.

Fig. 5: Delay per packet while varying the number of UEs, N , withqu = 0.5 and Da = 5.

varying the number of UEs (N) for several UE transmitprobability values, i.e., qu , when Da = 0 and Da = 5, respec-tively. For both the cases, we can observe that the analyticalmodel and the simulations almost coincide. Furthermore, inFig. 3a, we can observe that for qu = 0.1 the throughput isan increasing function of N . In contrast, for qu = 0.5 andqu = 0.9 the curves have non-monotonic behaviors. Indeed,after that the throughput reaches the maximum (at N = 6and N = 3 for qu = 0.5 and qu = 0.9, respectively),increasing N causes a decrease in T . Namely, high values ofN and qu lead to high interference that decreases the numberof packets successfully received by R and the mmAP. InFig. 3b, the larger value of the beam alignment delay, Da = 5,decreases the transmit probability that causes a decrease of theinterference. This explains the monotonic or quasi-monotonicbehaviors of the throughput in Fig. 3b, in which, however, themaximum value of T is lower with respect to Fig. 3a.

Now, by considering the same system parameters of Fig. 3aand Fig. 3b, we show the results for the delay in Fig. 4a andFig. 4b. In these figures, we can identify the regions for whichthe queue at the relay is stable (λr < µr ), unstable (λr > µr )and instable (λr = µr ). In this latest case, the arrival rateλr is still below the service rate µr , but very close to it. Thethree regions can be easily distinguished. Namely, for the caseof instable queue we report only the analytical results (sincesimulation results are meaningless), for the unstable queue wedo not report any results, because the delay increases towardsinfinity, and only for the stable case we report both analyticaland simulation results. In Fig. 4a, for qu = 0.1, there is neither

2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

Da

0

5

10

15

20

25

30

Delay

per

packet

[slots]

Transmission delay (UEs)Transmission delay (Relay)Queueing delayAlignment delay

Fig. 6: Delay per packet while varying the beam alignmentduration, Da , with qu = 0.5 and N = 10.

0.5 0.55 0.6 0.65 0.7 0.75 0.8 0.85 0.9 0.95

Throughput [packets/slot]

14

16

18

20

22

24

26

Delay

per

packet

[slots]

2

18

20

16

14

12

109 8 7 6 5

4

3

11

13

15

17

19

Fig. 7: Throughput vs. delay tradeoff for several values of Da ,with qu = 0.5 and N = 10. For each point we report thecorresponding value of Da .

unstability nor instability regions. In contrast, for qu = 0.5and qu = 0.9 the queue becomes unstable at N = 6 andN = 3, respectively, which is also approximately the pointat which the throughput reaches its maximum. Furthermore,as explained for Fig. 3a and Fig. 3b, increasing N causesa higher interference and a smaller arrival rate at the relay,whose queue becomes again stable at N = 11 and N = 7for qu = 0.5 and qu = 0.9, respectively. Whereas, at N = 10(qu = 0.5) and N = 6 (qu = 0.5), we can clearly observe theregion for which the queue is instable, λr ≈ µr , where thedelay values is finite, but very high.

The transmit probability qt x and the arrival packet rate at therelay decrease by increasing the value of the beam alignmentdelay to Da = 5. The effects of this can be observed in Fig. 4b,where the queue is never unstable and the instability regionschange as well. Namely, the instability region for qu = 0.5is visible at N = 20, whereas, for qu = 0.9 it is betweenN = 15 and N = 20. For regions far from instability, theanalytical model and the simulations almost coincide and thedelay increases with the increasing number of UEs for all thecurves.

The increasing trend of the delay is caused by two mainreasons: i) an increasing number of packets inside the queueand ii) increasing interference (that reduces the success prob-ability of transmission). For a better understanding of thisphenomenon, we show in Fig. 5a the delay per packet as sumof its components, i.e., UE’s and relay transmission delaysand queueing and alignment delays, for the red curve shownin Fig. 4b (qu = 0.5, Da = 5, and γ = 10 dB). We can

Page 10: On the Benefits of Network-Level Cooperation in Millimeter

9

(a) Da = 0.

10

20

30

40

50

60

70

80

90

θrd

0 0.2 0.4 0.6 0.8 1

quf

Through

put[packets/slot]

0.4

0.45

0.5

0.55

0.6

0.65

0.7

(b) Da = 5.

Fig. 8: Throughput, T , while varying qu f and θrd , with qur = 0.5.For each value of θrd , we represent with a blue solid line the valueof qu f that maximizes the throughput.

observe that close to the instability region (N = 20) thebiggest delay component is given by the queueing delay,whereas the transmission delays (both UE and R) as well asthe alignment delay are barely increasing with N . A differentbehavior can be observed in Fig. 5b, where the same scenarioof Fig. 5a is considered, but for a higher SINR threshold,i.e., γ = 15 dB. In this case, the higher value of γ reduces thesuccess probability of transmission and the arrivals at the relay.Thus, the queueing delay does not represent anymore the mainissue, nor does the relay transmission delay. In contrast, theincreased unsuccessful transmission attempts make the packetswaiting for being transmitted for most of the time insidethe UEs’ queue that increases the UE transmission and thealignment delays. This is also due to the fact that, as explainedin Section II, after a transmission attempt the UE can changetransmission strategy.

In Fig. 6, we show the impact of the beam alignmentduration Da on the delay components. We set the numberof UEs N = 10, qu = 0.5, and γ = 10 dB while increasing thevalue of Da . First, we can observe that the delay has a non-monotonic behavior. More precisely, for Da = 0 and Da = 1the queue is instable and unstable, respectively, and we donot report any value. Then, the delay decreases at first, mostlybecause the increased Da reduces the transmit probability andthe arrival rate at the relay queue. This is confirmed by thedecrease in the queueing delay that represents the highest delaycomponent for lower values of Da . However, above a certainvalue of Da , the delay start increasing again mostly because

10

20

30

40

50

60

70

80

90

θrd

0 0.2 0.4 0.6 0.8 1quf

Delay

per

packet

[slots]

14

16

18

20

22

24

26

28

30

(a) Da = 0.

10

20

30

40

50

60

70

80

90

θrd

0 0.2 0.4 0.6 0.8 1

quf

Delay

per

packet[slots]

14

16

18

20

22

24

26

28

30

(b) Da = 5.

Fig. 9: Delay per packet, D, while varying qu f and θrd , with qur =0.5. For each value of θrd , we represent with a white solid line thevalue of qu f that minimizes the delay.

the alignment delay increases. In contrast to the delay, thethroughput has a slightly different behavior. In Fig. 7, weshow the throughput and delay tradeoff for several values ofDa and it can be observed that the throughput monotonicallydecreases.

A. Optimal Transmission Strategy

Hereafter, we set qu = 0.1 and N = 10 (i.e., the queue isalways stable) and we study the effect of the two transmissionstrategies (FD and BR) on the throughput and the delay. InFig. 8a, we set qur = 0.5 and show the aggregate throughput,T , while varying the probability of using the FD transmission,qu f , and θrd , for Da = 0. The solid blue line shows thevalues of qu f that maximizes the throughput for each valueof θrd . Namely, for small values of θrd , the BR transmissionis preferable (corresponding to small values of qu f ). In thiscase, we can use a narrow beam with high beamforming gainto transmit simultaneously to R and the mmAP. In contrast,for higher values of θrd , the optimal value of qu f becomes 1,which corresponds to using the FD transmission. For Da = 5,in Fig. 8b, we have almost the same behavior. However, theselection of the best strategy is either qu f = 0 or qu f = 1,since the number of beam alignments is minimized and qt xmaximized when qu f = 0 or qu f = 1.

In Fig. 9a and Fig. 9b we show the delay for the same settingof Fig. 8a and Fig. 8b, respectively, while varying qu f , andθrd . For this scenario, where the queue is stable, the highestcontributions to the delay are given by the transmission and

Page 11: On the Benefits of Network-Level Cooperation in Millimeter

10

(a) Da = 0.

30

40

50

60

70

80

90

100

110

120

θrd

0 0.2 0.4 0.6 0.8 1

qur

Through

put[packets/slot]

0.54

0.55

0.56

0.57

0.58

0.59

0.6

0.61

0.62

0.63

0.64

(b) Da = 5.

Fig. 10: Throughput, T , while varying qur and θrd with qu f = 1.For each value of θrd , we represent with a solid blue line the valueof qur that maximizes the throughput.

alignment delays. For this reason the strategy that minimizesthe delay, which is shown with a white solid line, followsalmost the same behavior of the transmission strategy thatmaximizes the throughput.

In Fig. 10, we show the throughput T while varying theprobability to transmit at the relay qur and θrd , when the FDtransmission is used, i.e., qu f = 1. Note that larger valuesof θrd correspond to longer distances between R and themmAP, i.e., drd (see Fig. 1). Thus, when θrd increases, theinterference of the relay on the transmission to the mmAPdecreases. As explained in Section II, the relay is in LOSwith the mmAP and uses always the FD transmission with highbeamforming gain. Such high gain can cause high interferenceat the receiver side of the mmAP. As results of this, we canobserve higher throughput for larger values of θrd . Indeed,packets that are successfully transmitted by the relay are barelyaffected by increasing the distance between R and the mmAP.In contrast, the packets that are successfully transmitted byUEs to the mmAP increases for wider θrd because theinterference caused by R decreases. In Fig. 10a, for whichDa = 0, the strategy that maximizes T is shown by a solidblue line and it is qur ≈ 0.6 for all the values of θrd . Incontrast, in Fig. 10b, where Da = 5, we observe a differentbehavior. The optimal strategy coincides with qur = 1 forlower value of θrd that allows to minimize the probability tochange strategy. When θrd increases, the highest throughputis provided by a slightly smaller value of qur , with an increasein the transmissions to the mmAP.

30

40

50

60

70

80

90

100

110

120

θrd

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

qur

Delay

per

packet

[slots]

16

16.5

17

17.5

18

18.5

19

(a) Da = 0.

(b) Da = 5.

Fig. 11: Delay per packet, D, while varying qur and θrd , with qu f =1. For each value of θrd , we represent with a white solid line thevalue of qur that minimizes the delay.

For the same settings of Fig. 10a and Fig. 10b, we show theresults for delay in Fig. 11a and Fig. 11b, respectively. First,we can observe that the best transmission strategy for the delayis different from the one for the throughput. Indeed, for thethroughput it is more beneficial to transmit to the relay R,while it is preferable to transmit to the mmAP for minimizingthe delay. Namely, by transmitting to the mmAP the packetsavoid the queueing delay at the relay and the interference thatthis creates on the mmAP, since the relay transmits a loweramount of packets. In Fig. 10a and Fig. 10b, we observe thatfor the FD transmission and short distances (dur = 30 m anddud = 50 m), we have higher values of T as θrd increases.

Finally, we show the effects of increasing the distances,i.e, dud and dur , when considering the same scenario ofFig. 10. In Fig. 12a, we show the throughput with longerdistances i.e., dur = 50 m, dud = 200 m, and Da = 0. Theblue solid line shows the transmission strategy for maximizingthe throughput. For lower values of θrd the transmissions tothe relay are preferable, as in Fig. 10a. However, for longerdistances drd (high values of θrd), the relay does not becomeanymore beneficial and in general T decreases. As a result,the transmissions between the UEs and the mmAP are barelyaffected by the interference of R and the path loss betweenR and the mmAP is dominant. This path loss decreases thesuccess probability for a packet from R to the mmAP andmakes the queue at R not stable when qur is above certainvalues. The unstabilty and instability regions can be betterobserved in Fig. 13a, where we show the delay for Da = 0.

Page 12: On the Benefits of Network-Level Cooperation in Millimeter

11

30

40

50

60

70

80

90

100

110

120

θrd

0 0.2 0.4 0.6 0.8 1qur

Throughput[packets/slot]

0

0.05

0.1

0.15

0.2

0.25

0.3

(a) Da = 0.

30

40

50

60

70

80

90

100

110

120

θrd

0 0.2 0.4 0.6 0.8 1

qur

Through

put[packets/slot]

0

0.05

0.1

0.15

0.2

0.25

0.3

(b) Da = 5.

Fig. 12: Throughput, T , while varying qur and θrd with qu f = 1,dur = 50 m and dud = 200 m. For each value of θrd , we representwith a solid blue line the value of qur that maximizes the throughput.

Here, we do not report (i.e., white area) the values of qur andθrd for which the queue is unstable. For higher value of Da ,we can observe in Fig 13a and Fig 13b that the unstabilityregion changes, but the optimal strategy for the throughputhas almost the same behavior.

B. Imperfect Beam Alignment

Let us consider the problem of beam misalignment. Giventhe sectored antenna model described in Section II-B, weintroduce a beam alignment error (ε) that is modelled byusing the truncated gaussian error model in [39]. Thus, thetransmitter and receiver gains in (1) can be computed asfollows:

g =

2πθBW

with probability PG (σ),0 with probability 1 − PG (σ).

(28)

The term PG (σ) is the probability that the absolute value ofthe error is less than the beamwidth and it is given by:

PG (σ) = P( |ε | ≤ θBW ) =Erf

(θBW /

√2σ2)

Erf(π/√

2σ2) , (29)

where, Erf is the error function and σ2 represents the varianceof ε . Note that, the beam alignment error affects only the com-putation of the success probability transmission in AppendixA, whereas the rest of the analysis remains the same.

Now, we can show the results for throughput and delaywhen errors in the beam alignment phase are considered. InFig 14a and 14b we show the throughput while varying qu f

30

40

50

60

70

80

90

100

110

120

θrd

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

qur

Delay

per

packet

[slots]

0

50

100

150

200

250

300

(a) Da = 0.

30

40

50

60

70

80

90

100

110

120

θrd

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

qur

Delay

per

packet

[slots]

0

50

100

150

200

250

300

(b) Da = 5.

Fig. 13: Delay per packet, D, while varying qur and θrd , with qu f =1, dur = 50 m and dud = 200 m.

and θrd for σ2 = 5◦ and σ2 = 10◦, respectively. By comparingthese figures with Fig. 8a, where σ2 = 0◦, we can observethat the throughput, T , decreases with the increase of σ2.Moreover, for higher values of this parameter, the BR schemeincreases its range of θrd values for which it represents theoptimal choice. Namely, since PG (σ) increases for highervalues of θBW , wider beams are less subject to alignmenterrors. The delay for σ2 = 5◦ has the same behavior of T , as itis shown in 15a. Whereas, in Fig 15b we can observe that, forσ2 = 10◦, the delay is not minimum when qu f = 0. Indeed,although BR transmissions are more robust to alignment er-rors, they provide a lower beamforming gain that decreases thenumber of packets that are successfully received by the mmAP.However, these packets are still successfully received by R,whose queue size (and queueing delay) increases significantlywith respect to Fig 15a.

C. Imperfect Full-Duplex Communications

In this section, we consider non-perfect full-duplex relayoperations, where packets that are transmitted by UEs to therelay are subject to an additional interference term when therelay is transmitting [16], [40]. We assume that the relayimplements a self-interference mitigation technique , whoseefficiency is modelled by a scalar 0 ≤ β ≤ 1. This is similarto the parameter α used to model the interference cancellationat the receiver side of the relay in Section II-B. Namely, β = 0models a perfect self-interference cancellation, whereas, whenβ = 1 the self-interference cancellation is not used. The term βaffects the SINR expression in (1) and the success probability

Page 13: On the Benefits of Network-Level Cooperation in Millimeter

12

10

20

30

40

50

60

70

80

90θrd

0 0.2 0.4 0.6 0.8 1

quf

Through

put[packet/slot]

0.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

0.5

0.55

0.6

(a) σ2 = 5◦.

10

20

30

40

50

60

70

80

90

θrd

0 0.2 0.4 0.6 0.8 1

quf

Through

put[packet/slot]

0

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

(b) σ2 = 10◦.

Fig. 14: Throughput with imperfect beam alignment while varyingqu f and θrd . Moreover, we set qur = 0.5, dur = 30 m and dud =50 m.

transmission, but the rest of the analysis in Section III andSection IV remain the same. In Fig. 16 and Fig. 17 we showthe throughput and delay, respectively, while varying N forseveral values of β and transmit probability, i.e., qu . Fromthese figures, we can observe that, when β > 0, the additionalinterference term (self-interference at R) decreases the numberof packets successfully received by R and, therefore, thethroughput. Moreover, Fig. 17 shows that for qu = 0.9, thelower number of packets at the relay makes the queue alwaysstable. However, in general, the behavior of the curves forβ > 0 does not change significantly with respect to the casewhen β = 0.

VI. CONCLUSION

We have presented a throughput and delay analysis forrelay assisted mm-wave wireless networks, where the UEs canadopt either an FD or a BR transmission. In particular, wehave analyzed the performance of the queue at the relay byderiving the stability conditions and the arrival and servicerates. We have numerically evaluated the analytical modeland validated our analysis with simulations. The analyticalmodel matches well the simulation results. The latter show thatbeam alignment causes a decrease in the transmit probabilityinversely proportional to the beam alignment duration, Da ,and the probability to change the strategy. We have shownhow, in case of queue stability, the increase in Da decreasesthe throughput and the delay. However, for dense scenarios,where the queue at the relay is close to becoming unstable,

10

20

30

40

50

60

70

80

90

θrd

0 0.2 0.4 0.6 0.8 1quf

Delay

per

packet

[slots]

0

10

20

30

40

50

60

70

(a) σ2 = 5◦.

10

20

30

40

50

60

70

80

90

θrd

0 0.2 0.4 0.6 0.8 1

quf

Delay

per

packet[slots]

0

20

40

60

80

100

120

140

160

(b) σ2 = 10◦.

Fig. 15: Delay with imperfect beam alignment while varying qu f andθrd . Moreover, we set qur = 0.5, dur = 30 m and dud = 50 m.

the increase in Da can decrease the delay per packet. Moreprecisely, when being close to the instability condition, wecould show that the highest delay component is given by thequeueing delay. Whereas, when the queue is stable, the delayis affected mostly by the transmission and alignment delay.

Moreover, we have showed that the optimal transmissionstrategy highly depends on the network topology, e.g., dud ,dur , θrd , and the queue condition. When the queue is stable,the values of qu f and qur that maximize the throughput andminimize the delay usually coincide. However, when beingclose to the instability and unstability regions, the throughputand delay present a tradeoff. Furthermore, as expected, weshowed that is not always beneficial to use narrow beams (FD)compared to wider beams (BR). As a matter of fact, for shortdistances and a beamwidth of 30◦, a broadcast transmissionis still preferable, although it provides a lower beamforminggain than FD. We have additionally showed that wider beamsare more robust to beam alignment errors. However, whenthe angle between the mmAP and the relay is too wide orthe distances and the SINR threshold increase, an FD strategyshould be chosen.

Finally, we could observe, that for the evaluated scenarios,the interference caused by the relay and the link path lossrepresent the main impediments for the success probability,hence the throughput and the delay, in case of short and longdistances among the nodes, respectively.

Page 14: On the Benefits of Network-Level Cooperation in Millimeter

13

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

N

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Throughput[packets/slot]

qu = 0.1 and β = 0

qu = 0.1 and β = 10−9

qu = 0.1 and β = 10−6

qu = 0.9 and β = 0

qu = 0.9 and β = 10−9

qu = 0.9 and β = 10−6

Fig. 16: Throughput, T , while varying the number of UEs forseveral values of β and transmit probability (i.e., qu = 0.1 andqu = 0.9) when Da = 0

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20

N

0

5

10

15

20

25

30

35

40

45

50

Delay

per

packet[slots]

qu = 0.1 and β = 0qu = 0.1 and β = 10−9

qu = 0.1 and β = 10−6

qu = 0.9 and β = 0qu = 0.9 and β = 10−9

qu = 0.9 and β = 10−6

Fig. 17: Delay per packet while varying the number of UEs forseveral values of β and transmit probability (i.e., qu = 0.1 andqu = 0.9) when Da = 0

APPENDIX A

We now derive the success probability expression, con-ditioned to the sets If and Ib , for a generic link i j withN symmetric UEs. In order to average on all the possiblescenarios for the LOS and NLOS links, we consider that kand h UEs over |If | and |Ib | interferers, respectively, are inLOS. Thus, the success probability can be derived as follows:

P f

i j/If ,Ib= P(LOSi j )P(SINR f

i j/If ,Ib≥ γ |LOSi j )

+ P(NLOSi j )P(SINR f

i j/If ,Ib≥ γ |NLOSi j )

= P(LOSi j )[ |If |∑k=0

(|If |

k

)P(LOSi j )k P(NLOSi j ) |If |−k

×

|Ib |∑h=0

(|Ib |

h

)P(LOSi j )hP(NLOSi j ) |Ib |−h

× P(SINR f

i j/If l ,If n,Ibl ,Ibn≥ γ |LOSi j )

]

+ P(NLOSi j )[ |If |∑k=0

(|If |

k

)P(LOSi j )k P(NLOSi j ) |If |−k

×

|Ib |∑h=0

(|Ib |

h

)P(LOSi j )hP(NLOSi j ) |Ib |−h

× P(SINR f

i j/If l ,If n,Ibl ,Ibn≥ γ |NLOSi j )

], (30)

where, P(SINR f

i j/If ,Ib≥ γ |LOSi j ) and P(SINR f

i j/If ,Ib≥

γ |NLOSi j ) are the probabilities that the received SINR isabove γ, when link i j is in LOS and NLOS, respectively,conditioned to the specific scenarios of interferers, If andIb . The expression for P(SINR f

i j/If l ,If n,Ibl ,Ibn≥ γ |LOSi j )

is given in (1).

APPENDIX BProof. To prove Theorem 1, we compute the probability that aUE transmits in timeslot k. We identify the following mutuallyexclusive events:

1) the UE is performing a beam alignment. In this case theUE cannot transmit and qt x = 0.

2) Alk−Da : the UE starts a beam alignment in timeslot k −Da . In this case qt x = 1. This is because the UE maystart a beam alignment only if it decides to transmit.

3) Ik : the UE has not started an alignment in the previousDa timeslots with respect to the k-th timeslot (k − Da ,k −Da −1,..., k −1). In this case, the UE can transmit intimeslot k, if and only if it decides to transmit with thesame strategy used in the previous transmission attempt.Thus, qt x = quP(sk = i ∩ sk = i), with, i ∈ S, and krepresents the timeslot where the previous transmissionattempt occurs with respect to the k-th timeslot.

First, we analyze the second event. It occurs when in timeslotk − Da the following two independent events hold: i) Ik−Da

and ii) the UE decides to transmit with a different strategythan that used in the previous transmission attempt. Thus theevent Alk−Da occurs with probability:

P(Alk−Da

)= P

(Ik−Da

)qu

(1 − P(sk−Da = i ∩ s Fk−Da

= i))

(31)

Thus, we can express qt x as follows:

qt x = P(Alk−Da

)+ P

(Ik

)quP(sk = i ∩ sk = i)

= P(Ik−Da

)qu

(1 − P(sk−Da = i ∩ s Fk−Da

= i))

+ P(Ik

)quP(sk = i ∩ sk = i) = P

(Ik

)qu, (32)

where, the first equality exploits the mutual exclusivity of thethree events. In the second equality of (32), we take intoaccount (31) and in the last equality we have assumed thatP(sk = i) is i.d. for any timeslot, giving P

(Ik−Da

)= P

(Ik

)and P(sk−Da = i ∩ s Fk−Da

= i) = P(sk = i ∩ sk = i).Consider the probability of the complementary event of Ik ,

i.e., Ik . This event occurs when the UE starts a beam alignmentin one of timeslots k −Da , k −Da − 1, ..., k − 1. Thus, P

(Ik

)is derived as the probability of the union of the followingmutually exclusive events:

⋃k−1i=k−Da

Ali :

P(Ik

)= P

( k−1⋃i=k−Da

Ali)=

k−1∑i=k−Da

P(Ali

)=

k−1∑i=k−Da

P(Ii)qu

(1 − P(si = j ∩ s i = j)

)= DaP

(Ik

)qu

(1 − P(sk = i ∩ sk = i)

), (33)

where, in the last step of (33), we use the same reasoning forthe last equality of (32). Finally, by replacing (33) in P

(Ik

)=

1 − P(Ik

)we obtain (2). �

Page 15: On the Benefits of Network-Level Cooperation in Millimeter

14

APPENDIX C

In this appendix, we provide the transition probabilitiesp0k

and p1k

for the two UE case. In this scenario, in everytimeslot, the queue size can increase by a maximum of two,i.e., when both UEs successfully transmit to R and R itselfdoes not successfully transmit any packet. Moreover, R cantransmit a packet only when the queue is not empty. Therefore,by considering all the possible transmission strategies andcombinations of successfully received packets at R, we canwrite the following:

p01 = 2qt xqt xqu f qur P f

ur + 2qt xqt xqubPbur P

b

ud

+ 2q2t xq2

u f q2ur P f

ur/ {1} fPf

ur/ {1} f + 2q2t xq2

u f qurqumP fur

+ 2q2t xqu f qubqur

[P f

ur/ {1}b

(1 − Pb

ur/ {1} f Pb

ud

)(34)

+ Pf

ur/ {1}b Pbur/ {1} f P

b

ud

]+2q2

t xqubqu f qumPbur P

b

ud/ {1} f

+ q2t xq2

ub

[2Pb

ur/ {1}b Pb

ud/ {1}b(1 − Pb

ur/ {1}b Pb

ud/ {1}b)].

p02 =

(qt xqu f qur P f

ur/ {1} f

)2+(qt xqubPb

ur/ {1}b Pb

ud/ {r } f , {1}b)2

+ 2q2t xqubqu f qur Pb

ur/ {1} f Pb

udP f

ur/ {1}b. (35)

p1−1 = qr

[P frd

(q2t x + 2qt xqt xqu f qur P

f

ur + (qt xqu f qur Pf

ur/ {1} f )2)

+ P f

rd/ {1} f

(2qt xqt xqu f qum + 2q2

t xq2u f qumqur P

f

ur

)+ P f

rd/ {1}b

(2qt xqt xqub (1 − Pb

ur Pb

ud/ {r } f )

+ 2q2t xqubqu f qur (1 − Pb

ur/ {1} f Pb

ud/ {r } f )Pf

ur/ {1}b)

+ P f

rd/ {1} f , {1}b2q2

t xqu f qubqum (1 − Pbur P

b

ud/ {1,r } f )

+ P f

rd/ {2}b

(qt xqub (1 − Pb

ur/ {1}b Pb

ud/ {r } f , {1}b ))2]

+ P f

rd/ {2} fq2t xq2

u f q2um . (36)

p11 = qr p0

1 + qr[2qt xqt xqu f qur P f

ur Pf

rd

+ 2qt xqt xqubPbur P

b

ud/ {r } f Pf

rd/ {1}b

+ 2q2t xq2

u f qumqur P fur P

f

rd/ {1} f

+ 2q2t xqu f qubqumPb

ur Pb

ud/ {1,r } f Pf

rd/ {1} f , {1}b

+ q2t xq2

u f q2ur

(P f

ur/ {1} fPf

ur/ {1} f Pf

rd + (P f

ur/ {1} f)2P f

rd

)+ q2

t xq2ub

(2Pb

ur/ {1}b Pb

ud/ {r }, {1}Pf

rd/ {2}b

× (1 − Pbur/ {1}b P

b

ud/ {r } f , {1}b )

+ (Pbur/ {1}b P

b

ud/ {r } f , {1}b )2P f

rd/ {2}b

)+ 2q2

t xqubqu f qur(Pbur/ {1} f P

b

ud/ {r } f Pf

ur/ {r } f , {1}b Pf

rd/ {1}b

+ (1 − Pbur/ {1} f P

b

ud/ {r } f )P f

ur/ {1}bPf

rd/ {1}b

+ Pbur/ {2} f P

b

ud/ {r } f P f

ur/ {1}bP f

rd/ {1}b

)]. (37)

p12 = qr p0

2 + qr[(

qt xqu f qur P f

ur/ {1} f

)2Pf

rd

+(qt xqubPb

ur/ {1}b Pb

ud/ {r } f , {1}b)2

Pf

rd/ {2}b

+ 2q2t xqubqu f qur Pb

ur/ {1} f Pb

udP f

ur/ {1}bPf

rd/ {1}b]. (38)

APPENDIX DHereafter, we analyze the performance of the queue at

the relay for N UEs. The average arrival rate that is givenin (4). In order to compute the number of packets successfullyreceived by R, i.e., r0

kand r1

k, we consider all the possible

combinations of UE’s transmission strategies and interferencescenarios. Thus, we indicate with m out of N the number ofUEs that transmit a packet, with i (at most m) the number oftransmitting UEs that use FD transmissions (m − i UEs usethe BR transmission), and with j the number of FD UEs thattransmit to R (i − j UEs transmit to the mmAP). Moreover,k is the total number of packets successfully received by therelay in a timeslot, and k f out of them are received by usingFD transmissions (k − k f packets are received by using a BRtransmission). Thus, we can express r0

kand r1

kas follows:

r0k =

N∑m=k

(Nm

)qmtxq N−m

tx

m∑i=0

(mi

)qiu f qm−i

ub

×

i∑j=max(0,k+i−m)

(ij

)q jurqi− j

um

min( j,k )∑k f =max(0,k+i−m)

(j

k f

)× (P f

ur/ { j−1} f , {m−i }b)k f (P

f

ur/ { j−1} f , {m−i }b ) j−k f (39)

×

(m − ik − k f

)(Pb

ur/ { j } f , {m−i−1}b Pb

ud/ {i− j } f , {m−i−1}b )k−k f

× (1 − Pbur/ { j } f , {m−i−1}b P

b

ud/ {i− j } f , {m−i−1}b )m−i−k+k f ,

r1k = qrr0

k + qrN∑

m=k

(Nm

)qmtxq N−m

tx

m∑i=0

(mi

)qiu f qm−i

ub

×

i∑j=max(0,k+i−m)

(ij

)q jurqi− j

um

min( j,k )∑k f =max(0,k+i−m)

(j

k f

)× (P f

ur/ { j−1} f , {m−i }b)k f (P

f

ur/ { j−1} f , {m−i }b ) j−k f (40)

×

(m − ik − k f

)(Pb

ur/ { j } f , {m−i−1}b Pb

ud/ {i− j,r } f , {m−i−1}b )k−k f

× (1 − Pbur/ { j } f , {m−i−1}b P

b

ud/ {i−1,r } f , {m−i−1}b )m−i−k+k f .

Then, for deriving the relay’s service rate µr , we follow thesame reasoning that is done above and the successful packettransmission of R is averaged over all the possible interferencescenarios:

µr = qrN∑

m=0

(Nm

)qmtxq N−m

tx

m∑i=0

(mi

)qmu f qN−m

ub

×

i∑j=0

(ij

)q jurqi− j

um P f

rd/ {i− j } f , {m−i }b, (41)

Now, we can study the evolution of the queue at R by usinga discrete time Markov Chain, whose transition matrix is a

Page 16: On the Benefits of Network-Level Cooperation in Millimeter

15

lower Hessenberg matrix, whose elements are represented bythe probabilities that the queue size increases by k packets ina timeslot when the queue is empty or not, i.e., p0

kand p1

k. By

using the same notation as in (39), these terms are given by:

p0k = r0

k, (42)

p1−1 = qr

N∑m=0

(Nm

)qmtxq N−m

tx

m∑i=0

(mi

)qiu f qm−i

ub

×

i∑j=0

(ij

)q jurqi− j

um P f

rd/ {i− j } f , {m−i }b

(Pf

ur/ { j−1} f , {m−i }b) j

× (1 − Pbur/ { j } f , {m−i−1}b P

b

ud/ {i− j,r } f , {m−i−1}b )m−i, (43)

p1k = qrr0

k + qrN∑

m=k

(Nm

)qmtxq N−m

tx

m∑i=0

(mi

)qiu f qm−i

ub

×

i∑j=max(0,k+i−m)

(ij

)q jurqi− j

um

min( j,k )∑k f =max(0,k+i−m)

(j

k f

)× (P f

ur/ { j−1} f , {m−i }b)k f (P

f

ur/ { j−1} f , {m−i }b ) j−k f

×

(m − ik − k f

)(Pb

ur/ { j } f , {m−i−1}b Pb

ud/ {i− j,r } f , {m−i−1}b )k−k f

× (1 − Pbur/ { j } f , {m−i−1}b P

b

ud/ {i− j,r } f , {m−i−1}b )m−i−k+k f

× Pf

rd/ {i− j } f , {m−i }b + qrN∑

m=k+1

(Nm

)qmtxq N−m

tx

m∑i=0

(mi

)qiu f qm−i

ub

×

i∑j=max(0,k+1+i−m)

(ij

)q jurqi− j

um

min( j,k+1)∑k f =max(0,k+1+i−m)

(j

k f

)

×

(m − i

k + 1 − k f

)(P f

ur/ { j−1} f , {m−i }b)k f (P

f

ur/ { j−1} f , {m−i }b ) j−k f

× (Pbur/ { j } f , {m−i−1}b P

b

ud/ {i− j,r } f , {m−i−1}b )k+1−k f

× (1 − Pbur/ { j } f , {m−i−1}b P

b

ud/ {i− j,r } f , {m−i−1}b )m−i−k−1+k f

× P f

rd/ {i− j } f , {m−i }b, (44)

p10 = 1 − p1

−1 −

N∑k=1

p1k . (45)

Finally, we can compute the probability that the queue isempty, P(Q = 0), and the average relay queue size, Q.Hereafter, we show the main steps of the derivations that areillustrated with more details in [41]. First, we can note that thequeue at R can be modelled as an MN /M/1 queue. Therefore,the equation that describes the evolution of the states is givenby:

si = ai s0 +

i+1∑j=1

bi− j+1s j, (46)

where, si represents the probability of finding our system instate i at equilibrium. Let s be the steady-state distributionvector and S(z) its Z-transformation, we have:

S(z) =∞∑i=1

si z−i ⇒ Q = −S′(1) = −s0K ′′(1)L′′(1)

. (47)

The terms K ′′(z) and L′′(z) in (47) are the second derivativesof K (z) and L(z), respectively. These are given by [41]:

K (z) = (−z−2 A(z) + z−1 A′(z) − B′(z))(z−1 − B(z))

− (z−1 A′(z) − B(z))(−z−2 − B′(z)), (48)

L(z) = (z−1 − B(z))2, (49)

where, A(z) =∑N

i=1 ai z−i and B(z) =∑N+1

i=1 bi z−i (ai = p0i

and bi = p1i−1). The term s0, in (47), is the probability that

the queue is empty at equilibrium, which can be written asfollows [41]:

P(Q = 0) =1 + B′(1)

1 + B′(1) − A′(1). (50)

Then, by replacing the first derivative of A(z) and B(z) in(50), we obtain:

P(Q = 0) =p1−1 −

∑Ni=1 ip1

i

p1−1 −

∑Ni=1 ip1

i + λ0r

. (51)

Finally, by considering (47), (48), (49), and (51), we canexpress Q as follows:

Q =

(∑Nk=1 kp1

k− p1−1

) ∑Nk=1 k (k + 3)p0

k

2(∑N

k=1 kp1k− p1−1

) (p1−1 −

∑k=1 N kp1

k+ λ0

r

)+

λ0r

(2p1−1 −

∑Nk=1 k (k + 3)p1

k

)2(∑N

k=1 kp1k− p1−1

) (p1−1 −

∑k=1 N kp1

k+ λ0

r

) . (52)

REFERENCES

[1] C. Tatino, N. Pappas, I. Malanchini, L. Ewe, and D. Yuan, “Throughputanalysis for relay-assisted millimeter-wave wireless networks,” in 2018IEEE Globecom Workshops (GC Wkshps), Dec. 2018, pp. 1–7.

[2] E. Hossain and M. Hasan, “5G cellular: key enabling technologiesand research challenges,” IEEE Instrumentation Measurement Magazine,vol. 18, no. 3, pp. 11–21, June 2015.

[3] T. S. Rappaport, Y. Xing, G. R. MacCartney, A. F. Molisch, E. Mellios,and J. Zhang, “Overview of millimeter wave communications for fifth-generation (5G) wireless networks-with a focus on propagation models,”IEEE Transactions on Antennas and Propagation, vol. 65, no. 12, pp.6213–6230, Dec. 2017.

[4] H. Zhao, R. Mayzus, S. Sun, M. Samimi, J. K. Schulz, Y. Azar, K. Wang,G. N. Wong, F. Gutierrez, and T. S. Rappaport, “28 GHz millimeter wavecellular communication measurements for reflection and penetration lossin and around buildings in New York City,” in IEEE InternationalConference on Communications (ICC), June 2013, pp. 5163–5167.

[5] G. R. MacCartney and T. S. Rappaport, “73 GHz millimeter wavepropagation measurements for outdoor urban mobile and backhaulcommunications in New York City,” in IEEE International Conferenceon Communications (ICC), June 2014, pp. 4862–4867.

[6] Y. Niu, Y. Li, D. Jin, L. Su, and A. V. Vasilakos, “A survey ofmillimeter wave communications (mmwave) for 5G: Opportunities andchallenges,” Wireless Networks, vol. 21, no. 8, pp. 2657–2676, Nov.2015. [Online]. Available: https://doi.org/10.1007/s11276-015-0942-z

[7] C. Tatino, I. Malanchini, D. Aziz, and D. Yuan, “Beam based stochasticmodel of the coverage probability in 5G millimeter wave systems,” in the15th International Symposium on Modeling and Optimization in Mobile,Ad Hoc, and Wireless Networks (WiOpt), May 2017, pp. 1–6.

Page 17: On the Benefits of Network-Level Cooperation in Millimeter

16

[8] D. Moltchanov, A. Ometov, S. Andreev, and Y. Koucheryavy, “Upperbound on capacity of 5G mmwave cellular with multi-connectivitycapabilities,” Electronics Letters, vol. 54, no. 11, pp. 724–726, 2018.

[9] C. Tatino, I. Malanchini, N. Pappas, and D. Yuan, “Maximum throughputscheduling for multi-connectivity in millimeter-wave networks,” in the16th International Symposium on Modeling and Optimization in Mobile,Ad Hoc, and Wireless Networks (WiOpt), May 2018, pp. 1–6.

[10] A. K. Sadek, K. J. R. Liu, and A. Ephremides, “Cognitive multipleaccess via cooperation: Protocol design and performance analysis,” IEEETransactions on Information Theory, vol. 53, no. 10, pp. 3677–3696,Oct. 2007.

[11] B. Rong and A. Ephremides, “Cooperative access in wireless networks:Stable throughput and delay,” IEEE Transactions on Information Theory,vol. 58, no. 9, pp. 5890–5907, Sept. 2012.

[12] O. Simeone, Y. Bar-Ness, and U. Spagnolini, “Stable throughput of cog-nitive radios with and without relaying capability,” IEEE Transactionson Communications, vol. 55, no. 12, pp. 2351–2360, Dec. 2007.

[13] N. Pappas, A. Ephremides, and A. Traganitis, “Relay-assisted multipleaccess with multi-packet reception capability and simultaneous transmis-sion and reception,” in IEEE Information Theory Workshop, Oct. 2011,pp. 578–582.

[14] G. Kramer, I. Maric, and R. D. Yates, “Cooperative communications,”Foundations and Trends in Networking, vol. 1, no. 3, pp. 271–425,2007. [Online]. Available: http://dx.doi.org/10.1561/1300000004

[15] W. Zhuang and M. Ismail, “Cooperation in wireless communicationnetworks,” IEEE Wireless Communications, vol. 19, no. 2, pp. 10–20,Apr. 2012.

[16] N. Pappas, M. Kountouris, A. Ephremides, and A. Traganitis, “Relay-assisted multiple access with full-duplex multi-packet reception,” IEEETransactions on Wireless Communications, vol. 14, no. 7, pp. 3544–3558, July 2015.

[17] G. Papadimitriou, N. Pappas, A. Traganitis, and V. Angelakis, “Network-level performance evaluation of a two-relay cooperative random accesswireless system,” Computer Networks, vol. 88, pp. 187–201, Sept. 2015.

[18] N. Pappas, I. Dimitriou, and Z. Cheng, “Network-level cooperation inrandom access iot networks with aggregators,” in 30th InternationalTeletraffic Congress (ITC 30), vol. 1, Sept. 2018.

[19] N. Zlatanov, A. Ikhlef, T. Islam, and R. Schober, “Buffer-aided cooper-ative communications: opportunities and challenges,” IEEE Communi-cations Magazine, vol. 52, no. 4, pp. 146–153, Apr. 2014.

[20] N. Nomikos, T. Charalambous, I. Krikidis, D. N. Skoutas,D. Vouyioukas, M. Johansson, and C. Skianis, “A survey on buffer-aidedrelay selection,” IEEE Communications Surveys Tutorials, vol. 18,no. 2, pp. 1073–1097, Secondquarter 2016.

[21] S. Kutty and D. Sen, “Beamforming for millimeter wave communica-tions: An inclusive survey,” IEEE Communications Surveys Tutorials,vol. 18, no. 2, pp. 949–973, Secondquarter 2016.

[22] M. Giordani, M. Mezzavilla, and M. Zorzi, “Initial access in 5Gmmwave cellular networks,” IEEE Communications Magazine, vol. 54,no. 11, pp. 40–47, Nov. 2016.

[23] C. N. Barati, S. A. Hosseini, M. Mezzavilla, T. Korakis, S. S. Panwar,S. Rangan, and M. Zorzi, “Initial access in millimeter wave cellularsystems,” IEEE Transactions on Wireless Communications, vol. 15,no. 12, pp. 7926–7940, Dec. 2016.

[24] V. K. Sakarellos, D. Skraparlis, A. D. Panagopoulos, and J. D. Kanel-lopoulos, “Cooperative diversity performance in millimeter wave radiosystems,” IEEE Transactions on Communications, vol. 60, no. 12, pp.3641–3649, Dec. 2012.

[25] B. Xie, Z. Zhang, and R. Q. Hu, “Performance study on relay-assistedmillimeter wave cellular networks,” in IEEE 83rd Vehicular TechnologyConference (VTC Spring), May 2016, pp. 1–5.

[26] S. Biswas, S. Vuppala, J. Xue, and T. Ratnarajah, “On the performanceof relay aided millimeter wave networks,” IEEE Journal of SelectedTopics in Signal Processing, vol. 10, no. 3, pp. 576–588, Apr. 2016.

[27] X. Lin and J. G. Andrews, “Connectivity of millimeter wave networkswith multi-hop relaying,” IEEE Wireless Communications Letters, vol. 4,no. 2, pp. 209–212, Apr. 2015.

[28] K. Belbase, Z. Zhang, H. Jiang, and C. Tellambura, “Coverage anal-ysis of millimeter wave decode-and-forward networks with best relayselection,” IEEE Access, vol. 6, pp. 22 670–22 683, 2018.

[29] N. Wei, X. Lin, and Z. Zhang, “Optimal relay probing in millimeter-wave cellular systems with device-to-device relaying,” IEEE Transac-tions on Vehicular Technology, vol. 65, no. 12, pp. 10 218–10 222, Dec.2016.

[30] S. Wu, R. Atat, N. Mastronarde, and L. Liu, “Coverage analysis ofd2d relay-assisted millimeter-wave cellular networks,” in IEEE Wireless

Communications and Networking Conference (WCNC), Mar. 2017, pp.1–6.

[31] J. W. Sungoh Kwon, “Relay selection for mmwave communications,”in the 28th Annual IEEE International Symposium on Personal, Indoorand Mobile Radio Communications (IEEE PIMRC), Oct. 2017, pp. 1–5.

[32] Y. Xu, H. Shokri-Ghadikolaei, and C. Fischione, “Distributed associationand relaying with fairness in millimeter wave networks,” IEEE Trans-actions on Wireless Communications, vol. 15, no. 12, pp. 7955–7970,Dec. 2016.

[33] R. Congiu, H. Shokri-Ghadikolaei, C. Fischione, and F. Santucci, “Onthe relay-fallback tradeoff in millimeter wave wireless system,” inIEEE Conference on Computer Communications Workshops (INFOCOMWKSHPS), Apr. 2016, pp. 622–627.

[34] S. Sun, T. S. Rappaport, R. W. Heath, A. Nix, and S. Rangan, “Mimo formillimeter-wave wireless communications: beamforming, spatial multi-plexing, or both?” IEEE Communications Magazine, vol. 52, no. 12, pp.110–121, Dec. 2014.

[35] H. Shokri-Ghadikolaei and C. Fischione, “The transitional behavior ofinterference in millimeter wave networks and its impact on mediumaccess control,” IEEE Transactions on Communications, vol. 64, no. 2,pp. 723–740, Feb. 2016.

[36] T. Bai and R. W. Heath, “Coverage and rate analysis for millimeter-wavecellular networks,” IEEE Transactions on Wireless Communications,vol. 14, no. 2, pp. 1100–1114, Feb. 2015.

[37] R. M. Loynes, “The stability of a queue with non-independent inter-arrival and service times,” Mathematical Proceedings of the CambridgePhilosophical Society, vol. 58, no. 3, pp. 497–520, 1962.

[38] 3GPP, “Study on channel model for frequencies from 0.5 to 100 GHz(release 14), 3GPP tr 38.901 v14.2.0,” Tech. Rep., Sept. 2017.

[39] A. Thornburg and R. W. Heath, “Ergodic capacity in mmwave ad hocnetwork with imperfect beam alignment,” in MILCOM - IEEE MilitaryCommunications Conference, Oct. 2015, pp. 1479–1484.

[40] Z. Xiao, P. Xia, and X. Xia, “Full-duplex millimeter-wave communica-tion,” IEEE Wireless Communications, vol. 24, no. 6, pp. 136–143, Dec.2017.

[41] F. Gebali, Analysis of Computer and Communication Networks. NewYork, NY, USA: Springer-Verlag, 2010.

Cristian Tatino received the B.Sc. and the M.Sc.degrees in telecommunications engineering fromUniversitá di Napoli Federico II, Italy, in 2011 and2013, respectively. From 2013 to 2015, he workedas system engineer on wireless telecommunicationsnetworks for railways application. Cristian is cur-rently an early state researcher in ACT5G MarieCurie Project and a Ph.D. student at Linköping Uni-versity (Sweden) at the Mobile Telecommunications(MT) group of the Communications and TransportSystems (CTS) division. Moreover, he has been a

visiting fellow at Nokia Bell Labs in Stuttgart, Germany, in 2016 and 2018.He focuses his research on the wireless link status anticipation for millimeter-waves wireless networks. In particular he studied the impact of the signalreflections on the coverage probability for non-line of sight communications,multi-connectivity and relaying solutions for communication reliability.

Page 18: On the Benefits of Network-Level Cooperation in Millimeter

17

Nikolaos Pappas (S’07-M’13) received the B.Sc.degree in computer science, the B.Sc. degree inmathematics, the M.Sc. degree in computer science,and the Ph.D. degree in computer science from theUniversity of Crete, Greece, in 2005, 2012, 2007,and 2012, respectively. From 2005 to 2012, he wasa Graduate Research Assistant with the Telecom-munications and Networks Laboratory, Institute ofComputer Science, Foundation for Research andTechnology, Hellas, and a Visiting Scholar withthe Institute of Systems Research, University of

Maryland at College Park, College Park, MD, USA. From 2012 to 2014, hewas a Postdoctoral Researcher with the Department of Telecommunications,Supélec, France. Since 2014, he has been with Linköping University, as aMarie Curie Fellow. He is currently an Associate Professor in mobile telecom-munications with the Department of Science and Technology, LinköpingUniversity, Norrköping, Sweden. His current research interests include wire-less communication networks with emphasis on the stability analysis, energyharvesting networks, network-level cooperation, age-of-information, networkcoding, and stochastic geometry. From 2013 to 2018, he was an Editor of theIEEE COMMUNICATIONS LETTERS. He is currently an Editor of the IEEETRANSACTIONS ON COMMUNICATIONS and the IEEE/KICS JOURNALOF COMMUNICATIONS AND NETWORKS.

Ilaria Malanchini is a Senior Research Engineerat the E2E Network & Service Automation Laband has been with Bell Labs Stuttgart since 2012.She received B.S. and M.S. degrees in telecommu-nications engineering from Politecnico di Milano,Italy, in 2005 and 2007, respectively, and a Ph.D.in electrical engineering from Drexel University,Philadelphia, and Politecnico di Milano in 2011.Ilaria was awarded the Meucci-Marconi Award andthe Chorafas Foundation Prize for her Master andPhD thesis, respectively. She published more than

25 peer reviewed journal and conference papers and has more than 10granted or filed patents. Her research interests focus on optimization models,mathematical programming, game theory, and machine learning, with theapplication of these techniques to wireless network problems such as wirelessresource allocation, anticipatory network optimization, infrastructure andresource sharing, and network slicing.

Lutz Ewe is a member of technical staff in theBell Labs End-To-End Network Service AutomationLab in Stuttgart, Germany. He received a diploma inphysics at the University of Giessen, and a doctoraldegree in electrical engineering at the Universityof Duisburg, Germany. Dr. Ewe’s current researchfocus includes self-organizing network based radioresource allocation and optimization in 5G networks.

Di Yuan (M’03-SM’15) received the M.Sc. degreein computer science and engineering and the Ph.D.degree in optimization from the Linkoping Instituteof Technology, in 1996 and 2001, respectively. Hewas a Guest Professor with the Technical Universityof Milan, Italy, in 2008, and a Senior VisitingScientist with Ranplan Wireless Network DesignLtd., U.K., in 2009 and 2012. In 2011 and 2013, hehas been part time with Ericsson Research, Sweden.In 2014 and 2015, he was a Visiting Professor withthe University of Maryland at College Park, College

Park, MD, USA. He is currently a Full Professor in telecommunications withthe Department of Science and Technology, Linköping University, Sweden.His current research interests include network optimization of 4G and 5Gsystems, and capacity optimization of wireless networks. He was a co-recipientof the IEEE ICC12 Best Paper Award and a Supervisor of the Best StudentJournal Paper Award by the IEEE Sweden Joint VT-COM-IT Chapter, in2014. He is an Area Editor of the Computer Networks journal. He has beenin the management committee of four European Cooperation in Scientific andTechnical Research (COST) actions, an Invited Lecturer of European Networkof Excellence EuroNF, and Principal Investigator of several European FP7 andHorizon 2020 projects.