13
SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 1 Stochastic Geometric Analysis of User Mobility in Heterogeneous Wireless Networks Wei Bao, Student Member, IEEE and Ben Liang, Senior Member, IEEE Abstract—Horizontal and vertical handoffs are important ramifications of user mobility in multi-tier heterogeneous wireless networks. They directly affect the signaling overhead and quality of calls in the system. However, they are difficult to analyze due to the irregularly shaped network topologies introduced by multiple tiers of cells. In this work, a stochastic geometric analysis framework on user mobility is proposed, to capture the spatial randomness and various scales of cell sizes in different tiers. We derive theoretical expressions for the rates of all handoff types experienced by an active user with arbitrary movement trajectory. We also derive the downlink data rate of the user given the set of cell tiers that it is willing to use. Based on these results, we provide guidelines for optimal tier selection under different user velocity, taking both the handoff rates and the data rate into consideration. Empirical study using real user mobility trace data and extensive simulation are conducted, demonstrating the correctness and usefulness of our analysis. Index Terms—Heterogeneous wireless network, mobility, hand- off, stochastic geometry, analytic geometry I. I NTRODUCTION T RADITIONAL single-tier macro-cellular networks pro- vide wide coverage for mobile user equipments (UEs), but they are insufficient to satisfy the exploding demand for high bandwidth access driven by modern mobile traffic, such as multimedia transmissions and cloud computing tasks. One effective means to increase network capacity is to provide more serving stations within a geographical area, i.e., installing a diverse set of small-cells such as femtocells [2] and WiFi hotspots [3], overlaying the macrocells, to form a multi-tier heterogeneous wireless network (HWN). Each small-cell is equipped with a shorter-range and lower-cost base station (BS) or access point (AP), to provide nearby UEs with higher-bandwidth network access with lower power usage, and to offload data traffic from macrocells. The commercial deployment of small-cells has attracted increasing attention in recent years. For example, AT&T Inc. now supplies a femtocell product [4], and it has also deployed WiFi APs in a number of metropolitan areas with dense population [5]. In the presence of multiple tiers of cells, however, mobile UEs may experience internetworking issues among different tiers. In particular, vertical handoffs (i.e., handoffs made be- tween two BSs in different tiers) are introduced [6]. Compared with horizontal handoffs (i.e., handoffs made between two BSs The authors are affiliated with the Department of Electrical and Computer Engineering, University of Toronto, 10 King’s College Road, Toronto, Ontario, Canada (email: {wbao, liang}@comm.utoronto.ca). This work has been supported in part by grants from Bell Canada and the Natural Sciences and Engineering Research Council (NSERC) of Canada. A part of this work has appeared as [1], which contains only the derivation of handoff rates. -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1 x coordinate (km) y coordinate (km) X Y B1 B2 B3 (a) A UE starts a call at X and terminates it at Y . It experiences one horizontal handoff at B 1 and two vertical handoffs at B 2 and B 3 . -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1 -1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1 x coordinate (km) y coordinate (km) C1 C2 X Y (b) Same BS locations and UE trajectory. Tier-3 BSs are not accessed. The same UE experiences one horizontal handoff at C 1 and one vertical handoff at C 2 . Fig. 1. An example of a three-tier HWN and selective tier association. Tier- 1, 2, and 3 BSs are represented by squares, circles, and triangles respectively; blue curves show intra-tier cell boundaries; green curves show inter-tier cell boundaries. in the same tier), vertical handoffs have a more complicated impact on both the UEs and the overall system. Additional risks are present during channel setup and tear down when a vertical handoff is made, such as (1) extra traffic latency; (2) additional network signaling; (3) more UE power consumption due to simultaneously active network interface to multiple tiers; and (4) higher risk in call drops or degraded quality of service (QoS) caused by the lack of radio resource after handoffs. Furthermore, vertical handoffs may be classified into inter-RAT (radio access technology) handoffs (e.g., handoffs made between LTE access and WiFi access) and intra-RAT

SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN ... · and network access optimization in HWNs by providing new technical tools to quantify the rates of horizontal and vertical handoffs,

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN ... · and network access optimization in HWNs by providing new technical tools to quantify the rates of horizontal and vertical handoffs,

SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS 1

Stochastic Geometric Analysis of User Mobility inHeterogeneous Wireless Networks

Wei Bao, Student Member, IEEE and Ben Liang, Senior Member, IEEE

Abstract—Horizontal and vertical handoffs are importantramifications of user mobility in multi-tier heterogeneous wirelessnetworks. They directly affect the signaling overhead and qualityof calls in the system. However, they are difficult to analyzedue to the irregularly shaped network topologies introduced bymultiple tiers of cells. In this work, a stochastic geometric analysisframework on user mobility is proposed, to capture the spatialrandomness and various scales of cell sizes in different tiers.We derive theoretical expressions for the rates of all handofftypes experienced by an active user with arbitrary movementtrajectory. We also derive the downlink data rate of the usergiven the set of cell tiers that it is willing to use. Based on theseresults, we provide guidelines for optimal tier selection underdifferent user velocity, taking both the handoff rates and the datarate into consideration. Empirical study using real user mobilitytrace data and extensive simulation are conducted, demonstratingthe correctness and usefulness of our analysis.

Index Terms—Heterogeneous wireless network, mobility, hand-off, stochastic geometry, analytic geometry

I. INTRODUCTION

TRADITIONAL single-tier macro-cellular networks pro-vide wide coverage for mobile user equipments (UEs),

but they are insufficient to satisfy the exploding demand forhigh bandwidth access driven by modern mobile traffic, suchas multimedia transmissions and cloud computing tasks. Oneeffective means to increase network capacity is to providemore serving stations within a geographical area, i.e., installinga diverse set of small-cells such as femtocells [2] and WiFihotspots [3], overlaying the macrocells, to form a multi-tierheterogeneous wireless network (HWN). Each small-cell isequipped with a shorter-range and lower-cost base station(BS) or access point (AP), to provide nearby UEs withhigher-bandwidth network access with lower power usage,and to offload data traffic from macrocells. The commercialdeployment of small-cells has attracted increasing attentionin recent years. For example, AT&T Inc. now supplies afemtocell product [4], and it has also deployed WiFi APs ina number of metropolitan areas with dense population [5].

In the presence of multiple tiers of cells, however, mobileUEs may experience internetworking issues among differenttiers. In particular, vertical handoffs (i.e., handoffs made be-tween two BSs in different tiers) are introduced [6]. Comparedwith horizontal handoffs (i.e., handoffs made between two BSs

The authors are affiliated with the Department of Electrical and ComputerEngineering, University of Toronto, 10 King’s College Road, Toronto, Ontario,Canada (email: {wbao, liang}@comm.utoronto.ca). This work has beensupported in part by grants from Bell Canada and the Natural Sciences andEngineering Research Council (NSERC) of Canada. A part of this work hasappeared as [1], which contains only the derivation of handoff rates.

-1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1-1

-0.8

-0.6

-0.4

-0.2

0

0.2

0.4

0.6

0.8

1

x coordinate (km)

y c

oord

inate

(km

)

X

Y

B1

B2

B3

(a) A UE starts a call at X and terminates it at Y . It experiencesone horizontal handoff at B1 and two vertical handoffs at B2 andB3.

-1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1-1

-0.8

-0.6

-0.4

-0.2

0

0.2

0.4

0.6

0.8

1

x coordinate (km)

y c

oord

inate

(km

)

C1

C2

X

Y

(b) Same BS locations and UE trajectory. Tier-3 BSs are notaccessed. The same UE experiences one horizontal handoff at C1

and one vertical handoff at C2.

Fig. 1. An example of a three-tier HWN and selective tier association. Tier-1, 2, and 3 BSs are represented by squares, circles, and triangles respectively;blue curves show intra-tier cell boundaries; green curves show inter-tier cellboundaries.

in the same tier), vertical handoffs have a more complicatedimpact on both the UEs and the overall system. Additionalrisks are present during channel setup and tear down when avertical handoff is made, such as (1) extra traffic latency; (2)additional network signaling; (3) more UE power consumptiondue to simultaneously active network interface to multipletiers; and (4) higher risk in call drops or degraded qualityof service (QoS) caused by the lack of radio resource afterhandoffs. Furthermore, vertical handoffs may be classified intointer-RAT (radio access technology) handoffs (e.g., handoffsmade between LTE access and WiFi access) and intra-RAT

Page 2: SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN ... · and network access optimization in HWNs by providing new technical tools to quantify the rates of horizontal and vertical handoffs,

2 SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS

handoffs, where the former could cause worse performancedegradation on UEs [7].

The handoff rate is defined as the expected number ofhandoffs experienced by one UE per unit time, which directlyaffects the signaling overhead in the system and QoS ofUEs. As a prerequisite to performance evaluation and systemdesign in HWNs, it is essential to quantify the rates ofdifferent handoff types. However, a study on handoff ratesin HWNs will inevitably be challenged by the irregularlyshaped multi-tier network topologies introduced by the small-cell structure. An example topology with three tiers of BSs isshown in Fig. 1. First, BSs are spread irregularly, sometimesin an anywhere plug-and-play manner, leading to a high levelof spatial randomness. Second, different tiers of cells areequipped with BSs communicating at different power levels,causing various scales of cell sizes. As a consequence, itis difficult to characterize the cell boundaries and to trackboundary crossings made by UEs (i.e., handoffs) in the system.Few previous works have resolved the above challenges.

Characterizing the handoff rates provides important guide-lines for system design. One main design concern is thetradeoff between the handoff rates and the data rate. As shownin the example in Fig. 1(a), a UE starts a call at X andterminates it at Y . By choosing to access all of tier-1, 2, and3 cells, it experiences one horizontal handoff at B1 and twovertical handoffs at B2 and B3. As shown in Fig. 1(b), bychoosing to access tier-1 and 2 cells only, it experiences onehorizontal handoff at C1 and only one vertical handoff at C2.However, in the latter case, the UE misses the opportunity toaccess a high-bandwidth tier-3 BS. Thus, a UE could choose toaccess high-bandwidth small-cell BSs to improve data rate, butthis may also lead to more frequent vertical handoffs, whichpotentially deteriorates the service quality. Therefore, in thispaper, we are also motivated to optimize the UE tier selectionscheme, by taking both the handoff rates and the data rate intoconsideration.

In this work, we contribute to user mobility modelingand network access optimization in HWNs by providingnew technical tools to quantify the rates of horizontal andvertical handoffs, under random multi-tier BSs, arbitrary usermovement trajectory, and flexible user-BS association. A newstochastic geometric analysis framework on user mobility isproposed. In this framework, different tiers of BSs are modeledas Poisson point processes (PPPs) to capture their spatialrandomness. To model flexible scaling of cell sizes in differenttiers, we consider the biased user association scheme [8], [9],[10], [11], in which each tier of BSs is assigned an associationbias value, and a UE is associated with a BS that providesthe largest biased received power. Through stochastic andanalytic geometric analysis, we derive exact expressions forthe rates of all handoff types experienced by an active UEwith arbitrary movement trajectory. In addition, as a studyon the application of the above handoff rate analysis, aftercalculating the downlink data rate of an active UE given theset of BS tiers that it chooses to associate with, we furtherstudy optimal tier selection by the UE, considering both thehandoff rates and the data rate.

We confirm our theoretical analysis through an empirical

study using the Yonsei Trace [12]. The trace provides alarge data set, accumulating fine-grained mobility data fromcommercial mobile phones in an 8-month period. Numericalstudies using the empirical trace data set, together with furthersimulation, demonstrate the correctness and usefulness of ouranalytical conclusions.

The rest of the paper is organized as follows. In Section II,we discuss the relation between our work and prior works.In Section III, we describe the system model. In SectionIV, we present our contributions in handoff rates derivations.In Section V, we discuss the optimal tier selection schemeconsidering both the handoff rates and the data rate. In SectionVI, we present empirical study with the Yonsei Trace as wellas simulation. Finally, conclusions are given in Section VII.

II. RELATED WORKS

Classical mobility modeling and management techniquesare limited to homogeneous single-tier networks [13], [14],which do not concern vertical handoffs or tier selection intro-duced by HWNs. In the following, we present prior relatedworks mainly focusing on HWNs.

A. Mobility Modeling Based on Queueing Systems

One common category of previous works employ queueingsystems to model HWNs. In this case, cells are modeled asqueues, active users are modeled as units in the queues, andhandoffs correspond to unit transfers among queues. Ghoshet al. [15] studied the single-cell scenario using an M/G/∞queue. Kirsal et al. [16] studied one WLAN cell overlayingone 3G cell, and a two-queue model is proposed accordingly.For multicell scenarios, queueing network models have beenemployed in [17], [18], [19], [20], [21], [22]. However, noneof these works explicitly modeled the geometric patterns ofcell shapes in heterogeneous networks.

B. Geometric Pattern Study

In order to characterize the geometric patterns of networktopologies, a second category of works model the shapeof cells, mostly in non-random regular grids. Zonoozi andDassanayake [23] modeled a one-tier cellular network as ahexagonal grid. Anpalagan and Katzela [24] studied a two-tier network by modeling small-cells as hexagons, and eachmacrocell as a cluster of neighbouring small-cells. Shenoy andHartpence [25] studied a two-tier network by modeling WLANsmall-cells as squares, and macrocells as larger squares, eachcovering 5×5 WLAN cells. Hasib and Fapojuwo [26] studieda two-tier cellular network including one hexagonal macrocelland a predetermined N circular microcells. Lin et al. [27]conducted a pioneering study on the user mobility in one-tier macro cellular network considering randomly distributedBSs. Macrocells were modeled as a standard Poisson Voronoi.However, in [27], the authors did not consider multi-tier BSswith different scales of cell sizes. To the best of our knowl-edge, ours is the first work studying user mobility in multi-tierHWNs that captures their random geometric patterns.

Page 3: SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN ... · and network access optimization in HWNs by providing new technical tools to quantify the rates of horizontal and vertical handoffs,

BAO et al.: STOCHASTIC GEOMETRIC ANALYSIS OF USER MOBILITY IN HETEROGENEOUS WIRELESS NETWORKS 3

C. Real-world Trace Study

Another important category of related works employ em-pirical traces to investigate user mobility. Kotz et al. [28],[29] studied user mobility patterns on the Dartmouth campus.McNett and Voelker [30] characterized the mobility and accesspatterns of hand-held PDA users on the UCSD campus,and a campus waypoint model was proposed to characterizethe trace. Halepovic and Williamson [31] studied mobilityparameters such as the number of calls initiated per user,call inter-arrival time, and the number of cell sites visited peruser, based on data traffic traces of a regional CDMA2000cellular network. Rhee et al. [32] concluded that human walkpatterns contain statistically similar features observed in Levywalks, based on a large daily GPS trace set accumulated in5 different places in US and Korea. In [33], empirical studyon spatial and temporal mobility patterns of the Yonsei Trace[12] was conducted, in order to predict users’ future positionprecisely. Ficek and Kencl [34] proposed inter-call mobilitymodel to locate users’ position between calls based on the traceaccumulated in a trip between San Jose and San Francisco.Baumann et al. [35] predicted user arrival and residence timesin the system through extracting important parameters fromthe trace accumulated by Nokia Research.

These works based on real-world traces study are practicallyvaluable for system evaluation and design. However, they areinsufficient to provide in-depth analytical modeling of handoffand data rates. In our work, we use the Yonsei Trace [12],[33] to demonstrate the correctness and usefulness of ourtheoretical results.

D. Handoff and Association Decision Algorithms

Orthogonal to the scope of this work, there is a large body ofprevious works that study handoff timing algorithms, withoutconsidering the random geometric patterns of UEs and BSs.One type of handoff decision algorithms employ a thresholdcomparison of one or several specific metrics, (e.g., receivedsignal strength, network loading, bandwidth, and so on) toderive handoff decisions [36], [37], [38], [39]. Another typeuses dynamic programming (DP) [40] or artificial intelligencetechniques (e.g., fuzzy logic [41]) to improve the effectivenessof handoff procedures. In our work, we do not explicitly spec-ify the handoff timing. Instead, we derive handoff rates andtier-level association decisions through stochastic geometricanalysis.

Stochastic geometric analysis has been employed to derivetier-association decisions in HWNs [8], [9], [10], [11]. Theseworks assume that the UEs are randomly placed but stationary.They focus on average performance metrics such as themean data throughput or outage probability. They ignore themovement of UEs and the effect of handoffs, which are themain focus of our work.

III. SYSTEM MODEL

A. Multi-tier Network

We consider a HWN with spatially randomly distributed Ktiers of BSs. Let K = {1, 2, . . . ,K}. In order to characterize

the random spatial patterns of BSs, we use the conventionalassumption that each tier of BSs independently form a ho-mogeneous Poisson point process (PPP) in two-dimensionalEuclidean space R2 [8], [9], [10], [42], [43], [44], [45]. LetΦk denote the PPP corresponding to tier-k BSs, and let λk beits intensity.

B. Biased User Association

Different tiers of BSs transmit at different power levels. LetPk be the transmission power of tier-k BSs, which is a givenparameter. If Pt(x), for Pt(x) ∈ {P1, P2, . . . , PK}, is thetransmission power from a BS at x and Pr(y) is the receivedpower at y, we have Pr(y) =

Pt(x)hx,y

α|x−y|γ , where α|x − y|γis the propagation loss function with γ > 2, and hx,y is thefast fading term. Corresponding to common Rayleigh fadingwith power normalization, hx,y is independently exponentiallydistributed with unit mean.

In order to capture various scales of different cell sizes,biased user association is considered [8], [9], [10]. Given thata UE is located at y, it associates itself with the BS thatprovides the maximum biased received power as follows:

BS(y) = arg maxx∈Φk,∀k

BkPk|x− y|−γ , (1)

where BS(y) denotes the location of the BS chosen for theUE, Pk|x − y|−γ is the received power from a tier-k BSlocated at x, and Bk is the association bias, indicating thereceived power preference of UEs toward tier-k BSs. Bk maybe different in different tiers, mainly because (1) differentradio access technologies may require different received powerlevels, and (2) some tiers could be assigned larger values ofBk, in order to offload data traffic from other tiers. As aconsequence, the resultant cell splitting forms a generalizedDirichlet tessellation, or weighted Poisson Voronoi [46], anexample of which is shown in Fig. 1(a). Let T(1) denote theoverall cell boundaries, and let T(1)

kj denote the boundaries oftier-k cells and tier-j cells, which is also referred to as typek-j cell boundaries in this paper. Note that T

(1)kj and T

(1)jk

are equivalent (i.e., type k-j cell boundaries and type j-k cellboundaries are equivalent).

Note that for B1, B2, . . . , BK , their effects remain the sameif we multiply all of them by the same positive constant.

For presentation convenience, we define βkj =(

PkBk

PjBj

)1/γ.

Clearly, βkj =1

βjk.

Let Ak denote the probability that a UE associates itselfwith a tier-k BS. As derived in [8], we have

Ak =λk(PkBk)

2γ∑K

j=1 λj(PjBj)2γ

. (2)

C. UE Trajectory and Handoff Rate

We aim to study the rates of all handoff types of someactive UE moving in the network. Let T0 denote the trajectoryof the UE, which is of finite length. The number of handoffsthe UE experiences is equal to the number of intersections ofT0 and T(1), which is denoted by N (T0,T(1)). In this paper,a handoff made from a tier-k cell to a tier-j cell is called a

Page 4: SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN ... · and network access optimization in HWNs by providing new technical tools to quantify the rates of horizontal and vertical handoffs,

4 SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS

type k-j handoff. The number of type k-j handoffs is denotedby Nkj(T0,T(1)

kj ).If j ̸= k, a type k-j (vertical) handoff is not equivalent to

a type j-k handoff. When the UE crosses type k-j boundary,either a type k-j or a type j-k handoff is made, depending onthe moving direction. Thus, the number of type k-j plus typej-k handoffs is equal to the number of intersections of T0 andT

(1)kj , which is denoted by N (T0,T(1)

kj ). In other words, wehave N (T0,T(1)

kj ) = Nkj(T0,T(1)kj ) +Njk(T0,T(1)

kj ).

If j = k, N (T0,T(1)kk ) = Nkk(T0,T(1)

kk ) indicates thenumber of type k-k (horizontal) handoffs.

In Section IV, we aim to study the rates of all handofftypes, which correspond to the expected numbers of handoffsexperienced by the active UE per unit time.

IV. HANDOFF RATE ANALYSIS IN MULTI-TIER HWNS

The proposed analysis of handoff rates consists of a pro-gressive sequence of four components, which are described inthe following subsections.

A. Length Intensity of Cell Boundaries

Handoffs occur at the intersections of the active UE’strajectory with cell boundaries. In order to track the number ofintersections, we need to first study the length intensity of cellboundaries T(1) (resp. T(1)

kj ), which is defined as the expectedlength of T(1) (resp. T

(1)kj ) in a unit square. Higher length

intensity of cell boundaries leads to greater opportunities forboundary crossing, and thus higher handoff rates.

The cell boundaries T(1) is a fiber process [47] generatedby Φ1,Φ2, . . . ,ΦK . T(1) also corresponds to the set of pointson R2, where a same biased power level is received from twonearby BSs, and this biased received power level is no lessthan those from any other BSs. Mathematically, we have

T(1) =

{x

∣∣∣∣∣∀k, j ∈ K,∃x1 ∈ Φk,x2 ∈ Φj ,x1 ̸= x2,

s.t. Pr =PkBk

|x1 − x|γ=

PjBj

|x2 − x|γ, and

∀i ∈ K,y ∈ Φi, Pr ≥ PiBi

|y − x|γ

}. (3)

Similarly, T(1)kj can be expressed as

T(1)kj =

{x

∣∣∣∣∣∃x1 ∈ Φk,x2 ∈ Φj ,x1 ̸= x2,

s.t. Pr =PkBk

|x1 − x|γ=

PjBj

|x2 − x|γ, and

∀i ∈ K,y ∈ Φi, Pr ≥ PiBi

|y − x|γ

}. (4)

Note that∪K

k=1

∪Kj=k T

(1)kj = T(1).

−4 −3 −2 −1 0 1 2 3−2

−1.5

−1

−0.5

0

0.5

1

1.5

2

2.5

3

3.5

T(1)

T(2)(∆d)∆d

Tier-1 BS

Tier-2 BS

Tier-2 BS

Fig. 2. The blue bold curves show T(1); and the region within red dashedcurves shows T(2)(∆d).

Let µ1

(T(1)

)denote the length intensity of T(1), which is

the expected length of T(1) in a unit square1 [47]:

µ1

(T(1)

)= E

(∣∣∣T(1)∩

[0, 1)2∣∣∣1

), (5)

where |L|1 denotes the length of L (i.e., one-dimensionalLebesgue measure of L). Similarly, let µ1

(T

(1)kj

)denote the

length intensity of T(1)kj :

µ1

(T

(1)kj

)= E

(∣∣∣T(1)kj

∩[0, 1)2

∣∣∣1

). (6)

Note that we have µ1

(T(1)

)=∑K

k=1

∑Kj=k µ1

(T

(1)kj

).

B. ∆d-Extended Cell BoundariesIt is difficult to directly quantify the one-dimensional

measures µ1

(T(1)

)and µ1

(T

(1)kj

)on the two-dimensional

plane. Instead, we first introduce the ∆d-extended cell bound-aries, which extends the one-dimensional measures to two-dimensional measures.

The ∆d-extended cell boundaries of T(1), denoted byT(2)(∆d) is defined as

T(2)(∆d) ={x∣∣∣∃y ∈ T(1), s.t. |x− y| < ∆d

}. (7)

In other words, T(2)(∆d) is the ∆d-neighbourhood of T(1).A point is in T(2)(∆d) iff its (shortest) distance to T(1)

is less than ∆d, as shown in Fig. 2. Similarly, we defineT

(2)kj (∆d) as the ∆d-extended cell boundaries of T

(1)kj (i.e,

∆d-neighbourhood of T(1)kj ):

T(2)kj (∆d) =

{x∣∣∣∃y ∈ T

(1)kj , s.t. |x− y| < ∆d

}. (8)

The area intensity of T(2)(∆d) is defined as the expectedarea of T(2)(∆d) in a unit square:

µ2

(T(2)(∆d)

)= E

(∣∣∣T(2)(∆d)∩

[0, 1)2∣∣∣) , (9)

where |S| denotes the area of S (i.e., two-dimensionalLebesgue measure of S). Similarly, the area intensity ofT

(2)kj (∆d) is

µ2

(T

(2)kj (∆d)

)= E

(∣∣∣T(2)kj (∆d)

∩[0, 1)2

∣∣∣) . (10)

1Because Φ1, . . . ,ΦK are stationary, T(1) is also stationary, and thus theunit square could be arbitrarily picked on R2.

Page 5: SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN ... · and network access optimization in HWNs by providing new technical tools to quantify the rates of horizontal and vertical handoffs,

BAO et al.: STOCHASTIC GEOMETRIC ANALYSIS OF USER MOBILITY IN HETEROGENEOUS WIRELESS NETWORKS 5

Because Φ1,Φ2 . . . ,ΦK are stationary and isotropic,T(2)(∆d) and T

(2)kj (∆d) are also stationary and isotropic. As

a result, given a reference UE located at 0, the area intensityof T(2)(∆d) (resp. T(2)

kj (∆d)) is equal to the probability thatthe reference UE at 0 is in T(2)(∆d) (resp. T(2)

kj (∆d)).

µ2

(T(2)(∆d)

)= P(0 ∈ T(2)(∆d)), (11)

µ2

(T

(2)kj (∆d)

)= P(0 ∈ T

(2)kj (∆d)). (12)

We observe that the probabilities in (11) and (12) areanalytically tractable, which will be presented in the nextsubsection.

C. Derivations of the Area Intensities

In this subsection, we present the derivations of P(0 ∈T(2)(∆d)) and P(0 ∈ T

(2)kj (∆d)). First, we study the proba-

bility that the reference UE at 0 is in T(2)kj (∆d), given that it

is associated with a tier-k BS at a distance of r0 from it. Byemploying both analytic geometric and stochastic geometrictools, we derive the following theorem:

Theorem 1: Suppose the reference UE is located at 0, itis associated with a tier-k BS, and their distance is R. Theconditional probability that 0 ∈ T

(2)kj (∆d) given R = r0 is

P(0 ∈ T

(2)kj (∆d)|R = r0, tier = k

)=

1− exp(−2λj∆dr0F(βkj) +O(∆d2)

), (13)

where

F(β) , 1

β2

∫ π

0

√(β2 + 1)− 2β cos(θ)dθ. (14)

See Appendix VIII-A for the proof.Second, through stochastic geometric tools and decondition-

ing on R, we can derive the unconditioned probabilities thatthe reference UE at 0 is in T(2)(∆d) and in T

(2)kj (∆d):

Theorem 2: The area intensities of T(2)(∆d) and T(2)kj (∆d)

are:(a)

µ2

(T(2)(∆d)

)=P(0 ∈ T(2)(∆d))

=K∑

k=1

λk

(∑Ki=1 λi∆dF(βki)

)(∑K

i=1 λiβ2ik

) 32

+O(∆d2).

(15)

(b)

µ2

(T

(2)kj (∆d)

)= P

(0 ∈ T

(2)kj (∆d)

)=

λk(λj∆dF(βkj))

(∑K

i=1 λiβ2ik)

32

+λj(λk∆dF(βjk))

(∑K

i=1 λiβ2ij)

32

+O(∆d2) if k ̸= j,

λ2k∆dF(1)

(∑K

i=1 λiβ2ik)

32+O(∆d2) if k = j.

(16)

See Appendix VIII-B for the proof.

D. From Area Intensities to Handoff Rates

In this subsection, we derive handoff rates from area in-tensities derived in Theorem 2. This involves two steps: (1)from area intensities µ2

(T(2)(∆d)

)and µ2

(T

(2)kj (∆d)

)to

length intensities µ1

(T(1)

)and µ1

(T

(1)kj

), and (2) from length

intensities to handoff rates.First, we derive the length intensity µ1

(T(1)

)(resp.

µ1

(T

(1)kj

)) from the area intensity µ2

(T(2)(∆d)

)(resp.

µ2

(T

(2)kj (∆d)

)) by taking ∆d → 0. We have

Theorem 3: The length intensities of T(1) and T(1)kj can be

computed as follows:(a)

µ1

(T(1)

)=

K∑k=1

λk

(∑Ki=1 λiF(βki)

)2(∑K

i=1 λiβ2ik

) 32

. (17)

(b)

µ1

(T

(1)kj

)=

λkλjF(βkj)

2(∑K

i=1 λiβ2ik)

32+

λjλkF(βjk)

2(∑K

i=1 λiβ2ij)

32

if k ̸= j,

λ2kF(1)

2(∑K

i=1 λiβ2ik)

32

if k = j.

(18)

See Appendix VIII-C for the proof.Remark 1: Note that, if we consider the single-tier case

by taking K = 1, we have F(1) = 4, and µ1

(T(1)

)=

µ1

(T

(1)11

)= 2

√λ1. This matches the length intensity of a

standard Poisson Voronoi. See Section 10.6 of [47].Second, we can derive the expected number of handoffs of

an active UE as follows:Theorem 4: Let T0 denote an arbitrary UE’s trajectory on

R2 with length |T0|1. Then, the expected number of intersec-tions of T0 and T(1) (resp. T(1)

kj ) are

E(N (T0,T(1))

)=2

πµ1

(T(1)

)|T0|1, (19)

E(N (T0,T(1)

kj ))=2

πµ1

(T

(1)kj

)|T0|1, (20)

and the expected number of type k-j handoffs are

E(Nkj(T0,T(1)

kj ))=

12E(N (T0,T(1)

kj ))

if k ̸= j,

E(N (T0,T(1)

kj ))

if k = j.(21)

Proof: T(1) and T(1)kj are stationary and isotropic fibre

processes with length intensity µ1

(T(1)

)and µ1

(T

(1)kj

)re-

spectively. The proof follows the conclusions in Section 9.3of [47].

Note that the expected number of type k-j handoffs is thesame as the expected number of type j-k handoffs, both ofwhich are equal to half of E

(N (T0,T(1)

kj ))

.Let v denote the instantaneous velocity of an active UE,

H(v) denote its overall handoff rate (i.e., sum handoff rate ofall types), and Hkj(v) denote its type k-j handoff rate. Thenwe have the following Corollary from Theorem 4:

Corollary 1:

H(v) =2

πµ1

(T(1)

)v, (22)

Page 6: SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN ... · and network access optimization in HWNs by providing new technical tools to quantify the rates of horizontal and vertical handoffs,

6 SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS

Hkj(v) =

{1πµ1

(T

(1)kj

)v if k ̸= j,

2πµ1

(T

(1)kj

)v if k = j.

(23)

Note that the above handoff rates are instantaneous rates.Our analysis allows time-varying velocity for the UEs, inwhich case the handoff rates are also time varying.

V. UE’S DATA RATE AND TIER SELECTION

Suppose that an active UE chooses only to connect to a setof tiers S ⊂ K. We assume that 1 ∈ S (i.e., the UE alwaysselects tier-1 macrocells). In this section, we first study theaverage downlink data rate of the UE under tier selection S.Then, we discuss optimal tier selection taking both the handoffrates and the data rate into consideration.

A. UE Data Rate

1) Spectrum Allocation and Coverage Probability: We as-sume that the active UE is allocated with a spectrum band-width of Wk if it is associated with a tier-k BS. Differenttiers of BSs are allocated separate spectrum, but BSs in thesame tier share the same spectrum [48], [49], [50]. As a con-sequence, we need to characterize the co-tier interference inthe system, which will influence the UE’s data rate. Followingconventional wireless modeling [8], [10], [50], we assume theUE requires a minimum Signal-to-Interference Ratio (SIR)T . The coverage probability of the UE is defined as theprobability that its SIR is no less than T [44]. If the UEexperiences coverage probability P′ and is allocated with aspectrum bandwidth W ′, its data rate is W ′ log(1 + T ) if itsSIR is no less than T , and its data rate is 0 if its SIR is lessthan T (i.e., outage occurs). Thus, the overall data rate of theUE is W ′ log(1+ T )P′. Note that log is in base 2 throughoutthis paper. Also, we have assumed the common scenario wherethe system is interference limited, such that noise is negligible.

2) Average UE Data Rate Derivation: In this subsection,we derive the average UE data rate. An approach similar to oneproposed in [11] is used to derive a closed-form expression forthe average UE data rate. The main difference is that here aUE may choose an arbitrary subset of the tiers. We present anoutline of the derivation for completeness. Interested readersare referred to [11] for more details.

Following (2), the probability that the active UE associatesitself with a tier-k (k ∈ S) BS is

Ak,S =λk(PkBk)

2γ∑

j∈S λj(PjBj)2γ

. (24)

Given that the UE is associated with a tier-k BS andtheir distance is d, the overall interference to it is the suminterference from all tier-k BSs other than the BS associatedby the UE:

Ik,S(d) =∑x∈Φ′

k

Pkhx,0

α|x|γ, (25)

where Φ′k is the reduced Palm point process [8] corresponding

to all tier-k BSs other than the BS associated by the UE. Itcan be shown that Φ′

k is a PPP with intensity 0 in B(0, d) and

intensity λk in R2\B(0, d), where B(x, r) denotes the diskregion centered at x with radius r [44].

The distribution of Ik,S(d) is derived through its Laplacetransform as follows:

LIk,S (d, s) = E

exp−

∑x∈Φ′

k

sPkhx,0

α|x|γ

=exp

(−2πλk

∫ ∞

d

sPkrα

sPk

α + rγdr

). (26)

Let Pcov,k,S(d) denote the conditional coverage probabilityof the active UE (given k and d). Then,

Pcov,k,S(d) =P

(PkhxB ,0

αdγ≥ TIk,S(d)

)=LIk,S (d, s)|s=Tαdγ

Pk

, (27)

where xB is the coordinate of the BS associated by theUE, and |xB| = d. (27) is because hxB ,0 is exponentiallydistributed. Substituting (26) into (27), we have

Pcov,k,S(d) = exp

(−2πλk

∫ ∞

d

Tdγr

Tdγ + rγdr

)t= r2

T2/γd2= exp

(−πλkT

2γ d2

∫ ∞

( 1T )

1

1 + tγ2

dt

). (28)

Note that by doing so, we are able to capture the fact that theUE’s data rate is higher if it is closer to its serving BS.

Next, the probability density function (pdf) of the distancebetween the UE and the BS associated by the UE is

fk,S(d) =2πλk

Ak,Sd exp

−πd2∑j∈S

λj

(PjBj

PkBk

) 2γ

(29)

=2πλk

Ak,Sd exp

(−πd2

λk

Ak,S

), (30)

where (29) is derived in [8], and (30) is by substituting (24)into (29).

Thus, the coverage probability Pcov,k,S of the UE (giventhat it is associated with a tier-k BS) can be computed as

Pcov,k,S =

∫ ∞

0

fk,S(d)Pcov,k,S(d)dd

=1

1 +Ak,SC, (31)

where C , (T )2γ∫∞( 1

T )2γ

11+tγ/2 dt.

Because the active UE is allocated with a spectrum band-width of Wk if it is associated with a tier-k BS, its expecteddata rate can be computed as

RS =∑k∈S

Ak,SWk log(1 + T )Pcov,k,S

=∑k∈S

Ak,SRk

1 +Ak,SC, (32)

where Rk , Wk log(1 + T ).2

2In reality, UE’s data rate may also be influenced by its velocity. To capturethis effect, we can combine (32) with some empirical formulas (e.g., [51], [52],[53]). The remaining part the optimal tier selection does not change after themodification of (32).

Page 7: SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN ... · and network access optimization in HWNs by providing new technical tools to quantify the rates of horizontal and vertical handoffs,

BAO et al.: STOCHASTIC GEOMETRIC ANALYSIS OF USER MOBILITY IN HETEROGENEOUS WIRELESS NETWORKS 7

B. Optimal Tier Selection

Following the derivations in Section IV and V-A, we seethat different tier selections lead to different data rates andhandoff rates. Let Ckj be the cost for one type k-j handoff,and UR be the utility value for one bit data transmission. Weassume the UE also pays service charge Pk per second whenit is associated with a type-k BS. Note that Ckj , UR, and Pk

could be assigned arbitrarily, and Ckj and Cjk may be differentif k ̸= j [6]. If the UE favors higher data rate, it could assigna larger value for UR; if it favors lower handoff rates, it couldassign larger values for Ckj .

If the active UE’s tier selection is S, its overall averageutility on data transmission per second is URRS , overallaverage service charge per second is P(S) =

∑k∈S Ak,SPk,

and overall average expense on handoffs per second is

C(S, v) = 2

πv∑k∈S

λk

(∑i∈S

(Cki+Cik)2 λiF(βki)

)2(∑

i∈S λiβ2ik

) 32

, (33)

where (33) follows the conclusions of Theorem 3 and Corol-lary 1. Consequently, the overall average utility per second oftier selection S is

G(S, v) = URRS − C(S, v)− P(S). (34)

Finally, the optimal tier selection is

Sopt = argmaxS∈S

(URRS − C(S, v)− P(S)

), (35)

where S is the set of all possible tier selections. Because thenumber of tiers K is usually not high in reality (i.e., K ≤ 5),the cardinality of S, 2K−1, is not large. Therefore, Sopt canbe derived through comparing all possible tier selections.

VI. EXPERIMENTAL STUDY

In this section, our analysis is validated via experimentingwith real-world traces and simulations.

A. Yonsei Trace Data

We use the real-world Yonsei Trace [12] to validate our ana-lytical results. The trace was accumulated from 12 commercialmobile phones during an 8-month period in 2011 in the cityof Seoul. An application named SmartDC had been runningon the commercial mobile phones equipped with GPS, GSM,and WiFi. For every 2 to 5 minutes, the application collectedUE’s location information (latitude and longitude), the MACaddresses of surrounding WiFi APs, and the cell IDs of nearbycellular BSs they could detect. Each AP has a unique MACaddress and each BS has a unique cell ID. By analyzing thedata set, we are able to determine which APs and BSs a UEcould detect at the recorded coordinates and time instants. Inthe following, we regard cellular BSs as tier-1 BSs and APsas tier-2 BSs.

36.5 37 37.5 38 38.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Latitude (◦N)

cdf

126 126.5 127 127.5 128 128.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Longitude (◦E)

cdf

Fig. 3. Cumulative distribution function (cdf) of the latitude and longitude.

B. Data Processing

1) Location Approximations of APs and BSs: As the dataset does not explicitly provide the latitudes and longitudes ofAPs and BSs, we apply the following approach to approximatetheir locations: for each AP (resp. BS), we list all the coor-dinates recorded by UEs when they are able to detect the AP(resp. BS). Then, we approximate the location of the AP (resp.BS), by taking the average of these recorded coordinates.

2) Reference Region: In order to avoid the edge effect, wedefine a reference region, in which most recorded coordinatesare located. The UEs’ trajectories are only accounted insidethe reference region. By plotting the cumulative distributionfunction (cdf) of the latitude (resp. longitude) of all recordedcoordinates (shown in Fig. 3), we observe a sharp stepupward between 37.48◦N and 37.58◦N (resp.126.9◦E and127.1◦E). As a consequence, we employ the rectangle definedby 37.48◦N , and 37.58◦N , 126.9◦E, and 127.1◦E as thereference region.

3) UE Trajectory: In the trace data, the coordinates of a UEare recorded only once every few minutes. To recover its fulltrajectory, we regard it as moving in a straight line at a constantvelocity between two consecutive recorded coordinates. Thus,interpolations can be made to determine the coordinate ofthe UE at any time. Note that only the trajectories inside thereference region are used.

4) Handoff Rates: Through the locations of BSs and APs,as well as the UE trajectories, we are able to derive theempirical rates of all handoff types following the biased userassociation scheme discussed in Section III-B. If we ignoreall the APs, we can also derive the empirical handoff rates forthe one-tier case.

5) BS and AP Intensities: The AP (resp. BS) density iscomputed as the number of APs (resp. BSs) over the areaof the reference region, which is 455.1 unit/km2 (resp. 52.6unit/km2). This indicates an urban area with high populationand BS densities.

C. Empirical Results

We compare the handoff rates derived from our analysis andthose from our empirical study based on the Yonsei Trace. Theempirical handoff rates are derived from the steps in SectionsVI-B1 - VI-B4. For the analytical results, we use the BS andAP intensities shown in Section VI-B5 as input parameters.

Page 8: SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN ... · and network access optimization in HWNs by providing new technical tools to quantify the rates of horizontal and vertical handoffs,

8 SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS

0 20 40 60 80 100 120 140 160 180 2000

0.5

1

1.5

2

2.5

3

3.5

4

Velocity (m/minute)

Handoff

rate

(unit/m

inute

)

P1/P2 = 101.5 , B1/B2 = 103, γ = 3

1-1, analytical

1-1, empirical

1-2 (or 2-1), analytical

1-2, empirical

2-1, empirical

2-2, analytical

2-2, empirical

Fig. 4. Two-tier case: comparison of analytical and empirical handoff rates.

0 20 40 60 80 100 120 140 160 180 2000

0.5

1

1.5

2

2.5

3

3.5

4

Velocity (m/minute)

Handoff

rate

(unit/m

inute

)

analytical

empirical

Fig. 5. One-tier case: comparison of analytical and empirical handoff rates.

For the two-tier case, the comparison of analytical andempirical handoff rates is shown in Fig. 4. For the one-tiercase (by eliminating all the APs), the comparison is shownin Fig. 5. Both figures illustrate the accuracy of our analysis.When the UE’s velocity is low, empirical handoff rates areslightly greater than analytical handoff rates. This is becausethe locations of APs and BSs are not strictly homogeneousdistributed (e.g., some APs and BSs are crowded along somestreets, or at the center of the urban region). We also observethat UEs with lower velocity are more likely to be sampled inthe region with higher AP and BS densities. As a consequence,the empirical handoff rates are higher than those expected byour analytical results.

Fig. 4 and Fig. 5 also show that type 1-1 horizontal handoffrates are almost the same in the one-tier and two-tier cases, butextra type 1-2 and type 2-1 vertical handoffs are introduced inthe two-tier case. This agrees with our expectation that addinga second tier of APs brings more vertical handoffs. In addition,as a validation of (21), type 1-2 and type 2-1 handoff ratesare almost the same in empirical results.

D. Simulation Study

In this subsection, we present simulation results to furtherdemonstrate our analysis in more complex HWNs.

1) Simulation Setup: The simulation procedure is as fol-lows: in each round of simulation, two or three tiers of BSsare generated on a 10 km × 10 km square. Then, we randomlygenerate 5 waypoints X1, . . . , X5 in the central 5 km × 5km square (uniformly distributed). The five line segmentsX1X2, X2X3, . . . , X4X5 construct the trajectory of an activeUE. In this way, we derive the simulated handoff rates in thisround of simulation. The above procedure is repeated 200

1 2 3 4 5 6 7 8 9 100

0.5

1

1.5

2

2.5

3

3.5

4

λ1 (unit/km2)

Handoff

rate

(unit/m

inute

)

1-1, analytical

1-1, simulation

1-2 & 2-1, analytical

1-2 & 2-1, simulation

2-2, analytical

2-2, simulation

Fig. 6. Two-tier case: handoff rates under different λ1.

2 4 6 8 10 120

0.5

1

1.5

2

λ2 (unit/km2)H

andoff

rate

(unit/m

inute

)

1-1, analytical

1-1, simulation

1-2 & 2-1, analytical

1-2 & 2-1, simulation

1-3 & 3-1, analytical

1-3 & 3-1, simulation

2-2, analytical

2-2, simulation

2-3 & 3-2, analytical

2-3 & 3-2, simulation

3-3, analytical

3-3, simulation

Fig. 7. Three-tier case: handoff rates under different λ2.

rounds to derive one simulated data point. Note that in thissubsection, in order to avoid overlapping in figures, we onlyshow the sum rate of type j-k and type k-j (k ̸= j) handoffsfor easier inspection; the individual handoff rates are half ofthe sum handoff rate.

2) Handoff Rates under Different BS Intensities: We studyhandoff rates under different BS intensities. Fig. 6 shows atwo-tier case, with parameters as follows: (P1, P2) = (30, 20)dBm, (B1, B2) = (1, 1), and λ2 = 1 unit/km2. Fig. 7 showsa three-tier case, with parameters as follows: (P1, P2, P3) =(30, 20, 10) dBm, (B1, B2, B3) = (1, 1, 1), and (λ1, λ3) =(1, 1) unit/km2. The parameter values γ = 3 and v = 60 km/hare used for both Fig. 6 and Fig. 7.

Fig. 6 illustrates that increasing λ1 leads to higher type1 − 1 handoff rate but lower type 2 − 2 handoff rate. Fig. 7illustrates that increasing λ2 leads to higher type 2−2 handoffrate but lower type 1 − 1 and 1 − 3 & 3 − 1 handoff rates.Both observations suggest that increasing the BS intensity ofone tier causes higher horizontal handoff rate within this tier,but lower handoff rates outside this tier.

3) Handoff Rates under Different Association Bias Values:Next, we study handoff rates under different association biasvalues. Fig. 8 shows a two-tier case, with parameters as fol-lows: (P1, P2) = (30, 20) dBm, B2 = 1, and (λ1, λ2) = (1, 1)unit/km2. Fig. 9 shows a three-tier case, with parameters asfollows: (P1, P2, P3) = (30, 20, 10) dBm, (B1, B3) = (1, 1),and (λ1, λ2, λ3) = (1, 1, 1) unit/km2. The parameter valuesγ = 3 and v = 60 km/h are used for both Fig. 8 andFig. 9. These figures suggest that, increasing the associationbias value of one tier has a similar effect as increasing the BSintensity of this tier, leading to higher horizontal handoff ratewithin this tier, but lower handoff rates outside this tier.

Page 9: SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN ... · and network access optimization in HWNs by providing new technical tools to quantify the rates of horizontal and vertical handoffs,

BAO et al.: STOCHASTIC GEOMETRIC ANALYSIS OF USER MOBILITY IN HETEROGENEOUS WIRELESS NETWORKS 9

101

102

103

104

105

0

0.2

0.4

0.6

0.8

1

1.2

1.4

B1

Han

doff

rate

(unit/m

inute

) 1-1, analytical

1-1, simulation

1-2 & 2-1, analytical

1-2 & 2-1, simulation

2-2, analytical

2-2, simulation

Fig. 8. Two-tier case: handoff rates under different B1.

101

102

103

104

105

106

0

0.2

0.4

0.6

0.8

1

1.2

B2

Han

doff

rate

(unit/m

inute

)

1-1, analytical

1-1, simulation

1-2 & 2-1, analytical

1-2 & 2-1, simulation

1-3 & 3-1, analytical

1-3 & 3-1, simulation

2-2, analytical

2-2, simulation

2-3 & 3-2, analytical

2-3 & 3-2, simulation

3-3, analytical

3-3, simulation

Fig. 9. Three-tier case: handoff rates under different B2.

4) UE’s Utility under Different Tier Selections: Fig. 10shows simulated utility of an active UE under differen-t velocity values in a two-tier case. The parameters areas follows: (P1, P2) = (40, 20) dBm, (B1, B2) = (1, 1),(λ1, λ2) = (1, 5) units/km2, γ = 3, (R1, R2) = (2, 5) Mbps,(C11, C12, C21, C22) = (10, 45, 35, 20), UR = 1, T = 0.5, and(P1,P2) = (0.1, 0.1)3. The vertical line shows the analyticaltier selection threshold on the UE velocity, which is 34.47km/h. This figure demonstrates that the simulation resultsagree with the analytical results in tier selection as discussed inSection V. Tier selection {1, 2} is optimal if the UE’s velocityis low, but its overall utility decreases faster due to higherhandoff expense. Tier selection {1} is optimal if the UE’svelocity is greater than 34.47 km/h.

Fig. 11 shows simulated utility of an active UEunder different velocity values in a three-tier case. Theparameters are as follows: (P1, P2, P3) = (40, 20, 10)dBm, (B1, B2, B3) = (1, 1, 1), (λ1, λ2, λ3) = (1, 5, 20)units/km2, γ = 3, (R1, R2, R3) = (2, 5, 10)Mbps, (C11, C12, C21, C22, C13, C31, C23, C32, C33) =(10, 35, 25, 20, 45, 35, 55, 45, 30), UR = 1, T = 0.5,and (P1,P2,P2) = (0.1, 0.1, 0.1). Two vertical lines showthe analytical tier selection thresholds, which are 32.24 km/hand 50.70 km/h respectively. This figure again shows thatthe simulation results agree with the analytical results intier selection. When the velocity is in the range [0, 32.24)km/h, tier selection {1, 2, 3} is optimal; when the velocityis in the range [32.24, 50.70) km/h, tier selection {1, 2} isoptimal; when the velocity is in the range [50.70,∞) km/h,

3Ckj is in unit utility/handoff, UR is in unit utility/Mbit, and Pk is in unitutility/s in this section.

5 10 15 20 25 30 35 40 45 500

0.2

0.4

0.6

0.8

1

1.2

1.4

1.6

1.8

2

velocity (km/h)

unit

utility

/sec

ond

Utility of tier selection {1,2}, simulation

Utility of tier selection {1}, simulation

Analytical tier selection threshold

Fig. 10. Two-tier case: overall utility comparison of different tier selections.

10 20 30 40 50 60 70 800

0.5

1

1.5

2

2.5

3

3.5

velocity (km/h)

unit

utility

/sec

ond

Utility of tier selection {1,2,3}, simulation

Utility of tier selection {1,3}, simulation

Utility of tier selection {1,2}, simulation

Utility of tier selection {1}, simulation

Analytical threshold, {1,2,3} and {1,2},

Analytical threshold, {1,2} and {1},

Fig. 11. Three-tier case: overall utility comparison of different tier selections.

tier selection {1} is optimal.5) Velocity Threshold: Fig. 12 and Fig. 13 show the

computed velocity thresholds for tier selections, underdifferent BS densities. Fig. 12 shows a two-tier case.The parameters are as follows: (P1, P2) = (40, 20) dBm,λ1 = 1 units/km2, γ = 3, (R1, R2) = (2, 5) Mbps,(C11, C12, C21, C22) = (10, 45, 35, 20), T = 0.5, and(P1,P2) = (0.1, 0.1). Fig. 13 shows a three-tier case. Theparameters are as follows: (P1, P2, P3) = (40, 20, 10)dBm, (B1, B2, B3) = (1, 1, 1), (λ1, λ2) = (1, 5)units/km2, γ = 3, (R1, R2, R3) = (2, 5, 10)Mbps, (C11, C12, C21, C22, C13, C31, C23, C32, C33) =(10, 35, 25, 20, 45, 35, 55, 45, 30), T = 0.5, and(P1,P2,P2) = (0.1, 0.1, 0.1).

In the two-tier case, increasing λ2 or B2 improves theaverage UE data rate (as the UE has higher probability toassociate with tier-2 BSs), but it could also cause higherhandoff rates. Through our theoretical analysis, we couldobserve that the latter factor has a stronger effect and thevelocity threshold value is lowered if λ2 increases; whilethe former factor dominates and the velocity threshold valueincreases if B2 becomes greater. In addition, increasing UR

leads to a higher weight in data rate, so the threshold valuesincrease.

In the three-tier case, increasing λ3 could cause a morecomplicated impact on optimal tier-selection. We observe thatthe tier selection {1, 2} is broken into two separate regions.When λ3 is small, the velocity range of tier selection {1, 2}is below the velocity range of tier selection {1, 3}, while theformer range is above the latter one when λ3 becomes larger.Still, increasing UR leads to a higher weight in data rate, thus

Page 10: SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN ... · and network access optimization in HWNs by providing new technical tools to quantify the rates of horizontal and vertical handoffs,

10 SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS

1 2 3 4 5 6 7 8 9 10

30

35

40

45

50

55

60

λ2 (unit/km2)

Sel

ection

thre

shold

(km

/h)

B1/B2 = 2, UR = 1

B1/B2 = 2, UR = 1.05

B1/B2 = 1, UR = 1

B1/B2 = 1, UR = 1.05

B1/B2 = 0.5, UR = 1

B1/B2 = 0.5, UR = 1.05

Fig. 12. Two-tier case: tier selection velocity threshold.

2 4 6 8 10 12 14 16 18 200

10

20

30

40

50

60

70

80

90

100

λ3 (unit/km2)

Sel

ection

thre

shol

d(k

m/h

)

{1}

{1,2}

{1,3}

{1,2}

{1,2,3}UR = 1

UR = 1.05

Fig. 13. Three-tier case: tier selection velocity threshold.

the threshold values are increased (i.e., the dashed curves areshifted upward compared with the solid curves).

VII. CONCLUSIONS

In this work, we provide a theoretical framework to studyuser mobility in multi-tier HWNs. Through establishing astochastic geometric framework, we capture the irregularlyshaped network topologies introduced by the small-cell struc-ture. Theoretical expressions for the rates of all handoff typesexperienced by an active UE with arbitrary movement trajec-tory are derived. In addition, we investigate downlink datarate of the UE under different tier selections. Based on theseresults, optimal tier selection considering both the handoffrates and the data rate is studied. Empirical study on the YonseiTrace and extensive simulation are conducted, validating theaccuracy and usefulness of our analytical conclusions.

VIII. APPENDIX

A. Proof of Theorem 1

Proof: In this proof, the tier-k BS with which the ref-erence UE is associated is referred to as the reference BS.Without loss of generality, we assume the reference BS islocated at r0 = (r0, 0). Note that because the reference UEreceives the highest biased power level from the reference BS,∀j ∈ K, there are no tier-j BSs located within B(0, r0

βkj),

where B(x, r) denotes the disk region centered at x with radiusr, and B(x, r) denotes R2\B(x, r).

Let x0 = (x0, y0) denote the position of some tier-j BS(other than the reference BS if j = k). Let T (r0,x0, βkj)denote the trace satisfying the following condition:

T (r0,x0, βkj) =

{(x, y)

∣∣∣∣∣ PkBk

((x− r0)2 + y2)γ/2=

PjBj

((x− x0)2 + (y − y0)2)γ/2

}. (36)

Note that 0 ∈ T(2)kj (∆d) is equivalent to that the distance

from 0 to the trace T (r0,x0, βkj) is less than ∆d.In the following, we discuss three cases respectively: βkj >

1, βkj = 1, and βkj < 1.Case 1: βkj > 1.In this case, we have

T (r0,x0, βkj) =

{(x, y)

∣∣∣∣∣[x−

(β2kjx0 − r0

β2kj − 1

)]2+[

y −β2kjy0

β2kj − 1

]2=

β2kj(r

20 + x2

0 + y20 − 2x0r0)

(β2kj − 1)2

}, (37)

which is a circle centered at(

β2kjx0−r0

β2kj−1

,β2kjy0

β2kj−1

)with radius

βkj

√(r20+x2

0+y20−2x0r0)

(β2kj−1)

. Thus, the distance from 0 to the traceT (r0,x0, βkj) is

d(r0,x0, βkj) (38)

=

∣∣∣∣∣∣√

(β2kjx0 − r0)2 + (β2

kjy0)2 −

√β2kj(r

20 + x2

0 + y20 − 2x0r0)

(β2kj − 1)

∣∣∣∣∣∣ .Thus, 0 ∈ T

(2)kj (∆d) iff d(r0,x0, βkj) < ∆d, or equivalent-

ly, x0 ∈ S̃kj(∆d), where

S̃kj(∆d) ={x0

∣∣∣d(r0,x0, βkj) < ∆d}. (39)

Mathematical manipulations of (39) lead to

S̃kj(∆d) =

{(x0, y0)

∣∣∣∣∣∣∣∣∣(x2

0 + y20)−

r20β2kj

∣∣∣∣ < ∆d

β2kj

· (40)√2(β4kj + β2

kj

)(x2

0 + y20)− 8β2

kjx0r0 + 2(β2kj + 1)r20 +O(∆d2)

}.

By converting (x0, y0) into polar coordinates (r, θ), (40)becomes

S̃kj(∆d) =

{(r, θ)

∣∣∣∣∣∣∣∣∣r2 − r20

β2kj

∣∣∣∣ < ∆d

β2kj

· (41)√2(β4kj + β2

kj

)r2 − 8β2

kjr0r cos(θ) + 2(β2kj + 1)r20 +O(∆d2)

}.

Note that there are no tier-j BSs located inside B(0, r0βkj

).

Let Skj(∆d) = S̃kj(∆d)∩B(0, r0/βkj). As a result, 0 ∈

T(2)kj (∆d) iff x0 ∈ Skj(∆d), where

Skj(∆d) =

{(r, θ)

∣∣∣∣∣r ≥ r0βkj

and∣∣∣∣r2 − r20

β2kj

∣∣∣∣ < ∆d

β2kj

· (42)√2(β4kj + β2

kj

)r2 − 8β2

kjr0r cos(θ) + 2(β2kj + 1)r20 +O(∆d2)

}.

Page 11: SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN ... · and network access optimization in HWNs by providing new technical tools to quantify the rates of horizontal and vertical handoffs,

BAO et al.: STOCHASTIC GEOMETRIC ANALYSIS OF USER MOBILITY IN HETEROGENEOUS WIRELESS NETWORKS 11

According to (42), Skj(∆d) corresponds to a “ring” region(shaded area) shown in Fig. 14. We can observe that ∀(r, θ) ∈Skj(∆d), r = r0

βkj+O(∆d). Substituting it into (42) gives,

Skj(∆d) =

{(r, θ)

∣∣∣∣∣r ≥ r0βkj

and (43)∣∣∣∣r2 − r20β2kj

∣∣∣∣ < ∆d

β2kj

·[2(β4kj + β2

kj

)( r0βkj

+O(∆d)

)2

8β2kjr0

(r0βkj

+O(∆d)

)cos(θ) + 2(β2

kj + 1)r20 +O(∆d2)

]1/2},

which leads to,

Skj(∆d) =

{(r, θ)

∣∣∣∣∣r ≥ r0βkj

and∣∣∣∣r2 − r20

β2kj

∣∣∣∣ < (44)

2∆dr0β2kj

√(β2kj + 1

)− 2βkj cos(θ) +O(∆d2)

}.

The area of Skj(∆d) is

|Skj(∆d)| (45)

=2

∫ π

0

∫ √r20β2kj

+2∆dr0β2kj

√(β2kj

+1)−2βkj cos(θ)+O(∆d2)

r0βkj

rdrdθ

=2∆dr0β2kj

∫ π

0

√(β2kj + 1

)− 2βkj cos(θ)dθ +O(∆d2).

Given the reference UE and BS, it can be shown that Φj4

is a PPP with intensity 0 in B(0, r0

βkj

)and intensity λj in

B (0, r0/βkj) [44]. Because P(0 ∈ T

(2)kj (∆d)|R = r0, tier =

k)

is equal to the probability that there is at least one pointof Φj in Skj(∆d) (i.e., some x0 in Skj(∆d)), we have

P(0 ∈ T

(2)kj (∆d)|R = r0, tier = k

)(46)

=1− exp (−λj |Skj(∆d)|)=1− exp

(−2λj∆dr0F(βkj) +O(∆d2)

),

which completes the proof for Case 1.Case 2: βkj < 1. The proof is similar to that of Case 1.Case 3: βkj = 1.In this case, we have

T (r0,x0, 1) ={(x, y)

∣∣∣y0 (y − y02

)= −(x0 − r0)

(x− x0 + r0

2

)},

(47)

which is a line. Thus, the distance from 0 to T (r0,x0, 1) is

d(x0, r0, 1) =

∣∣∣ y202

− (r0−x0)(r0+x0)2

∣∣∣√(r0 − x0)2 + y2

0

. (48)

Consequently, similar to (39), 0 ∈ T(2)kj (∆d) if-

f d(x0, r0, 1) < ∆d, or equivalently, x0 ∈ S̃kj(∆d), where

S̃kj(∆d) =

(x0, y0)

∣∣∣∣∣∣∣∣∣ y2

02

− (r0−x0)(r0+x0)2

∣∣∣√(r0 − x0)2 + y2

0

< ∆d

. (49)

4If k = j, it is the reduced Palm point process [8] corresponding to alltier-k BSs other than reference BS.

−0.5 −0.4 −0.3 −0.2 −0.1 0 0.1 0.2 0.3 0.4 0.5

−0.4

−0.2

0

0.2

0.4

0.6

r = r0/βkj

Skj(∆d)

r2−

r2

0

β2

kj

= ∆dβ2

kj

2(β4

kj + β2

kj )r2 − 8β2

kj r0r cos(θ) + 2(β2

kj + 1)r20

+O(∆d2)

−r2 +r2

0

β2

kj

= ∆dβ2

kj

2(β4

kj + β2

kj )r2 − 8β2r0r cos(θ) + 2(β2

kj + 1)r20

+O(∆d2)

Fig. 14. The region (shaded part) of Skj(∆d).

After converting (x0, y0) into polar coordinate (r, θ),

S̃kj(∆d) =

{(r, θ)

∣∣∣∣∣∣r2 − r20∣∣ < 2∆d

√r20 + r2 − 2r0r cos θ

},

(50)

which is a special case of (41) with βkj = 1. Thus, followingthe same steps as (42)-(46), we can still derive (13), whichcompletes the proof of Case 3.

B. Proof of Theorem 2Proof: (a) Let Ei denote the event that there is at least

one tier-i BS located in Ski(∆d). Then

P(0 ∈ T(2)(∆d)|R = r0, tier = k

)=1− P

(E1

∩E2

∩. . .∩

EK

∣∣R = r0, tier = k)

=1− exp

(−

K∑i=1

|Ski(∆d)|λi

)

=1− exp

(−

K∑i=1

2λi∆dr0F(βki) +O(∆d2)

)

=

K∑i=1

2λi∆dr0F(βki) +O(∆d2). (51)

Furthermore, according to the results in [8], the probabilitydensity function (pdf) of the distance between the referenceUE and the reference BS is

fk(r0|tier = k) =2πλk

Akr0 exp

(−πr20

K∑i=1

λiβ2ik

). (52)

Also, we have P(tier = k) = Ak, thus

P(0 ∈ T(2)(∆d)

)=

K∑k=1

∫ ∞

0

P(0 ∈ T(2)(∆d)|R = r0, tier = k)

Page 12: SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN ... · and network access optimization in HWNs by providing new technical tools to quantify the rates of horizontal and vertical handoffs,

12 SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS

· fk(r0|tier = k)P(tier = k)dr0

=

K∑k=1

∫ ∞

0

2πλkr0 exp

(−πr20

K∑i=1

λiβ2ik

)

·

(K∑i=1

2λi∆dr0F(βki) +O(∆d2)

)dr0

=

K∑k=1

λk

(∑Ki=1 λi∆dF(βki) +O(∆d2)

)(∑K

i=1 λiβ2ik

) 32

, (53)

which completes the proof of (a).(b)Similar to (53), if k ̸= j we have

P(0 ∈ T

(2)kj (∆d)

)=

∫ ∞

0

P(0 ∈ T(2)kj (∆d)|R = r0, tier = k)fk(r0|tier = k)

· P(tier = k)dr0

+

∫ ∞

0

P(0 ∈ T(2)kj (∆d)|R = r0, tier = j)fj(r0|tier = j)

· P(tier = j)dr0

=λk

(λj∆dF(βkj) +O(∆d2)

)(∑Ki=1 λiβ2

ik

) 32

+λj

(λk∆dF(βjk) +O(∆d2)

)(∑Ki=1 λiβ2

ij

) 32

.

(54)

Otherwise, if k = j we have

P(0 ∈ T

(2)kk (∆d)

)=

λk

(λk∆dF(1) +O(∆d2)

)(∑Ki=1 λiβ2

ik

) 32

, (55)

which completes the proof of (b).

C. Proof of Theorem 3Proof: We have

µ1

(T(1)) = lim

∆d→0

µ2

(T(2)(∆d)

)2∆d

(56)

=

K∑k=1

λk

(∑Ki=1 λiF(βki)

)2(∑K

i=1 λiβ2ik

) 32

, (57)

where (56) follows [54] and Section 3.2 in [55]. Similarly,

µ1

(T

(1)kj

)= lim

∆d→0

µ2

(T

(2)kj (∆d)

)2∆d

(58)

=

λkλjF(βkj)

2(∑K

i=1 λiβ2ik)

32+

λjλkF(βjk)

2(∑K

i=1 λiβ2ij)

32

if k ̸= j,

λ2kF(1)

2(∑K

i=1 λiβ2ik)

32

if k = j.

REFERENCES

[1] W. Bao and B. Liang, “Handoff rate analysis in heterogeneous cellularnetworks: a stochastic geometric approach,” in Proc. of ACM MSWiM,Montreal, Canada, 2014.

[2] V. Chandrasekhar, J. Andrews, and A. Gatherer, “Femtocell networks:a survey,” IEEE Communications Magazine, vol. 46, no. 9, pp. 59–67,Sep. 2008.

[3] M. Bennis, M. Simsek, A. Czylwik, W. Saad, S. Valentin, and M. Deb-bah, “When cellular meets WiFi in wireless small cell networks,” IEEECommunications Magazine, vol. 51, no. 6, pp. 44–50, Jun. 2013.

[4] “AT&T 3G Microcell,” http://www.att.com/standalone/3gmicrocell.[5] “AT&T Wi-Fi hot spot locations,” https://www.att.com/maps/wifi.[6] M. Stemm and R. H. Katz, “Vertical handoffs in wireless overlay

networks,” ACM/Springer Mobile Networks and Applications, vol. 3,no. 4, pp. 335–350, Jan. 1998.

[7] I. Akyildiz, J. Xie, and S. Mohanty, “A survey of mobility manage-ment in next-generation all-IP-based wireless systems,” IEEE WirelessCommunications, vol. 11, no. 4, pp. 16–28, Aug. 2004.

[8] H.-S. Jo, Y. J. Sang, P. Xia, and J. G. Andrews, “Heterogeneous cellularnetworks with flexible cell association: A comprehensive downlink SINRanalysis,” IEEE Trans. on Wireless Communications, vol. 11, no. 10, pp.3484–3495, Oct. 2012.

[9] S. Singh, H. Dhillon, and J. G. Andrews, “Offloading in heterogeneousnetworks: Modeling, analysis, and design insights,” IEEE Trans. onWireless Communications, vol. 12, no. 5, pp. 2484–2497, May 2013.

[10] Y. Lin and W. Yu, “Optimizing user association and frequency reusefor heterogeneous network under stochastic model,” in Proc. of IEEEGlobecom, Atlanta, GA, Dec. 2013.

[11] W. Bao and B. Liang, “Structured spectrum allocation and user associa-tion in heterogeneous cellular networks,” in Proc. of IEEE INFOCOM,Toronto, Canada, Apr. 2014.

[12] Y. Chon, E. Talipov, H. Shin, and H. Cha, “Mobility data collected byLifemap monitoring system at Yonsei University in Seoul,” Downloadedfrom http://crawdad.cs.dartmouth.edu/yonsei/lifemap/, May 2012.

[13] I. Akyildiz, J. McNair, J. Ho, H. Uzunalioglu, and W. Wang, “Mobilitymanagement in next-generation wireless systems,” Proceedings of theIEEE, vol. 87, no. 8, pp. 1347–1384, Aug. 1999.

[14] V. Wong and V. Leung, “Location management for next-generationpersonal communications networks,” IEEE Network, vol. 14, no. 5, pp.18–24, Sep./Oct. 2000.

[15] A. Ghosh, R. Jana, V. Ramaswami, J. Rowland, and N. Shankara-narayanan, “Modeling and characterization of large-scale Wi-Fi trafficin public hot-spots,” in Proc. of IEEE INFOCOM, Shanghai, China, Apr.2011.

[16] Y. Kirsal, E. Gemikonakli, E. Ever, G. Mapp, and O. Gemikonakli,“An analytical approach for performance analysis of handoffs in thenext generation integrated cellular networks and WLANs,” in Proc. ofInternational Conference on Computer Communications and Networks,Zurich, Switzerland, Aug. 2010.

[17] F. Ashtiani, J. Salehi, and M. Aref, “Mobility modeling and analyticalsolution for spatial traffic distribution in wireless multimedia networks,”IEEE Journal on Selected Areas in Communications, vol. 21, no. 10,pp. 1699 – 1709, Dec. 2003.

[18] G. Mohimani, F. Ashtiani, A. Javanmard, and M. Hamdi, “Mobilitymodeling, spatial traffic distribution, and probability of connectivity forsparse and dense vehicular ad hoc networks,” IEEE Trans. on VehicularTechnology, vol. 58, no. 4, pp. 1998 – 2007, May 2009.

[19] Y. Chen, J. Kurose, and D. Towsley, “A mixed queueing network modelof mobility in a campus wireless network,” in Proc. of IEEE INFOCOM,Orlando, FL, Mar. 2012.

[20] A. H. Zahran, B. Liang, and A. Saleh, “Mobility modeling and perfor-mance evaluation of heterogeneous wireless networks,” IEEE Trans. onMobile Computing, vol. 7, no. 8, pp. 1041–1056, Aug. 2008.

[21] A. Farbod and B. Liang, “Structured admission control policies inheterogeneous wireless networks with mesh underlay,” in Proc. of IEEEINFOCOM, Rio de Janeiro, Brazil, Apr. 2009.

[22] W. Bao and B. Liang, “Insensitivity of user distribution in multicellnetworks under general mobility and session patterns,” IEEE Trans. onWireless Communications, vol. 12, no. 12, pp. 6244–6254, Dec. 2013.

[23] M. M. Zonoozi and P. Dassanayake, “User mobility modeling andcharacterization of mobility patterns,” IEEE Journal on Selected Areasin Communications, vol. 15, no. 7, pp. 1239–1252, Sep. 1997.

[24] A. Anpalagan and I. Katzela, “Overlaid cellular system design, with cellselection criteria for mobile wireless users,” in Proc. of IEEE CanadianConference on Electrical and Computer Engineering, Edmonton, Cana-da, May 1999.

[25] N. Shenoy and B. Hartpence, “A mobility model for cost analysis inintegrated cellular/WLANs,” in Proc. of International Conference onComputer Communications and Networks, Chicago, IL, Oct. 2004.

[26] A. Hasib and A. Fapojuwo, “Mobility model for heterogeneous wirelessnetworks and its application in common radio resource management,”IET Communications, vol. 2, no. 9, pp. 1186–1195, Oct. 2008.

Page 13: SUBMITTED TO IEEE JOURNAL ON SELECTED AREAS IN ... · and network access optimization in HWNs by providing new technical tools to quantify the rates of horizontal and vertical handoffs,

BAO et al.: STOCHASTIC GEOMETRIC ANALYSIS OF USER MOBILITY IN HETEROGENEOUS WIRELESS NETWORKS 13

[27] X. Lin, R. Ganti, P. Fleming, and J. Andrews, “Towards understandingthe fundamentals of mobility in cellular networks,” IEEE Trans. onWireless Communications, vol. 12, no. 4, pp. 1686–1698, Apr. 2013.

[28] D. Kotz and K. Essien, “Analysis of a campus-wide wireless network,”in Proc. of ACM MobiCom, Atlanta, GA, Sep. 2002.

[29] T. Henderson, D. Kotz, and I. Abyzov, “The changing usage of amature campus-wide wireless network,” in Proc. of ACM MobiCom,Philadelphia, PA, 2004.

[30] M. M. G. M. Voelker, “Access and mobility of wireless pda users,” ACMSIGMOBILE Mobile Computing and Communications Review, vol. 9,no. 2, pp. 40–55, Apr. 2005.

[31] E. H. C. Williamson, “Characterizing and modeling user mobility in acellular data network,” in Proc. of ACM PE-WASUN, Montreal, Canada,Oct. 2005.

[32] I. Rhee, M. Shin, S. Hong, K. Lee, S. J. Kim, and S. Chong, “On theLevy-walk nature of human mobility,” IEEE/ACM Trans. on Networking,vol. 19, no. 3, pp. 630–643, Jun. 2011.

[33] Y. Chon, H. Shin, E. Talipov, and H. Cha, “Evaluating mobilitymodels for temporal prediction with high-granularity mobility data,” inProc. of IEEE International Conference on Pervasive Computing andCommunications (PerCom), Lugano, Switzerland, Mar. 2012.

[34] M. Ficek and L. Kencl, “Inter-call mobility model: A spatio-temporalrefinement of call data records using a Gaussian mixture model,” inProc. of IEEE INFOCOM, Orlando, FL, Mar. 2012.

[35] P. Baumann, W. Kleiminger, and S. Santini, “How long are you staying?predicting residence time from human mobility traces,” in Proc. of ACMMobiCom, Miami, FL, Sep. 2013.

[36] G. Pollini, “Trends in handover design,” IEEE Communications Maga-zine, vol. 34, no. 3, pp. 82–90, Mar. 1996.

[37] A. H. Zahran, B. Liang, and A. Saleh, “Signal threshold adaptationfor vertical handoff in heterogeneous wireless networks,” ACM/SpringerMobile Networks and Applications, vol. 11, no. 4, pp. 625–640, Aug.2006.

[38] M. Liu, Z. Li, X. Guo, and E. Dutkiewicz, “Performance analysis andoptimization of handoff algorithms in heterogeneous wireless networks,”IEEE Trans. on Mobile Computing, vol. 7, no. 7, pp. 846–857, Jul. 2008.

[39] C. W. Lee, L. M. Chen, M. C. Chen, and Y. S. Sun, “A frameworkof handoffs in wireless overlay networks based on mobile IPv6,” IEEEJournal on Selected Areas in Communications, vol. 23, no. 11, pp. 2118– 2128, Nov. 2005.

[40] E. Stevens-Navarro, Y. Lin, and V. Wong, “An MDP-based verticalhandoff decision algorithm for heterogeneous wireless networks,” IEEETrans. on Vehicular Technology, vol. 57, no. 2, pp. 1243–1254, Mar.2008.

[41] J. Hou and D. O’brien, “Vertical handover-decision-making algorithmusing fuzzy logic for the integrated radio-and-OW system,” IEEE Trans.on Wireless Communications, vol. 5, no. 1, pp. 176–185, Jan. 2006.

[42] S. Singh and J. G. Andrews, “Joint resource partitioning and offloadingin heterogeneous cellular networks,” IEEE Trans. on Wireless Commu-nications, vol. 13, no. 2, pp. 888 – 901, Feb. 2014.

[43] H. Dhillon, R. Ganti, F. Baccelli, and J. G. Andrews, “Modeling andanalysis of K-tier downlink heterogeneous cellular networks,” IEEEJournal on Selected Areas in Communications, vol. 30, no. 3, pp. 550–560, Apr. 2012.

[44] F. Baccelli and B. Blaszczyszyn, “Stochastic geometry and wirelessnetworks, volume 1: Theory,” Foundations and Trends in Networking,vol. 3, no. 3-4, pp. 249 – 449, 2009.

[45] ——, “Stochastic geometry and wireless networks, volume 2: Appli-cations,” Foundations and Trends in Networking, vol. 4, no. 1-2, pp.1–312, 2009.

[46] P. F. Ash and E. D. Bolker, “Generalized Dirichlet tessellations,”Geometriae Dedicata, vol. 20, no. 2, pp. 209–243, Apr. 1986.

[47] D. Stoyan, W. Kendall, and J. Mecke, Stochastic Geometry and ItsApplications, 2nd ed. Wiley, 1995.

[48] W. C. Cheung, T. Q. S. Quek, and M. Kountouris, “Stochastic analysisof two-tier networks: Effect of spectrum allocation,” in Proc. of IEEEICASSP, Prague, Czech Republic, May 2011.

[49] V. Chandrasekhar and J. G. Andrews, “Spectrum allocation in tieredcellular networks,” IEEE Trans. on Communications, vol. 57, no. 10,pp. 3059–3068, Oct. 2009.

[50] W. C. Cheung, T. Q. S. Quek, and M. Kountouris, “Throughput opti-mization, spectrum allocation, and access control in two-tier femtocellnetworks,” IEEE Journal on Selected Areas in Communications, vol. 30,no. 3, pp. 561–574, Apr. 2012.

[51] C. Steger, P. Radosavljevic, and J. Frantz, “Performance of IEEE802.11b wireless LAN in an emulated mobile channel,” in Proc. of IEEEVTC-Spring, Jeju, South Korea, Apr. 2003.

[52] K. Xu, B. T. Garrison, and K.-C. Wang, “Throughput modeling for multi-rate IEEE 802.11 vehicle-to-infrastructure networks with asymmetrictraffic,” in Proc. of ACM MSWiM, Miami Beach, FL, Oct. 2011.

[53] B. Dusza, C. Ide, and C. Wietfeld, “Interference aware throughputmeasurements for mobile WiMAX over vehicular radio channels,” inProc. of IEEE WCNC Workshops, Paris, France, Apr 2012.

[54] A. Chambolle, S. Lisini, and L. Lussardi, “A remark on the anisotropicouter Minkowski content,” Advances in Calculus of Variations, vol. 7,no. 2, pp. 241–266, Apr. 2014.

[55] H. Federer, Geometric Measure Theory. Springer, 1969.