• ### On Optimal Policies in Full-Duplex Wireless Powered Communication Networks(1603.05132)

Feb. 16, 2019 cs.IT, math.IT
The optimal resource allocation scheme in a full-duplex Wireless Powered Communication Network (WPCN) composed of one Access Point (AP) and two wireless devices is analyzed and derived. AP operates in a full-duplex mode and is able to broadcast wireless energy signals in downlink and receive information data in uplink simultaneously. On the other hand, each wireless device is assumed to be equipped with Radio-Frequency (RF) energy harvesting circuitry which gathers the energy sent by AP and stores it in a finite capacity battery. The harvested energy is then used for performing uplink data transmission tasks. In the literature, the main focus so far has been on slot-oriented optimization. In this context, all the harvested RF energy in a given slot is also consumed in the same slot. However, this approach leads to sub-optimal solutions because it does not take into account the Channel State Information (CSI) variations over future slots. Differently from most of the prior works, in this paper we focus on the long-term weighted throughput maximization problem. This approach significantly increases the complexity of the optimization problem since it requires to consider both CSI variations over future slots and the evolution of the batteries when deciding the optimal resource allocation. We formulate the problem using the Markov Decision Process (MDP) theory and show how to solve it. Our numerical results emphasize the superiority of our proposed full-duplex WPCN compared to the half-duplex WPCN and reveal interesting insights about the effects of perfect as well as imperfect self-interference cancellation techniques on the network performance.
• ### Stable Throughput of Cooperative Cognitive Networks with Energy Harvesting: Finite Relay Buffer and Finite Battery Capacity(1707.09681)

June 18, 2018 cs.IT, math.IT
This paper studies a generic model for cooperative cognitive radio networks where the secondary user is equipped with a finite relay queue as well as a finite battery queue. Our prime objective is to characterize the stable throughput region. Nevertheless, the complete characterization of the stable throughput region for such system is notoriously difficult, since the computation of the steady state distribution of the two-dimensional Markov Chain (MC) model for both finite queues is prohibitively complex. We first propose an algorithm to characterize the stable throughput region numerically, and show its sheer computational complexity for large queue lengths. To lend tractability and explore the nature of design parameters optimization at the cognitive node, we next focus on two simpler systems, namely, finite battery queue with infinite relay queue and finite relay queue with infinite battery queue (referred henceforth as dominant system $1$ and $2$, respectively). For each proposed dominant system, we investigate the maximum service rate of the cognitive node subject to stability conditions. Despite the complexity of the formulated optimization problems, due to their non-convexity, we exploit the problems' structure to transform them into linear programs. Thus, we are able to solve them efficiently using standard linear programming solvers. Our numerical results demonstrate that, in practical systems, finite battery and relay queues achieve the same level of benefits of a system with infinite queue sizes, when their sizes are sufficiently large. They also reveal that the achievable stable throughput region significantly expands when the arrival rate of the energy harvesting process increases.
• ### Optimization of Energy-Constrained Wireless Powered Communication Networks with Heterogeneous Nodes(1603.01115)

Sept. 30, 2017 cs.IT, math.IT
In this paper, we study wireless networks where nodes have two energy sources, namely a battery and radio frequency (RF) energy harvesting circuitry. We formulate two optimization problems with different objective functions, namely maximizing the sum throughput and maximizing the minimum throughput, for enhanced fairness. Furthermore, we show the generality of the proposed system model through characterizing the conditions under which the two formulated optimization problems can be reduced to the corresponding problems of different known wireless networks, namely, conventional wireless networks (battery-powered) and wireless powered communications networks (WPCNs) with only RF energy harvesting nodes. In addition, we introduce WPCNs with two types of nodes, with and without RF energy harvesting capability, in which the nodes without RF energy harvesting are utilized to enhance the sum throughput, even beyond WPCNs with all energy harvesting nodes. We establish the convexity of all formulated problems which opens room for efficient solution using standard techniques. Our numerical results show that the two types of wireless networks, namely WPCNs with only RF energy harvesting nodes and conventional wireless networks, are considered, respectively, as lower and upper bounds on the performance of the generalized problem setting in terms of the maximum sum throughput and the maxmin throughput. Moreover, the results reveal new insights and throughput-fairness trade-offs unique to our new problem setting.
• ### Non-Orthogonal Multiple Access Schemes in Wireless Powered Communication Networks(1701.08526)

March 3, 2017 cs.IT, math.IT
We characterize time and power allocations to optimize the sum-throughput of a Wireless Powered Communication Network (WPCN) with Non-Orthogonal Multiple Access (NOMA). In our setup, an Energy Rich (ER) source broadcasts wireless energy to several devices, which use it to simultaneously transmit data to an Access Point (AP) on the uplink. Differently from most prior works, in this paper we consider a generic scenario, in which the ER and AP do not coincide, i.e., are two separate entities. We study two NOMA decoding schemes, namely Low Complexity Decoding (LCD) and Successive Interference Cancellation Decoding (SICD). For each scheme, we formulate a sum-throughput optimization problem over a finite horizon. Despite the complexity of the LCD optimization problem, due to its non-convexity, we recast it into a series of geometric programs. On the other hand, we establish the convexity of the SICD optimization problem and propose an algorithm to find its optimal solution. Our numerical results demonstrate the importance of using successive interference cancellation in WPCNs with NOMA, and show how the energy should be distributed as a function of the system parameters.
• ### Decentralized Coded Caching in Wireless Networks: Trade-off between Storage and Latency(1701.06673)

Jan. 25, 2017 cs.IT, math.IT
This paper studies the decentralized coded caching for a Fog Radio Access Network (F-RAN), whereby two edge-nodes (ENs) connected to a cloud server via fronthaul links with limited capacity are serving the requests of $K_r$ users. We consider all ENs and users are equipped with caches. A decentralized content placement is proposed to independently store contents at each network node during the off-peak hours. After that, we design a coded delivery scheme in order to deliver the user demands during the peak-hours under the objective of minimizing the normalized delivery time (NDT), which refers to the worst case delivery latency. An information-theoretic lower bound on the minimum NDT is derived for arbitrary number of ENs and users. We evaluate numerically the performance of the decentralized scheme. Additionally, we prove the approximate optimality of the decentralized scheme for a special case when the caches are only available at the ENs.
• ### Cache-Aided Heterogeneous Networks: Coverage and Delay Analysis(1701.06735)

Jan. 24, 2017 cs.IT, math.IT
This paper characterizes the performance of a generic $K$-tier cache-aided heterogeneous network (CHN), in which the base stations (BSs) across tiers differ in terms of their spatial densities, transmission powers, pathloss exponents, activity probabilities conditioned on the serving link and placement caching strategies. We consider that each user connects to the BS which maximizes its average received power and at the same time caches its file of interest. Modeling the locations of the BSs across different tiers as independent homogeneous Poisson Point processes (HPPPs), we derive closed-form expressions for the coverage probability and local delay experienced by a typical user in receiving each requested file. We show that our results for coverage probability and delay are consistent with those previously obtained in the literature for a single tier system.
• ### Asymmetric Degrees of Freedom of the Full-Duplex MIMO 3-Way Channel with Unicast and Broadcast Messages(1608.00209)

July 31, 2016 cs.IT, math.IT
In this paper, we characterize the asymmetric total degrees of freedom (DoF) of a multiple-input multiple-output (MIMO) 3-way channel. Each node has a separate-antenna full-duplex MIMO transceiver with a different number of antennas, where each antenna can be configured for either signal transmission or reception. We study this system under two message configurations; the first configuration is when each node has two unicast messages to be delivered to the two other nodes, while the second configuration is when each node has two unicast messages as well as one broadcast message to be delivered to the two other nodes. For each configuration, we first derive upper bounds on the total DoF of the system. Cut-set bounds in conjunction with genie-aided bounds are derived to characterize the achievable total DoF. Afterwards, we analytically derive the optimal number of transmit and receive antennas at each node to maximize the total DoF of the system, subject to the total number of antennas at each node. Finally, the achievable schemes for each configuration are constructed. The proposed schemes are mainly based on zero-forcing and null-space transmit beamforming.
• ### Sparse Spectrum Sensing in Infrastructure-less Cognitive Radio Networks via Binary Consensus Algorithms(1606.03639)

June 11, 2016 cs.IT, math.IT
Compressive Sensing has been utilized in Cognitive Radio Networks (CRNs) to exploit the sparse nature of the occupation of the primary users. Also, distributed spectrum sensing has been proposed to tackle the wireless channel problems, like node or link failures, rather than the common (centralized approach) for spectrum sensing. In this paper, we propose a distributed spectrum sensing framework based on consensus algorithms where SU nodes exchange their binary decisions to take global decisions without a fusion center to coordinate the sensing process. Each SU will share its decision with its neighbors, and at every new iteration each SU will take a new decision based on its current decision and the decisions it receives from its neighbors; in the next iteration, each SU will share its new decision with its neighbors. We show via simulations that the detection performance can tend to the performance of majority rule Fusion Center based CRNs.
• ### On Optimizing Cooperative Cognitive User Performance under Primary QoS Constraints(1603.09530)

March 31, 2016 cs.NI
We study the problem of optimizing the performance of cognitive radio users with opportunistic real-time applications subject to primary users quality-of-service (QoS) constraints. Two constrained optimization problems are formulated; the first problem is maximizing the secondary user throughput while the second problem is minimizing the secondary user average delay, subject to a common constraint on the primary user average delay. In spite of the complexity of the optimization problems, due to their non-convexity, we transform the first problem into a set of linear programs and the second problem into a set of quasiconvex optimization problems. We prove that both problems are equivalent with identical feasible sets and optimal solutions. We show, through numerical results, that the proposed cooperation policy represents the best compromise between enhancing the secondary users QoS and satisfying the primary users QoS requirements.
• ### Energy-Aware Cooperative Wireless Networks with Multiple Cognitive Users(1603.06507)

March 21, 2016 cs.NI
In this paper, we study and analyze cooperative cognitive radio networks with arbitrary number of secondary users (SUs). Each SU is considered a prospective relay for the primary user (PU) besides having its own data transmission demand. We consider a multi-packet transmission framework which allows multiple SUs to transmit simultaneously thanks to dirty-paper coding. We propose power allocation and scheduling policies that optimize the throughput for both PU and SU with minimum energy expenditure. The performance of the system is evaluated in terms of throughput and delay under different opportunistic relay selection policies. Towards this objective, we present a mathematical framework for deriving stability conditions for all queues in the system. Consequently, the throughput of both primary and secondary links is quantified. Furthermore, a moment generating function (MGF) approach is employed to derive a closed-form expression for the average delay encountered by the PU packets. Results reveal that we achieve better performance in terms of throughput and delay at lower energy cost as compared to equal power allocation schemes proposed earlier in literature. Extensive simulations are conducted to validate our theoretical findings.
• ### Stability Analysis of Slotted Aloha with Opportunistic RF Energy Harvesting(1501.06954)

July 27, 2015 cs.NI
Energy harvesting (EH) is a promising technology for realizing energy efficient wireless networks. In this paper, we utilize the ambient RF energy, particularly interference from neighboring transmissions, to replenish the batteries of the EH enabled nodes. However, RF energy harvesting imposes new challenges into the analysis of wireless networks. Our objective in this work is to investigate the performance of a slotted Aloha random access wireless network consisting of two types of nodes, namely Type I which has unlimited energy supply and Type II which is solely powered by an RF energy harvesting circuit. The transmissions of a Type I node are recycled by a Type II node to replenish its battery. We characterize an inner bound on the stable throughput region under half-duplex and full-duplex energy harvesting paradigms as well as for the finite capacity battery case. We present numerical results that validate our analytical results, and demonstrate their utility for the analysis of the exact system.
• ### An Information-theoretic Model for Knowledge Sharing in Opportunistic Social Networks(1505.03231)

May 13, 2015 cs.NI
In this paper we establish fundamental limits on the performance of knowledge sharing in opportunistic social net- works. In particular, we introduce a novel information-theoretic model to characterize the performance limits of knowledge sharing policies. Towards this objective, we first introduce the notions of knowledge gain and its upper bound, knowledge gain limit, per user. Second, we characterize these quantities for a number of network topologies and sharing policies. This work constitutes a first step towards defining and characterizing the performance limits and trade-offs associated with knowledge sharing in opportunistic social networks. Finally, we present nu- merical results characterizing the cumulative knowledge gain over time and its upper bound, using publicly available smartphone data. The results confirm the key role of the proposed model to motivate future research in this ripe area of research as well as new knowledge sharing policies.
• ### Maximum Throughput Opportunistic Network Coding in Two-Way Relay Networks(1502.02868)

Feb. 10, 2015 cs.IT, math.IT, cs.NI
In this paper, we study Two-way relaying networks well-known for its throughput merits. In particular, we study the fundamental throughput delay trade-off in two-way relaying networks using opportunistic network coding. We characterize the optimal opportunistic network coding policy that maximizes the aggregate network throughput subject to an average packet delay constraint. Towards this objective, first, we consider a pair of nodes communicating through a common relay and develop a two dimensional Markov chain model capturing the buffers' length states at the two nodes. Second, we formulate an optimization problem for the delay constrained optimal throughput. Exploiting the structure of the problem, it can be cast as a linear programming problem. Third, we compare the optimal policy to two baseline schemes and show its merits with respect to throughput, average delay and power consumption. First, the optimal policy significantly outperforms the first baseline with respect to throughput, delay and power consumption. Moreover, it outperforms the second baseline with respect to the average delay and power consumption for asymmetrical traffic arrival rates.
• ### On the Stable Throughput of Cooperative Cognitive Radio Networks with Finite Relaying Buffer(1410.2419)

Oct. 9, 2014 cs.NI
In this paper, we study the problem of cooperative communications in cognitive radio systems where the secondary user has limited relaying room for the overheard primary packets. More specifically, we characterize the stable throughput region of a cognitive radio network with a finite relaying buffer at the secondary user. Towards this objective, we formulate a constrained optimization problem for maximizing the secondary user throughput while guaranteeing the stability of the primary user queue. We consider a general cooperation policy where the packet admission and queue selection probabilities, at the secondary user, are both dependent on the state (length) of the finite relaying buffer. Despite the sheer complexity of the optimization problem, attributed to its non-convexity, we transform it to a linear program. Our numerical results reveal a number of valuable insights, e.g., it is always mutually beneficial to cooperate in delivering the primary packets in terms of expanding the stable throughput region. In addition, the stable throughput region of the system, compared to the case of infinite relaying queue capacity, marginally shrinks for limited relaying queue capacity.
• ### Interference-Based Optimal Power-Efficient Access Scheme for Cognitive Radio Networks(1404.1113)

July 8, 2014 cs.IT, math.IT, cs.NI
In this paper, we propose a new optimization-based access strategy of multipacket reception (MPR) channel for multiple secondary users (SUs) accessing the primary user (PU) spectrum opportunistically. We devise an analytical model that realizes the multipacket access strategy of SUs that maximizes the throughput of individual backlogged SUs subject to queue stability of the PU. All the network receiving nodes have MPR capability. We aim at maximizing the throughput of the individual SUs such that the PU's queue is maintained stable. Moreover, we are interested in providing an energy-efficient cognitive scheme. Therefore, we include energy constraints on the PU and SU average transmitted energy to the optimization problem. Each SU accesses the medium with certain probability that depends on the PU's activity, i.e., active or inactive. The numerical results show the advantage in terms of SU throughput of the proposed scheme over the conventional access scheme, where the SUs access the channel randomly with fixed power when the PU is sensed to be idle.
• ### Effective Capacity of Cognitive Radio Links: Accessing Primary Feedback Erroneously(1406.5280)

June 20, 2014 cs.IT, math.IT
We study the performance of a cognitive system modeled by one secondary and one primary link and operating under statistical quality of service (QoS) delay constraints. We analyze the effective capacity (EC) to quantify the secondary user (SU) performance under delay constraints. The SU intends to maximize the benefit of the feedback messages on the primary link to reduce SU interference for primary user (PU) and makes opportunistic use of the channel to transmit his packets. We assume that SU has erroneous access to feedback information of PU. We propose a three power level scheme and study the tradeoff between degradation in EC of SU and reliability of PU defined as the success rate of the transmitted packets. Our analysis shows that increase in error in feedback access causes more interference to PU and packet success rate decreases correspondingly.
• ### Cognitive Radio Networks with Probabilistic Relaying: Stable Throughput and Delay Tradeoffs(1404.6112)

April 24, 2014 cs.NI
In this paper, we study and analyze fundamental throughput and delay tradeoffs in cooperative multiple access for cognitive radio systems. We focus on the class of randomized cooperative policies, whereby the secondary user (SU) serves either the queue of its own data or the queue of the primary user (PU) relayed data with certain service probabilities. Moreover, admission control is introduced at the relay queue, whereby a PU's packet is admitted to the relay queue with an admission probability. The proposed policy introduces a fundamental tradeoff between the delays of the PU and SU. Consequently, it opens room for trading the PU delay for enhanced SU delay and vice versa. Thus, the system could be tuned according to the demands of the intended application. Towards this objective, stability conditions for the queues involved in the system are derived. Furthermore, a moment generating function approach is employed to derive closed-form expressions for the average delay encountered by the packets of both users. The effect of varying the service and admission probabilities on the system's throughput and delay is thoroughly investigated. Results show that cooperation expands the stable throughput region. Moreover, numerical simulation results assert the extreme accuracy of the analytically derived delay expressions. In addition, we provide a criterion for the SU based on which it decides whether cooperation is beneficial to the PU or not. Furthermore, we show the impact of controlling the flow of data at the relay queue using the admission probability.
• ### Cooperative Access in Cognitive Radio Networks: Stable Throughput and Delay Tradeoffs(1309.1200)

April 24, 2014 cs.NI
In this paper, we study and analyze fundamental throughput-delay tradeoffs in cooperative multiple access for cognitive radio systems. We focus on the class of randomized cooperative policies, whereby the secondary user (SU) serves either the queue of its own data or the queue of the primary user (PU) relayed data with certain service probabilities. The proposed policy opens room for trading the PU delay for enhanced SU delay. Towards this objective, stability conditions for the queues involved in the system are derived. Furthermore, a moment generating function approach is employed to derive closed-form expressions for the average delay encountered by the packets of both users. Results reveal that cooperation expands the stable throughput region of the system and significantly reduces the delay at both users. Moreover, we quantify the gain obtained in terms of the SU delay under the proposed policy, over conventional relaying that gives strict priority to the relay queue.
• ### Improved Spectrum Mobility using Virtual Reservation in Collaborative Cognitive Radio Networks(1310.2954)

Oct. 9, 2013 cs.IT, math.IT, cs.NI, cs.PF
Cognitive radio technology would enable a set of secondary users (SU) to opportunistically use the spectrum licensed to a primary user (PU). On the appearance of this PU on a specific frequency band, any SU occupying this band should free it for PUs. Typically, SUs may collaborate to reduce the impact of cognitive users on the primary network and to improve the performance of the SUs. In this paper, we propose and analyze the performance of virtual reservation in collaborative cognitive networks. Virtual reservation is a novel link maintenance strategy that aims to maximize the throughput of the cognitive network through full spectrum utilization. Our performance evaluation shows significant improvements not only in the SUs blocking and forced termination probabilities but also in the throughput of cognitive users.
• ### Coverage Probability Analysis for Wireless Networks Using Repulsive Point Processes(1309.3597)

Sept. 13, 2013 cs.NI
The recent witnessed evolution of cellular networks from a carefully planned deployment to more irregular, heterogeneous deployments of Macro, Pico and Femto-BSs motivates new analysis and design approaches. In this paper, we analyze the coverage probability in cellular networks assuming repulsive point processes for the base station deployment. In particular, we characterize, analytically using stochastic geometry, the downlink probability of coverage under a Matern hardcore point process to ensure minimum distance between the randomly located base stations. Assuming a mobile user connects to the nearest base station and Rayleigh fading, we derive two lower bounds expressions on the downlink probability of coverage that is within 4% from the simulated scenario. To validate our model, we compare the probability of coverage of the Matern hardcore topology against an actual base station deployment obtained from a public database. The comparison shows that the actual base station deployment can be fitted by setting the appropriate Matern point process density.
• ### Effective Capacity of Delay Constrained Cognitive Radio Links Exploiting Primary Feedback(1304.0207)

March 31, 2013 cs.IT, math.IT
In this paper, we analyze the performance of a secondary link in a cognitive radio (CR) system operating under statistical quality of service (QoS) delay constraints. In particular, we quantify analytically the performance improvement for the secondary user (SU) when applying a feedback based sensing scheme under the "SINR Interference" model. We leverage the concept of effective capacity (EC) introduced earlier in the literature to quantify the wireless link performance under delay constraints, in an attempt to opportunistically support real-time applications. Towards this objective, we study a two-link network, a single secondary link and a primary network abstracted to a single primary link, with and without primary feedback exploitation. We analytically prove that exploiting primary feedback at the secondary transmitter improves the EC of the secondary user and decreases the secondary user average transmitted power. Finally, we present numerical results that support our analytical results.
• ### A Cooperative Q-learning Approach for Real-time Power Allocation in Femtocell Networks(1303.2789)

March 12, 2013 cs.MA, cs.LG
In this paper, we address the problem of distributed interference management of cognitive femtocells that share the same frequency range with macrocells (primary user) using distributed multi-agent Q-learning. We formulate and solve three problems representing three different Q-learning algorithms: namely, centralized, distributed and partially distributed power control using Q-learning (CPC-Q, DPC-Q and PDPC-Q). CPCQ, although not of practical interest, characterizes the global optimum. Each of DPC-Q and PDPC-Q works in two different learning paradigms: Independent (IL) and Cooperative (CL). The former is considered the simplest form for applying Qlearning in multi-agent scenarios, where all the femtocells learn independently. The latter is the proposed scheme in which femtocells share partial information during the learning process in order to strike a balance between practical relevance and performance. In terms of performance, the simulation results showed that the CL paradigm outperforms the IL paradigm and achieves an aggregate femtocells capacity that is very close to the optimal one. For the practical relevance issue, we evaluate the robustness and scalability of DPC-Q, in real time, by deploying new femtocells in the system during the learning process, where we showed that DPC-Q in the CL paradigm is scalable to large number of femtocells and more robust to the network dynamics compared to the IL paradigm
• ### A Soft Sensing-Based Cognitive Access Scheme Exploiting Primary Feedback(1204.1730)

April 8, 2012 cs.NI, math.OC
In this paper, we examine a cognitive spectrum access scheme in which secondary users exploit the primary feedback information. We consider an overlay secondary network employing a random access scheme in which secondary users access the channel by certain access probabilities that are function of the spectrum sensing metric. In setting our problem, we assume that secondary users can eavesdrop on the primary link's feedback. We study the cognitive radio network from a queuing theory point of view. Access probabilities are determined by solving a secondary throughput maximization problem subject to a constraint on the primary queues' stability. First, we formulate our problem which is found to be non-convex. Yet, we solve it efficiently by exploiting the structure of the secondary throughput equation. Our scheme yields improved results in, both, the secondary user throughput and the primary user packet delay. In addition, it comes very close to the optimal genie-aided scheme in which secondary users act upon the presumed perfect knowledge of the primary user's activity.
• ### Distributed Cooperative Q-learning for Power Allocation in Cognitive Femtocell Networks(1203.3935)

March 18, 2012 cs.GT, cs.LG
In this paper, we propose a distributed reinforcement learning (RL) technique called distributed power control using Q-learning (DPC-Q) to manage the interference caused by the femtocells on macro-users in the downlink. The DPC-Q leverages Q-Learning to identify the sub-optimal pattern of power allocation, which strives to maximize femtocell capacity, while guaranteeing macrocell capacity level in an underlay cognitive setting. We propose two different approaches for the DPC-Q algorithm: namely, independent, and cooperative. In the former, femtocells learn independently from each other while in the latter, femtocells share some information during learning in order to enhance their performance. Simulation results show that the independent approach is capable of mitigating the interference generated by the femtocells on macro-users. Moreover, the results show that cooperation enhances the performance of the femtocells in terms of speed of convergence, fairness and aggregate femtocell capacity.
• ### On the Role of Vehicular Mobility in Cooperative Content Caching(1203.0657)

March 3, 2012 cs.NI
In this paper, we analyze the performance of cooperative content caching in vehicular ad hoc networks (VANETs). In particular, we characterize, using analysis and simulations, the behavior of the probability of outage (i.e. not finding a requested data chunk at a neighbor) under freeway vehicular mobility. First, we introduce a formal definition for the probability of outage in the context of cooperative content caching. Second, we characterize, analytically, the outage probability under vehicular and random mobility scenarios. Next, we verify the analytical results using simulations and compare the performance under a number of plausible mobility scenarios. This provides key insights into the problem and the involved trade-offs and enable us to assess the potential opportunity offered by the, somewhat structured, vehicular mobility that can be exploited by cooperative content caching schemes. The presented numerical results exhibit complete agreement between the analytical and simulation studies. Finally, we observe that vehicular mobility creates opportunities for enhanced outage performance under practically relevant scenarios.