Modeling and Analysis on Access Control for Device-to-Device Communications in Cellular Network: A Network-Calculus-Based Approach

被引:19
作者
Huang, Jun [1 ]
Sun, Yi [1 ]
Xiong, Zi [1 ]
Duan, Qiang [2 ]
Zhao, Yanxiao [3 ]
Cao, Xianghui [4 ,5 ]
Wang, Wei [6 ]
机构
[1] Chongqing Univ Posts & Telecommun, Dept Commun & Informat Engn, Chongqing 400065, Peoples R China
[2] Penn State Univ, Dept Informat Sci & Technol, Abington, PA 19001 USA
[3] South Dakota Sch Mines & Technol, Dept Elect & Comp Engn, Rapid City, SD 57701 USA
[4] Zhejiang Univ, State Key Lab Ind Control Technol, Hangzhou 310027, Zhejiang, Peoples R China
[5] IIT, Dept Elect & Comp Engn, Chicago, IL 60616 USA
[6] San Diego State Univ, Dept Comp Sci, San Diego, CA 92115 USA
关键词
Access control; device-to-device (D2D); multipriority; network calculus (NC); performance analysis; RESOURCE-ALLOCATION; DELAY; CHALLENGES; UNDERLAY; SERVICE; DESIGN;
D O I
10.1109/TVT.2015.2412154
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Device-to-device (D2D) communication plays a crucial role in improving the performance of cellular systems, and it is expected to be an innovative technology for next-generation wireless systems. Although significant progress has been made toward cellular and D2D coexistence, the issue of access control for D2D communications in the cellular network has received limited attention. In this paper, we address this issue by employing the network calculus (NC) theory for the first time. We propose a multipriority model, which assigns the strictly highest priority to cellular users and multiple levels of priority to D2D users to characterize the communication requests' access. The proposed model facilitates interference avoidance between cellular and D2D communications and, thus, enhances the quality of service (QoS) of the cellular system. We also apply the NC theory to analyze the worst-case performance of service rate, delay, and backlog for processing communication requests of cellular and D2D users. Both theoretical and experimental results demonstrate that the proposed model is effective and applicable to characterize the access control for D2D communications underlaying cellular networks.
引用
收藏
页码:1615 / 1626
页数:12
相关论文
共 38 条
[1]  
Abeta S., 2010, 2010 12th IEEE International Conference on Communication Systems (ICCS 2010), P146, DOI 10.1109/ICCS.2010.5686367
[2]   Performance bounds for flow control protocols [J].
Agrawal, R ;
Cruz, RL ;
Okino, C ;
Rajan, R .
IEEE-ACM TRANSACTIONS ON NETWORKING, 1999, 7 (03) :310-323
[3]  
[Anonymous], 2001, NETWORK CALCULUS THE
[4]  
[Anonymous], STUD LTE DEV DEV PRO
[5]   A Survey on Device-to-Device Communication in Cellular Networks [J].
Asadi, Arash ;
Wang, Qing ;
Mancuso, Vincenzo .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1801-1819
[6]   Five Disruptive Technology Directions for 5G [J].
Boccardi, Federico ;
Heath, Robert W., Jr. ;
Lozano, Angel ;
Marzetta, Thomas L. ;
Popovski, Petar .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (02) :74-80
[7]  
Bouillard A., 2011, 5 INT ICST C PERF EV, P381, DOI [10.4108/icst.valuetools.2011.245603, DOI 10.4108/ICST.VALUETOOLS.2011.245603]
[8]   STABILITY, QUEUE LENGTH, AND DELAY OF DETERMINISTIC AND STOCHASTIC QUEUING-NETWORKS [J].
CHANG, CS .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1994, 39 (05) :913-931
[9]  
Chao Luo, 2012, 2012 1st IEEE International Conference on Communications in China (ICCC 2012), P103, DOI 10.1109/ICCChina.2012.6356861
[10]   A CALCULUS FOR NETWORK DELAY .2. NETWORK ANALYSIS [J].
CRUZ, RL .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1991, 37 (01) :132-141