Beruflich Dokumente
Kultur Dokumente
Abstract Device-to-device (D2D) communications underlaying cellular networks are considered to be promising communication modes to improve network radio resource eciency and provide higher transmission data
rates to devices close to each other. However, when D2D
communications reuse cellular resources, the resulting
interference will cause signicant performance loss to
cellular users. In this paper, the spacial distribution
of D2D communication users is modeled as a homogeneous spatial poisson point process (SPPP). With this
assumption, the closed-form expressions of the cumulative distribution functions (CDF) of the uplink interference power from the D2D communications and the
signal power from the serving cellular users to the base
station (BS) are derived, respectively. The approximate
CDF of the uplink signal-to-interference-ratio (SIR) of
cellular users is also given in our analysis. With these
analytical results, one can readily obtain the outage
probability and the CDF of the achievable data rates of
the cellular users in a straightforward manner without
exhaustive simulations. More attractively, the analytical results can be used to help design the constraints on
the congurations of D2D communications considering
the minimum requirements of cellular users. Simulation
results validate our analysis. Application examples of
the analytical results are also given in this paper.
W. Wu Y. Zhang K. Zheng W. Wang
Wireless Signal Processing and Network Lab, Key Laboratory of Universal Wireless Communications, Ministry of Education, Beijing University of Posts & Telecommunications,
Beijing, China.
Tel.: 86-10-6228-2245-5
E-mail: WenjunWu@bupt.edu.cn
W. Xiang
Faculty of Engineering and Surveying, University of Southern
Queensland, Toowoomba, QLD 4350, Australia.
1 Introduction
Communications by means of wireless networks have
become indispensable in modern social lifes. Increasingly large volumes of data are envisaged to be transmitted over wireless networks in the foreseeable future.
To meet the demands of such data explosion, wireless
networks tend to support increasingly higher data rates
for all the users. New techniques such as relay, pico cell
and femtocell have received a lot of attentions in both
academia and industry. However, no matter where the
source and destination in communications are located
and what kind of new node they access to, they have
to transmit data through a centralized controller such
as the base station (BS). This will cause inecient resource utilization when the source and destination are
close to each other.
In this article, the BS controlled device-to-device
(D2D) communications are considered. With this communication mode, the source and destination only receive necessary control signaling from the BS, and transmit data directly to each other when their locations are
in close proximity, as illustrated in Fig. 1. This communication mode can avoid unnecessary data transmission
to the BS and thus improve on the eciency of resource
utilization. When the number of communication devices
is large, such as the devices of the Internet of Things
(IoT), enabling such a communication mode is especially imperative. It is proved that enabling the D2D
communication mode can provide a higher sum rate
compared with the pure cellular communications [1].
In comparison with other short distance communica-
Wenjun Wu et al.
2 System model
We consider an OFDMA wireless cellular network with
underlaying D2D communications. On the downlink,
D2D users receive control signaling information from
the cellular BS. Since user devices are always half-duplex,
they can not transmit and receive simultaneously. As
a result, the D2D communication users transmit signals to each other on the cellular uplink interval. A
schematic of such a two-tier network is illustrated in
Fig. 1, where the dashed line represents the transmission of control signaling information on the downlink.
There are generally two basic frequency resource allocation methods between the cellular communication mode
and the D2D communication mode in such a two-tier
network. One is the fully reuse method, whereas the
other is termed orthogonal allocation. We focus on the
fully reuse scheme to analyze the most serious interference scenario in this paper.
1
1
=
,
Rd,max Rd,min
ard
(1)
where Rd,max and Rd,min are the maximum and minimum distance between the two D2D communication
users, respectively. Similarly, Rd,min is also considered
to be very small in our analysis.
For brevity of exposition, the propagation model is
considered to be a simple distance-dependent path loss,
with an extra log-normal distributed random factor accounting for shadow fading, which is similar with that
adopted in [15]. The received power from transmitter y
to receiver x deployed on a tower is
(2)
from the same location y are correlated random variables, since they both share the same local environment
of y. However, for the receiver x located at a particular
tower, the received powers from two dierent locations
y1 and y2 are assumed to be independent since there are
hardly any scatters in the local environment of x, and
the local environments of y1 and y2 are independent.
This means mx,y1 and mx,y2 are independent random
variables.
When the transmitter and receiver are both user
devices, their surroundings contribute to shadow fading
in general. The propagation model should be modied
as
(3)
Nsc
,
NC
(4)
Denote by D
the sets of D2D communication pairs on
one subchannel. The average number of pairs per-cell
ND
=
ND Nsc,d
D Nsc,d
and D =
.
Nsc
Nsc
(5)
3 Performance analysis
For fully reuse resource allocation method, the interference received by the BS from D2D users will give rise
to signicant outage of cellular uplink transmission. In
the following, we primarily analyze the statistical characteristics of the interference induced by D2D communications to the BS. Then, the constraints on the congurations of D2D users are given with respects to the
minimum performance requirement of cellular users.
The interference received by the BS is comprised
of two components, i.e., that from cellular users served
Wenjun Wu et al.
D2D users is D
with density D as dened in (5).
The interference from D2D users can be expressed as
PId2c =
Pr,c,d ,
(6)
dD
dD
dierent points of D
. According to Appendix A with
(mD /10)
(mc,D /10)
QD = 10
10
, the characteristic function of PId2c can be given by
[
( )
]
acd
1
1 j 1
PId2c()= exp D Ptd 2 e 16
e 4 2
2
[
) ]
(
acd
16
= exp
, (8)
(1j) D Ptd e
2
2 pI
3 2
acd
8
(9)
(ln qcs )2
1
e acs ,
qcs acs
fQcs (qcs ) =
(10)
(12)
where acs = 2 2 s 2 .
Since the number of cellular users transmitting on
the candidate subchannel is xed to one, the distribution of the user served on this subchannel is no longer
an SPPP. In fact, it is uniformly distributed in the coverage area of the BS. Thus, the distance between the
cellular user and its serving BS has the following PDF
pRc (rc ) =
2rc
2rc
=
,
2
Rc,min
arc
(13)
2
Rc,max
where Rc,max and Rc,min are the maximum and minimum distances between the BS and the users, respectively. Since Rc,min is very small, we assume it is zero
2
for convenience of analysis, and thus arc = Rc,max
. To
arc
yr
(14)
P RpS
tc c,max
fQcs (qcs )
=
pS
Ptc qcs
Rc,max
(ln qcs )2 (
)( )2
e acs
1
pS
2
qcs dqcs
qcs acs
arc Ptc
0
)
(ln qcs )2 (
P RpS
2
acs
Rc,max
tc c,max e
dqcs
qcs acs
arc
0
pS
Ptc R
c,max
1
{1 + sign (A3 ) erf [abs (A3 )]}
2
acs
2
2
1
pS Ptc e 2 {1+sign (A4 ) erf [abs (A4 )]} (, 15)
2arc
(
ln P
respectively.
According to (2), the received signal power of the
BS from its serving user located at s is
= Ptc rc Qcs ,
pS
tc Rc,max
where A3 =
and A4 = A3 + cs .
acs
Since the CDFs of PId2c and PSc2c both are very
complicated according to the previous analysis, it is
dicult to nd a closed-form expression for the system performance. As the received interference of the BS
from the neighboring cellular users is always the same
as that in the conventional cellular network, the outage
of cellular users can be well controlled via controlling
the interference from D2D users. It is easy to sketch the
CDFs of PId2c and PSc2c , and the gap between them is
very clear. Designing the gap will be employed as one
option in the subsequent simulation section to aid the
design of D2D transmission. However this method cannot be used to analyze other performance metrics such
as the achievable rate and the exact outage probability.
A more feasible method is analyzing the distribution
of the SIR of cellular users approximately. The received
SIR denoted by Tc is given by
PSc2c
Tc =
,
(16)
PIc2c + PId2c
where PIc2c is the received interference at the observing BS from cellular users served by neighbors. When
the density and transmit power of D2D pairs are large,
PIc2c is relatively small compared with the interference
from D2D users. In this paper, this kind of interference
is neglected. However, it is noted that this will cause
inaccuracy especially when the transmit power and the
density of D2D communication devices is low. A more
accurate analysis will be undertaken in further study.
Using Td2c to denote an approximation of Tc which is
given by
PSc2c
Td2c =
.
(17)
PId2c
To make the analysis process clear, we rst ignore the
Td2c
= Sc2c ,
(18)
PId2c
where PS c2c = Ptc rc with
2
2
2
fPS (pS ) =
(19)
Ptc pS 1 .
c2c
arc
(t )
FTd2c
[
fPId2c (pI )
= P R
tc
c,max
t
pI t
Ptc Rc,max
fPS
c2c
( )1+ 4
2
2
A5
1
Ptc A5
t
=
2
2arc
)
(
)]
[ (
2
Rc,max
2
1
2
1
, A26 +
erf (A6 ) (20)
2
2
arc
acd
3
c,max
FTd2c (t) =
fQcs (qcs ) FTd2c
dqcs .
(21)
qcs
0
(22)
).
CC = Nsc,c CC,1 Nsc,c Bsubc log2 (1 + Td2c
(23)
2 Nsc,c Bsubc 1 .
FCC (c) FTd2c
(24)
Since the logarithm function is a convex function, the
achievable data rate calculated with this method is larger
than its actual value aected by fast fading. However,
when fast fading is considered, opportunistic scheduling will provide additional gains, which requires further
investigation.
pout = FTd2c
(Tout ) .
(25)
FTd2c
(t , ) with dierent values of . Supposing that
the outage SIR threshold of the cellular users is Tout ,
(Tout , ).
Step 2 : Calculate FTd2c
Wenjun Wu et al.
Table 1 Parameters for simulation on a subchannel
Cellular
Parameters
ISD
(m)
Rc,mins NC
Ptc
(m)
(dB) (/cell) (dBm/subchannel)
Scenario I
500
0.05
Scenario II
500
0.05
Scenario III
500
0.05
Scenario IV
500
0.05
Scenario V
500
10
Scenario VI
500
10
D2D
Parameters
Rd,max Rd,mins ND
Ptd
(m)
(m)
(dB) (/cell) (dBm/subchannel)
Scenario I
10
0.05
10
Scenario II
10
0.05
10
-15
Scenario III
10
0.05
10
3
-15
Scenario IV
10
0.05
10
Scenario V
10
0.05
10
Scenario VI
10
0.05
10
-15
5 Numerical results
In this section, we will rst validate our analytical results via simulations for a wide range of scenarios with
dierent system parameters. Then, we give some examples of using these results to guide the design of the
system.
5.1 Validation
To validate the analytical results of the CDF of the received interference power, the received signal power and
the SIR of the cellular uplink transmission, an OFDMA
network with a bandwidth of 10 MHz and Nsc = 50 is
considered. Assume NC = 10, and ND = 100. The average numbers of subchannels allocated to each cellular
user and each D2D communication pair are Nsc,c = 5
and Nsc,d = 5, respectively. To observe the robustness
of the analytical results, a group of parameters are used
as shown in Table 1. Since we only analyze the statistical characteristics of the geometry-based performance
in the OFDMA networks, the simulations are based on
snapshots of the network.
In our simulations, we also assume the antenna gains
of the BS and the user are GB = 14 dB and GU = 0 dB,
respectively. Comparative results between the simulations and the analysis are shown in Figs. 2-4. To estimate the error of our analytical results, the mean
squared error (MSE) of the CDF is calculated in terms
of the value of the probability when the abscissa is the
same. The results are shown in Table 2.
The MSEs of FPId2c and FPSc2c in Fig. 2 and Fig.
3 are relatively stable. Since we have considered shadowing in the analysis of the CDFs of these tow kinds
of power, increasing the standard deviation will not increase the error. This can be observed from the MSEs of
Scenarios group I /III and Scenarios group II/IV. Since
we assume the minimum distance between the users and
the BS is zero in the analysis, the error increases with
the increase of the actual minimum distance. From Table 2 we can see the MSE of Scenario V is larger than
those of Scenarios I and III, and the MSE of Scenario VI
is larger than those of Scenarios II and IV too. However, the MSEs are still relatively small, and there is
no distinct gap between the simulation and analytical
results in Figs. 2 and 3.
When observing the results in Fig. 4, the MSE between the simulation and the analytical CDFs of FTc
0.8
0.8
0.6
0.6
CDF
1.0
CDF
1.0
Scenario I
Scenario II
0.4
Scenario I
Scenario II
0.4
Scenario III
Scenario III
Scenario IV
Scenario IV
Scenario V
0.2
Scenario V
0.2
Scenario VI
Scenario VI
0.0
0.0
-80
-60
-40
-20
-80
-60
-20
20
40
60
-40
Tout 0
1.0
0.8
0.8
CDF
0.6
CDF
0.6
Scenario I
Scenario II
0.4
Scenario I
Scenario III
Scenario II
0.4
Scenario IV
Scenario III
Scenario IV
Scenario V
0.2
Scenario VI
Scenario V
0.2
Scenario VI
Solid : Simulation results
Dash : Analytical results
0.0
-100
-80
-60
-40
-20
10
12
14
XX
XXX CDF F
Scenario XXX PId2c
FPSc2c
FTc
Scenario I
9.5149E-05
7.1099E-06
8.4503E-05
Scenario II
1.1169E-04
1.7757E-06
4.1965E-04
Scenario III
9.0064E-05
6.3717E-06
5.8865E-04
Scenario IV
1.0366E-04
1.2540E-06
9.4950E-04
Scenario V
2.2416E-04
1.0520E-05
6.7498E-05
Scenario VI
1.5682E-04
6.4085E-06
4.4839E-04
Wenjun Wu et al.
1.0
Simulation outage
Analytical outage
Scenario I
0.8628
0.8719
Scenario II
0.3567
0.2977
Scenario III
0.8678
0.9068
0.8
0.6
CDF
Scenario IV
0.4869
0.3927
'
'
'
Scenario V
0.8587
0.8719
'
'
'
Scenario VI
0.3453
0.2977
'
'
0.4
0.2
0.0
-100
-80
-60
-40
10
) 1 =
2
4.1214
mw/m
ND
(/cell)
10
2 =
3.1703
3 =
2.4387
4 =
1.8759
10
Ptd
14.9897 17.2686 13.5268 15.8057
(dBm/subchannel)
(
) 5 =
ND
(/cell)
6 =
1.1100
7 =
0.8539
8 =
0.6568
1.0
0.40
0.35
0.8
0.30
0.25
CDF
0.6
0.20
0.15
0.4
0.10
0.05
-8
-7
-7.44
0.2
'
'
'
'
'
'
'
'
0.0
-40
-20
20
40
Fig. 7 CDFs of the uplink SIR for cellular users with various
D2D communication densities and transmit powers.
40
35
30
25
20
15
10
5
-2
10
12
14
Ptd
18.0846 20.3634 22.6423 24.9212
(dBm/subchannel)
Note:
considering antenna gains in simulation,
D Ptd GB .
Fig. 6 CDFs of PId2c with various D2D communication densities and transmit powers.
mit power of D2D communications. The cellular parameters are given in Table 5 and xed. A proper value of
will be chosen to satisfy the suggested gap in the previous study. Using (15) and (10), we can draw a group
of curves with dierent values of as illustrated in
1.0
0.10
0.8
-97.17
0.20
0.20
0.09
-81.91
0.8
0.08
-97.5
-97.0
-96.5
-82.5
-82.0
0.07
-81.5
0.6
0.06
CDF
CDF
0.6
0.4
0.05
-7.75
-7.50-7.44
-7.25
0.4
0.2
0.2
0.0
0.0
-100
-80
-60
-40
-60
-40
-20
20
40
60
80
100
ND
= 3/cell and Ptd = 24.6726 (dBm/subchannel),
respectively. The minimum requirement of the reference sensitivity power level of user equipment is chosen
to be -94 dBm according to the specication in [17].
Since the maximum distance between the D2D users
is Rd,max = 10m, the minimum transmit power of the
D2D users is about -54 dBm. As a result, our designed
transmit power is much larger than the minimum transmit power that is feasible.
We carry out system-level simulations according to
the designed parameters. Results shown in Fig. 10 demonstrate that the outage probability of cellular users is
Fig. 11 Simulation SIR of the system design example using
8.6161%. Since this value is less than 10%, our method
analytical approximate method.
is thus validated.
4.6422106 mw/m2 , the approximate outage probability is about 4.9707% that meets our design target. We
Table 5 Parameters for the system design example
design the density and transmit power of D2D commu
0.10
0.09
0.8
0.08
0.07
0.6
CDF
0.06
0.05
-7.75
-7.50-7.44
-7.25
0.4
0.2
0.0
-60
-40
-20
20
40
60
80
100
At last, a more convenient method using the approximate CDF of the uplink SIR for cellular users described in Section IV.C is adopted to design the density
and transmit power of D2D communications. The cellular parameters are the same as in the previous example
given in Table 5 with = 0.9. Since the errors resulted from ignoring the interference from neighboring
cellular users increase when the density and transmit
power of D2D communications are low, 5% is set as
the target outage probability in our analytical computation, which is half of the actually required out
age probability. We choose ND
= 5/cell and Ptd =
14.21 (dBm/subchannel) as the initial values, which
6 Conclusion
In this paper, the interference induced by D2D communications to cellular users is analyzed when the two
communication modes reuse the same radio resources.
The closed-form CDFs of both the BS receiving interference from D2D communications and the signal power
from its serving cellular user are derived given random
user location and shadow fading. An approximate CDF
of the uplink SIR of cellular users is derived in lieu of the
actual one for convenience of analysis. Based on the analytical results, the outage probability and the CDF of
10
Wenjun Wu et al.
fQY (q) =
e ay .
q ay
(26)
(y,Qy )C
(28)
P =
g (y, Qy ).
(29)
yY
(y,Qy )C
= exp EQy
ejPt ry
ry (0,)
Qy
1 2ry dry .
(30)
)2
(
( ju
) 1
2 2 1
= exp EQy
e
u
du
1
PtQy
u(,0)
)
(
2
(31)
= exp Pt A1 A2 .
where
A1 =
) 2 2 1
eju 1
u du,
(32)
u(,0)
and
[
]
2
A2 = EQy Qy .
(33)
(C) =
(dy) p (dQy ) =
dyfQY (q) dq. (27)
(y,Qy )C
(
)
(
)
(
)
)]
2
=
j cos
+
sin
+
1+
2
(
)
j
2
2
= e 1 +
.
(34)
+
[ ]
1
ln q
E qk =
q k1 q ay dq. (35)
q k fQY (q) dq =
ay 0
2
mR+
(36)
(
)
j
2
= exp Ae ,
(38)
ay
)
(
2
where A = Pt e 2 1 + 2 .
The laws of probability with characteristic functions
given by (38) are the stable laws of exponent 2 with
the restriction of 0 < 2 < 1 [19]. Similar to (22)
in [18], we give the PDF of the sum of the received
power as
)(
(
)k
(
)
1 1 2k
2
A
fP(p; ) =
sin k 1 +
.(39)
2
p
k!
p
k=1
P()= exp Pt e
e
2
[
) ]
(
ay
16
= exp
.
(40)
(1 j) Pt e
2
The PDF and CDF of P are given by
fP(p) =
ay
3 2 Pt e
3
4p
Pt e 16 p 2 e
2
and
ay
8
(41)
ay )
3
2 Pt e 16
FP(p) = erfc
,
2 p
(42)
2
x
0
et dt.
2
Acknowledgments
This work was supported in part by National Basic Research Program of China (973 Program): 2012CB316005
and Program for New Century Excellent Talents (NCET)
in University.
References
1. Pekka J., Chia-hao Y., Klaus D., Cssio R., Carl W., Klaus
H., Device-to-device communication underlaying cellular
communications systems, Int. J. Communications, Network
and System Sciences, 3, 169-178 (2009)
2. Klaus D., Mika R., Carl W., Cssio B. R., Klaus H., Deviceto-device communication as an underlay to LTE-Advanced
networks, IEEE Commun. Mag., 47(12), 42-49, (2009)
3. Klaus D., Mika P. R., Pekka J., Cassio R., Klaus H.,
Device-to-Device communications; functional prospects for
LTE-Advanced networks, Proc. IEEE Int. Conf. on Communications Workshops 2009 (ICC Workshops09), Dresden, Germany, 1-6, (2009)
11