Sie sind auf Seite 1von 11

Noname manuscript No.

(will be inserted by the editor)

Performance Analysis of Device-to-Device Communications


Underlaying Cellular Networks
Wenjun Wu Wei Xiang Yingkai Zhang Kan Zheng Wenbo Wang

Received: date / Accepted: date

Abstract Device-to-device (D2D) communications underlaying cellular networks are considered to be promising communication modes to improve network radio resource eciency and provide higher transmission data
rates to devices close to each other. However, when D2D
communications reuse cellular resources, the resulting
interference will cause signicant performance loss to
cellular users. In this paper, the spacial distribution
of D2D communication users is modeled as a homogeneous spatial poisson point process (SPPP). With this
assumption, the closed-form expressions of the cumulative distribution functions (CDF) of the uplink interference power from the D2D communications and the
signal power from the serving cellular users to the base
station (BS) are derived, respectively. The approximate
CDF of the uplink signal-to-interference-ratio (SIR) of
cellular users is also given in our analysis. With these
analytical results, one can readily obtain the outage
probability and the CDF of the achievable data rates of
the cellular users in a straightforward manner without
exhaustive simulations. More attractively, the analytical results can be used to help design the constraints on
the congurations of D2D communications considering
the minimum requirements of cellular users. Simulation
results validate our analysis. Application examples of
the analytical results are also given in this paper.
W. Wu Y. Zhang K. Zheng W. Wang
Wireless Signal Processing and Network Lab, Key Laboratory of Universal Wireless Communications, Ministry of Education, Beijing University of Posts & Telecommunications,
Beijing, China.
Tel.: 86-10-6228-2245-5
E-mail: WenjunWu@bupt.edu.cn
W. Xiang
Faculty of Engineering and Surveying, University of Southern
Queensland, Toowoomba, QLD 4350, Australia.

Keywords Device-to-device interference analysis


spacial poisson point processes

1 Introduction
Communications by means of wireless networks have
become indispensable in modern social lifes. Increasingly large volumes of data are envisaged to be transmitted over wireless networks in the foreseeable future.
To meet the demands of such data explosion, wireless
networks tend to support increasingly higher data rates
for all the users. New techniques such as relay, pico cell
and femtocell have received a lot of attentions in both
academia and industry. However, no matter where the
source and destination in communications are located
and what kind of new node they access to, they have
to transmit data through a centralized controller such
as the base station (BS). This will cause inecient resource utilization when the source and destination are
close to each other.
In this article, the BS controlled device-to-device
(D2D) communications are considered. With this communication mode, the source and destination only receive necessary control signaling from the BS, and transmit data directly to each other when their locations are
in close proximity, as illustrated in Fig. 1. This communication mode can avoid unnecessary data transmission
to the BS and thus improve on the eciency of resource
utilization. When the number of communication devices
is large, such as the devices of the Internet of Things
(IoT), enabling such a communication mode is especially imperative. It is proved that enabling the D2D
communication mode can provide a higher sum rate
compared with the pure cellular communications [1].
In comparison with other short distance communica-

Fig. 1 D2D communications underlaying wireless cellular


networks.

tion modes, the BS controlled D2D communications are


transparent to users. Moreover, it is more reliable since
they communicate via an accredited network.
However, the D2D communication mode poses considerable new challenges, e.g., the signaling of D2D communications, the interference problem between D2D communication mode and cellular mode, and the resource
allocation of D2D communications. In [2], the session
control of D2D communications is considered. Related
functional blocks to enable D2D communications are
also addressed in [3]. The mode selection schemes, which
decide when to enable the D2D communication mode
are discussed to maximize the system utility [4]. In [5]
and [6], the resource sharing mode selection is discussed
when the D2D communication mode is selected. To
manage interference, power control is considered. When
D2D communications reuse the cellular resources, the
mechanisms that limit the maximum D2D transmit power
are proposed in [1] and [2]. In [7], several practical
power control methods for D2D communications in an
OFDMA FDD system are investigated. Eective resource allocation including time-frequency resource and
power allocation is also helpful to manage interference.
Reserving resources for D2D communications is a straightforward way to allocate resources, but not eective in
terms of resource eciency [2]. Dynamic resource allocation is more eective, the instantaneous interference
environment can be considered when allocating [8]-[11].
The performance of cellular networks with underlaying
D2D communication links is analyzed in [12][13] in a
simple isolated cell where one cellular user and two D2D
users share the available radio resources. Although it is
helpful to design some interference avoidance schemes,

Wenjun Wu et al.

it is not enough to give statistical characteristics on the


general interference scenario of D2D communications.
This paper analyzes the performance of cellular users
in an OFDMA wireless cellular network with underlaying D2D communications. The interference range is
considered to be two-layer cells around the observing
one. Each cell serves only one cellular user on a subchannel, which can be located inside the coverage area
of the BS uniformly. Meanwhile, the number of D2D
communications on a subchannel depends on the density of D2D communication users. Since the location
of D2D communication users is random, the homogeneous spacial poisson point processes (SPPP) [14] is
used in our analysis. The statistical distribution of the
interference from D2D communications and the signal
from cellular users to the BS are derived, respectively.
An approximate statistical distribution of the signalto-interference-ratio (SIR) for cellular users in uplink
transmission is also given. With these analytical results,
the outage probability of cellular users and an estimated
distribution of the achievable transmission data rates
are given. The analysis also help to determine the constraints on the congurations of D2D communications,
such as density and the maximum transmit power.
The remainder of the paper is organized as follows.
In Section II, the system model is introduced. In Section
III, the statistical distribution of the cellular user performance is derived. The applications of the analytical
results are given in Section IV. The validation of the analytical results and their application examples are given
in Section V with numerical simulation results. At last,
Section VI concludes this paper.

2 System model
We consider an OFDMA wireless cellular network with
underlaying D2D communications. On the downlink,
D2D users receive control signaling information from
the cellular BS. Since user devices are always half-duplex,
they can not transmit and receive simultaneously. As
a result, the D2D communication users transmit signals to each other on the cellular uplink interval. A
schematic of such a two-tier network is illustrated in
Fig. 1, where the dashed line represents the transmission of control signaling information on the downlink.
There are generally two basic frequency resource allocation methods between the cellular communication mode
and the D2D communication mode in such a two-tier
network. One is the fully reuse method, whereas the
other is termed orthogonal allocation. We focus on the
fully reuse scheme to analyze the most serious interference scenario in this paper.

Performance Analysis of Device-to-Device Communications Underlaying Cellular Networks

Denote by AR2 and H A the coverage area of


the cellular network and one hexagonal macro cell, respectively. The BS is located in the center of each cell.
Assume the use of omni-antenna by the BS for simplicity of analysis. Users adopting the traditional cellular
communication mode are distributed randomly in A ,
forming a homogeneous SPPP denoted by C with intensity C . Thus, C is also the density of the cellular users, and the average number of them in each cell
is NC = C H , where H represents the area of
one cell. The underlaying D2D communication pairs are
also randomly distributed in A . We set one user of each
pair as a dominator of the communication. All these
dominant users form a homogeneous SPPP denoted by
D with intensity D . Similarly, D is also the density
of these dominant users and the average number of D2D
communication pairs in each cell is ND = D H .
In practice, the distance between the BS and users
should be greater than a certain threshold Rc,min . However, this threshold is considered to be very small (close
to zero) in our analysis for theoretic tractability. There
are still some restrictions on distance Rd between the
two D2D communication users. Assume Rd follows an
uniform distribution. The probability density function
(PDF) of Rd is given by
pRd (r) =

1
1
=
,
Rd,max Rd,min
ard

(1)

where Rd,max and Rd,min are the maximum and minimum distance between the two D2D communication
users, respectively. Similarly, Rd,min is also considered
to be very small in our analysis.
For brevity of exposition, the propagation model is
considered to be a simple distance-dependent path loss,
with an extra log-normal distributed random factor accounting for shadow fading, which is similar with that
adopted in [15]. The received power from transmitter y
to receiver x deployed on a tower is

Pr,x,y = Pt,y |y x| 10(my /10) 10(mx,y /10) ,

(2)

where Pt,y is the transmit power at y, |y x| indicates


the distance between x and y, and is the path-loss
fading coecient (typically = 4). my and mx,y are
two independent zero-mean Gaussian random variables
with an identical standard deviation of s . Obviously,
10(my /10) and 10(mx,y /10) are log-normal distributed,
with the former representing the shadow fading induced
by the local environment of y and the latter representing the shadow fading induced by the propagation environment between x and y. In practice, coecients
and often take the value of 2 = 2 = 1/2. This propagation model is in line with the fact that the received
powers of two separate high located receivers x1 and x2

from the same location y are correlated random variables, since they both share the same local environment
of y. However, for the receiver x located at a particular
tower, the received powers from two dierent locations
y1 and y2 are assumed to be independent since there are
hardly any scatters in the local environment of x, and
the local environments of y1 and y2 are independent.
This means mx,y1 and mx,y2 are independent random
variables.
When the transmitter and receiver are both user
devices, their surroundings contribute to shadow fading
in general. The propagation model should be modied
as

Pr,x,y = Pt,y |y x| 10(my /10) 10(mx /10) ,

(3)

where mx is the shadow fading induced by the local


environment of x.
To provide a basic understanding on the performance of D2D communications underlaying a cellular
network, we assume that the network does not employ any power control and interference mitigation techniques. The BS allocates frequency resources to regular
cellular users and D2D communication pairs randomly.
In an OFDMA network, there is always only one cellular
user on each subchannel in a cell, denoted by NC = 1.
The average number of subchannels assigned to each
cellular user can be given by
Nsc,c =

Nsc
,
NC

(4)

where Nsc is the total number of subchannels in use in


the OFDMA network. Assume the average number of
subchannels assigned to each D2D communication pair
is denoted by Nsc,d . The density of D2D communication pairs on each subchannel is harmoniously diluted.

Denote by D
the sets of D2D communication pairs on
one subchannel. The average number of pairs per-cell

and the density of D


are given by

ND
=

ND Nsc,d
D Nsc,d
and D =
.
Nsc
Nsc

(5)

3 Performance analysis
For fully reuse resource allocation method, the interference received by the BS from D2D users will give rise
to signicant outage of cellular uplink transmission. In
the following, we primarily analyze the statistical characteristics of the interference induced by D2D communications to the BS. Then, the constraints on the congurations of D2D users are given with respects to the
minimum performance requirement of cellular users.
The interference received by the BS is comprised
of two components, i.e., that from cellular users served

Wenjun Wu et al.

by the neighboring BSs and that from the surrounding


D2D users. Since each cell serves only one cellular user
on each subchannel irrespective of the resource allocation method employed, the statistical characteristics of
the cellular interference is not changed in comparison
with the traditional cellular network.
On a candidate subchannel, the set of interfering

D2D users is D
with density D as dened in (5).
The interference from D2D users can be expressed as

PId2c =
Pr,c,d ,
(6)

dD

where c is the location of the candidate BS which is set


as the origin of the two-dimensional plane. Pr,c,d is the
received power dened by (2) since the antennas of the
BS are always deployed on a tower. Assuming all the
D2D users transmit at the same power level of Ptd and
substituting (2) into (6), a more detailed expression of
PId2c is given by

Ptd |d| 10(md /10) 10(mc,d /10) .


(7)
PId2c =

dD

For two dierent points d1 and d2 of D


, md1 and md2
are independent. mc,d1 and mc,d2 are also independent
since the environments along the two paths are dierent. As a result, 10(md /10) 10(mc,d /10) is a log-normal
distributed random variable, which is independent for

dierent points of D
. According to Appendix A with
(mD /10)
(mc,D /10)
QD = 10
10
, the characteristic function of PId2c can be given by
[
( )
]
acd
1
1 j 1
PId2c()= exp D Ptd 2 e 16
e 4 2
2
[
) ]
(

acd

16
= exp
, (8)
(1j) D Ptd e
2

where acd = 2 2 s 2 and = (ln 10) /10. The PDF and


CDF of PId2c are given by
D Ptd e

3 acd
4pI
fPId2c(pI ) = D Ptd pI 2 e 16 e
2
and
)
( 3
acd
2 D Ptd e 16
,
FPId2c(pI ) = erfc

2 pI
3 2

acd
8

(9)

(ln qcs )2
1
e acs ,

qcs acs

fQcs (qcs ) =

(10)

PSc2c = Ptc |s c| 10(ms /10) 10(ms,c /10)


(11)

where Ptc is the transmit power of the cellular user and


rc is the distance between the BS and the user. Qcs
is the comprehensive shadow fading comprised of the

(12)

where acs = 2 2 s 2 .
Since the number of cellular users transmitting on
the candidate subchannel is xed to one, the distribution of the user served on this subchannel is no longer
an SPPP. In fact, it is uniformly distributed in the coverage area of the BS. Thus, the distance between the
cellular user and its serving BS has the following PDF
pRc (rc ) =

2rc
2rc
=
,
2
Rc,min
arc

(13)

2
Rc,max

where Rc,max and Rc,min are the maximum and minimum distances between the BS and the users, respectively. Since Rc,min is very small, we assume it is zero
2
for convenience of analysis, and thus arc = Rc,max
. To

simplify expressions, we dene yr = rc and


fYr (yr ) =

arc

yr

(14)

The CDF of PSc2c can be calculated as (15).


FPSc2c(pS )

P RpS
tc c,max
fQcs (qcs )
=

pS
Ptc qcs

fYr (yr ) dyr dqcs

Rc,max

(ln qcs )2 (
)( )2
e acs
1
pS
2
qcs dqcs

qcs acs
arc Ptc
0
)
(ln qcs )2 (
P RpS
2
acs
Rc,max
tc c,max e

dqcs

qcs acs
arc
0

pS
Ptc R
c,max

1
{1 + sign (A3 ) erf [abs (A3 )]}
2
acs
2
2
1
pS Ptc e 2 {1+sign (A4 ) erf [abs (A4 )]} (, 15)

2arc
(
ln P

respectively.
According to (2), the received signal power of the
BS from its serving user located at s is
= Ptc rc Qcs ,

shadow fading induced by the surrounding of the user


and the environment of the transmission path. Obviously, Qcs is log-normal distributed with variance s 2
in dB whose PDF is given by

pS

tc Rc,max

where A3 =
and A4 = A3 + cs .
acs
Since the CDFs of PId2c and PSc2c both are very
complicated according to the previous analysis, it is
dicult to nd a closed-form expression for the system performance. As the received interference of the BS
from the neighboring cellular users is always the same
as that in the conventional cellular network, the outage
of cellular users can be well controlled via controlling
the interference from D2D users. It is easy to sketch the
CDFs of PId2c and PSc2c , and the gap between them is
very clear. Designing the gap will be employed as one
option in the subsequent simulation section to aid the

Performance Analysis of Device-to-Device Communications Underlaying Cellular Networks

design of D2D transmission. However this method cannot be used to analyze other performance metrics such
as the achievable rate and the exact outage probability.
A more feasible method is analyzing the distribution
of the SIR of cellular users approximately. The received
SIR denoted by Tc is given by
PSc2c
Tc =
,
(16)
PIc2c + PId2c
where PIc2c is the received interference at the observing BS from cellular users served by neighbors. When
the density and transmit power of D2D pairs are large,
PIc2c is relatively small compared with the interference
from D2D users. In this paper, this kind of interference
is neglected. However, it is noted that this will cause
inaccuracy especially when the transmit power and the
density of D2D communication devices is low. A more
accurate analysis will be undertaken in further study.
Using Td2c to denote an approximation of Tc which is
given by
PSc2c
Td2c =
.
(17)
PId2c
To make the analysis process clear, we rst ignore the

shadowing fading factor in PSc2c , and denote by Td2c


this interim SIR. We can obtain
P

Td2c
= Sc2c ,
(18)
PId2c
where PS c2c = Ptc rc with
2
2
2
fPS (pS ) =
(19)
Ptc pS 1 .
c2c
arc

The CDF of Td2c


can be calculated as follows.

(t )
FTd2c
[

fPId2c (pI )
= P R
tc

c,max
t

pI t

Ptc Rc,max

fPS

c2c

(pS ) dpS dpI

( )1+ 4
2
2
A5
1

Ptc A5
t
=
2
2arc
)
(
)]
[ (
2
Rc,max
2
1
2
1

, A26 +
erf (A6 ) (20)

2
2
arc

acd
3

where A5 = 2 D Ptd e 16 and A6 = 2PA5 Rt


.
tc

c,max

Since Td2c = Td2c


Qcs , the CDF of Td2c is given by
( )

t

FTd2c (t) =
fQcs (qcs ) FTd2c
dqcs .
(21)
qcs
0

4 Application of the analysis results


With the distribution of the SIR of cellular users, the
system performance can be analytically determined without running time consuming simulations. We can also
suggest on system design without exhaustive simulations.

4.1 Achievable Data Rate


When fast fading is not considered, the geometry-based
achievable data rate of the cellular user on one subchannel can be calculated as a function of the SIR, which is
given by
CC,1= Bsubc log2 (1 + Tc )

Bsubc log2 (1 + Td2c


).

(22)

where CC,1 is the achievable data rate of the cellular


user on one subchannel, and Bsubc is the bandwidth of
the subchannel. Considering the average number of subchannels assigned to each cellular user, the achievable
data rate of cellular users can be expressed as

).
CC = Nsc,c CC,1 Nsc,c Bsubc log2 (1 + Td2c

(23)

According to the geometry-based static SIR, the CDF


of CC is given by
(
)
c

2 Nsc,c Bsubc 1 .
FCC (c) FTd2c
(24)
Since the logarithm function is a convex function, the
achievable data rate calculated with this method is larger
than its actual value aected by fast fading. However,
when fast fading is considered, opportunistic scheduling will provide additional gains, which requires further
investigation.

4.2 Outage Probability


With the CDF function at hand, it is easy to obtain the
outage probability. Assume that the outage SIR threshold of the cellular users is Tout according to the modulation threshold of the control signal. If the transmit
power Ptc of the cellular users, the transmit power Ptd
and the density D of the D2D users are given, the
outage probability pout of the cellular users is

pout = FTd2c
(Tout ) .

(25)

4.3 Constraints on the Congurations of D2D


Communications
In this section, the constraints on the congurations
such as the density and the transmit power are investigated. With the consideration of the outage probability
of the cellular user, the density and the transmit power
should be below a certain threshold. As can be observed
from (20), F () can be expressed as a function of
( ) Td2c
D Ptd denoted by . When the transmit power
of cellular user Ptc is xed, there will be a range of

FTd2c
(t , ) with dierent values of . Supposing that
the outage SIR threshold of the cellular users is Tout ,

and the desired outage probability of the cellular user

is below Pout , we can calculate FTd2c


(Tout , ) until the

condition FTd2c (Tout , ) Pout is satised. The process


of nding the proper is given below.
Step 1 : Assign an initial value to .

(Tout , ).
Step 2 : Calculate FTd2c

Step 3 : if FTd2c (Tout , ) > Pout , set =

and return to Step 2. if FTd2c


(Tout , ) < Pout ,
stop calculation, and record the current value of .
where < 1 denotes the step coecient of . When
we obtain the value of , we can determine density D
and transmit power Ptd of the D2D users according to
the system requirement, such as the receiver sensitivity
of D2D devices and the number of the D2D pairs in a
cell. This can be expressed as Ptd Ptd,min and D
D,min .

Wenjun Wu et al.
Table 1 Parameters for simulation on a subchannel
Cellular
Parameters

ISD
(m)

Rc,mins NC
Ptc
(m)
(dB) (/cell) (dBm/subchannel)

Scenario I

500

0.05

Scenario II

500

0.05

Scenario III

500

0.05

Scenario IV

500

0.05

Scenario V

500

10

Scenario VI

500

10

D2D
Parameters

Rd,max Rd,mins ND
Ptd
(m)
(m)
(dB) (/cell) (dBm/subchannel)

Scenario I

10

0.05

10

Scenario II

10

0.05

10

-15

Scenario III

10

0.05

10

3
-15

Scenario IV

10

0.05

10

Scenario V

10

0.05

10

Scenario VI

10

0.05

10

-15

5 Numerical results
In this section, we will rst validate our analytical results via simulations for a wide range of scenarios with
dierent system parameters. Then, we give some examples of using these results to guide the design of the
system.

5.1 Validation
To validate the analytical results of the CDF of the received interference power, the received signal power and
the SIR of the cellular uplink transmission, an OFDMA
network with a bandwidth of 10 MHz and Nsc = 50 is
considered. Assume NC = 10, and ND = 100. The average numbers of subchannels allocated to each cellular
user and each D2D communication pair are Nsc,c = 5
and Nsc,d = 5, respectively. To observe the robustness
of the analytical results, a group of parameters are used
as shown in Table 1. Since we only analyze the statistical characteristics of the geometry-based performance
in the OFDMA networks, the simulations are based on
snapshots of the network.
In our simulations, we also assume the antenna gains
of the BS and the user are GB = 14 dB and GU = 0 dB,
respectively. Comparative results between the simulations and the analysis are shown in Figs. 2-4. To estimate the error of our analytical results, the mean
squared error (MSE) of the CDF is calculated in terms
of the value of the probability when the abscissa is the
same. The results are shown in Table 2.
The MSEs of FPId2c and FPSc2c in Fig. 2 and Fig.
3 are relatively stable. Since we have considered shadowing in the analysis of the CDFs of these tow kinds

of power, increasing the standard deviation will not increase the error. This can be observed from the MSEs of
Scenarios group I /III and Scenarios group II/IV. Since
we assume the minimum distance between the users and
the BS is zero in the analysis, the error increases with
the increase of the actual minimum distance. From Table 2 we can see the MSE of Scenario V is larger than
those of Scenarios I and III, and the MSE of Scenario VI
is larger than those of Scenarios II and IV too. However, the MSEs are still relatively small, and there is
no distinct gap between the simulation and analytical
results in Figs. 2 and 3.
When observing the results in Fig. 4, the MSE between the simulation and the analytical CDFs of FTc

changes in dierent scenarios, since we use FTd2c


to approach FTc in the analysis. In Scenario I, the standard
deviation of shadowing is low and the transmit power
of the D2D users is relatively large. Ignoring the shadowing of the received signal and the interference from
neighboring cellular users causes little loss of accuracy.
With the increase of the standard deviation, the MSE
increases very fast. We can see that the MSEs in Scenarios III and IV are larger than those in Scenarios I and
II, respectively. Meanwhile, when the transmit power
of D2D users is low, the proportion of the interference
from the neighboring cellular users will increase. The
approach employed by our analysis will result in more
errors, and the MSEs in Scenarios II, IV and VI are
larger than those in Scenarios I, III and V, respectively.
Comparing Scenarios V and VI to Scenarios I and II, an
interesting phenomenon can be observed that the MSE
decreases when the actual minimum distance increases.
This is contrary to the previous results on FPId2c and

Performance Analysis of Device-to-Device Communications Underlaying Cellular Networks

0.8

0.8

0.6

0.6

CDF

1.0

CDF

1.0

Scenario I
Scenario II

0.4

Scenario I
Scenario II

0.4

Scenario III

Scenario III

Scenario IV

Scenario IV
Scenario V

0.2

Scenario V

0.2

Scenario VI

Scenario VI

Solid : Simulation results

Solid : Simulation results

Dash : Analytical results

Dash : Analytical results

0.0

0.0
-80

-60

-40

-20

-80

-60

-20

20

40

60

Uplink SIR of cellular users, dB

MeNB receiving interference from D2D links, dBm/subchannel

Fig. 2 CDF validation of the BS receiving interference from


D2D communications.

-40

Tout 0

Fig. 4 CDF validation of the uplink SIR for cellular users.


1.0

1.0

0.8

0.8

CDF

0.6

CDF

0.6

Scenario I
Scenario II

0.4

Scenario I

Scenario III

Scenario II

0.4

Scenario IV

Scenario III
Scenario IV

Scenario V

0.2

Scenario VI

Scenario V

0.2

Solid : Simulation results

Scenario VI
Solid : Simulation results
Dash : Analytical results

0.0
-100

-80

-60

-40

-20

MeNB receiving signal from cellular users, dBm/subchannel

Fig. 3 CDF validation of the BS receiving signal power from


serving cellular users.

Dash : Analytical results


0.0
0

10

12

14

Achievable data rate, Mbps

Fig. 5 CDF of the uplink achievable data rate of cellular


users.

5.2 Achievable Data Rate and Outage Probability


FPSc2c , due to that counteraction among serval factors
may reduce the error. In a word, ignoring the shadowing
of the received signal and the interference from neighboring cellular users will cause a distinct gap between
the simulation and analytical results when the standard
deviation of shadowing is large and the transmit power
of D2D users is low. However, this is still acceptable
and our analytical results are valid in most cases.

Table 2 MSE of the analytical CDF

XX
XXX CDF F
Scenario XXX PId2c

FPSc2c

FTc

Scenario I

9.5149E-05

7.1099E-06

8.4503E-05

Scenario II

1.1169E-04

1.7757E-06

4.1965E-04

Scenario III

9.0064E-05

6.3717E-06

5.8865E-04

Scenario IV

1.0366E-04

1.2540E-06

9.4950E-04

Scenario V

2.2416E-04

1.0520E-05

6.7498E-05

Scenario VI

1.5682E-04

6.4085E-06

4.4839E-04

Utilizing the analytical FTc to obtain the achievable


data rate and outage probability is straightforward. Using the parameters in Table 2 and assuming that the
bandwidth of the subchannel is Bsubc = 180 kHz, the
achievable data rate is shown in Fig. 5. The error in
the analytical achievable data rate is similar to that
of the analytical SIR. The corresponding outage probability is also given in Table 3. Since the interference
from neighboring cellular users is ignored in the analysis, the analytical outage probability is lower than its
actual value when the transmit power of the D2D links
is low. When one uses the analytical results to guide
the system design, these errors need to be taken into
consideration.

5.3 Constraints on the Congurations of D2D


Communications
We rst use a graphic method to obtain the constraints
on the density and transmit power of D2D communica-

Wenjun Wu et al.
1.0

Table 3 outage probability


Scenario

Simulation outage

Analytical outage

Scenario I

0.8628

0.8719

Scenario II

0.3567

0.2977

Scenario III

0.8678

0.9068

0.8

0.6

CDF

signal from serving user


Dash: interference from D2D

Scenario IV

0.4869

0.3927

'

'

'

Scenario V

0.8587

0.8719

'

'

'

Scenario VI

0.3453

0.2977

'

'

0.4

0.2

Note: Simulated outage is read from the solid curve in Fig.

4 and the analytical outage is calculated as FTd2c


(Tout )
assuming Tout=7.44 dB according to the required SNR
of PUCCH in [16].

0.0
-100

-80

-60

-40

BS receiving power, dBm/subchannel

Table 4 Parametric values of the intensity and transmit


power for D2D communications
(

10

) 1 =

2
4.1214
mw/m

ND
(/cell)

10

2 =
3.1703

3 =
2.4387

4 =
1.8759

10

Ptd
14.9897 17.2686 13.5268 15.8057
(dBm/subchannel)
(

) 5 =

105 mw/m2 1.4430

ND
(/cell)

6 =
1.1100

7 =
0.8539

8 =
0.6568

1.0

0.40

0.35

0.8

0.30

0.25

CDF

0.6

0.20

0.15

0.4

0.10

0.05
-8

-7

-7.44

0.2

'

'

'

'

'

'

'

'

0.0
-40

-20

20

40

Simulation uplink SIR of cellular users, dB

Fig. 7 CDFs of the uplink SIR for cellular users with various
D2D communication densities and transmit powers.
40

35

30

25

20

15

10

5
-2

10

12

14

Gap between BS receiving signal power from serving cellular


users and interference power from D2D links, dBm

Ptd
18.0846 20.3634 22.6423 24.9212
(dBm/subchannel)

Note:
considering antenna gains in simulation,
D Ptd GB .

Fig. 6 CDFs of PId2c with various D2D communication densities and transmit powers.

Outage Probability (%)

tions. We assume the acceptable outage probability of


cellular users is below 10%. Before we use this method
to design the system, we should nd a reasonable gap
between the CDF of the BS receiving signal power from
its serving users and the interference from D2D communications. Once the desired gap is identied, we can
use it in the system design when needed.
The cellular parameters are xed which are the same
as in Scenario II in Table 1. A range of values for
given in Table 4 are used to sketch the analytical CDFs
of the BS receiving interference from D2D communications shown in Fig. 6. Accordingly, simulation results
with the same parameters are also given in Fig. 7. As
can be seen from Figs. 6 and 7, we can obtain a graph of
the gap versus the outage probability as shown in Fig.
8. With these statistics and under conservative estimation, we suggest a gap of 15 dB between the analytical
CDF of the signal power from cellular users and the interference power from D2D communications to the BS.

In the sequel, we give an example of using the graphic


method to assist in the design of the density and trans-

Fig. 8 Analytical gap vs. actual cellular outage probability.

mit power of D2D communications. The cellular parameters are given in Table 5 and xed. A proper value of
will be chosen to satisfy the suggested gap in the previous study. Using (15) and (10), we can draw a group
of curves with dierent values of as illustrated in

Fig. 9. When = 4.0554 106 mw/m2 , the gap can

Performance Analysis of Device-to-Device Communications Underlaying Cellular Networks


1.0

1.0
0.10

0.8

-97.17

0.20

0.20

0.09

-81.91
0.8

0.08

-97.5

-97.0

-96.5

-82.5

-82.0

0.07

-81.5

0.6
0.06

CDF

CDF

0.6

signal from serving user

0.4

0.05
-7.75

-7.50-7.44

-7.25

0.4

interference from D2D

0.2

0.2

0.0

0.0

Outage Probability = 8.6161%

-100

-80

-60

-40

-60

BS receiving power, dBm/subchannel

Fig. 9 Theoretical gap of the system design example.

-40

-20

20

40

60

80

100

Simulation uplink SIR of cellular users, dB

Fig. 10 Simulation SIR of the system design example using


graphic method.

meet the suggested requirement of 15 dB. We design the


density and transmit power of D2D communication as

ND
= 3/cell and Ptd = 24.6726 (dBm/subchannel),
respectively. The minimum requirement of the reference sensitivity power level of user equipment is chosen
to be -94 dBm according to the specication in [17].
Since the maximum distance between the D2D users
is Rd,max = 10m, the minimum transmit power of the
D2D users is about -54 dBm. As a result, our designed
transmit power is much larger than the minimum transmit power that is feasible.
We carry out system-level simulations according to
the designed parameters. Results shown in Fig. 10 demonstrate that the outage probability of cellular users is
Fig. 11 Simulation SIR of the system design example using
8.6161%. Since this value is less than 10%, our method
analytical approximate method.
is thus validated.

4.6422106 mw/m2 , the approximate outage probability is about 4.9707% that meets our design target. We
Table 5 Parameters for the system design example
design the density and transmit power of D2D commu

ISD Rc,min Rd,max Rd,min s NC


Ptc
nication as ND
= 3/cell and Ptd = 23.4985 (dBm/subchannel).
(m) (m)
(m)
(m)
(dB) (/cell) (dBm/subchannel) Simulation results are shown in Fig. 11 indicating that
500 0.05
10
0.05
4
1
0
the outage probability of the cellular users is 8.7449%
which is lower than 10%. This method is validated too.
1.0

0.10

0.09

0.8

0.08

0.07

0.6

CDF

0.06

0.05
-7.75

-7.50-7.44

-7.25

0.4

0.2

Outage Probability = 8.7449%

0.0

-60

-40

-20

20

40

60

80

100

Simulation uplink SIR of cellular users, dB

At last, a more convenient method using the approximate CDF of the uplink SIR for cellular users described in Section IV.C is adopted to design the density
and transmit power of D2D communications. The cellular parameters are the same as in the previous example
given in Table 5 with = 0.9. Since the errors resulted from ignoring the interference from neighboring
cellular users increase when the density and transmit
power of D2D communications are low, 5% is set as
the target outage probability in our analytical computation, which is half of the actually required out
age probability. We choose ND
= 5/cell and Ptd =
14.21 (dBm/subchannel) as the initial values, which

indicates = 2.2547 105 mw/m2 . When =

6 Conclusion
In this paper, the interference induced by D2D communications to cellular users is analyzed when the two
communication modes reuse the same radio resources.
The closed-form CDFs of both the BS receiving interference from D2D communications and the signal power
from its serving cellular user are derived given random
user location and shadow fading. An approximate CDF
of the uplink SIR of cellular users is derived in lieu of the
actual one for convenience of analysis. Based on the analytical results, the outage probability and the CDF of

10

Wenjun Wu et al.

the achievable data rate is obtained. Simulation results


demonstrate the accuracy of the derived closed-form
CDFs, and the error of the approximate uplink SIR for
cellular users is acceptable in most cases. The analytical results provided here are also helpful for network
design. The D2D communication conguration calculation is given as an example in this paper. Since the
distance between the source and destination is short,
the transmit power of D2D communication devices can
be extremely low, and the density of D2D devices can
be relatively large compared to the users adopting the
cellular communication mode. The results also conrm
the use of this new communication mode to support
emerging service such as the IoT.

Appendices: Derivation of the Statistical Characteristics of the Sum of Received Power


Assume Y is an SPPP on A with intensity , we
will analyze the statistical characteristics of the sum
of received power at an arbitrary point x in the twodimensional plane comprised of all the points in Y .
Since shadow fading is a random variable, it is necessary to form a marked SPPP. Dene by QY R+
as the random marking of Y . For any two dierent
points y1 and y2 , Qy1 and Qy2 are independent. The
distribution of QY is the same for all the points in Y ,
and 10log10 (QY ) N (0, 2 ), where 2 is the variance.
The probability density function (PDF) is
(ln q)2
1

fQY (q) =
e ay .
q ay

(26)

(y,Qy )C

Dene the received power from a transmitter y to the


particular receiver x as
Pr,x,y = g (y, Qy ) = Pt ry Qy .

(28)

where ry is the distance between y and x. The sum of


the received power is

P =
g (y, Qy ).
(29)
yY

(y,Qy )C

= exp EQy

ejPt ry

ry (0,)

Qy

1 2ry dry .

(30)

Dene u = Pt ry Qy that falls under the range of (, 0)


since is always negative. With this variable substitution, (30) can be rewritten as
P()

)2
(

( ju
) 1
2 2 1

= exp EQy
e
u
du
1

PtQy

u(,0)
)
(
2
(31)
= exp Pt A1 A2 .
where

A1 =

) 2 2 1
eju 1
u du,

(32)

u(,0)

and

[
]
2
A2 = EQy Qy .

(33)

We rst simplify A1 as follows.



( ju
) 2
e
1 du
A1=
0+

where ay = 2 2 2 and = (ln 10) /10.


The pair (Y, QY ) can then be regarded as a random point Y in the product space C = A R+ . The
totality of points Y forms a random countable subset Y = {(Y, QY ) ; Y Y } of C. According to the
Marking Theorem [14], Y is still a SPPP on C, with
mean measure given by

(C) =
(dy) p (dQy ) =
dyfQY (q) dq. (27)
(y,Qy )C

Using Campbells Theorem [14], the characteristic function of P is


[
]
P () = E ejP

(
)

ejg(y,Qy ) 1 (dy, dQy )


= exp

(
)
(
)
)]
2
=
j cos
+
sin
+
1+
2

(
)
j
2
2
= e 1 +
.
(34)

where (x) = 0 tx1 et dt.


In order to simplify A2 , the average kth power of the
log-normal distributed random variable QY is derived
as follows.

+
[ ]
1
ln q
E qk =
q k1 q ay dq. (35)
q k fQY (q) dq =
ay 0
2

mR+

Dening v = ln q v (, +), we have


+ 2
k2 ay
[ ]
1
v +kv
E qk =
e ay
dv = e 4 .
ay

(36)

Substituting (36) in to (33), A2 can be simplied as


]
[
ay
2
A2 = EQy Qy = e 2 .
(37)

Performance Analysis of Device-to-Device Communications Underlaying Cellular Networks

As a result, the characteristic function is given by


(
[
)
]
ay
j
2
2
2
P()= exp Pt e 2 1 +
e

(
)
j
2

= exp Ae ,
(38)
ay
)
(
2

where A = Pt e 2 1 + 2 .
The laws of probability with characteristic functions
given by (38) are the stable laws of exponent 2 with
the restriction of 0 < 2 < 1 [19]. Similar to (22)
in [18], we give the PDF of the sum of the received
power as
)(
(
)k
(
)

1 1 2k
2
A

fP(p; ) =
sin k 1 +
.(39)
2
p
k!

p
k=1

Following the inverse Gaussian probability law for =


4, we can have a density given by a closed-form expression. The characteristic function is
( )
]
[
ay
1
1 j 1
2
16
4
2

P()= exp Pt e
e
2
[
) ]
(
ay

16
= exp
.
(40)
(1 j) Pt e
2
The PDF and CDF of P are given by
fP(p) =

ay
3 2 Pt e
3

4p
Pt e 16 p 2 e
2

and

ay
8

(41)

ay )

3
2 Pt e 16
FP(p) = erfc
,

2 p

respectively, where erfc(x) = 1

(42)
2

x
0

et dt.
2

Acknowledgments
This work was supported in part by National Basic Research Program of China (973 Program): 2012CB316005
and Program for New Century Excellent Talents (NCET)
in University.

References
1. Pekka J., Chia-hao Y., Klaus D., Cssio R., Carl W., Klaus
H., Device-to-device communication underlaying cellular
communications systems, Int. J. Communications, Network
and System Sciences, 3, 169-178 (2009)
2. Klaus D., Mika R., Carl W., Cssio B. R., Klaus H., Deviceto-device communication as an underlay to LTE-Advanced
networks, IEEE Commun. Mag., 47(12), 42-49, (2009)
3. Klaus D., Mika P. R., Pekka J., Cassio R., Klaus H.,
Device-to-Device communications; functional prospects for
LTE-Advanced networks, Proc. IEEE Int. Conf. on Communications Workshops 2009 (ICC Workshops09), Dresden, Germany, 1-6, (2009)

11

4. Sami H., Tao C., Janne L., Timo K., Device-to-device


(D2D) communication in cellular network - performance
analysis of optimum and practical communication mode
selection, Proc. IEEE Wireless Communications and Networking Conf. 2010 (WCNC10), Sydney, Australia, 1-6,
(2010)
5. Chia-Hao Y., Olav T., Klaus D., Cssio R., Power optimization of device-to-device communication underlaying cellular
communication, Proc. IEEE Int. Conf. on Communications
2009 (ICC09), Dresden, Germany, 1-5, (2009)
6. Klaus D., Chia-Hao Y., Cssio B. R., Pekka J., Mode selection for Device-to-device communication underlaying an
LTE-advanced network, Proc. IEEE Wireless Communications and Networking Conf. 2010 (WCNC10), Sydney, Australia, 1-6, (2010)
7. Hongnian X., Sami H., The investigation of power control
schemes for a device-to-device communication integrated
into OFDMA cellular system, Proc. IEEE 21th Int. Sym.
on Personal, Indoor and Mobile Radio Communications
(PIMRC10), Instanbul, Turkey, 1775-1780, (2010)
8. Pekka J., Visa K., Cssio R., Juha K., Klaus D., Klaus H.,
Interference-aware resource allocation for device-to-device
radio underlaying cellular networks, Proc. IEEE 69th Vehicular Technology Conf. (VTC Spring09), Barcelona, Spain,
1-5, (2009)
9. Shaoyi X., Haiming Wang., Tao Peng., Qing H., Eective labeled time slots based D2D transmission in cellular
downlink spectrums, Proc. IEEE 71st Vehicular Technology
Conf. (VTC Spring10), Taipei, Taiwan, 1-5, (2010)
10. Shaoyi Xu., Haiming W., Tao C., Qing H., Tao P., Effective interference cancellation scheme for device-to-device
communication underlaying cellular networks, Proc. IEEE
72nd Vehicular Technology Conf. (VTC Fall10), Ottawa,
Canada, 1-5, (2010)
11. Tao C., Gilles C., Sami H., Time hopping for deviceto-device communication in LTE cellular system, Proc.
IEEE Wireless Communications and Networking Conf.
2010 (WCNC10), Sydney, Australia, 1-6, (2010)
12. Chia-Hao Y., Olav T., Klaus D., Cssio R., On the performance of device-to-device underlay communication with
simple power control, Proc. IEEE 69th Vehicular Technology Conf. (VTC Spring09), Barcelona, Spain, 1-5, (2009)
13. Chia-Hao Y., Klaus D., Cssio R., Olav T., Performance
impact of fading interference to device-to-device communication underlaying cellular networks, Proc. IEEE 20th Int.
Sym. on Personal, Indoor and Mobile Radio Communications (PIMRC09), Tokyo, Japan, 858-862, (2009)
14. John F. C. K., Poisson processes, Oxford Univ. Press,
(1993)
15. Chun C. C., Stephen V. H., Calculating the outage probability in a CDMA network with spatial poisson trac, IEEE
Trans. on Vehicular Technology, 50(1), 183-204, (2001)
16. 3GPP R1-104956, Link evaluations of ACK/NAK transmission with convolutional coding, (2010)
17. 3GPP TS 36.101, Evolved universal terrestrial radio access (E-UTRA); user equipment (UE) radio transmission
and reception, (2011)
18. Elvino S. S., Joho A. S., Optimum transmission ranges
in a direct-sequence spread-spectrum multihop packet radio network, IEEE J. Sel. Areas. Commun., 8(5), 762-771,
(1990)
19. William F., An introduction to probability theory and
its application, vol. II, Wiley, (1971)

Das könnte Ihnen auch gefallen