DOI QR코드

DOI QR Code

Performance Analysis of a Dense Device to Device Network

  • Kim, Seung-Yeon (Department of Electronics and Information Engineering, Korea University) ;
  • Lim, Chi-Hun (Department of Computer and Information Science, Korea University) ;
  • Cho, Choong-Ho (Department of Computer and Information Science, Korea University)
  • Received : 2014.04.16
  • Accepted : 2014.08.17
  • Published : 2014.09.30

Abstract

Device-to-Device (D2D) communication is a technology component for long-term evolution-advanced (LTE-A). In D2D communication, users in close proximity to each other can communicate directly without going through a base station; such direct communication can improve spectral efficiency. Although D2D communication brings improvement in spectral efficiency, it also causes interference to the cellular network as a result of spectrum sharing. In particularly, D2D communication can generate interference for each D2D pair when the common wireless medium in a co-located limited area is accessed. Even though the interference management for between the D2D pair and cellular networks has been proposed, the interference reducing methods have still not been fully studied for the D2D pairs. In this paper, we investigate the problem of D2D pair coexistence in which interference is considered between D2D pairs. Using a signal to interference model for a target D2D pair, we provide an analysis of the aggregated throughput of a dense D2D network. For a target D2D pair, we assume that the desired signal and interference signals obey multipath fading and shadow fading. Through analysis, we demonstrate the effect of cluster size such as the number of D2D pairs and the size of the considered area on the network performance. The analytical results are compared with computer simulations. Our work can be used for a rough guideline for controlling the system throughput in a dense D2D network environment.

Keywords

1. Introduction

Device-to-device (D2D) communication underlaying the cellular network has recently attracted a lot of attention in long-term evolution standardization. Transmission in a D2D pair occurs using one direct wireless link, whereas a conventional cellular uses two wireless links in which the base station (BS) is operated as the relay. Hence, by using D2D communication, the BS can be released from its function to forward data and thus improve spectral efficiency. The spectral efficiency is especially improved when multiple D2D links are able to operate simultaneously, using the same resources. The spectral efficiency is also improved by actively exploiting spatial diversity; devices in proximity of each other giving the opportunity to communicate directly and thus possibly to transmit their data with a lower signal power [1].

D2D use cases can be classified into peer-to-peer and relay types [2]. For the peer-to-peer case, D2D communications can be used to provide local data service when two geographically proximate users or devices want to exchange data, e.g., in the case of content sharing or context-aware applications. In relay cases, one of the communicating D2D devices has to relay the exchanged information to the BS which further forwards the data to the destination device.

Although D2D communication brings improvement in spectral efficiency and system capacity, since D2D communication occurs under the umbrella of a cellular network, in which D2D sessions take place in the same frequency band as the cellular communication, the interference caused by D2D links on the cellular communication must be contained. Additionally, D2D links also interfere with each other. Thus, interference management is one of the most critical issues for D2Ds underlaying cellular networks.

There are several devices which work to reduce the interference between D2D pairs and cellular networks. In [3], [4] and [5] restricting the transmit power schemes have been suggested to coordinate interference between D2D users and cellular users. Furthermore, a fixed booster factor and a back off factor have been proposed in [6] to dynamically control D2D power levels and limit D2D interference. In [7] and [8], authors proposed a resource allocation scheme in which a D2D link can reuse the resources for more than one cellular UE. In addition, a joint subcarrier and power allocation method using the spectrum sensing technique have been proposed in [9] to improve the spectrum efficiency.

Even though the interference management for between D2D pair and cellular networks was proposed, the interference reducing methods have still not been fully studied for between D2D pairs. Because of an absence of coordination between independent D2D pairs when accessing a wireless medium, devices will encounter high interference if several D2D pairs are simultaneously operating in crowded places, such as airports, international conferences, and shopping malls, where potential D2D users are located close to each other. Therefore, the study of interference gains importance because interference affects the throughput of a dense D2D network.

In order to illustrate this in detail, suppose that there are several D2D pairs that need to communicate privately within the same region, as shown in Fig. 1. In this scenario, because many D2D pairs exist densely, the pairs cause severe interference problems for D2D pair communication. The main contribution of this work is the derivation of an analytical model to obtain the maximum aggregated throughput of a dense D2D network deployed within the same region. In particular, this paper evaluates the outage probability and throughput by considering the modulation and coding scheme (MCS) based on the computation of the sum of multiple small scale fading and large scale fading components. We use this analysis to develop system guidelines, and demonstrate the accuracy of the analytic model through a comparison with computer simulations.

Fig. 1.System model of a dense D2D network.

The rest of this paper is organized as follows. Section 2 introduces the D2D pair network system model. The analytical model is presented in Section 3. In Section 4, numerical studies are discussed. Finally, concluding remarks are presented in Section 5.

 

2. System Model

Let us consider a limited circular region interference scenario that involves co-located D2D pairs. We assume that the interference between the cellular network and the D2D pair is managed efficiently using location-based, D2D mode selecting mechanisms [10]. Hence, we focus only on the interference caused by the coexistence of D2D pairs. In this scenario, D2D pairs are assumed to be uniformly distributed in a circular region of radius R from the target D2D receiver and organized in N D2D pairs with maximum radius DR, as shown in Fig. 1.

To analyze the performance of a dense D2D network, we define the aggregated throughput of a dense D2D network, denoted by TD, as

where TiD is the throughput of the D2D pair i conveyed to the D2D receiver in each of the N D2D pairs deployed in the region.

Let us assume that the most interfered D2D pair of our scenario is the central pair, given the assumption we made on the distribution of D2D pairs, where the most interfered D2D pair has index 1. Therefore, we can define a lower bound on the aggregated throughput of a dense D2D network, Tbound, as

Under the considered scenario, the signal received at the target D2D receiver is

where sM and siI are the signals transmitted from the target D2D transmitter and from the interfering D2D transmitter i, respectively. uM and uiI are the distance of the target D2D pair link and that of the target D2D receiver-interfering D2D transmitter i link, respectively, in a circular region. In Eq. (3), a path-loss model defined as Pr = PD·(u0)-α is used, where PD and Pr denote the D2D transmit power and received signal power measured at u0 away from the transmitter, respectively, and α is the path-loss exponent. Furthermore, LM and LiI are a shadowing effect of the target D2D pair link and the target D2D receiver-interfering D2D transmitter i link, respectively, the natural logarithm of LM and LiI is a Gaussian with a mean of zero and a standard deviation σ , where σ is σdB (In1O)/1O. n is the additive white Gaussian noise (AWGN) at the receivers with power spectral density (PSD) N0. In addition, hM and hiI are the channel coefficient of the target D2D pair link and that of the target D2D receiver-interfering D2D transmitter i link; we assume that all channel coefficients follow a multipath fading that is fast, and the amplitude can be modeled by the Rician and Rayleigh distributions [11].

In the considered scenario, mostly there is a line-of-sight path for the desired signal of a target D2D pair communication. The fast component can then be modeled by a Rician distribution where the probability density function (PDF) is given by

Here, x is the signal amplitude, p'mp is the power of the scattered signal, sp is the peak value of the directly received signal, I0(·) is the modified Bessel function of the first kind and zeroth order [12], and K is the Rician factor, which depends on the ratio of the signal power from the dominant signal path relative to that of the scattered signal, and pmp is the local mean power by path-loss and the shadowing effect. For Eq. (4), when a direct signal does not exist, i.e., sp = 0 ( K = 0 and pmp = p'mp ), it become the Rayleigh distribution, where the PDF is given by

 

3. Analytical Modeling

In order to evaluate a lower bound on the aggregated throughput of a dense D2D network, let us focus our attention on the throughput of the target D2D pair, performed by the desired signal power of the target D2D pair, the sum of the interfering signals power of i interfering D2D transmitters in the same channel and the noise power as

where Pr[i] is the probability that i interfering D2D pairs use the same channel that is assigned to the target D2D pair, F(z0|i) is the conditional probability that the desired signal power of the target D2D pair, Pd to the sum of the interfering signal powers by i interfering D2D transmitters, Pi and the noise power, Pn ratio is less than a predefined threshold value, z0, as follows:

In general, -174dBm/Hz is used as the noise power spectral density for Pn. Thus, when this condition is considered in the system parameters, we approximate Pi + Pn ≈ Pi and then Eq. (7) can be expressed as

In the last term of Eq. (6), ML represents the bits per symbol according to the modulation and coding scheme (MCS) level, as a predefined threshold value, z0.

In our study, for the desired signal, the Rician distribution as a multipath fading effect is considered. For the cases of an interfering signal, we consider the two cases in which the multipath fading effect is described by the Rician and Rayleigh distributions. In Eqs. (6) and (8), Pr[i] and F(z0|i) will be derived in the following sections. The performances of the analytic models considering Eq. (8) will be compared with the results of simulation considering the varying noise power spectral densities.

3.1 Modeling of Channel Interference Probability

As mentioned in the previous scenario, the analysis model consists of a target D2D pair and N-1 interfering D2D pairs. For given N-1 interfering D2D pairs, the probability of i D2D pairs using the same channel that is used by the target D2D pair, Pr[i], is approximated with N-1 independent Bernoulli trials as

Here, ρ is the probability that a co-channel is assigned to the target D2D pair and the interfering D2D pair.

3.2 Signal to Interference Ratio (SIR)

At first, let the signals of all D2D pairs obey the Rician fading effect. From Eq. (4), the PDF for the instantaneous desired signal power p of a target D2D pair is given by using p = (1/2)x2

For the PDF of the sum of the interfering signal power of i interfering D2D pairs, we consider independent and identically distributed (i.i.d.) signals, each with the same Rician factor. Following the i time convolution of the Laplace transform method for Eq. (10) [13], we obtain

where sa is the peak value of the directly received interfering signal a, and Ii-1 is the modified (i-1)th-order Bessel function of the first kind. From Eqs. (10) and (11), is derived in Appendix A as follows

where , and Q(·) is the Marcum Q function [11]. pmp and pI–mp can be obtained using the algorithm of Yeh and Schwartz [14].

Secondly, let the signal of a target D2D pair obey a Rician distribution and the interfering signal of interfering D2D pairs obey a Rayleigh distribution. When K = 0 for Eq. (11), the PDF of the sum of the interference signal powers by i interfering D2D pairs is given as

From Eqs. (10) and (13), we obtain the throughput for Eq. (6) as follows:

where . Eq. (14) is derived in Appendix B.

 

4. Numerical Studies

From the previous section, we obtained the analytic models of the two cases for the interfering D2D pair signals in which channel coefficients for interfering signal links, follow Rician fading and Rayleigh fading. In this section, we investigate the operating conditions of D2D pairs, such as a lower bound on the aggregated throughput of a dense D2D. The performances of the analytic models are compared with the simulation results by using the Monte Carlo simulation method. The system parameters for simulation and analysis are set as shown in Table 1. In addition, ML according to z0(= SINR) is shown in Table 2 [15].

Table 1.System Parameters

Table 2.MCS (modulation and coding scheme) level

Fig. 2 shows the Rician factor K by path-loss and shadowing effect in which K is obtained by the local mean power pmp and the scattered signal power p'mp as shown in Eq. (4), for link of a main D2D pair. Based on the results shown in Fig. 2, it can be seen that if the distance between the transmitter and receiver of a target D2D pair increases, and/or p'mp increases, then K is degraded.

Fig. 2.Rician factor of a target D2D pair link versus DR in varying p'mp .

Fig. 3 shows K by path-loss and shadowing effect in which K is obtained by the local mean power pmp and the scattered signal power p'I–mp as shown in Eq. (4), for the link of a target D2D receiver with i interfering D2D transmitters. As expected from previous results, if a considered region from the receiver of a target D2D pair increases, and/or p'I–mp decreases, K is degraded. We can also observe that as the number of interfering D2D pairs increases, K is decreased.

Fig. 3.Rician factor of a target D2D receiver with N interfering D2D transmitter links versus R with varying R/DR and p'I–mp .

In Fig. 4, the outage probabilities of the main D2D pair obtained by analysis and simulation for Rician fading (a) and Rayleigh fading (b) are shown. In this figure, we let R = 20m, and p'mp = p'I–mp = -36dBm. In addition, each outage probability is obtained from Eq. (8), when z0 < 1dB. We can observe that the results of the mathematical analysis agree reasonably well with those of the simulations. For an approximation of Eq. (8), we can see that the effect of the interference power is stronger than the noise power for the system performance, when the noise power spectral density is -174dBm/Hz, while this approximation is not suitable for the condition with the large noise power spectral density as shown in Fig. 7 of Appendix C. We can also observe that as N and ρ increase, the outage probability increases. Lastly, when D2D pairs use the channel set fined by cognitive technique proposed in [9] is applied, we can see that ρ lies in between 1/50 and 1/30.

Fig. 4.Outage probability versus number of N interfering D2D pairs by varying ρ for (a) Rician fading and (b) Rayleigh fading, where z0=1dB, Kd = 0.7, and Ki = N x Kd .

Fig. 5 describes the results of the outage probability and the aggregated throughput in Rician fading for the analytical model. In this figure, we use ρ = 1/50, which means that each D2D pair randomly selects only one channel among 50 channels in a long-term-evolution (LTE)-advanced cellular system with a 10 MHz channel bandwidth [16]. We also let ML = 0.88 bits/symbol, and K = 0.7, according to z0 = 1dB, respectively. From the figure, we can observe that the outage probability increases as N increases and R/DR decreases. As expected from the results of the outage probability, the throughput increases as the ratio R/DR increases. Through these results, we can obtain N = 49, 50, and 73, when R/DR = 3, 4, and 5, respectively, to maximize Tbound.

Fig. 5.Outage probability (left) and throughput (right) curves derived with the analytical model for varying N and R/DR in Rician fading.

Fig. 6 compares the outage probability and the aggregated throughput for different D2D cluster densities with Rayleigh fading in the analytical model. In this figure, we use ρ = 1/50, M = 0.88 bits/symbol, and K = 0.7. From the figure, both the outage probability and the aggregated throughput have the same trend as in the previous figure for the increase of N and R/DR. Through the results for the throughput, we can obtain N = 151, 181, and 211, when R/DR = 3, 4, and 5, respectively, to maximize Tbound. As can be observed from the results in the graphs, variation in the density of D2D pairs has a significant impact on coexistence, especially when the density of D2D pairs becomes large.

Fig. 6.Outage probability (left) and throughput (right) curves derived with the analytical model for varying N and R/DR in Rayleigh fading.

 

5. Conclusion

In this paper, we introduce the problem of the coexistence of D2D pairs deployed in the same region. In addition, we derive an analytical model of the outage probability and aggregated throughput, considering propagation aspects with shadow fading and multipath fading effects. The majority of our analytical results show good agreement with the simulations in some conditions. The results show that the outage probability of a target D2D pair increases as the ratio R/DR decreases, and the number of interfering D2D pairs increases, whereas the aggregated throughput of a dense D2D network increases as R/DR decreases, and the number of interfering D2D pairs increases.

References

  1. G. Fodor, E. Dahlman, G. Muldh, S. Parkvall, N. Reider, G. Miklo, and Z. Turanyi, "Design Aspects of Network Assisted Device-to-Device Communications," IEEE Commun. Mag., vol. 50, no. 3, pp. 170-177, Mar. 2012.
  2. L. Lei, Z. Zhong, C. Lin, and S. Shen, "Operator controlled device to device communications in LTE-advanced networks," IEEE Wireless Mag., vol. 19, no. 3, pp. 96-104, June 2012. https://doi.org/10.1109/MWC.2012.6231164
  3. K. Doppler, M. Rinne, C. Wijting, C. Ribeiro, and K. Hugl, "Device-to-device communication as an underlay to LTE-advanced networks," IEEE Commun. Mag., vol. 47, no. 12, pp. 42-49, Dec. 2009.
  4. B. Kaufman and B. Aazhang, "Cellular networks with an overlaid device to device network," in Proc. of IEEE Asilomar Conf. on Signals, Syst. and Comput., pp. 1537-1541. 2008.
  5. M. C. Erturk et al., "Distributions of Transmit Power and SINR in Device-to-Device Networks," IEEE Comm. Letts., vol. 17, no. 2, pp. 273-276, Jan. 2013. https://doi.org/10.1109/LCOMM.2012.122012.121632
  6. P. Janis, C. Yu, K. Doppler, C. Ribeiro, C. Wijting, K. Hugl, O. Tirkkonen, and V. Koivunen, "Device-to-device communication underlaying cellular communications systems," Int'l J. of Commun., Network and Syst. Sci., vol. 2, no. 3, pp. 169-178, 2009.
  7. H. Min, J. Lee, S. Park, and D. Hong, "Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks," IEEE Trans. Wireless Commun., vol. 10, no. 12, pp. 3995- 4000, Dec. 2011. https://doi.org/10.1109/TWC.2011.100611.101684
  8. Z. Wang, H. Tian, K. Yang and Z. Liu, "Frequency resource allocation strategy with QoS support in hybrid cellular and Device-to-Device networks," Int. J. Communi. Syst., vol. 9, no. 2, pp. 495-500, Feb. 2014.
  9. Chen, Yueyun, Xiangyun Xu, and Qun Lei. "Joint Subcarriers and Power Allocation with Imperfect Spectrum Sensing for Cognitive D2D Wireless Multicast." KSII Trans. Internet and Information Syst., vol. 7, no. 7, pp. 1533-1546, Jul. 2013. https://doi.org/10.3837/tiis.2013.07.001
  10. Min, H., Seo, W., Lee, J., Park, S., and Hong, D., "Reliability improvement using receive mode selection in the device-to-device uplink period underlaying cellular networks," IEEE Trans. Wirel. Commun., vol. 10, no. 2, pp. 413-418. Feb., 2011. https://doi.org/10.1109/TWC.2011.122010.100963
  11. J. G. Proakis, Digital Communications, 2nd ed. McGraw-Hill, New York, 1989.
  12. N.W. McLachlan, Bessel Functions for Engineers. Oxford, U.K.: Oxford Univ. Press., 1955.
  13. M. Abramowitz and I. A. Stegun, handbook of Mathematical functions. New York: Dover, 1964, ch.9 and 29.
  14. Abu-Dayya and N. C. Beaulieu, "Outage probabilities in the presence of correlated lognormal interferers," IEEE Trans. Veh. Technol., vol. 43, no. 1, pp. 164-173, Feb. 1994. https://doi.org/10.1109/25.282277
  15. D. L.-P, A. L, A. J, H. R, and J.Z, "Optimization Method for the Joint Allocation of Modulation Schemes, Coding Rates, Resource Blocks and Power in Self-Organizing LTE Networks," in Proc. of IEEE INFOCOM, Shanghai, China, April 2011.
  16. I. F. Akyildiz, D. M. Gutierrez-Estevez and E.C. Reyes, The Evolution to 4G Cellular Systems: LTE-Advanced, Elesevier: Physical Comm., 2010.

Cited by

  1. Cellular Traffic Offloading through Opportunistic Communications Based on Human Mobility vol.9, pp.3, 2014, https://doi.org/10.3837/tiis.2015.03.002
  2. Joint Mode Selection and Resource Allocation for Mobile Relay-Aided Device-to-Device Communication vol.10, pp.3, 2014, https://doi.org/10.3837/tiis.2016.03.001
  3. Performance Analysis of Co- and Cross-tier Device-to-Device Communication Underlaying Macro-small Cell Wireless Networks vol.10, pp.4, 2014, https://doi.org/10.3837/tiis.2016.04.001
  4. A Middleware Based Architecture for the Industrial Internet of Things vol.10, pp.7, 2014, https://doi.org/10.3837/tiis.2016.07.001