Computer Science ›› 2018, Vol. 45 ›› Issue (9): 123-128, 165.doi: 10.11896/j.issn.1002-137X.2018.09.019

• Network & Communication • Previous Articles     Next Articles

Cluster-based Radio Resource Allocation Mechanism in D2D Networks

LI Fang-wei1 HUANG Xu1 ZHANG Hai-bo1 LIU Kai-jian1 HE Xiao-fan2   

  1. Chongqing Key Lab of Mobile Communications Technology,Chongqing University of Posts and Telecommunications,Chongqing 400065,China1
    Department of Electrical Engineering,Lamar University,Beaumonl 77710,USA2
  • Received:2017-07-07 Online:2018-09-20 Published:2018-10-10

Abstract: A cluster-based resource allocation mechanism was proposed for the problem of the limited battery life of the user equipment.The mechanism includs three parts:D2D users are put in disjoint clusters by graph theory,and then the auction algorithm is used to allocate the channel for D2D clusters according to the clustering results.In the end,the power allocation is performed by using non-cooperative game theory model.Simulation results show that the proposed mechanism effectively extends battery life,improves the energy efficiency of the users,and satisfies the requirements of the user transmission rate,thus ensuring the users to obtain higher QoS.

Key words: D2D, Energy efficiency, Graph coloring, Auction algorithm, Game theory

CLC Number: 

  • TN929.5
[1] MARSCH P,SILVA I D,ELAYOUBI S E,et al.Preliminary views and initial considerations on 5G RAN architecture and functional designs[EB/OL].https://metis-ii.5g-ppp.eu/wp-content/uploads/5G-PPPMETIS-II-5G-RAN-Architecture-White-Paper.pdf.
[2] HUANG H C,ZHANG J,ZHANG Z F,et al.Interference-Limi-ted device-to-device multi-user cooperation Scheme for optimization of edge networking[J].Journal of Computer Science and Technology,2016,31(6):1096-1109.
[3] TEHRANI M N,UYSAL M,YANIKOMEROGLU H.Device-to-device communication in 5G cellular networks:challenges,solutions,and future directions[J].IEEE Communications Magazine,2014,52(5):86-92.
[4] ZHANG H,LIAO Y,SONG L.D2D-U:device-to-device com-munications in unlicensed bands for 5G system[J].IEEE Transa-ctions on Wireless Communications,2017,16(6):3507-3519.
[5] PAN J Y,HSU M H.Relay selection of relay-assisted device-to-device and uplink communication underlying cellular networks[C]∥2017 International Conference on Computing,Networking and Communications(ICNC).Santa Clara,CA,2017:980-985.
[6] XIANG M,LI M X,MING Z,et al.Statistical QoS-driven re-source allocation and source adaptation for D2D communications underlaying OFDMA-based cellular networks[J].IEEE Access,2017,5(99):3981-3999.
[7] YANG T,ZHANG R,CHENG X,et al.Graph coloring based resource sharing(GCRS) scheme for D2D communications underlaying Full-Duplex cellular networks[J].IEEE Transactions on Vehicular Technology,2017,99(PP):1.
[8] XU C,SONG L,HAN Z,et al.Efficiency resource allocation for device-to-device underlay communication systems:A reverse ite-rative combinatorial auction based approach[J].IEEE Journal on Selected Areas in Communications,2013,31(9):348-358.
[9] BU S,YU F R,SENARATH G.Interference-aware energy-efficient resource allocation for heterogeneous networks with incomplete channel state information[J].IEEE International Conference on Communications,2013,64(3):6081-6085.
[10] BU S,YU F R,YANIKOMEROGLU H.Interference-awareenergy-efficient resource allocation for OFDMA-based heteroge-neous networks with incomplete channel state information[J].IEEE Transactions on Vehicular Technology,2015,64(3):1036-1050.
[11] WANG F,XU C,SONG L,et al.Energy-efficient resource allocation for device-to-device underlay communication[J].IEEE Transactions on Wireless Communications,2015,14(4):2082-2092.
[12] HOANG T D,LE L B,LE-NGOC T.Energy-efficient resource allocation for D2D communications in cellular networks[C]∥2015 IEEE International Conference on Communications(ICC).IEEE,2015:2251-2256.
[13] TAO Y,SUN J,SHAO S X.Radio resource allocation based on greedy algorithm and successive interference cancellation in device-to-device(D2D) communication[C]∥IET International Conference on Information and Communications Technologies(IETICT 2013).Beijing,2013:452-458.
[14] JAHEON G U,BAE S J,HASAN S F,et al.A combined power control and resource allocation scheme for D2D communication underlaying an LTE-advanced system[J].IEICE Transactions on Communications,2013,96(10):2683-2692.
[15] WANG F,XU C,SONG L,et al.Energy-efficient radio resource and power allocation for device-to-device communication underlaying cellular networks[C]∥2012 International Conference on Wireless Communications & Signal Processing(WCSP).IEEE,2012:1-6.
[16] QIU X,XUEWEN L,DONG K,et al.Energy efficiency analysisin device-to-device communication underlaying cellular networks[C]∥Consumer Communications and Networking Conference(CCNC),2013 IEEE.IEEE,2013:625-630.
[17] DOERFFEL D,SHARKH S A.A critical review of using the Peukert equation for determining the remaining capacity of leada-cid and lithium-ion batteries[J].Journal of Power Sources,2006,155:395-400.
[18] Evolved universal terrestrial radio access (E-UTRA) ande-volved universal terrestrial radio access network (E-UTRAN)[J].Eurasip Journal on Wireless Communications & Networking,2008,14(1):172-185.
[19] GUNDLACH M.Overview of D2D proximity services standardi-zation in 3GPP LTE[C]∥EuCNC.Bologna,2014.
[20] SARAYDAR C,MANDAYAM N B,GOODMAN D J.Efficient power control via pricing in wireless data networks[C]∥IEEE Transactions on Communications.2002:291-303.
[1] ZHAO Lei, ZHOU Jin-he. ICN Energy Efficiency Optimization Strategy Based on Content Field of Complex Networks [J]. Computer Science, 2019, 46(9): 137-142.
[2] DU Wei, DING Shi-fei. Overview on Multi-agent Reinforcement Learning [J]. Computer Science, 2019, 46(8): 1-8.
[3] HE Ying-qing,LI Ning,WANG Cong,CHEN Yan-cheng,XU Jian-hui. Study on Energy Efficient M2M Uplink Subcarrier and Power Allocation in LTE-A Network [J]. Computer Science, 2019, 46(7): 61-66.
[4] XU Fei, WANG Shao-chang, YANG Wei-xia. Cloud Resource Scheduling Algorithm Based on Game Theory [J]. Computer Science, 2019, 46(6A): 295-299.
[5] QIU Ya-qiong, HU Yong-hua, LI Yang, TANG Zhen, SHI Lin. Optimization Algorithm of Complementary Register Usage Between Two Register Classesin Register Spilling for DSP Register Allocation [J]. Computer Science, 2019, 46(6): 196-200.
[6] ZHAO Ning-bo, LIU Wei, LUO Rong, HU Shun-ren1,3. Optimization Model of Working Mode Transformation Strategies for Wireless Sensor Nodes [J]. Computer Science, 2019, 46(5): 44-49.
[7] LI Fang-wei, ZHOU Jia-wei, ZHANG Hai-bo. Anti-eavesdropping Physical Layer Transmission Scheme Based on Time-reversal in D2D Communication Link [J]. Computer Science, 2019, 46(5): 100-104.
[8] ZHANG Hui-juan, ZHANG Da-min, YAN Wei, CHEN Zhong-yun, XIN Zi-yun. Throughput Optimization Based Resource Allocation Mechanism in Heterogeneous Networks [J]. Computer Science, 2019, 46(10): 109-115.
[9] CHI Kai-kai, TANG Ze-feng, ZHU Yi-nan, SHAO Qi-ke. Efficient Multicast Schemes for D2D Multicast Cluster in Wireless Cellular Network [J]. Computer Science, 2019, 46(1): 169-174.
[10] LIU Jing-wei, LIU Jing-ju, LU Yu-liang, YANG Bin, ZHU Kai-long. Optimal Defense Strategy Selection Method Based on Network Attack-Defense Game Model [J]. Computer Science, 2018, 45(6): 117-123.
[11] WANG Zi-qiang, LIN Hui. High Energy Efficient Mobile Charging Strategy in Wireless Rechargeable Sensor Networks [J]. Computer Science, 2018, 45(11A): 315-319,334.
[12] YAN Xue-wen, DONG Chao, QU Yu-ben. Survey of D2D-based Traffic Offloading [J]. Computer Science, 2018, 45(11): 45-51.
[13] ZHU Jiang, LEI Yun, WANG Yan. Stability Based Energy-efficient Routing Protocol in Cognitive Wireless Sensor Networks [J]. Computer Science, 2018, 45(11): 97-102.
[14] XIONG Zi-li, HAN Lan-sheng, XU Xing-bo, FU Cai and LIU Bu-yu. Research on Intrusion Detection of Wireless Sensor Networks Based on Game Theory [J]. Computer Science, 2017, 44(Z6): 326-332.
[15] YANG Da-yu, LI Jing-zhao and REN Ping. Multi-user Cooperative Power Control Allocation Scheme for D2D Cellular System Based on Noise Model [J]. Computer Science, 2017, 44(7): 98-103.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .