SlideShare a Scribd company logo
1 of 17
Download to read offline
Modelling D2D Communications in
Cellular Access Networks via Coupled
Processors
Christian Vitale Institute IMDEA Networks and Univ. Carlos III de Madrid
Vincenzo Mancuso Institute IMDEA Networks
Gianluca Rizzo HES SO Valais
HES-SO Valais-Wallis
Page 2
Outline
• Overview In-band Underlay D2D
• Our contributions:
– A new model for D2D communications: Coupled Processor
– How to study a D2D Coupled Processor model
– Sufficient conditions for stability D2D transmitters
– Effects of D2D transmissions on cellular transmitters
– Proportional Fair assignment of resources to D2D transmitters
• Future developments
HES-SO Valais-Wallis
Page 3
D2D Communications
• D2D: Device to Device communications
– Info among two device in proximity do not traverse any eNBs
but is directly exchanged
• D2D scope:
– Content Distribution
– Offloading cellular infrastructure
– Increase efficiency spectrum use
– …
• No standardization yet
– LTE Release 12 will contain D2D transmissions too
HES-SO Valais-Wallis
Page 4
In-band Underlay D2D
• D2D transmitters reuse Resource Blocks (RBs)
assigned to cellular transmitters (mutual
interference)
• Complex modeling and performance evaluation
HES-SO Valais-Wallis
Page 5
Analysed In-band Underlay D2D
• D2D – Uplink channel
• eNB schedules D2D transmissions too
• Cellular transmission scheduling:
– Equal Time
• Cellular transmitters in saturation
• D2D scheduling approach (FlashLinQ[1] like):
– Scheduling happens every RB, or blocks of RBs (when SC-
FDMA)
– D2D transmitters with traffic to serve are randomly ordered and
scheduled if:
• Interference to and from the concurrent cellular transmission
is under a given threshold
• Interference to and from the already scheduled D2D
transmissions is under a given threshold
[1] Wu, Xinzhou, et al. "FlashLinQ: A synchronous distributed scheduler for peer-to-peer ad hoc networks." IEEE/ACM Transactions on Networking
(TON) 21.4 (2013): 1215-1228.
HES-SO Valais-Wallis
Page 6
A Coupled Processor Model for D2D communications
• The Modulation Coding Scheme used by each transmitter is
univocally determined by the set of active transmitters in the same
RB
• Coupled processor
– Queueing system. Service rate at each time t univocally depends from the set of
not empty queues
• CPS can mimic the network behavior
∑+
=
≠
>−
>−
activej
ij
ii
ij
R
R
i
PN
P
SINR
|
HES-SO Valais-Wallis
Page 7
A Coupled Processor Model for D2D
communications(2)
• CPS model details:
– A queue per D2D transmitter
– System state I: set of not empty queues
– Service rate at each queue determined by I
• Average throughput achieved by the corresponding D2D
transmitter d when the set of transmitters is I
where pu is the probability of cellular transmitter u to be
scheduled; Io one of the possible ordering of I; is the
throughput of d under ordering Io and cellular transmitter u
|!|
)(
)(
I
IR
pIR OI o
u
d
ud
∑
=
HES-SO Valais-Wallis
Page 8
Coupled Processor Stability
• Find sufficient conditions for stability of CP is as
difficult as for D2D system
• Evaluation is done through simpler upper bounding
systems, i.e., simpler systems which stability implies the
stability of a CP[2]
[2] C. Vitale, G. Rizzo, and B. Rengarajan. Performance
Bounds in Coupled Processor Systems, 2013. Available
at
http://publications.hevs.ch/index.php/attachments/single/
665
HES-SO Valais-Wallis
Page 9
Sufficient condition for stability in
D2D system
• Arrivals considered are leaky bucket constrained {𝞺,
𝞼}
• Stability is studied through introduced upper
bounding networks and basic Network Calculus
results
Union over the
upper bounding
networks
GPS nodes
capacity given
the network
Maximum “absorbed”
capacity given the
network
Minimum
capacity,
saturation
HES-SO Valais-Wallis
Page 10
Sufficient condition for stability D2D system:
Results
HES-SO Valais-Wallis
Page 11
Effects on Cellular transmissions
• Previously cellular transmitters were considered in
saturation:
– Cellular transmitters are active in every system state I
• To evaluate effects on cellular transmitters, a new CP
model is studied
• Given the demands of the D2D transmitters, maximum
stable rate for the cellular transmitter is evaluated
HES-SO Valais-Wallis
Page 12
Effects on Cellular transmissions:
Results
• In all scenarios previously simulated, from position A to position B,
analytical and simulated stable rates for cellular transmitters are
compared
• Highest average underestimation of real simulated maximum
achievable rate in position B
– Average underestimation: 11.18%
HES-SO Valais-Wallis
Page 13
Proportional Fairness
• Objective: maximize a proportional Fairness measure
picking stable long term rates for the D2D transmitters
– Can be implemented at the application level through leaky bucket
shapers
where dO is a particular order of mapping D2D transmitters-> stages upper
bounding networks
STABILITY
REGION
ARRIVALS LIMIT
PROPORTIONAL
FAIRNESS
HES-SO Valais-Wallis
Page 14
Proportional Fairness-Brute Force
• Per-network optimization:
– Big-M transformation
– Branch and Bound over introduced binary variables
– Concave Optimization ->Unique solution
• Evaluation over each possible mapping D2D transmitters
GPS nodes upper bounding networks
HES-SO Valais-Wallis
Page 15
Proportional Fairness-Heuristic
• Per-network approximation:
– Branch and bound stopped when current solution not far than 𝟄% than
the optimum (𝟄=10)
• Selected set of analyzed networks
– Small set of starting networks
• For each starting network, D2D transmitters are assigned from top
to bottom proportionally to the inverse of the weight
The highest is the weight the best the interference is
modelled
– From each starting network, all networks achieved swapping two D2D
transmitters into the upper bounding networks are evaluated
– Such operation is repeated up to a local maximum
HES-SO Valais-Wallis
Page 16
Proportional Fairness
Results
• Utility Brute Force vs. Heuristic and Simulation optimized
system vs. simulations
– Utility is sensibly improved
– Simulations of optimized system gets analytical optimization results
– Heuristic very close to brute force
• Complexity
HES-SO Valais-Wallis
Page 17
Conclusions
• First analytical evaluation of performances underlay D2D
transmissions
– Sufficient condition for stability D2D transmission queues
– Quantification effects D2D transmission over cellular transmission
– Simple and effective proportional fairness scheme for D2D
transmissions
• Next step:
– Statistical characterization of stability of D2D system

More Related Content

What's hot

Efficient resource allocation for device to-device
Efficient resource allocation for device to-deviceEfficient resource allocation for device to-device
Efficient resource allocation for device to-deviceMansour Naslcheraghi
 
Evolution of LTE Towards B4G (2014)
Evolution of LTE Towards B4G (2014)Evolution of LTE Towards B4G (2014)
Evolution of LTE Towards B4G (2014)Jevgenij Kriv
 
Device to Device communication
Device to Device communicationDevice to Device communication
Device to Device communicationSharu Sparky
 
3 4 b4-g_workshop_d2d_based_comm_v2
3 4 b4-g_workshop_d2d_based_comm_v23 4 b4-g_workshop_d2d_based_comm_v2
3 4 b4-g_workshop_d2d_based_comm_v2ssk
 
Handover for 5G Networks using Fuzzy Logic: A Review
Handover for 5G Networks using Fuzzy Logic: A ReviewHandover for 5G Networks using Fuzzy Logic: A Review
Handover for 5G Networks using Fuzzy Logic: A ReviewAI Publications
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksSayed Chhattan Shah
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network drboon
 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksIJAEMSJORNAL
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUVinish Alikkal
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSPallepati Vasavi
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network YunusKhan38
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networksSalahuddin Jokhio
 
Text compression
Text compressionText compression
Text compressionkrishnagd22
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Vivek Maurya
 
IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...
IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...
IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...IRJET Journal
 

What's hot (20)

Efficient resource allocation for device to-device
Efficient resource allocation for device to-deviceEfficient resource allocation for device to-device
Efficient resource allocation for device to-device
 
Evolution of LTE Towards B4G (2014)
Evolution of LTE Towards B4G (2014)Evolution of LTE Towards B4G (2014)
Evolution of LTE Towards B4G (2014)
 
Device to Device communication
Device to Device communicationDevice to Device communication
Device to Device communication
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
3 4 b4-g_workshop_d2d_based_comm_v2
3 4 b4-g_workshop_d2d_based_comm_v23 4 b4-g_workshop_d2d_based_comm_v2
3 4 b4-g_workshop_d2d_based_comm_v2
 
Handover for 5G Networks using Fuzzy Logic: A Review
Handover for 5G Networks using Fuzzy Logic: A ReviewHandover for 5G Networks using Fuzzy Logic: A Review
Handover for 5G Networks using Fuzzy Logic: A Review
 
Introduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc NetworksIntroduction to Mobile Ad hoc Networks
Introduction to Mobile Ad hoc Networks
 
Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network Power Management in Mobile Adhoc Network
Power Management in Mobile Adhoc Network
 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
Mobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTUMobile ad hoc networks (MANET) for KTU
Mobile ad hoc networks (MANET) for KTU
 
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMSMOBILE COMPUTING MANETS,ROUTING ALGORITHMS
MOBILE COMPUTING MANETS,ROUTING ALGORITHMS
 
Adhoc Wireless Network
Adhoc Wireless Network Adhoc Wireless Network
Adhoc Wireless Network
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
 
8.conclusion
8.conclusion8.conclusion
8.conclusion
 
Adhoc wireless
Adhoc wirelessAdhoc wireless
Adhoc wireless
 
Text compression
Text compressionText compression
Text compression
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
 
IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...
IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...
IRJET- Review on Multiple Access Techniques used in Mobile Telecommunication ...
 

Similar to Modelling D2D Communications in Cellular Access Networks via Coupled Processors

Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...
Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...
Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...Prasanna Shanmugasundaram
 
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessImproving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessIaetsd Iaetsd
 
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...IJERA Editor
 
CellSDN: Software-Defined Cellular Core networks
CellSDN: Software-Defined Cellular Core networksCellSDN: Software-Defined Cellular Core networks
CellSDN: Software-Defined Cellular Core networksOpen Networking Summits
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsVirendra Thakur
 
An overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standardAn overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standardssk
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptxMunazza63
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...Tal Lavian Ph.D.
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptxkarthiksmart21
 
Cloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptxCloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptxRahulBhole12
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.pptTekle12
 
Experimental Evaluation of Large Scale WiFi Multicast Rate Control, By: Varun...
Experimental Evaluation of Large Scale WiFi Multicast Rate Control, By: Varun...Experimental Evaluation of Large Scale WiFi Multicast Rate Control, By: Varun...
Experimental Evaluation of Large Scale WiFi Multicast Rate Control, By: Varun...Belal Essam ElDiwany
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETijsrd.com
 

Similar to Modelling D2D Communications in Cellular Access Networks via Coupled Processors (20)

Mobile Data Networks
Mobile Data NetworksMobile Data Networks
Mobile Data Networks
 
Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...
Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...
Performance Analysis of Creido Enhanced Chord Overlay Protocol for Wireless S...
 
5G Enabled Vehicular Networks
5G Enabled Vehicular Networks5G Enabled Vehicular Networks
5G Enabled Vehicular Networks
 
Switching
SwitchingSwitching
Switching
 
Improving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wirelessImproving thrpoughput and energy efficiency by pctar protocol in wireless
Improving thrpoughput and energy efficiency by pctar protocol in wireless
 
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
Mobile Relay Configuration in Data-Intensuive Wireless Sensor with Three Rout...
 
CellSDN: Software-Defined Cellular Core networks
CellSDN: Software-Defined Cellular Core networksCellSDN: Software-Defined Cellular Core networks
CellSDN: Software-Defined Cellular Core networks
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
Wireless Sensor Network Routing Protocols
Wireless Sensor Network Routing ProtocolsWireless Sensor Network Routing Protocols
Wireless Sensor Network Routing Protocols
 
An overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standardAn overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standard
 
Wireless Sensor Networks.pptx
Wireless Sensor Networks.pptxWireless Sensor Networks.pptx
Wireless Sensor Networks.pptx
 
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
A Platform for Data Intensive Services Enabled by Next Generation Dynamic Opt...
 
MOBILE COMPUTING Unit 4.pptx
 MOBILE COMPUTING Unit 4.pptx MOBILE COMPUTING Unit 4.pptx
MOBILE COMPUTING Unit 4.pptx
 
Na2522282231
Na2522282231Na2522282231
Na2522282231
 
Wcdma planning
Wcdma planningWcdma planning
Wcdma planning
 
Cloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptxCloud interconnection networks basic .pptx
Cloud interconnection networks basic .pptx
 
Chapter 6 WSN.ppt
Chapter 6 WSN.pptChapter 6 WSN.ppt
Chapter 6 WSN.ppt
 
Experimental Evaluation of Large Scale WiFi Multicast Rate Control, By: Varun...
Experimental Evaluation of Large Scale WiFi Multicast Rate Control, By: Varun...Experimental Evaluation of Large Scale WiFi Multicast Rate Control, By: Varun...
Experimental Evaluation of Large Scale WiFi Multicast Rate Control, By: Varun...
 
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANETPerformance Evaluation of DSDV & OLSR Proactive Protocols in MANET
Performance Evaluation of DSDV & OLSR Proactive Protocols in MANET
 
3 g training by luca
3 g training by luca3 g training by luca
3 g training by luca
 

More from Institute of Information Systems (HES-SO)

Classification of noisy free-text prostate cancer pathology reports using nat...
Classification of noisy free-text prostate cancer pathology reports using nat...Classification of noisy free-text prostate cancer pathology reports using nat...
Classification of noisy free-text prostate cancer pathology reports using nat...Institute of Information Systems (HES-SO)
 
Machine learning assisted citation screening for Systematic Reviews - Anjani ...
Machine learning assisted citation screening for Systematic Reviews - Anjani ...Machine learning assisted citation screening for Systematic Reviews - Anjani ...
Machine learning assisted citation screening for Systematic Reviews - Anjani ...Institute of Information Systems (HES-SO)
 
Exploiting biomedical literature to mine out a large multimodal dataset of ra...
Exploiting biomedical literature to mine out a large multimodal dataset of ra...Exploiting biomedical literature to mine out a large multimodal dataset of ra...
Exploiting biomedical literature to mine out a large multimodal dataset of ra...Institute of Information Systems (HES-SO)
 
Studying Public Medical Images from Open Access Literature and Social Network...
Studying Public Medical Images from Open Access Literature and Social Network...Studying Public Medical Images from Open Access Literature and Social Network...
Studying Public Medical Images from Open Access Literature and Social Network...Institute of Information Systems (HES-SO)
 
Risques opérationnels et le système de contrôle interne : les limites d’un te...
Risques opérationnels et le système de contrôle interne : les limites d’un te...Risques opérationnels et le système de contrôle interne : les limites d’un te...
Risques opérationnels et le système de contrôle interne : les limites d’un te...Institute of Information Systems (HES-SO)
 
Le contrôle interne dans les administrations publiques tient-il toutes ses pr...
Le contrôle interne dans les administrations publiques tient-il toutes ses pr...Le contrôle interne dans les administrations publiques tient-il toutes ses pr...
Le contrôle interne dans les administrations publiques tient-il toutes ses pr...Institute of Information Systems (HES-SO)
 
Le système de contrôle interne : Présentation générale, enjeux et méthodes
Le système de contrôle interne : Présentation générale, enjeux et méthodesLe système de contrôle interne : Présentation générale, enjeux et méthodes
Le système de contrôle interne : Présentation générale, enjeux et méthodesInstitute of Information Systems (HES-SO)
 
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...Institute of Information Systems (HES-SO)
 
NOSE: une approche Smart-City pour les zones périphériques et extra-urbaines
NOSE: une approche Smart-City pour les zones périphériques et extra-urbainesNOSE: une approche Smart-City pour les zones périphériques et extra-urbaines
NOSE: une approche Smart-City pour les zones périphériques et extra-urbainesInstitute of Information Systems (HES-SO)
 

More from Institute of Information Systems (HES-SO) (20)

MIE20232.pptx
MIE20232.pptxMIE20232.pptx
MIE20232.pptx
 
Classification of noisy free-text prostate cancer pathology reports using nat...
Classification of noisy free-text prostate cancer pathology reports using nat...Classification of noisy free-text prostate cancer pathology reports using nat...
Classification of noisy free-text prostate cancer pathology reports using nat...
 
Machine learning assisted citation screening for Systematic Reviews - Anjani ...
Machine learning assisted citation screening for Systematic Reviews - Anjani ...Machine learning assisted citation screening for Systematic Reviews - Anjani ...
Machine learning assisted citation screening for Systematic Reviews - Anjani ...
 
Exploiting biomedical literature to mine out a large multimodal dataset of ra...
Exploiting biomedical literature to mine out a large multimodal dataset of ra...Exploiting biomedical literature to mine out a large multimodal dataset of ra...
Exploiting biomedical literature to mine out a large multimodal dataset of ra...
 
L'IoT dans les usines. Quels avantages ?
L'IoT dans les usines. Quels avantages ?L'IoT dans les usines. Quels avantages ?
L'IoT dans les usines. Quels avantages ?
 
Studying Public Medical Images from Open Access Literature and Social Network...
Studying Public Medical Images from Open Access Literature and Social Network...Studying Public Medical Images from Open Access Literature and Social Network...
Studying Public Medical Images from Open Access Literature and Social Network...
 
Risques opérationnels et le système de contrôle interne : les limites d’un te...
Risques opérationnels et le système de contrôle interne : les limites d’un te...Risques opérationnels et le système de contrôle interne : les limites d’un te...
Risques opérationnels et le système de contrôle interne : les limites d’un te...
 
Le contrôle interne dans les administrations publiques tient-il toutes ses pr...
Le contrôle interne dans les administrations publiques tient-il toutes ses pr...Le contrôle interne dans les administrations publiques tient-il toutes ses pr...
Le contrôle interne dans les administrations publiques tient-il toutes ses pr...
 
Le système de contrôle interne : Présentation générale, enjeux et méthodes
Le système de contrôle interne : Présentation générale, enjeux et méthodesLe système de contrôle interne : Présentation générale, enjeux et méthodes
Le système de contrôle interne : Présentation générale, enjeux et méthodes
 
Crowdsourcing-based Mobile Application for Wheelchair Accessibility
Crowdsourcing-based Mobile Application for Wheelchair AccessibilityCrowdsourcing-based Mobile Application for Wheelchair Accessibility
Crowdsourcing-based Mobile Application for Wheelchair Accessibility
 
Quelle(s) valeur(s) pour le leadership stratégique ?
Quelle(s) valeur(s) pour le leadership stratégique ?Quelle(s) valeur(s) pour le leadership stratégique ?
Quelle(s) valeur(s) pour le leadership stratégique ?
 
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...
A 3-D Riesz-Covariance Texture Model for the Prediction of Nodule Recurrence ...
 
Challenges in medical imaging and the VISCERAL model
Challenges in medical imaging and the VISCERAL modelChallenges in medical imaging and the VISCERAL model
Challenges in medical imaging and the VISCERAL model
 
NOSE: une approche Smart-City pour les zones périphériques et extra-urbaines
NOSE: une approche Smart-City pour les zones périphériques et extra-urbainesNOSE: une approche Smart-City pour les zones périphériques et extra-urbaines
NOSE: une approche Smart-City pour les zones périphériques et extra-urbaines
 
Medical image analysis and big data evaluation infrastructures
Medical image analysis and big data evaluation infrastructuresMedical image analysis and big data evaluation infrastructures
Medical image analysis and big data evaluation infrastructures
 
Medical image analysis, retrieval and evaluation infrastructures
Medical image analysis, retrieval and evaluation infrastructuresMedical image analysis, retrieval and evaluation infrastructures
Medical image analysis, retrieval and evaluation infrastructures
 
How to detect soft falls on devices
How to detect soft falls on devicesHow to detect soft falls on devices
How to detect soft falls on devices
 
FUNDAMENTALS OF TEXTURE PROCESSING FOR BIOMEDICAL IMAGE ANALYSIS
FUNDAMENTALS OF TEXTURE PROCESSING FOR BIOMEDICAL IMAGE ANALYSISFUNDAMENTALS OF TEXTURE PROCESSING FOR BIOMEDICAL IMAGE ANALYSIS
FUNDAMENTALS OF TEXTURE PROCESSING FOR BIOMEDICAL IMAGE ANALYSIS
 
MOBILE COLLECTION AND DISSEMINATION OF SENIORS’ SKILLS
MOBILE COLLECTION AND DISSEMINATION OF SENIORS’ SKILLSMOBILE COLLECTION AND DISSEMINATION OF SENIORS’ SKILLS
MOBILE COLLECTION AND DISSEMINATION OF SENIORS’ SKILLS
 
Enhanced Students Laboratory The GET project
Enhanced Students Laboratory The GET projectEnhanced Students Laboratory The GET project
Enhanced Students Laboratory The GET project
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 

Modelling D2D Communications in Cellular Access Networks via Coupled Processors

  • 1. Modelling D2D Communications in Cellular Access Networks via Coupled Processors Christian Vitale Institute IMDEA Networks and Univ. Carlos III de Madrid Vincenzo Mancuso Institute IMDEA Networks Gianluca Rizzo HES SO Valais
  • 2. HES-SO Valais-Wallis Page 2 Outline • Overview In-band Underlay D2D • Our contributions: – A new model for D2D communications: Coupled Processor – How to study a D2D Coupled Processor model – Sufficient conditions for stability D2D transmitters – Effects of D2D transmissions on cellular transmitters – Proportional Fair assignment of resources to D2D transmitters • Future developments
  • 3. HES-SO Valais-Wallis Page 3 D2D Communications • D2D: Device to Device communications – Info among two device in proximity do not traverse any eNBs but is directly exchanged • D2D scope: – Content Distribution – Offloading cellular infrastructure – Increase efficiency spectrum use – … • No standardization yet – LTE Release 12 will contain D2D transmissions too
  • 4. HES-SO Valais-Wallis Page 4 In-band Underlay D2D • D2D transmitters reuse Resource Blocks (RBs) assigned to cellular transmitters (mutual interference) • Complex modeling and performance evaluation
  • 5. HES-SO Valais-Wallis Page 5 Analysed In-band Underlay D2D • D2D – Uplink channel • eNB schedules D2D transmissions too • Cellular transmission scheduling: – Equal Time • Cellular transmitters in saturation • D2D scheduling approach (FlashLinQ[1] like): – Scheduling happens every RB, or blocks of RBs (when SC- FDMA) – D2D transmitters with traffic to serve are randomly ordered and scheduled if: • Interference to and from the concurrent cellular transmission is under a given threshold • Interference to and from the already scheduled D2D transmissions is under a given threshold [1] Wu, Xinzhou, et al. "FlashLinQ: A synchronous distributed scheduler for peer-to-peer ad hoc networks." IEEE/ACM Transactions on Networking (TON) 21.4 (2013): 1215-1228.
  • 6. HES-SO Valais-Wallis Page 6 A Coupled Processor Model for D2D communications • The Modulation Coding Scheme used by each transmitter is univocally determined by the set of active transmitters in the same RB • Coupled processor – Queueing system. Service rate at each time t univocally depends from the set of not empty queues • CPS can mimic the network behavior ∑+ = ≠ >− >− activej ij ii ij R R i PN P SINR |
  • 7. HES-SO Valais-Wallis Page 7 A Coupled Processor Model for D2D communications(2) • CPS model details: – A queue per D2D transmitter – System state I: set of not empty queues – Service rate at each queue determined by I • Average throughput achieved by the corresponding D2D transmitter d when the set of transmitters is I where pu is the probability of cellular transmitter u to be scheduled; Io one of the possible ordering of I; is the throughput of d under ordering Io and cellular transmitter u |!| )( )( I IR pIR OI o u d ud ∑ =
  • 8. HES-SO Valais-Wallis Page 8 Coupled Processor Stability • Find sufficient conditions for stability of CP is as difficult as for D2D system • Evaluation is done through simpler upper bounding systems, i.e., simpler systems which stability implies the stability of a CP[2] [2] C. Vitale, G. Rizzo, and B. Rengarajan. Performance Bounds in Coupled Processor Systems, 2013. Available at http://publications.hevs.ch/index.php/attachments/single/ 665
  • 9. HES-SO Valais-Wallis Page 9 Sufficient condition for stability in D2D system • Arrivals considered are leaky bucket constrained {𝞺, 𝞼} • Stability is studied through introduced upper bounding networks and basic Network Calculus results Union over the upper bounding networks GPS nodes capacity given the network Maximum “absorbed” capacity given the network Minimum capacity, saturation
  • 10. HES-SO Valais-Wallis Page 10 Sufficient condition for stability D2D system: Results
  • 11. HES-SO Valais-Wallis Page 11 Effects on Cellular transmissions • Previously cellular transmitters were considered in saturation: – Cellular transmitters are active in every system state I • To evaluate effects on cellular transmitters, a new CP model is studied • Given the demands of the D2D transmitters, maximum stable rate for the cellular transmitter is evaluated
  • 12. HES-SO Valais-Wallis Page 12 Effects on Cellular transmissions: Results • In all scenarios previously simulated, from position A to position B, analytical and simulated stable rates for cellular transmitters are compared • Highest average underestimation of real simulated maximum achievable rate in position B – Average underestimation: 11.18%
  • 13. HES-SO Valais-Wallis Page 13 Proportional Fairness • Objective: maximize a proportional Fairness measure picking stable long term rates for the D2D transmitters – Can be implemented at the application level through leaky bucket shapers where dO is a particular order of mapping D2D transmitters-> stages upper bounding networks STABILITY REGION ARRIVALS LIMIT PROPORTIONAL FAIRNESS
  • 14. HES-SO Valais-Wallis Page 14 Proportional Fairness-Brute Force • Per-network optimization: – Big-M transformation – Branch and Bound over introduced binary variables – Concave Optimization ->Unique solution • Evaluation over each possible mapping D2D transmitters GPS nodes upper bounding networks
  • 15. HES-SO Valais-Wallis Page 15 Proportional Fairness-Heuristic • Per-network approximation: – Branch and bound stopped when current solution not far than 𝟄% than the optimum (𝟄=10) • Selected set of analyzed networks – Small set of starting networks • For each starting network, D2D transmitters are assigned from top to bottom proportionally to the inverse of the weight The highest is the weight the best the interference is modelled – From each starting network, all networks achieved swapping two D2D transmitters into the upper bounding networks are evaluated – Such operation is repeated up to a local maximum
  • 16. HES-SO Valais-Wallis Page 16 Proportional Fairness Results • Utility Brute Force vs. Heuristic and Simulation optimized system vs. simulations – Utility is sensibly improved – Simulations of optimized system gets analytical optimization results – Heuristic very close to brute force • Complexity
  • 17. HES-SO Valais-Wallis Page 17 Conclusions • First analytical evaluation of performances underlay D2D transmissions – Sufficient condition for stability D2D transmission queues – Quantification effects D2D transmission over cellular transmission – Simple and effective proportional fairness scheme for D2D transmissions • Next step: – Statistical characterization of stability of D2D system