SlideShare a Scribd company logo
1 of 8
Download to read offline
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/276943128
Optimal Device-to-Device Cell Association and Load Balancing
Conference Paper · June 2015
DOI: 10.1109/ICC.2015.7249189
CITATIONS
8
READS
177
2 authors:
Some of the authors of this publication are also working on these related projects:
H2020 5G NORMA (https://5gnorma.5g-ppp.eu) View project
5G NORMA View project
Christoforos Vlachos
King's College London
11 PUBLICATIONS   38 CITATIONS   
SEE PROFILE
Vasilis Friderikos
King's College London
165 PUBLICATIONS   1,095 CITATIONS   
SEE PROFILE
All content following this page was uploaded by Christoforos Vlachos on 23 September 2016.
The user has requested enhancement of the downloaded file.
Optimal Device-to-Device Cell Association and
Load Balancing
Christoforos Vlachos
Centre for Telecommunications Research
King’s College London
Strand, London, WC2R 2LS, UK
Email: christoforos.vlachos@kcl.ac.uk
Vasilis Friderikos
Centre for Telecommunications Research
King’s College London
Strand, London, WC2R 2LS, UK
Email: vasilis.friderikos@kcl.ac.uk
Abstract—A key characteristic of the emerging and future
wireless networks (aka 5G) is the enabling of direct Device-
to-Device (D2D) communications between mobile nodes. D2D
communication will not only provide ultra-low power, reduced
latencies and increased spatial capacity in such networks but will
also unlock a plethora of new location-aware applications. Since
these D2D links will be mainly controlled by the network, it is
crucially important to reduce the overall overhead and also allow
for mitigated traffic imbalance by controlling a potentially large
number of D2Ds. In this paper, an optimization framework is
introduced to firstly reduce signalling load and latency in network
control-based D2D links and secondly to balance the load among
neighbouring cells. To this end, under the assumption of future
small cell-based ecosystems, a set of integer linear programs
is introduced for D2D links that fall within the coverage area
of different neighbouring base stations (BSs) with the aim to
equilibrate load across cells and reduce signalling overhead by
associating D2D links with only one BS.
Through a wide set of numerical investigations, the benefits of
the proposed schemes are evaluated showing significant perfor-
mance gains in terms of load balancing and cost-based resource
block (RB) allocation for orchestrating D2D links.
Index Terms—Device-to-Device communications, radio re-
source allocation, multi-cell load balancing.
I. INTRODUCTION
The unquestionable need to encounter the rapidly increasing
demand for wireless access to the existing and emerging
mobile networks is the main concern for network operators. It
is widely noticed that the average user owns at least one mobile
device with enriched set of capabilities such as smartphones
or tablets, while at the same time each one of these devices’
usage grew in a percentage of 45% on average during 2014
according to a survey conducted by Cisco [1].
This issue initiated the research community’s interest to
investigate for novel networking solutions in order to satisfy
or further improve the requirements set in the International
Mobile Telecommunications-Advanced (IMT-Advanced) spec-
ifications. Currently, 3GPP Long Term Evolution-Advanced
(LTE-A) system is the one to be considered as the commer-
cially introduced 4G technology, including all technological
components to support heterogeneity and enhance the system
capabilities and performance. Additionally, future 5G networks
are expected to address the aforementioned user inundation by
becoming more dynamic and ultra-dense and at the same time
ameliorate the already existent interference mitigation as well
as spectrum efficiency techniques [2]. Device-to-Device (D2D)
communication contributes to this direction by bringing a set
of benefits that arise mainly from the proximity gain that it
offers [3], as well as from the reuse gain that the underlay
property can provide [4]. In this emerging communication
paradigm, two close-ranged user equipments (UEs) are eligible
to connect directly and communicate with each other by
utilizing either the cellular (i.e. inband) or the unlicensed
spectrum (i.e. outband), unlike the traditional communication
via the BS. The aim of introducing such a technique is to
enable opportunities for new services, to provide novel means
to offload cellular BSs and enhance network capacity by
exploiting the advantages that localized, short-range wireless
peer-to-peer communications can offer.
Due to the resulting highly possible traffic congestion for
some cells in a multi-cell infrastructure and the load imbalance
among neighbouring areas, it is of crucial importance for the
network operators to apply cooperative efficient load balancing
techniques in order to provide not only satisfactory quality of
service (QoS) for all newcoming or already active UEs but
also enhance the system capacity to accommodate more users
to serve.
So far, several works have been carried out to either avoid
or mitigate the system’s overload by injecting a variety of
different offloading techniques. However, to the best of our
knowledge, this is the first work that provides signalling
overhead limitation and load balancing analysis for D2D
paired users in cellular-based networks.
The D2D links that underlay a cellular infrastructure will
be mainly controlled by the network. Hence, it is mandatory
to reduce the overall overhead and at the same time succeed
reduced latency in controlling and orchestrating large number
of D2D links in the network. Due to the booming user prolif-
eration, the probability and need for two users to share data
between each other will become more immense and lead to the
irregular emergence of several D2D pairs in future networks.
In the following subsection, we provide an alternative way to
examine the existence of only cell-edge D2D links that cross
due to their need to communicate different serving regions in
cellular networks and that will help us understand and develop
an efficient optimization framework to achieve advanced BS
IEEE ICC 2015 - Next Generation Networking Symposium
978-1-4673-6432-4/15/$31.00 ©2015 IEEE 5441
h = 2d
d
D2D link served by one BS
Cell(s)-crossing D2D link
D2D-BS control link
BS3
BS2
BS1
F1 F2 F3 F4
Frequency sub-channel division
Fig. 1. Device-to-Device communication links in a multi-cell environment
(with h = 2d). A number of links might cross the boundaries between
neighbouring cells, hence link nodes should be connected to different BSs.
association policies as well as signalling and load balancing
improvement.
A. Connection between Buffon’s Needle problem and Device-
to-Device communications
The probability of having both nodes of a D2D communica-
tion link been located within the geographical area of different
BSs as shown in the sequel represent the well-known Buffon’s
Needle (BN) problem ([5]). The Buffon’s Needle problem ex-
amines the probability that a needle comes to lie in a position
where it crosses one of the lines when dropped on a ruled
two-dimensional space. The generalization of this problem in
various other surfaces is known as the Laplace extension of
the baseline Buffon’s problem. Assuming a hexagonal layout
(coverage area of a BS) with dimension h = 2d (fig. 1) and
that the distance between two communicating nodes n1 and n2
is ln1,n2
, it can be shown that the probability that both nodes
are within the coverage area of the same BS is as follows [5]:
p0 = 1 −
1
3
ln1,n2
h
2
−
ln1,n2
h
4 −
√
3
ln1,n2
h
1
π
. (1)
Therefore, the probability of the nodes in the D2D link to be
formed that are currently connected to a different BS will be
p =
1
3
ln1,n2
h
2
+
ln1,n2
h
4 −
√
3
ln1,n2
h
1
π
. (2)
In the case where there is a multi-D2D node communication,
for example a node creates D2D links with multiple nodes,
then this could be considered as a polygonal with the total
length being the addition of the D2D links. However, in our
work we will be focusing only on the single-paired D2D
connectivity type.
Figure 2 depicts the probability that each node in a D2D
link falls within the coverage area of different BSs. Extensive
20 30 40 50 60 70 80 90 100
0
0.02
0.04
0.06
0.08
0.1
0.12
0.14
0.16
D2D link distance[m]
CrossingProbabilityaccordingtoBuffonneedlesurvey
h = 800 m − Monte Carlo
h = 1000 m − Monte Carlo
h = 1200 m − Monte Carlo
h = 1400 m − Monte Carlo
h = 1600 m − Monte Carlo
h = 800 m − BN survey
h = 1000 m − BN survey
h = 1200 m − BN survey
h = 1400 m − BN survey
h = 1600 m − BN survey
Fig. 2. Buffon’s Needle survey and Monte Carlo simulations comparison.
This figure signifies the probability of having D2D link crossing within a pair
of neighbouring cells. Convergence achieved for high number of iterations.
simulations confirm the conceptual similarity and applicability
of Buffon’s Needle survey to the under study problem as,
for a designated number of iterations, the output becomes
tangent and converges to the survey’s realization. The resulting
probabilities were produced for varying cell dimensions as
well as D2D communication range cases. The figure shows the
case where each D2D link is composed of two nodes (single
pair). As expected, this probability increases in proportion with
the distance of the D2D communication link and decreases for
cells with larger radius. In real world scenarios, the coverage
areas of neighbouring cells are not well defined and therefore
the percentage of D2D nodes is expected to be significantly
higher in some cases. Also, in the current trend where we
are witnessing further cell densification and overall decrease
of the cell size radius in order to increase spatial capacity
of emerging and future networks, the issue of having nodes
associated with a different BS might become a significant
proportion of the D2D communication links.
Load balancing techniques should be applied to distribute
the increasing number of cell-edged D2D users that are not
only characterized by the hitting property of the link formation
but also can be formed and co-located close to the limits of
all deployed cells. For the rest of the paper we will refer to
that ’hot’ area of a cell as Region of Interest (RoI). Therefore,
the previously depicted probability can give a good estimate
of the minimum bound of D2D pairs that need to be balanced.
This paper is organized as follows: in Section II, we detail
previous related research on load balancing as well as resource
allocation in cellular networks. In Section III, we present
the system model for the D2D edged users followed by an
optimization framework to balance the network load with
respect to the RB availability for D2D links. In Section IV,
a set of numerical investigations is presented providing the
analysis that results from the optimization solvers. Lastly, we
IEEE ICC 2015 - Next Generation Networking Symposium
5442
conclude with overall remarks and future work in Section V.
II. PREVIOUS RELATED WORK
In cellular networks, the most widely applied techniques for
load balancing were based on the concept of borrowing chan-
nels from neighbouring sparsely loaded cells such as channel
borrowing without locking [6] and selective borrowing-based
offloading [7] method. More recent techniques focus on the
concept of traffic offloading, including cell-breathing algo-
rithms (aiming to enhance system performance jointly with
scheduling techniques [8]), mobile-assisted call admission
(’hot’ to ’cold’ cells traffic transfer [9]) and overlaying ad-hoc
relays integrated in cellular networks as described in [10]. It
is noticed that the available schemes cannot be directly ap-
plied to traffic offloading in LTE-A Heterogeneous Networks
(HetNets), since the major target here is to balance traffic
load among multi-tier cells, which differ primarily in terms
of physical size, maximum transmit power and so on. On that
frontier, Ye et al. [11] propose a wide set of innovative user
association techniques to succeed load balancing in HetNets
through a number of optimization problems (which entail
to be NP-hard) and their related relaxations in the form of
distributed algorithms to obtain a near-optimal solution via
biasing. The latter is proven to be an efficient but at the same
time difficult method to be applied in real-time traffic scenarios
for multi-tier heterogeneous wireless ecosystems.
Compared with previous works, D2D communication-based
load balancing techniques have the following unique features:
a) D2D communications are regulated by the service-provider,
including the transmission power of end users and frequency
resources, b) underlaying D2D communications deploy the
same frequency resources as cellular transmissions for im-
proved spectrum efficiency [12]. Therefore, the arising levels
of interference due to possible RB reuse need to be mitigated
and still remains a critical challenge.
This paper’s approach is based on the assumption that Frac-
tional Frequency Reuse (FFR) [13] is applied to restrict the
inter-cell interference cases developed among the distributed
users, as already specified and studied in [14]. This means
that cell-edge users will be allocated specific resources from a
pool depending on the respective BS to serve them. Literature
concerning the in-system D2D edge-pair formation and need
for load balancing among the newcoming users with respect to
the competition for utilizing the available spectrum is almost
non-existent and is the subject of interest in this work.
III. SYSTEM MODEL AND SCENARIOS
The under investigation D2D communication links are lo-
cated close to the edge of the deployed cells and supposedly
their nodes belong to a different serving geographical area,
therefore are initially associated with different BSs before
forming the candidate D2D pair (fig. 3a). We assume that
the overall signalling overhead can be reduced by providing
association of each link to a single BS, aiming to avoid
any BS intercommunication and cooperation to exchange
information. This approach corresponds to a more realistic
D2D data/forwarding plane
D2D control plane
(a)
(b)
Coordination between BSs
BS1 BS2
BS1 BS2
Fig. 3. Different scenarios when nodes of a D2D link are located on cell
edge and communication with two BSs is possible.
networking system as it is easier to be implemented compared
to multi-BS association of the users. Also, in this way, inter-
BS asynchronous coordination and control inefficiency can
be avoided [15]. Assuming that our topology consists of
seven hexagonal cells and the total number of D2D edge
users is ND2D, the delay and overhead simplification implies
pairwise association with a single BS for each constructed
D2D pair and a signalling saving of ND2D
2 cooperative flows
among competing BSs, thus alleviating the need for signalling
exchange equal to the number of D2D users. Thereinafter, cell-
edge paired D2D users that are located in different serving
areas are assumed to be regulated by a single BS, without
any signalling coordination between the two BS candidates,
as depicted in figure 3b.
In our scenario, we assume a set of base stations B and a
set of D2D links L. Each BS b ∈ B has a pool of remaining
RBs Kb. Let us define by clb the cost of device-to-device link
l connected to BS b, this can be considered as the average cost
of connecting both nodes of a D2D link at the same BS and
can be represented as follows:
PLb,ni = 36.7log10rb,ni
+ 40.9 + 26log10(fc/5) (3)
clb =
PLb,n1 + PLb,n2
2
(4)
where link l consists of nodes n1 and n2, rb,ni
and PLb,ni
are the distance (in meters) and path-loss (in dB) between
BS b and ni for i = 1, 2, respectively, and fc is the carrier
frequency expressed in GHz. The aforementioned path-loss
expression concerns urban modelling as declared in ITU-R
report in [16]. Herein, fast fading impairments are not taken
into consideration.
In order to view the problem of BS association and mini-
mization of the overall cost via a mathematical programming
setting, the following binary variable is defined:
ylb =
1, if link l connected to BS b
0, otherwise.
(5)
IEEE ICC 2015 - Next Generation Networking Symposium
5443
Based on the above, the minimum cost D2D link association
to BS can be formulated as follows:
min
l∈L b∈B
clbylb (6)
s.t.
b∈Bl
ylb = 1, ∀l ∈ L (6a)
l∈L
ylb ≤ Kb, ∀b ∈ B (6b)
ylb ∈ {0, 1}, ∀l ∈ L, ∀b ∈ B (6c)
where Bl is the set of candidate competing BSs to be asso-
ciated with the link l. Sub-equation 6a stands for the BSs
competency constraint, whereas 6b represents the capacity
constraint (in terms of available resources) for each BS. The
aforementioned optimization problem is an Integer Program-
ming (IP) problem that due to the unimodular property of
its inequality matrix (determinant of every square sub-matrix
equals to 1) can be solved in an efficient manner, since it would
have the complexity of a linear program. Additionally, in many
cases it is desirable to provide some form of load balancing
between serving BSs in order to distribute the connectivity
and management of the D2D links in less loaded cells so as
to avoid traffic congestion and the need for RB reuse that
could lead to increased interference levels among users. This
problem can be formulated accordingly as follows:
min
b∈B l∈L
ylb
2
(7)
s.t.
b∈Bl
ylb = 1, ∀l ∈ L (7a)
l∈L
ylb ≤ Kb, ∀b ∈ B (7b)
ylb ∈ {0, 1}, ∀l ∈ L, ∀b ∈ B. (7c)
Note that the above is a non-linear integer optimization pro-
gram which is not suitable to be solved via powerful available
toolboxes on linear integer mathematical programming. How-
ever, the problem can be re-formulated as a linear problem
if viewed as a max-min optimization problem which can be
described as shown below:
max z (8)
s.t. z ≤
l∈L
ylb, ∀b ∈ B (8a)
b∈Bl
ylb = 1, ∀l ∈ L (8b)
l∈L
ylb ≤ Kb, ∀b ∈ B (8c)
ylb ∈ {0, 1}, ∀l ∈ L, ∀b ∈ B. (8d)
Another way to look into the BS association would be
to consider the current load level of the different candidate
BSs as well as the congestion level on the fronthaul since it
might be the case that D2D communication will not only incur
signalling cost but also data. Therefore, if we define by Ub the
utilization level of BS b (which might include the utilization
level of the fronthaul) then we might be interested to provide
load balancing by taking also into account the utilization levels
of the BSs. Such an approach can be realized by solving the
following mathematical program:
min
b∈B
Ub −
l∈L
ylb
2
(9)
s.t.
b∈Bl
ylb = 1, ∀l ∈ L (9a)
l∈L
ylb ≤ Kb, ∀b ∈ B (9b)
ylb ∈ {0, 1}, ∀l ∈ L, ∀b ∈ B. (9c)
Note again that the above formulation is a non-linear integer
programming problem. In a similar manner as described
before, this optimization problem can be linearized as follows:
max z (10)
s.t. z ≤ Ub −
l∈L
ylb, ∀b ∈ B (10a)
b∈Bl
ylb = 1, ∀l ∈ L (10b)
l∈L
ylb ≤ Kb, ∀b ∈ B (10c)
ylb ∈ {0, 1}, ∀l ∈ L, ∀b ∈ B. (10d)
A. Joint connectivity cost & RB reuse optimization
In this subsection, we further empower the cost minimiza-
tion setting in 6, by extending the objective with the prospect
of also minimizing the overall RB reuse levels. A proper
RB allocation on top of a cost-efficient method for D2D
connectivity could potentially entail in a reduction of the
aggregate co-channel interference due to the avoidance of
over-utilizing the same available resources, i.e resource blocks.
Therefore, we would like to provide cell association and RB
allocation so that we also minimize the reuse of resource
blocks which are currently allocated based on the FFR method.
To do so, we define the following decision variable:
τbr =
1, if RB r of BS b is used
0, otherwise.
(11)
We also define with ρbr an index which captures how many
times a RB r is used by base station b. Based on the above
definitions, we formulate the following optimization problem
which provides optimal D2D cell association and minimizes
the reuse of resource blocks in the network:
min
l∈L b∈B
clbylb ;
b∈B r∈R
τbrρbr (12)
IEEE ICC 2015 - Next Generation Networking Symposium
5444
s.t.
b∈Bl
ylb = 1, ∀l ∈ L (12a)
l∈L
ylb ≤ Kb, ∀b ∈ B (12b)
r∈R
τbr ≤ Kb, ∀b ∈ B (12c)
r∈R
τbr ≥
l∈L
ylb, ∀b ∈ B (12d)
ylb, τbr ∈ {0, 1}, ∀l ∈ L, ∀b ∈ B, ∀r ∈ R. (12e)
In this setting, the objective functions are conflicting (i.e. cost
and RB reuse varying values, respectively), hence there exists
multiple number of Pareto optimal solutions. Additionally,
we note that constraints (12d) are logically redundant. These
constraints are implied by (12c), but are used to reduce the
search effort and run-time (i.e. reducing further the search
space).
IV. NUMERICAL INVESTIGATIONS
In this section, a set of numerical investigations is detailed
which shed light on the efficacy of the aforementioned opti-
mization schemes to provide reliable BS association and load
balancing performance when active communication is taking
place between any constructed pair of D2D nodes within the
network. A main assumption for the applicability of these
problems is the existing occupation of some RBs from D2Ds
that are currently being served while the newcoming and
under consideration pairs will have to select from the available
remaining resource pool Kb of each serving BS b ∈ B to
satisfy their communication needs. Furthermore, we presume,
without loss of generality, that the D2D users are uniformly
distributed in the network and can be sharing the same RB with
more than one users from neighbouring cells as considered
also in [14]. The simulation parameters are shown in Table I.
We compare the performance of the cost minimization
programming problem stated in 6 with a cost-based heuristic
method. The greedy heuristic allocates one RB to each D2D
pair by associating each pair to the BS that provides the
best channel conditions to it, without taking into consider-
ation the total occupancy of the network but only looking
into not violating the RB availability of the respective cell.
The algorithm runs in a centralized manner by sequentially
assigning RBs to the involved users and when the resource
buffer of the related BS to serve is full, the transmission
needs of the respective users is satisfied from the competing
BS candidate. The cost minimization difference is expected
to be somehow low for the two compared techniques since
the objective for mitigating the overall cost and achieving
an efficient RB assignment combination is implemented in
a similar way. Figure 4 highlights this slight differentiation
and reveals the increasing mean gain/reduction proportionally
with the increase of utilization levels and traffic congestion in
relation to the remaining RBs to be occupied. This proves that
the cost minimization IP formulation performs better in con-
gested scenarios. In other words, the gains are achieved when
really needed, i.e. in congested epochs which are envisioned
TABLE I
SIMULATION PARAMETERS
Parameter Value
D2D user distribution Uniform
Region of interest (RoI) Cell-edge
Number of cells (Nc) 7
Cell radius (d) 400 m
Minimum distance for RoI consideration 300 m
Path-loss (PL) model [16]
Carrier frequency (fc) 2 GHz
System bandwidth (BW) 10 MHz
Number of D2D pair hits (ND2D) [85, 160]
D2D link range (ln1,n2 ) [20, 100] m
Max number of available RBs per RoI 40
to be of frequent occurrence due to the exponential growth
of user emergence in current and future networks. The results
are normalized for ease of comprehension and are depicted
for different levels of congestion. For these simulations highly
utilized BSs were assumed as for low congestion scenarios
the two compared methods have similar outputs. The highest
cost minimization gain is met on the most bottlenecked case
(congestion level > 90%) in a percentage of almost 3.15%.
The aforementioned notable but also small gain is the reason
we enhance the cost minimization problem by introducing
an additive sub-objective to efficiently control the unassigned
users that need to be orchestrated. As implied in problem 12,
this programming solver looks into allocating lightly used RBs
of the candidate BS to the unallocated D2D links given that
all involved BSs are active and highly utilized. Furthermore,
due to the limited RB availability and the huge number of
users, it can be easily conceivable that several resources will
be over-utilized. To this direction, we apply this solver to high
congestion instances where the resources are reused within
the network. Figure 5 proves that for different traffic cases
and occupancy of the network, this setting achieves better
performance compared with an average utilization agnostic
method that assigns resources randomly picked from the
available pool of RBs. On the other hand, the worst case
would be to assign users to satisfy their transmission needs
by using the over-utilized resources. As depicted, the optimal
case of utilizing the less used RBs outperforms the worst case
and average utilization agnostic case in a percentage of 45%
and almost 22% over-utilization avoidance gain, respectively.
Similar behaviour is observed for more congested instances
(> 70%) where the achieved gain remains significant.
In regard to the problem of load balancing within the
deployed topology from the perspective of D2D users, we
compare the performance of the proposed load balancing IP
frame (problems 7,8) with two heuristic algorithms. The first
one, namely the cost-based heuristic (CbH), was described
afore in the cost minimization problem. The second greedy
heuristic is a load-based heuristic (LbH). LbH bases its allo-
cation rationale on looking into the current load of the network
and each cell-edge’s capacity in order to assign resources to
the less loaded between competing cells. The latter theoret-
IEEE ICC 2015 - Next Generation Networking Symposium
5445
[70, 80) % [80, 90) % [90, 100) %
0.9
0.92
0.94
0.96
0.98
1
Overall congestion level
Normalizedcostcomparison Cost−based Heuristic
Cost minimization IP solution
Fig. 4. Normalized cost comparison for cost minimization IP solver and
Cost-based Heuristic (CbH) algorithm for high congestion levels.
( > 60 % ) ( > 70 % ) ( > 80 % )
0
0.2
0.4
0.6
0.8
1
1.2
Network congestion levels
Normalizedover−utilizationavoidance
Optimal case
Avg. utilization agnostic case
Worst case
Fig. 5. Normalized utilization balancing comparison for optimal allocation
of RBs.
ically works better in the case of relatively balanced cells
but because of its dependency to load fluctuation scenarios
(varying RB availability) can be slightly weakened compared
to the former in initially load imbalanced cases. Also, it is
obvious that the LbH method outperforms the CbH when
the objective is to balance the load of the deployed cells.
Figure 6 shows a statistical significance and supremacy of
the proposed optimization problems compared to both CbH
and LbH algorithms for a sample of ten different deployment
scenarios. The results derived from a round of independent
simulations and for this sampled cases the standard deviation
σ of the CbH and the LbH methods is almost 3.5 and 2.7
times bigger, respectively, compared to the LB-IP solution.
This signifies less spread and more balanced assignment of
the available RBs to the newcoming D2D users by using
the optimization framework. The least observed deviation of
1 2 3 4 5 6 7 8 9 10
0
1
2
3
4
5
6
Scenario sampling (10 out of 1000 Monte Carlo simulations)
Standarddeviation(SD)ofRBallocation
LB−IP solution
Load−based heuristic algorithm
Cost−based heuristic algorithm
Fig. 6. Simulation instances of Load Balancing (LB) optimization solver,
Load-based (LbH) and Cost-based heuristic (CbH) algorithmic solutions.
the LB-IP solution to those algorithms (scenario 4 in fig.
6) is characterized by a highly restricted scenario where the
distribution of users is very similar for all cells and the number
of available RBs is limited and close to the number of edge
D2D pairs. In this case, 7% and 13.6% standard deviation
percentage differentiation characterizes the result of CbH and
LbH respectively compared to the optimal solution.
A study was conducted for varying number of D2D cell-
edge links (bounded accordingly as defined in figure 2 of
subsection I-A for a total number of formed D2D pairs)
where the mean standard deviation is the metric for the
results shown in figure 7. This figure reveals the consistency
of the proposed optimization problem as a solver for both
light and more congested ecosystems where the availability
of resources is more likely to become constrained by the
uprising number of users. The IP solution outperforms in
terms of mean standard deviation the LbH as well as the
CbH load balancing algorithms in a percentage of almost
44% and more than 53% difference respectively, as depicted
below. The increasing tendency of the LB-IP solution can be
justified by the fact that, while retaining the constrained Kb
capacity values, some of the newcoming D2Ds might fully
utilize the available resources on a specific cell; therefore,
the remaining unassigned D2D links should be coupled with
the related BS that has available resources. This entails in
increasing association variance for increased number of users.
Despite the random deployment of D2D links for different
cases, the results highlight the performance gain of the LB-IP
solver per case. In addition, after running the LB-IP solution
a large number of iterations by retaining the same number of
randomly distributed D2Ds (115 users for each instance) but
for different deployment scenarios, the average elapsed time
was estimated on 0.2517 seconds and could converge at least
one order of magnitude faster by using hardware accelerating
techniques to improve its time-running performance.
Finally, a set of results is presented for problems 9, 10 by
IEEE ICC 2015 - Next Generation Networking Symposium
5446
90 100 110 120 130 140 150 160
1
1.5
2
2.5
3
3.5
4
Total number of D2D hits
Meanstandarddeviation
LB−IP
LbH
CbH
Fig. 7. Mean standard deviation estimations for Load Balancing (LB-IP)
solver, Load-based (LbH) and Cost-based heuristic (CbH).
90 100 110 120 130 140 150 160
1
1.5
2
2.5
3
3.5
4
4.5
5
Total number of D2D hits
MeanstandarddeviationconsideringUC
LB−IP
LbH
CbH
Fig. 8. Mean standard deviation estimations based on different BSs’ utilization
cases (UC) for Load Balancing (LB-IP) solver, LbH and CbH.
including and examining the effect of the utilization level Ub
of each cell. The results depicted in figure 8 were produced
for randomly generated utilization levels for each BS with-
out violating any resource constraint. The evaluation of the
included load balancing schemes is likewise compared to the
figure above and the differences are mainly arithmetic and
incidental due to the randomness of the parameter values for
different scenarios and the involvement of the Ub limitations.
The optimal recorded mean standard deviation values differ in
a percentage of close to 50.5% and 55.3% compared to LbH
and CbH algorithmic outputs, respectively.
V. CONCLUSIONS
In this paper, a set of integer linear programs has been
detailed aiming to optimize the performance of network-
supported D2D communications in emerging small cell wire-
less networks. As illustrated in the numerical investigations,
the proposed schemes can efficiently balance the traffic load
related to D2D link support across the deployed set of BSs
and achieve significant cost avoidance gains, especially in con-
gested network episodes. We further detailed an efficient way
to apply cell association and RB assignment for FFR-based,
highly utilized deployment scenarios. As a future step, the
proposed framework can be extended to support load balancing
of D2D links in a distributed manner and, by considering also
the effects of node mobility within the communication pair,
to reduce latency, signalling load as well as provide self-
organizing mechanisms to manage the load imbalance and
resource allocation.
ACKNOWLEDGMENTS
This work is funded by the European Commission Frame-
work Programme 7 Marie Curie Initial Training Networks
(ITN) CROSSFIRE project (FP7-PEOPLE-317126).
REFERENCES
[1] CISCO, “Global Mobile Data Traffic Forecast Update, 2014-2019,” in
Cisco White Paper, February 2015.
[2] T. Ihalainen, P. Janis, Z. Li, M. Moisio, V. Nurmela, M. Uusitalo,
C. Wijting, and O. Yilmaz, “Flexible scalable solutions for dense small
cell networks,” in Wireless World Research Forum (WWRF), April 2013.
[3] 3GPP TR 36.843, “Technical Specification Group Radio Access Net-
work; Study on LTE device to device proximity services”, March 2014.
[4] K. Doppler, M. Rinne, C. Wijting, C.B. Ribeiro, K. Hugl “Device-to-
Device communication as an underlay to LTE-Advanced networks,” in
IEEE Communications Magazine, vol. 47, no. 12, pp. 42–49, Dec. 2009.
[5] G. Wood and J. Robertson, “Buffon got it straight,” Statistics &
Probability Letters, vol. 37, no. 4, pp. 415 – 421, March 1998.
[6] H. Jiang and S. Rappaport Stephen, “CBWL: A new channel assignment
and sharing method for cellular communication systems,” IEEE Trans-
actions on Vehicular Technology, vol. 43, no. 2, pp. 313–322, May 1994.
[7] S. Das, S. Sen, and R. Jayaram, “A dynamic load balancing strategy
for channel assignment using selective borrowing in cellular mobile
environment,” Wireless Networks, vol. 3, no. 5, 1997.
[8] S. Das, H. Viswanathan, and G. Rittenhouse, “Dynamic load balanc-
ing through coordinated scheduling in packet data systems,” in 22nd
Annual Joint Conference of the IEEE Computer and Communications,
INFOCOM, vol. 1, March 2003, pp. 786–796.
[9] X. Wu, B. Mukherjee, and S.-H. Chan, “MACA-an efficient channel
allocation scheme in cellular networks,” in IEEE GLOBECOM, vol. 3,
November 2000, pp. 1385–1389.
[10] H. Wu, C. Qiao, S. De, and O. Tonguz, “Integrated cellular and ad-
hoc relaying systems: iCAR,” IEEE Journal on Selected Areas in
Communications, vol. 19, no. 10, pp. 2105–2115, October 2001.
[11] Q. Ye, B. Rong, Y. Chen, M. Al-Shalash, C. Caramanis, and J. An-
drews, “User association for load balancing in heterogeneous cellular
networks,” IEEE Transactions on Wireless Communications, vol. 12,
no. 6, pp. 2706–2716, June 2013.
[12] J. Liu, Y. Kawamoto, H. Nishiyama, N. Kato, and N. Kadowaki,
“Device-to-Device communications achieve efficient load balancing in
LTE-Advanced networks,” IEEE Wireless Communications, vol. 21,
no. 2, pp. 57–65, April 2014.
[13] T. Novlan, J. Andrews, I. Sohn, R. Ganti, and A. Ghosh, “Compari-
son of fractional frequency reuse approaches in the OFDMA cellular
downlink,” in IEEE GLOBECOM, December 2010, pp. 1–5.
[14] H. S. Chae, J. Gu, B.-G. Choi, and M. Chung, “Radio resource allocation
scheme for Device-to-Device communication in cellular networks using
fractional frequency reuse,” in 17th IEEE Asia-Pacific Conference on
Communications (APCC), October 2011, pp. 58–62.
[15] O. Yilmaz, Z. Li, K. Valkealahti, M. Uusitalo, M. Moisio, P. Lunden,
and C. Wijting, “Smart Mobility Management for D2D Communications
in 5G Networks,” in IEEE Wireless Communications and Networking
Conference Workshops (WCNCW), April 2014, pp. 219–223.
[16] ITU-R M.2135 : ”Guidelines for evaluation of radio interface technolo-
gies for IMT-Advanced”, 2008.
IEEE ICC 2015 - Next Generation Networking Symposium
5447View publication statsView publication stats

More Related Content

What's hot

Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...IJCNCJournal
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSIJMIT JOURNAL
 
5. 7771 8116-1-pb
5. 7771 8116-1-pb5. 7771 8116-1-pb
5. 7771 8116-1-pbIAESIJEECS
 
Csit54201
Csit54201Csit54201
Csit54201csandit
 
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...amal algedir
 
Universal Network Coding-Based Opportunistic Routing for Unicast
Universal Network Coding-Based Opportunistic Routing for UnicastUniversal Network Coding-Based Opportunistic Routing for Unicast
Universal Network Coding-Based Opportunistic Routing for Unicast1crore projects
 
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...cscpconf
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSijasuc
 
Universal network coding based opportunistic routing for unicast
Universal network coding based opportunistic routing for unicastUniversal network coding based opportunistic routing for unicast
Universal network coding based opportunistic routing for unicastPvrtechnologies Nellore
 
Oblivious Cooperative Communication in Cognitive Radio Networks_FinalProject
Oblivious Cooperative Communication in Cognitive Radio Networks_FinalProjectOblivious Cooperative Communication in Cognitive Radio Networks_FinalProject
Oblivious Cooperative Communication in Cognitive Radio Networks_FinalProjectMicheal Fisher
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
 

What's hot (14)

Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...
Self-Pruning based Probabilistic Approach to Minimize Redundancy Overhead for...
 
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKSMULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
MULTI-HOP BANDWIDTH MANAGEMENT PROTOCOL FOR MOBILE AD HOC NETWORKS
 
5. 7771 8116-1-pb
5. 7771 8116-1-pb5. 7771 8116-1-pb
5. 7771 8116-1-pb
 
Csit54201
Csit54201Csit54201
Csit54201
 
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
 
Universal Network Coding-Based Opportunistic Routing for Unicast
Universal Network Coding-Based Opportunistic Routing for UnicastUniversal Network Coding-Based Opportunistic Routing for Unicast
Universal Network Coding-Based Opportunistic Routing for Unicast
 
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
FUZZY-CONTROLLED POWER-AWARE PROACTIVE-ACKNOWLEDGEMENT BASED BROADCASTING (FP...
 
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKSOPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
OPTIMUM NEIGHBORS FOR RESOURCECONSTRAINED MOBILE AD HOC NETWORKS
 
Universal network coding based opportunistic routing for unicast
Universal network coding based opportunistic routing for unicastUniversal network coding based opportunistic routing for unicast
Universal network coding based opportunistic routing for unicast
 
50120140503006
5012014050300650120140503006
50120140503006
 
Oblivious Cooperative Communication in Cognitive Radio Networks_FinalProject
Oblivious Cooperative Communication in Cognitive Radio Networks_FinalProjectOblivious Cooperative Communication in Cognitive Radio Networks_FinalProject
Oblivious Cooperative Communication in Cognitive Radio Networks_FinalProject
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
C0351725
C0351725C0351725
C0351725
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
 

Similar to 07249189

Interference aware resource allocation model for D2D under cellular network
Interference aware resource allocation model for D2D under cellular network Interference aware resource allocation model for D2D under cellular network
Interference aware resource allocation model for D2D under cellular network IJECEIAES
 
A bipartite graph based proportional fair scheduling strategy to improve thr...
A bipartite graph based proportional fair scheduling strategy to  improve thr...A bipartite graph based proportional fair scheduling strategy to  improve thr...
A bipartite graph based proportional fair scheduling strategy to improve thr...IJECEIAES
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...IJCNCJournal
 
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...ijtsrd
 
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...ijtsrd
 
Device to Device Communication in Cellular Networks
Device to Device Communication in Cellular NetworksDevice to Device Communication in Cellular Networks
Device to Device Communication in Cellular Networksaroosa khan
 
Analysis Of D2D Communication In 5G Network
Analysis Of D2D Communication In 5G NetworkAnalysis Of D2D Communication In 5G Network
Analysis Of D2D Communication In 5G NetworkNicole Heredia
 
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...IJCNCJournal
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routingIJCNCJournal
 
1 s2.0-s1389128620312354-main
1 s2.0-s1389128620312354-main1 s2.0-s1389128620312354-main
1 s2.0-s1389128620312354-mainAbdoHassan41
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSIJCNCJournal
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksIJCNCJournal
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...ijasuc
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkijwmn
 
Radio propagation models in wireless
Radio propagation models in wirelessRadio propagation models in wireless
Radio propagation models in wirelessIJCNCJournal
 
D2D communication for spectral efficiency improvement and interference reduct...
D2D communication for spectral efficiency improvement and interference reduct...D2D communication for spectral efficiency improvement and interference reduct...
D2D communication for spectral efficiency improvement and interference reduct...journalBEEI
 

Similar to 07249189 (20)

Interference aware resource allocation model for D2D under cellular network
Interference aware resource allocation model for D2D under cellular network Interference aware resource allocation model for D2D under cellular network
Interference aware resource allocation model for D2D under cellular network
 
A bipartite graph based proportional fair scheduling strategy to improve thr...
A bipartite graph based proportional fair scheduling strategy to  improve thr...A bipartite graph based proportional fair scheduling strategy to  improve thr...
A bipartite graph based proportional fair scheduling strategy to improve thr...
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
 
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
 
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
Energy Efficient Resource Allocation and Relay Selection Schemes for D2D Comm...
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Device to Device Communication in Cellular Networks
Device to Device Communication in Cellular NetworksDevice to Device Communication in Cellular Networks
Device to Device Communication in Cellular Networks
 
Analysis Of D2D Communication In 5G Network
Analysis Of D2D Communication In 5G NetworkAnalysis Of D2D Communication In 5G Network
Analysis Of D2D Communication In 5G Network
 
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
 
Design and implementation of new routing
Design and implementation of new routingDesign and implementation of new routing
Design and implementation of new routing
 
1 s2.0-s1389128620312354-main
1 s2.0-s1389128620312354-main1 s2.0-s1389128620312354-main
1 s2.0-s1389128620312354-main
 
Et24912915
Et24912915Et24912915
Et24912915
 
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKSBROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
BROADCAST SCHEDULING PROTOCOLS IN MULTIHOP MOBILE AD HOC NETWORKS
 
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc NetworksBroadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
Broadcast Scheduling Protocols in Multi-Hop Mobile Ad hoc Networks
 
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
AN ENERGY EFFICIENT DISTRIBUTED PROTOCOL FOR ENSURING COVERAGE AND CONNECTIVI...
 
Characterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor networkCharacterization of directed diffusion protocol in wireless sensor network
Characterization of directed diffusion protocol in wireless sensor network
 
Rmdtn ppt
Rmdtn pptRmdtn ppt
Rmdtn ppt
 
Radio propagation models in wireless
Radio propagation models in wirelessRadio propagation models in wireless
Radio propagation models in wireless
 
D2D communication for spectral efficiency improvement and interference reduct...
D2D communication for spectral efficiency improvement and interference reduct...D2D communication for spectral efficiency improvement and interference reduct...
D2D communication for spectral efficiency improvement and interference reduct...
 
Network Coverage Mapping
Network Coverage Mapping Network Coverage Mapping
Network Coverage Mapping
 

Recently uploaded

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 

07249189

  • 1. See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/276943128 Optimal Device-to-Device Cell Association and Load Balancing Conference Paper · June 2015 DOI: 10.1109/ICC.2015.7249189 CITATIONS 8 READS 177 2 authors: Some of the authors of this publication are also working on these related projects: H2020 5G NORMA (https://5gnorma.5g-ppp.eu) View project 5G NORMA View project Christoforos Vlachos King's College London 11 PUBLICATIONS   38 CITATIONS    SEE PROFILE Vasilis Friderikos King's College London 165 PUBLICATIONS   1,095 CITATIONS    SEE PROFILE All content following this page was uploaded by Christoforos Vlachos on 23 September 2016. The user has requested enhancement of the downloaded file.
  • 2. Optimal Device-to-Device Cell Association and Load Balancing Christoforos Vlachos Centre for Telecommunications Research King’s College London Strand, London, WC2R 2LS, UK Email: christoforos.vlachos@kcl.ac.uk Vasilis Friderikos Centre for Telecommunications Research King’s College London Strand, London, WC2R 2LS, UK Email: vasilis.friderikos@kcl.ac.uk Abstract—A key characteristic of the emerging and future wireless networks (aka 5G) is the enabling of direct Device- to-Device (D2D) communications between mobile nodes. D2D communication will not only provide ultra-low power, reduced latencies and increased spatial capacity in such networks but will also unlock a plethora of new location-aware applications. Since these D2D links will be mainly controlled by the network, it is crucially important to reduce the overall overhead and also allow for mitigated traffic imbalance by controlling a potentially large number of D2Ds. In this paper, an optimization framework is introduced to firstly reduce signalling load and latency in network control-based D2D links and secondly to balance the load among neighbouring cells. To this end, under the assumption of future small cell-based ecosystems, a set of integer linear programs is introduced for D2D links that fall within the coverage area of different neighbouring base stations (BSs) with the aim to equilibrate load across cells and reduce signalling overhead by associating D2D links with only one BS. Through a wide set of numerical investigations, the benefits of the proposed schemes are evaluated showing significant perfor- mance gains in terms of load balancing and cost-based resource block (RB) allocation for orchestrating D2D links. Index Terms—Device-to-Device communications, radio re- source allocation, multi-cell load balancing. I. INTRODUCTION The unquestionable need to encounter the rapidly increasing demand for wireless access to the existing and emerging mobile networks is the main concern for network operators. It is widely noticed that the average user owns at least one mobile device with enriched set of capabilities such as smartphones or tablets, while at the same time each one of these devices’ usage grew in a percentage of 45% on average during 2014 according to a survey conducted by Cisco [1]. This issue initiated the research community’s interest to investigate for novel networking solutions in order to satisfy or further improve the requirements set in the International Mobile Telecommunications-Advanced (IMT-Advanced) spec- ifications. Currently, 3GPP Long Term Evolution-Advanced (LTE-A) system is the one to be considered as the commer- cially introduced 4G technology, including all technological components to support heterogeneity and enhance the system capabilities and performance. Additionally, future 5G networks are expected to address the aforementioned user inundation by becoming more dynamic and ultra-dense and at the same time ameliorate the already existent interference mitigation as well as spectrum efficiency techniques [2]. Device-to-Device (D2D) communication contributes to this direction by bringing a set of benefits that arise mainly from the proximity gain that it offers [3], as well as from the reuse gain that the underlay property can provide [4]. In this emerging communication paradigm, two close-ranged user equipments (UEs) are eligible to connect directly and communicate with each other by utilizing either the cellular (i.e. inband) or the unlicensed spectrum (i.e. outband), unlike the traditional communication via the BS. The aim of introducing such a technique is to enable opportunities for new services, to provide novel means to offload cellular BSs and enhance network capacity by exploiting the advantages that localized, short-range wireless peer-to-peer communications can offer. Due to the resulting highly possible traffic congestion for some cells in a multi-cell infrastructure and the load imbalance among neighbouring areas, it is of crucial importance for the network operators to apply cooperative efficient load balancing techniques in order to provide not only satisfactory quality of service (QoS) for all newcoming or already active UEs but also enhance the system capacity to accommodate more users to serve. So far, several works have been carried out to either avoid or mitigate the system’s overload by injecting a variety of different offloading techniques. However, to the best of our knowledge, this is the first work that provides signalling overhead limitation and load balancing analysis for D2D paired users in cellular-based networks. The D2D links that underlay a cellular infrastructure will be mainly controlled by the network. Hence, it is mandatory to reduce the overall overhead and at the same time succeed reduced latency in controlling and orchestrating large number of D2D links in the network. Due to the booming user prolif- eration, the probability and need for two users to share data between each other will become more immense and lead to the irregular emergence of several D2D pairs in future networks. In the following subsection, we provide an alternative way to examine the existence of only cell-edge D2D links that cross due to their need to communicate different serving regions in cellular networks and that will help us understand and develop an efficient optimization framework to achieve advanced BS IEEE ICC 2015 - Next Generation Networking Symposium 978-1-4673-6432-4/15/$31.00 ©2015 IEEE 5441
  • 3. h = 2d d D2D link served by one BS Cell(s)-crossing D2D link D2D-BS control link BS3 BS2 BS1 F1 F2 F3 F4 Frequency sub-channel division Fig. 1. Device-to-Device communication links in a multi-cell environment (with h = 2d). A number of links might cross the boundaries between neighbouring cells, hence link nodes should be connected to different BSs. association policies as well as signalling and load balancing improvement. A. Connection between Buffon’s Needle problem and Device- to-Device communications The probability of having both nodes of a D2D communica- tion link been located within the geographical area of different BSs as shown in the sequel represent the well-known Buffon’s Needle (BN) problem ([5]). The Buffon’s Needle problem ex- amines the probability that a needle comes to lie in a position where it crosses one of the lines when dropped on a ruled two-dimensional space. The generalization of this problem in various other surfaces is known as the Laplace extension of the baseline Buffon’s problem. Assuming a hexagonal layout (coverage area of a BS) with dimension h = 2d (fig. 1) and that the distance between two communicating nodes n1 and n2 is ln1,n2 , it can be shown that the probability that both nodes are within the coverage area of the same BS is as follows [5]: p0 = 1 − 1 3 ln1,n2 h 2 − ln1,n2 h 4 − √ 3 ln1,n2 h 1 π . (1) Therefore, the probability of the nodes in the D2D link to be formed that are currently connected to a different BS will be p = 1 3 ln1,n2 h 2 + ln1,n2 h 4 − √ 3 ln1,n2 h 1 π . (2) In the case where there is a multi-D2D node communication, for example a node creates D2D links with multiple nodes, then this could be considered as a polygonal with the total length being the addition of the D2D links. However, in our work we will be focusing only on the single-paired D2D connectivity type. Figure 2 depicts the probability that each node in a D2D link falls within the coverage area of different BSs. Extensive 20 30 40 50 60 70 80 90 100 0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 D2D link distance[m] CrossingProbabilityaccordingtoBuffonneedlesurvey h = 800 m − Monte Carlo h = 1000 m − Monte Carlo h = 1200 m − Monte Carlo h = 1400 m − Monte Carlo h = 1600 m − Monte Carlo h = 800 m − BN survey h = 1000 m − BN survey h = 1200 m − BN survey h = 1400 m − BN survey h = 1600 m − BN survey Fig. 2. Buffon’s Needle survey and Monte Carlo simulations comparison. This figure signifies the probability of having D2D link crossing within a pair of neighbouring cells. Convergence achieved for high number of iterations. simulations confirm the conceptual similarity and applicability of Buffon’s Needle survey to the under study problem as, for a designated number of iterations, the output becomes tangent and converges to the survey’s realization. The resulting probabilities were produced for varying cell dimensions as well as D2D communication range cases. The figure shows the case where each D2D link is composed of two nodes (single pair). As expected, this probability increases in proportion with the distance of the D2D communication link and decreases for cells with larger radius. In real world scenarios, the coverage areas of neighbouring cells are not well defined and therefore the percentage of D2D nodes is expected to be significantly higher in some cases. Also, in the current trend where we are witnessing further cell densification and overall decrease of the cell size radius in order to increase spatial capacity of emerging and future networks, the issue of having nodes associated with a different BS might become a significant proportion of the D2D communication links. Load balancing techniques should be applied to distribute the increasing number of cell-edged D2D users that are not only characterized by the hitting property of the link formation but also can be formed and co-located close to the limits of all deployed cells. For the rest of the paper we will refer to that ’hot’ area of a cell as Region of Interest (RoI). Therefore, the previously depicted probability can give a good estimate of the minimum bound of D2D pairs that need to be balanced. This paper is organized as follows: in Section II, we detail previous related research on load balancing as well as resource allocation in cellular networks. In Section III, we present the system model for the D2D edged users followed by an optimization framework to balance the network load with respect to the RB availability for D2D links. In Section IV, a set of numerical investigations is presented providing the analysis that results from the optimization solvers. Lastly, we IEEE ICC 2015 - Next Generation Networking Symposium 5442
  • 4. conclude with overall remarks and future work in Section V. II. PREVIOUS RELATED WORK In cellular networks, the most widely applied techniques for load balancing were based on the concept of borrowing chan- nels from neighbouring sparsely loaded cells such as channel borrowing without locking [6] and selective borrowing-based offloading [7] method. More recent techniques focus on the concept of traffic offloading, including cell-breathing algo- rithms (aiming to enhance system performance jointly with scheduling techniques [8]), mobile-assisted call admission (’hot’ to ’cold’ cells traffic transfer [9]) and overlaying ad-hoc relays integrated in cellular networks as described in [10]. It is noticed that the available schemes cannot be directly ap- plied to traffic offloading in LTE-A Heterogeneous Networks (HetNets), since the major target here is to balance traffic load among multi-tier cells, which differ primarily in terms of physical size, maximum transmit power and so on. On that frontier, Ye et al. [11] propose a wide set of innovative user association techniques to succeed load balancing in HetNets through a number of optimization problems (which entail to be NP-hard) and their related relaxations in the form of distributed algorithms to obtain a near-optimal solution via biasing. The latter is proven to be an efficient but at the same time difficult method to be applied in real-time traffic scenarios for multi-tier heterogeneous wireless ecosystems. Compared with previous works, D2D communication-based load balancing techniques have the following unique features: a) D2D communications are regulated by the service-provider, including the transmission power of end users and frequency resources, b) underlaying D2D communications deploy the same frequency resources as cellular transmissions for im- proved spectrum efficiency [12]. Therefore, the arising levels of interference due to possible RB reuse need to be mitigated and still remains a critical challenge. This paper’s approach is based on the assumption that Frac- tional Frequency Reuse (FFR) [13] is applied to restrict the inter-cell interference cases developed among the distributed users, as already specified and studied in [14]. This means that cell-edge users will be allocated specific resources from a pool depending on the respective BS to serve them. Literature concerning the in-system D2D edge-pair formation and need for load balancing among the newcoming users with respect to the competition for utilizing the available spectrum is almost non-existent and is the subject of interest in this work. III. SYSTEM MODEL AND SCENARIOS The under investigation D2D communication links are lo- cated close to the edge of the deployed cells and supposedly their nodes belong to a different serving geographical area, therefore are initially associated with different BSs before forming the candidate D2D pair (fig. 3a). We assume that the overall signalling overhead can be reduced by providing association of each link to a single BS, aiming to avoid any BS intercommunication and cooperation to exchange information. This approach corresponds to a more realistic D2D data/forwarding plane D2D control plane (a) (b) Coordination between BSs BS1 BS2 BS1 BS2 Fig. 3. Different scenarios when nodes of a D2D link are located on cell edge and communication with two BSs is possible. networking system as it is easier to be implemented compared to multi-BS association of the users. Also, in this way, inter- BS asynchronous coordination and control inefficiency can be avoided [15]. Assuming that our topology consists of seven hexagonal cells and the total number of D2D edge users is ND2D, the delay and overhead simplification implies pairwise association with a single BS for each constructed D2D pair and a signalling saving of ND2D 2 cooperative flows among competing BSs, thus alleviating the need for signalling exchange equal to the number of D2D users. Thereinafter, cell- edge paired D2D users that are located in different serving areas are assumed to be regulated by a single BS, without any signalling coordination between the two BS candidates, as depicted in figure 3b. In our scenario, we assume a set of base stations B and a set of D2D links L. Each BS b ∈ B has a pool of remaining RBs Kb. Let us define by clb the cost of device-to-device link l connected to BS b, this can be considered as the average cost of connecting both nodes of a D2D link at the same BS and can be represented as follows: PLb,ni = 36.7log10rb,ni + 40.9 + 26log10(fc/5) (3) clb = PLb,n1 + PLb,n2 2 (4) where link l consists of nodes n1 and n2, rb,ni and PLb,ni are the distance (in meters) and path-loss (in dB) between BS b and ni for i = 1, 2, respectively, and fc is the carrier frequency expressed in GHz. The aforementioned path-loss expression concerns urban modelling as declared in ITU-R report in [16]. Herein, fast fading impairments are not taken into consideration. In order to view the problem of BS association and mini- mization of the overall cost via a mathematical programming setting, the following binary variable is defined: ylb = 1, if link l connected to BS b 0, otherwise. (5) IEEE ICC 2015 - Next Generation Networking Symposium 5443
  • 5. Based on the above, the minimum cost D2D link association to BS can be formulated as follows: min l∈L b∈B clbylb (6) s.t. b∈Bl ylb = 1, ∀l ∈ L (6a) l∈L ylb ≤ Kb, ∀b ∈ B (6b) ylb ∈ {0, 1}, ∀l ∈ L, ∀b ∈ B (6c) where Bl is the set of candidate competing BSs to be asso- ciated with the link l. Sub-equation 6a stands for the BSs competency constraint, whereas 6b represents the capacity constraint (in terms of available resources) for each BS. The aforementioned optimization problem is an Integer Program- ming (IP) problem that due to the unimodular property of its inequality matrix (determinant of every square sub-matrix equals to 1) can be solved in an efficient manner, since it would have the complexity of a linear program. Additionally, in many cases it is desirable to provide some form of load balancing between serving BSs in order to distribute the connectivity and management of the D2D links in less loaded cells so as to avoid traffic congestion and the need for RB reuse that could lead to increased interference levels among users. This problem can be formulated accordingly as follows: min b∈B l∈L ylb 2 (7) s.t. b∈Bl ylb = 1, ∀l ∈ L (7a) l∈L ylb ≤ Kb, ∀b ∈ B (7b) ylb ∈ {0, 1}, ∀l ∈ L, ∀b ∈ B. (7c) Note that the above is a non-linear integer optimization pro- gram which is not suitable to be solved via powerful available toolboxes on linear integer mathematical programming. How- ever, the problem can be re-formulated as a linear problem if viewed as a max-min optimization problem which can be described as shown below: max z (8) s.t. z ≤ l∈L ylb, ∀b ∈ B (8a) b∈Bl ylb = 1, ∀l ∈ L (8b) l∈L ylb ≤ Kb, ∀b ∈ B (8c) ylb ∈ {0, 1}, ∀l ∈ L, ∀b ∈ B. (8d) Another way to look into the BS association would be to consider the current load level of the different candidate BSs as well as the congestion level on the fronthaul since it might be the case that D2D communication will not only incur signalling cost but also data. Therefore, if we define by Ub the utilization level of BS b (which might include the utilization level of the fronthaul) then we might be interested to provide load balancing by taking also into account the utilization levels of the BSs. Such an approach can be realized by solving the following mathematical program: min b∈B Ub − l∈L ylb 2 (9) s.t. b∈Bl ylb = 1, ∀l ∈ L (9a) l∈L ylb ≤ Kb, ∀b ∈ B (9b) ylb ∈ {0, 1}, ∀l ∈ L, ∀b ∈ B. (9c) Note again that the above formulation is a non-linear integer programming problem. In a similar manner as described before, this optimization problem can be linearized as follows: max z (10) s.t. z ≤ Ub − l∈L ylb, ∀b ∈ B (10a) b∈Bl ylb = 1, ∀l ∈ L (10b) l∈L ylb ≤ Kb, ∀b ∈ B (10c) ylb ∈ {0, 1}, ∀l ∈ L, ∀b ∈ B. (10d) A. Joint connectivity cost & RB reuse optimization In this subsection, we further empower the cost minimiza- tion setting in 6, by extending the objective with the prospect of also minimizing the overall RB reuse levels. A proper RB allocation on top of a cost-efficient method for D2D connectivity could potentially entail in a reduction of the aggregate co-channel interference due to the avoidance of over-utilizing the same available resources, i.e resource blocks. Therefore, we would like to provide cell association and RB allocation so that we also minimize the reuse of resource blocks which are currently allocated based on the FFR method. To do so, we define the following decision variable: τbr = 1, if RB r of BS b is used 0, otherwise. (11) We also define with ρbr an index which captures how many times a RB r is used by base station b. Based on the above definitions, we formulate the following optimization problem which provides optimal D2D cell association and minimizes the reuse of resource blocks in the network: min l∈L b∈B clbylb ; b∈B r∈R τbrρbr (12) IEEE ICC 2015 - Next Generation Networking Symposium 5444
  • 6. s.t. b∈Bl ylb = 1, ∀l ∈ L (12a) l∈L ylb ≤ Kb, ∀b ∈ B (12b) r∈R τbr ≤ Kb, ∀b ∈ B (12c) r∈R τbr ≥ l∈L ylb, ∀b ∈ B (12d) ylb, τbr ∈ {0, 1}, ∀l ∈ L, ∀b ∈ B, ∀r ∈ R. (12e) In this setting, the objective functions are conflicting (i.e. cost and RB reuse varying values, respectively), hence there exists multiple number of Pareto optimal solutions. Additionally, we note that constraints (12d) are logically redundant. These constraints are implied by (12c), but are used to reduce the search effort and run-time (i.e. reducing further the search space). IV. NUMERICAL INVESTIGATIONS In this section, a set of numerical investigations is detailed which shed light on the efficacy of the aforementioned opti- mization schemes to provide reliable BS association and load balancing performance when active communication is taking place between any constructed pair of D2D nodes within the network. A main assumption for the applicability of these problems is the existing occupation of some RBs from D2Ds that are currently being served while the newcoming and under consideration pairs will have to select from the available remaining resource pool Kb of each serving BS b ∈ B to satisfy their communication needs. Furthermore, we presume, without loss of generality, that the D2D users are uniformly distributed in the network and can be sharing the same RB with more than one users from neighbouring cells as considered also in [14]. The simulation parameters are shown in Table I. We compare the performance of the cost minimization programming problem stated in 6 with a cost-based heuristic method. The greedy heuristic allocates one RB to each D2D pair by associating each pair to the BS that provides the best channel conditions to it, without taking into consider- ation the total occupancy of the network but only looking into not violating the RB availability of the respective cell. The algorithm runs in a centralized manner by sequentially assigning RBs to the involved users and when the resource buffer of the related BS to serve is full, the transmission needs of the respective users is satisfied from the competing BS candidate. The cost minimization difference is expected to be somehow low for the two compared techniques since the objective for mitigating the overall cost and achieving an efficient RB assignment combination is implemented in a similar way. Figure 4 highlights this slight differentiation and reveals the increasing mean gain/reduction proportionally with the increase of utilization levels and traffic congestion in relation to the remaining RBs to be occupied. This proves that the cost minimization IP formulation performs better in con- gested scenarios. In other words, the gains are achieved when really needed, i.e. in congested epochs which are envisioned TABLE I SIMULATION PARAMETERS Parameter Value D2D user distribution Uniform Region of interest (RoI) Cell-edge Number of cells (Nc) 7 Cell radius (d) 400 m Minimum distance for RoI consideration 300 m Path-loss (PL) model [16] Carrier frequency (fc) 2 GHz System bandwidth (BW) 10 MHz Number of D2D pair hits (ND2D) [85, 160] D2D link range (ln1,n2 ) [20, 100] m Max number of available RBs per RoI 40 to be of frequent occurrence due to the exponential growth of user emergence in current and future networks. The results are normalized for ease of comprehension and are depicted for different levels of congestion. For these simulations highly utilized BSs were assumed as for low congestion scenarios the two compared methods have similar outputs. The highest cost minimization gain is met on the most bottlenecked case (congestion level > 90%) in a percentage of almost 3.15%. The aforementioned notable but also small gain is the reason we enhance the cost minimization problem by introducing an additive sub-objective to efficiently control the unassigned users that need to be orchestrated. As implied in problem 12, this programming solver looks into allocating lightly used RBs of the candidate BS to the unallocated D2D links given that all involved BSs are active and highly utilized. Furthermore, due to the limited RB availability and the huge number of users, it can be easily conceivable that several resources will be over-utilized. To this direction, we apply this solver to high congestion instances where the resources are reused within the network. Figure 5 proves that for different traffic cases and occupancy of the network, this setting achieves better performance compared with an average utilization agnostic method that assigns resources randomly picked from the available pool of RBs. On the other hand, the worst case would be to assign users to satisfy their transmission needs by using the over-utilized resources. As depicted, the optimal case of utilizing the less used RBs outperforms the worst case and average utilization agnostic case in a percentage of 45% and almost 22% over-utilization avoidance gain, respectively. Similar behaviour is observed for more congested instances (> 70%) where the achieved gain remains significant. In regard to the problem of load balancing within the deployed topology from the perspective of D2D users, we compare the performance of the proposed load balancing IP frame (problems 7,8) with two heuristic algorithms. The first one, namely the cost-based heuristic (CbH), was described afore in the cost minimization problem. The second greedy heuristic is a load-based heuristic (LbH). LbH bases its allo- cation rationale on looking into the current load of the network and each cell-edge’s capacity in order to assign resources to the less loaded between competing cells. The latter theoret- IEEE ICC 2015 - Next Generation Networking Symposium 5445
  • 7. [70, 80) % [80, 90) % [90, 100) % 0.9 0.92 0.94 0.96 0.98 1 Overall congestion level Normalizedcostcomparison Cost−based Heuristic Cost minimization IP solution Fig. 4. Normalized cost comparison for cost minimization IP solver and Cost-based Heuristic (CbH) algorithm for high congestion levels. ( > 60 % ) ( > 70 % ) ( > 80 % ) 0 0.2 0.4 0.6 0.8 1 1.2 Network congestion levels Normalizedover−utilizationavoidance Optimal case Avg. utilization agnostic case Worst case Fig. 5. Normalized utilization balancing comparison for optimal allocation of RBs. ically works better in the case of relatively balanced cells but because of its dependency to load fluctuation scenarios (varying RB availability) can be slightly weakened compared to the former in initially load imbalanced cases. Also, it is obvious that the LbH method outperforms the CbH when the objective is to balance the load of the deployed cells. Figure 6 shows a statistical significance and supremacy of the proposed optimization problems compared to both CbH and LbH algorithms for a sample of ten different deployment scenarios. The results derived from a round of independent simulations and for this sampled cases the standard deviation σ of the CbH and the LbH methods is almost 3.5 and 2.7 times bigger, respectively, compared to the LB-IP solution. This signifies less spread and more balanced assignment of the available RBs to the newcoming D2D users by using the optimization framework. The least observed deviation of 1 2 3 4 5 6 7 8 9 10 0 1 2 3 4 5 6 Scenario sampling (10 out of 1000 Monte Carlo simulations) Standarddeviation(SD)ofRBallocation LB−IP solution Load−based heuristic algorithm Cost−based heuristic algorithm Fig. 6. Simulation instances of Load Balancing (LB) optimization solver, Load-based (LbH) and Cost-based heuristic (CbH) algorithmic solutions. the LB-IP solution to those algorithms (scenario 4 in fig. 6) is characterized by a highly restricted scenario where the distribution of users is very similar for all cells and the number of available RBs is limited and close to the number of edge D2D pairs. In this case, 7% and 13.6% standard deviation percentage differentiation characterizes the result of CbH and LbH respectively compared to the optimal solution. A study was conducted for varying number of D2D cell- edge links (bounded accordingly as defined in figure 2 of subsection I-A for a total number of formed D2D pairs) where the mean standard deviation is the metric for the results shown in figure 7. This figure reveals the consistency of the proposed optimization problem as a solver for both light and more congested ecosystems where the availability of resources is more likely to become constrained by the uprising number of users. The IP solution outperforms in terms of mean standard deviation the LbH as well as the CbH load balancing algorithms in a percentage of almost 44% and more than 53% difference respectively, as depicted below. The increasing tendency of the LB-IP solution can be justified by the fact that, while retaining the constrained Kb capacity values, some of the newcoming D2Ds might fully utilize the available resources on a specific cell; therefore, the remaining unassigned D2D links should be coupled with the related BS that has available resources. This entails in increasing association variance for increased number of users. Despite the random deployment of D2D links for different cases, the results highlight the performance gain of the LB-IP solver per case. In addition, after running the LB-IP solution a large number of iterations by retaining the same number of randomly distributed D2Ds (115 users for each instance) but for different deployment scenarios, the average elapsed time was estimated on 0.2517 seconds and could converge at least one order of magnitude faster by using hardware accelerating techniques to improve its time-running performance. Finally, a set of results is presented for problems 9, 10 by IEEE ICC 2015 - Next Generation Networking Symposium 5446
  • 8. 90 100 110 120 130 140 150 160 1 1.5 2 2.5 3 3.5 4 Total number of D2D hits Meanstandarddeviation LB−IP LbH CbH Fig. 7. Mean standard deviation estimations for Load Balancing (LB-IP) solver, Load-based (LbH) and Cost-based heuristic (CbH). 90 100 110 120 130 140 150 160 1 1.5 2 2.5 3 3.5 4 4.5 5 Total number of D2D hits MeanstandarddeviationconsideringUC LB−IP LbH CbH Fig. 8. Mean standard deviation estimations based on different BSs’ utilization cases (UC) for Load Balancing (LB-IP) solver, LbH and CbH. including and examining the effect of the utilization level Ub of each cell. The results depicted in figure 8 were produced for randomly generated utilization levels for each BS with- out violating any resource constraint. The evaluation of the included load balancing schemes is likewise compared to the figure above and the differences are mainly arithmetic and incidental due to the randomness of the parameter values for different scenarios and the involvement of the Ub limitations. The optimal recorded mean standard deviation values differ in a percentage of close to 50.5% and 55.3% compared to LbH and CbH algorithmic outputs, respectively. V. CONCLUSIONS In this paper, a set of integer linear programs has been detailed aiming to optimize the performance of network- supported D2D communications in emerging small cell wire- less networks. As illustrated in the numerical investigations, the proposed schemes can efficiently balance the traffic load related to D2D link support across the deployed set of BSs and achieve significant cost avoidance gains, especially in con- gested network episodes. We further detailed an efficient way to apply cell association and RB assignment for FFR-based, highly utilized deployment scenarios. As a future step, the proposed framework can be extended to support load balancing of D2D links in a distributed manner and, by considering also the effects of node mobility within the communication pair, to reduce latency, signalling load as well as provide self- organizing mechanisms to manage the load imbalance and resource allocation. ACKNOWLEDGMENTS This work is funded by the European Commission Frame- work Programme 7 Marie Curie Initial Training Networks (ITN) CROSSFIRE project (FP7-PEOPLE-317126). REFERENCES [1] CISCO, “Global Mobile Data Traffic Forecast Update, 2014-2019,” in Cisco White Paper, February 2015. [2] T. Ihalainen, P. Janis, Z. Li, M. Moisio, V. Nurmela, M. Uusitalo, C. Wijting, and O. Yilmaz, “Flexible scalable solutions for dense small cell networks,” in Wireless World Research Forum (WWRF), April 2013. [3] 3GPP TR 36.843, “Technical Specification Group Radio Access Net- work; Study on LTE device to device proximity services”, March 2014. [4] K. Doppler, M. Rinne, C. Wijting, C.B. Ribeiro, K. Hugl “Device-to- Device communication as an underlay to LTE-Advanced networks,” in IEEE Communications Magazine, vol. 47, no. 12, pp. 42–49, Dec. 2009. [5] G. Wood and J. Robertson, “Buffon got it straight,” Statistics & Probability Letters, vol. 37, no. 4, pp. 415 – 421, March 1998. [6] H. Jiang and S. Rappaport Stephen, “CBWL: A new channel assignment and sharing method for cellular communication systems,” IEEE Trans- actions on Vehicular Technology, vol. 43, no. 2, pp. 313–322, May 1994. [7] S. Das, S. Sen, and R. Jayaram, “A dynamic load balancing strategy for channel assignment using selective borrowing in cellular mobile environment,” Wireless Networks, vol. 3, no. 5, 1997. [8] S. Das, H. Viswanathan, and G. Rittenhouse, “Dynamic load balanc- ing through coordinated scheduling in packet data systems,” in 22nd Annual Joint Conference of the IEEE Computer and Communications, INFOCOM, vol. 1, March 2003, pp. 786–796. [9] X. Wu, B. Mukherjee, and S.-H. Chan, “MACA-an efficient channel allocation scheme in cellular networks,” in IEEE GLOBECOM, vol. 3, November 2000, pp. 1385–1389. [10] H. Wu, C. Qiao, S. De, and O. Tonguz, “Integrated cellular and ad- hoc relaying systems: iCAR,” IEEE Journal on Selected Areas in Communications, vol. 19, no. 10, pp. 2105–2115, October 2001. [11] Q. Ye, B. Rong, Y. Chen, M. Al-Shalash, C. Caramanis, and J. An- drews, “User association for load balancing in heterogeneous cellular networks,” IEEE Transactions on Wireless Communications, vol. 12, no. 6, pp. 2706–2716, June 2013. [12] J. Liu, Y. Kawamoto, H. Nishiyama, N. Kato, and N. Kadowaki, “Device-to-Device communications achieve efficient load balancing in LTE-Advanced networks,” IEEE Wireless Communications, vol. 21, no. 2, pp. 57–65, April 2014. [13] T. Novlan, J. Andrews, I. Sohn, R. Ganti, and A. Ghosh, “Compari- son of fractional frequency reuse approaches in the OFDMA cellular downlink,” in IEEE GLOBECOM, December 2010, pp. 1–5. [14] H. S. Chae, J. Gu, B.-G. Choi, and M. Chung, “Radio resource allocation scheme for Device-to-Device communication in cellular networks using fractional frequency reuse,” in 17th IEEE Asia-Pacific Conference on Communications (APCC), October 2011, pp. 58–62. [15] O. Yilmaz, Z. Li, K. Valkealahti, M. Uusitalo, M. Moisio, P. Lunden, and C. Wijting, “Smart Mobility Management for D2D Communications in 5G Networks,” in IEEE Wireless Communications and Networking Conference Workshops (WCNCW), April 2014, pp. 219–223. [16] ITU-R M.2135 : ”Guidelines for evaluation of radio interface technolo- gies for IMT-Advanced”, 2008. IEEE ICC 2015 - Next Generation Networking Symposium 5447View publication statsView publication stats