Skip to main content

A Priority-Based Access Control Model for Device-to-Device Communications Underlaying Cellular Network Using Network Calculus

  • Conference paper
Wireless Algorithms, Systems, and Applications (WASA 2014)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8491))

Abstract

Device-to-Device (D2D) communication has been proposed as a beneficial complement for cellular networks. Access control for D2D communications underlaying cellular network, however, has not received attention yet. In this paper, we investigate the access control for cellular and D2D communications in a single cell setting. We propose a priority-based model to characterize access control of both cellular and D2D users. The proposed model prioritizes the cellular communications, cellular mode D2D communications, and reuse mode D2D communications with different priority levels. We then apply Network Calculus theory to analyze the worst-case performance for access control, including service rate, delay, and backlog for processing service requests of cellular and D2D communications. Both of the theoretical analysis and the numerical results verify that the proposed model is valid and applicable to characterize the access control for D2D underlaying cellular network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Fodor, G., Dahlman, E., Mildh, G., Parkvall, S., Reider, N., Miklos, G., Turanyi, Z.: Design aspects of network assisted device-to-device communications. IEEE Communications Magazine 50, 170–177 (2012)

    Article  Google Scholar 

  2. Doppler, K., Rinne, M., Wijting, C., Ribeiro, C., Hugl, K.: Device-to-device communication as an underlay to lte-advanced networks. IEEE Communications Magazine 47, 42–49 (2009)

    Article  Google Scholar 

  3. Fodor, G., Della Penda, D., Belleschi, M., Johansson, M., Abrardo, A.: A comparative study of power control approaches for device-to-device communications. In: 2013 IEEE International Conference on Communications (ICC), pp. 6008–6013 (June 2013)

    Google Scholar 

  4. Phunchongharn, P., Hossain, E., Kim, D.: Resource allocation for device-to-device communications underlaying lte-advanced networks. IEEE Wireless Communications 20, 91–100 (2013)

    Article  Google Scholar 

  5. Xu, C., Song, L., Han, Z., Zhao, Q., Wang, X., Cheng, X., Jiao, B.: Efficiency resource allocation for device-to-device underlay communication systems: A reverse iterative combinatorial auction based approach. IEEE Journal on Selected Areas in Communications 31, 348–358 (2013)

    Article  Google Scholar 

  6. Pei, Y., Liang, Y.-C.: Resource allocation for device-to-device communications overlaying two-way cellular networks. IEEE Transactions on Wireless Communications 12, 3611–3621 (2013)

    Article  Google Scholar 

  7. Chang, C.-S.: Stability, queue length, and delay of deterministic and stochastic queueing networks. IEEE Transactions on Automatic Control 39(5), 913–931 (1994)

    Article  MATH  Google Scholar 

  8. Cruz, R.: A calculus for network delay. i. network elements in isolation. IEEE Transactions on Information Theory 37(1), 114–131 (1991)

    Article  MATH  MathSciNet  Google Scholar 

  9. Cruz, R.: A calculus for network delay, part ii: Network analysis. IEEE Transactions on Information Theory 37(1), 132–144 (1991)

    Article  MATH  MathSciNet  Google Scholar 

  10. Agrawal, R., Cruz, R.L., Okino, C., Rajan, R.: Performance bonds for flow control protocols. IEEE/ACM Trans. Netw. 7(3), 310–323 (1999)

    Article  Google Scholar 

  11. Jiang, Y., Liu, Y.: Stochastic network calculus. Springer, London (2008)

    MATH  Google Scholar 

  12. Le Boudec, J.-Y., Thiran, P.: Network Calculus. LNCS, vol. 2050. Springer, Heidelberg (2001)

    Book  MATH  Google Scholar 

  13. Le Boudec, J.-Y.: Application of network calculus to guaranteed service networks. IEEE Transactions on Information Theory 44(3), 1087–1096 (1998)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Huang, J., Xiong, Z., Li, J., Chen, Q., Duan, Q., Zhao, Y. (2014). A Priority-Based Access Control Model for Device-to-Device Communications Underlaying Cellular Network Using Network Calculus. In: Cai, Z., Wang, C., Cheng, S., Wang, H., Gao, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2014. Lecture Notes in Computer Science, vol 8491. Springer, Cham. https://doi.org/10.1007/978-3-319-07782-6_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-07782-6_55

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-07781-9

  • Online ISBN: 978-3-319-07782-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics