Emergency Communications Based on Throughput-Aware D2D Multicasting in 5G Public Safety Networks
Abstract
:1. Introduction
2. D2D Emergency Communications Mechanism
2.1. Application of D2D in PSN
- T-DU (Transmit-UE): T-DU is a cluster head of a D2D cluster. As the transmitting end of D2D multicasting, it is responsible for forwarding the HPN/RRU signals to the receiving users.
- AT-DU (Alternative Transmit-UE): AT-DU can be used as the T-DU for D2D multicasting. After selecting the T-DU, the rest of the AT-DU receives the information as the receiving users.
- R-DU (Receive-UE): As a receiving user, R-DU receive signals transmitted by T-DU.
- CU (Cellular UE): The users directly covered by the HPN/RRU, which transmit uplink and downlink data through the HPN/RRU.
2.2. The Process of D2D Emergency Communications
3. System Model and Problem Model
3.1. Variable Declaration
3.2. Channel Model
3.2.1. HPN to UE
3.2.2. UE to UE
3.3. SINR and Data Rate
3.4. Problem Model
3.4.1. Emergency Communications Based on Throughput-Aware D2D Multicasting
3.4.2. Cluster Head Selection Problem
- MaxRE: There are two ways to select T-DU. The first is to maximize the remaining battery electricity scheme (MaxRE). It selects the T-DU according to the terminal power, slowing down the power consumption of PSN. The other one is to maximize the extended UE number scheme (MaxUN). It selects the T-DU on the number of expandable UEs:
- MaxUN: The goal of this method is to extend active UEs in outage. A step function is introduced when counting the number of users, where , = 1; else, = 0. If Uj is not within a HPN’s coverage but in AT-DUi, Uj is an extended UE of AT-DUi. All users are counted to get the value of UN(AT-DUi). In addition, the AT-DU with the largest number of extended users is selected as the current T-DU:
3.4.3. Resource Allocation Problem
4. Algorithm Design and Application
4.1. Distance-Based AT-DU Clustering Method
- Step1: The information of all users is processed. In addition, 30% edge users are added to the search domain eU.
- Step2: When eU is not empty, the farthest node Ua is selected. Add all UEs in the maximum service radius of node Ua to the temporary collection Temp. The UEs in Temp are arranged in ascending order according to the distance to Ua. When Temp is empty, Ua can be a finished cluster Cu. If Temp is not empty, go to Step3.
- Step3: Initialize Ua’s cluster Cu={Ua}. Traverse the elements of Temp in order. Ui is an arbitrary element in Cu. If d(Ui , Ub)< , Ub is added into Cu, and Cu=Cu∪Ub.
- Step4: The current Cu is an AT-DU set and stored into Ca. After that, all the nodes in Cu are moved out of the search domain eU back to the Step2 loop until the search field eU is empty. Finally, output the total AT-DU set Ca.
Algorithm 1: Distance-based AT-DU clustering method | |
Input | U:The location information of UEs |
HPN: The location information of HPNs | |
eU: The set of edge UEs (Search domain) | |
Output | Cu: Current alternative cluster head set |
Ca: AT-DU set including some Cu sets | |
Step1 1 | Calculate eU←{ni|i=1…n} |
Step2 2 | While eU≠∅ do |
3 | Ua=find max(d(eU,HPN) ) |
4 | Temp ← find(d(Ua,Ub)<) |
5 | Sort(Temp), Cu={Ua} |
6 | If Temp=∅, go to Step4 |
7 | If Temp≠∅, go to Step3 |
Step3 8 | for i=1…| Temp | |
9 | Ub = Temp(i) |
10 | If d(Ui, Ub)<, Cu=Cu∪Ub |
11 | end for |
Step4 12 | eU=eU-Cu |
13 | End while |
4.2. Application of the Hungarian Algorithm
4.2.1. Structure Bipartite Graph
4.2.2. Bipartite Transformation
- NC = α*NK, α∈Z+. The number of CU is a positive integer multiple of the D2D clusters. At this point, it is necessary to expand the vertices number NK to α*NK. This means that (α-1)*NK virtual cluster vertices are added as shown in Figure 4a.
- NC = α*NK+β, α, β∈N+. The number of CU is not a positive integer multiple of the D2D clusters. It is needed to expand the cluster vertices number NK to (α+1)*NK. This means that α*NK virtual cluster vertices are added. The number of {C} is extended to NC+NK-β. This means that NK-β virtual CU vertices are added as Figure 4b.
4.2.3. Hungarian Algorithm
- Step1: An efficiency matrix or is generated based on the expanded bipartite graph. In order to facilitate the calculation, NT records the number of both rows and columns of the matrix. Then, . Matrix update times t = 0, Ht = H.
- Step2: is found as the minimum value of each row of the matrix Ht. In addition, we use to get a new matrix . Then, is found as the minimum value of each column of the matrix H’. In addition, a new matrix is created by . Matrix update times t = t + 1, Ht = H’’.
- Step3: NL is the number of the least horizontal or vertical lines that is used to cover all = 0 in Ht. If NL < NT, go to step4. Otherwise, go to Step5.
- Step4: Find the minimum value which is not covered by horizontal and vertical lines in . Subtract the minimum value from each line that is not covered to get a new matrix H’. In addition, the minimum value is added to each column covered to obtain a new matrix H’’. Matrix update times t = t + 1, Ht = H’’. Then, return to Step3.
- Step5: The matrix Ht obtained at this time is the final change result. It is needed to choose the optimal allocation result from Ht. The hij = 0 is marked with a row or column with the least 0 in the matrix Ht. In addition, all 0 elements of this row or column are removed. It continues to mark the remaining elements until NT zeros are marked. At this point, the marked position is recorded as 1, and the remaining positions are recorded as 0. The result is the best matching matrix M. Finally, the virtual channel in M and the node connected to it are deleted to obtain the optimal channel allocation matrix Δ.
Algorithm 2: Channel assignment based on Hungarian algorithm | |
Input | C: cellular user set |
D: D2D cluster set | |
H: Efficiency matrix | |
Output | M: Best matching matrix (0-1) |
Δ: Channel allocation matrix (0-1) | |
Step1 1 | t=0, H(T, i, j)= hij; |
Step2 2 | for i=1, α*NK |
3 | r_min=min(H(i,:)); H_1(i,j)= hij -r_min; |
4 | end for |
5 | for j=1, α*NK |
6 | c_min=min(H_1(:, j)); H_2(i, j)= H_1(i, j)- c_min; |
7 | end for |
8 | T=T+1, H(T, i, j) =H_2(i, j); |
9 | NL=0, r_line=0, c_line=0 |
Step3 10 | for i=1, α*NK |
11 | r_zero=find (H(i,:)==0); |
12 | end for |
13 | for j=1, α*NK |
14 | c_ zero=find (H(:,j)==0); |
15 | end for |
16 | Subgraph G(r_G, c_G) cover all 0 elements |
17 | NL= r_G+c_G; |
18 | If NL<NT go to Step4 |
19 | If NL=NT go to Step5 |
Step4 20 | Subgraph K=H-G, Min_value= min(K(i, :)) |
21 | for i=1, α*NK |
22 | H_1(i,:)= H (i, :) - Min_value; |
23 | end for |
24 | for j=1, α*NK |
25 | H_2(:,j)= H_1(:, j)+Min_value; |
26 | end for |
27 | T=T+1, H(T, i, j) =H_2(i, j); |
Step5 28 | M=zeros(NT,NT), Number of marks Nm=0; |
29 | While Nm<NT do |
30 | Find the row or column with the least 0, H(a, b)=0; |
31 | Mark M(a, b)=1; |
32 | end while |
33 | Get M, Delete the virtual node to get Δ. |
5. Simulation and Analysis
5.1. Parameter Settings
5.2. Compensation Effect
- In terms of the overall trend, the D2D emergency measures have greatly improved the user active status in the network. There is no obvious difference between the MaxRE and MaxUN cluster head selection methods.
- As the number of users increases, the total number of active users changes significantly. The larger the number of system users, the greater the proportion of active users increased through D2D multicast communications. The proportion of UE in outage increases as the user density increases. More interrupted users can access the network through D2D.
- The growth rate of the T-DU is gradually decreasing. As the user density increases, the number of AT-DU increases. However, the T-DU will only choose one of them as the transmitter of D2D. The T-DU without AT-DU reduces. As a result, the proportion of the T-DU in the total users gradually increased from 10% (100 total users) to 19.75% (800 total users) and stabilized at around 20%. The change of active users is mainly due to the increase of R-DU.
- The total number of active users of MaxUN is slightly larger than that of MaxRE. The number of D2D receivers of the two schemes is similar. In addition, MaxUN has less T-DU. Thus, the increase of MaxUN’s total active users comes from the users who have not been covered.
5.3. Resource Reuse Algorithm Comparison
5.4. Results Summary
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Yin, M.J.; Li, W.J.; Feng, L.; Yu, P.; Qiu, X.S. Multi-cell cooperative outage compensation in cloud-RANs based 5G public safety network. IEEE Access 2017, 5, 17309–17321. [Google Scholar] [CrossRef]
- Yu, W.; Xu, H.; Nguyen, J.; Blasch, E.; Hematian, A.; Gao, W. Survey of public safety communications: User-side and network-side solutions and future directions. IEEE Access 2018, 6, 70397–70425. [Google Scholar] [CrossRef]
- Peng, M.G.; Wang, C.G.; Lau, V.; Poor, H.V. Fronthaul-constrained cloud radio access networks: Insights and challenges. IEEE Wirel. Commun. 2015, 22, 152–160. [Google Scholar] [CrossRef] [Green Version]
- Peng, M.G.; Zhang, K.C.; Jing, J.M.; Wang, J.H.; Wang, W.B.A. Energy-efficient resource allocation for adaptive modulated mimo–ofdm heterogeneous cloud radio access networks. Wirel. Pers. Commun. 2017, 95, 4847–4866. [Google Scholar]
- Li, W.J.; Yin, M.J.; Yu, P.; Xiang, N. A cell outage compensation mechanism based on joint optimization of power and tilt. J. Electron. Inf. Technol. 2015, 37, 1207–1213. [Google Scholar]
- Yin, M.J.; Li, W.J.; Yu, P.; Feng, L.; Qiu, X.S. Self-healing based on cooperative transmission via bender’s decomposition in cloud radio access network. China Commun. 2015, 12, 1–10. [Google Scholar]
- Zhao, G.; Chen, S.; Zhao, L.; Hanzo, L. Joint energy-spectral-efficiency optimization of CoMP and BS deployment in dense large-scale cellular networks. IEEE Trans. Wirel. Commun. 2017, 16, 4832–4847. [Google Scholar] [CrossRef]
- Virdis, A.; Vallati, C.; Nardini, G.; Tanganelli, G.; Stea, G.; Mingozzi, E. D2D communications for large-scale fog platforms: Enabling direct M2M interactions. IEEE Veh. Technol. Mag. 2018, 13, 24–33. [Google Scholar] [CrossRef]
- Ahmed, E.; Yaqoob, I.; Gani, A.; Imran, M.; Guizani, M. Social-aware resource allocation and optimization for D2D communications. IEEE Wirel. Commun. 2017, 24, 122–129. [Google Scholar] [CrossRef]
- Alnoman, A.; Anpalagan, A. On D2D communications for public safety applications. In Proceedings of the 2017 Canada IEEE Humanitarian Technology Conference, Toronto, ON, Canada, 21–22 July 2017; pp. 124–127. [Google Scholar]
- Tang, H.; Ding, Z. Mixed mode transmission and resource allocation for D2D communications. IEEE Trans. Wirel. Commun. 2016, 1, 162–175. [Google Scholar] [CrossRef]
- Lee, J.; Lee, J.H. Performance analysis and resource allocation for cooperative D2D communications in cellular networks with multiple D2D Pairs. IEEE Commun. Lett. 2019, 23, 909–912. [Google Scholar] [CrossRef]
- Li, X.; Zhang, W.; Zhang, H.; Li, W. Mathematical characteristics analysis of uplink interference region in D2D communications underlaying cellular networks. In Proceedings of the 2015 7th International Conference on Ubiquitous and Future Networks, Sapporo, Japan, 7–10 July 2015; pp. 557–561. [Google Scholar]
- Melki, L.; Najeh, S.; Besbes, H. Radio resource allocation scheme for intra-inter-cell D2D communications in LTE-A. In Proceedings of the 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications, Hong Kong, China, 30 August–2 September 2015; pp. 1515–1519. [Google Scholar]
- Yaacoub, E.; Kubbar, O. Energy-efficient device-to-device communications in LTE public safety networks. In Proceedings of the IEEE Globecom Workshops, Anaheim, CA, USA, 3–7 December 2012; pp. 391–395. [Google Scholar]
- Yaacoub, E. Cooperative energy efficient D2D clustering in LTE-A with enhanced QoS. Telecommun. Syst. 2018, 9, 1–14. [Google Scholar] [CrossRef]
- She, C.Y.; Yang, C.Y. Energy efficiency-QoS relation and its application in wireless networks. Sci. Sin. Inf. 2017, 47, 607–619. [Google Scholar]
- Zhang, H.B.; Zou, J.; Liu, K.J. Cluster-based resourse allocation mechanism for Femtocell network. J. Commun. 2017, 1, 16–25. [Google Scholar]
- Favraud, R.; Apostolaras, A.; Nikaein, N.; Korakis, T. Toward moving public safety networks. IEEE Commun. Mag. 2016, 54, 14–20. [Google Scholar] [CrossRef]
- Bhardwaj, A.; Agnihotri, S. A resource allocation scheme for multiple device-to-device multicasts in cellular networks. In Proceedings of the IEEE Wireless Communications and Networking Conference, Doha, Qatar, 3–6 April 2016; pp. 1–6. [Google Scholar]
- Ali, K.; Nguyen, H.X.; Shah, P.; Vien, Q.T.; Bhuvanasundaram, N. Architecture for public safety network using D2D communications. In Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, Doha, Qatar, 3–6 April 2016; pp. 206–211. [Google Scholar]
- Li., Y.; Zhang, Z.; Wang, W. Concurrent transmission based stackelberg game for D2D communications in mmWave networks. In Proceedings of the IEEE International Conference on Communications, Paris, France, 21–25 May 2017; pp. 1–6. [Google Scholar]
- Kim, H.; Jo, J.; Park, C.; Ahn, S.; Chin, H.; Park, P.; Kim, Y. Dynamic resource scheduling algorithm for public safety network. In Proceedings of the UKSim-AMSS 20th International Conference on Computer Modelling and Simulation, Cambridge, UK, 27–29 March 2018; pp. 127–132. [Google Scholar]
- Propagation Data and Prediction Methods for the Planning of Short-Range Outdoor Radio Communications Systems and Radio Local Area Networks in the Frequency Range 300 MHz to 100 GHz; International Telecommunication Union: Geneva, Switzerland, 2015; ITU-R Report P.1411-6.
- Technical Specification Group Services and System Aspects; Study on Architecture Enhancements to Support Proximity-Based Services (ProSe) (Release 12); 3rd Generation Partnership Project (3GPP): Nice, France, 2016; Technical Report 23.703.
- Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); LTE Physical Layer; General Description (Release 13); 3rd Generation Partnership Project (3GPP): Nice, France, 2009; Technical Report 36.201.
- Chewi, S.; Yang, F.; Ghosh, A.; Parekh, A.; Ramchandran, K. Matching observations to distributions: Efficient estimation via sparsified hungarian algorithm. In Proceedings of the 57th Annual Allerton Conference on Communications, Control, and Computing, Monticello, IL, USA, 24–27 September 2019; pp. 368–375. [Google Scholar]
- Vu, D.; Dao, N.; Cho, S. Downlink sum-rate optimization leveraging Hungarian method in fog radio access networks. In Proceedings of the International Conference on Information Networking, Chiang Mai, Thailand, 10–12 January 2018; pp. 56–60. [Google Scholar]
- Doan, K.N.; Doan, T.V.; Shin, H.; Quek, T.Q.S. Socially-aware caching in wireless networks with random D2D communications. IEEE Access 2019, 7, 58394–58406. [Google Scholar] [CrossRef]
- Gu, J.; Bae, S.J.; Hasan, S.F.; Chung, M.Y. Heuristic algorithm for proportional fair scheduling in D2D-cellular systems. IEEE Trans. Wirel. Commun. 2016, 15, 769–780. [Google Scholar] [CrossRef]
Variable | Notation |
---|---|
Hk | The No. k High-Power Node (HPN). |
Ui | The No. i user equipment (UE). |
The transmit power of node x. | |
The received power of node y from x. | |
dx,y | The distance between x and y. |
Maximum distance for Device-to-device (D2D). | |
The channel gain from Hk to Uj. | |
The channel gain from Ui to Uj. | |
Cun | The No. n cluster head partitioning set. |
Environment | Suburban | Urban | Dense Urban or High-Rise |
---|---|---|---|
CM | −12.28 dB | 0 dB | 3 dB |
Lurban | 0 dB | 6.8 dB | 2.3 dB |
Parameter | Value |
---|---|
The transmit power of HPN | 46 dBm |
The number of HPN K0 | 9 |
The number of active HPN NK | 4 |
The number of simulated users NI | 100–1000 |
Carrier frequency | 2.6 GHz |
HPN antenna effective height | 45 m |
UE antenna effective height | 1.5 m |
CM | 3 dB |
Lurban | 2.3 dB |
Lfading | 7 dB |
Receive power threshold of UE Pth | −105 dBm |
The transmit power of UE | 0–200 mw |
102 m–180 m | |
SINR threshold of UE and HPN γth | 6 dB |
White Gaussian Noise | −154 dBm |
Power ratio for communications | 50% |
UE battery capacity | 2000 mAh |
Basic UE power consumption | 80 mW |
Minimum communications power of UE | 200 mAh |
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yin, M.; Li, W.; Feng, L.; Yu, P.; Qiu, X. Emergency Communications Based on Throughput-Aware D2D Multicasting in 5G Public Safety Networks. Sensors 2020, 20, 1901. https://doi.org/10.3390/s20071901
Yin M, Li W, Feng L, Yu P, Qiu X. Emergency Communications Based on Throughput-Aware D2D Multicasting in 5G Public Safety Networks. Sensors. 2020; 20(7):1901. https://doi.org/10.3390/s20071901
Chicago/Turabian StyleYin, Mengjun, Wenjing Li, Lei Feng, Peng Yu, and Xuesong Qiu. 2020. "Emergency Communications Based on Throughput-Aware D2D Multicasting in 5G Public Safety Networks" Sensors 20, no. 7: 1901. https://doi.org/10.3390/s20071901
APA StyleYin, M., Li, W., Feng, L., Yu, P., & Qiu, X. (2020). Emergency Communications Based on Throughput-Aware D2D Multicasting in 5G Public Safety Networks. Sensors, 20(7), 1901. https://doi.org/10.3390/s20071901