TY - GEN
T1 - A priority-based access control model for device-to-device communications underlaying cellular network using network calculus
AU - Huang, Jun
AU - Xiong, Zi
AU - Li, Jibi
AU - Chen, Qianbin
AU - Duan, Qiang
AU - Zhao, Yanxiao
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2014.
PY - 2014
Y1 - 2014
N2 - Device-to-Device (D2D) communication has been proposed as a beneficial complement for cellular networks. Access control for D2D communications underlaying cellular network, however, has not received attention yet. In this paper, we investigate the access control for cellular and D2D communications in a single cell setting. We propose a prioritybased model to characterize access control of both cellular and D2D users. The proposed model prioritizes the cellular communications, cellular mode D2D communications, and reuse mode D2D communications with different priority levels. We then apply Network Calculus theory to analyze the worst-case performance for access control, including service rate, delay, and backlog for processing service requests of cellular and D2D communications. Both of the theoretical analysis and the numerical results verify that the proposed model is valid and applicable to characterize the access control for D2D underlaying cellular network.
AB - Device-to-Device (D2D) communication has been proposed as a beneficial complement for cellular networks. Access control for D2D communications underlaying cellular network, however, has not received attention yet. In this paper, we investigate the access control for cellular and D2D communications in a single cell setting. We propose a prioritybased model to characterize access control of both cellular and D2D users. The proposed model prioritizes the cellular communications, cellular mode D2D communications, and reuse mode D2D communications with different priority levels. We then apply Network Calculus theory to analyze the worst-case performance for access control, including service rate, delay, and backlog for processing service requests of cellular and D2D communications. Both of the theoretical analysis and the numerical results verify that the proposed model is valid and applicable to characterize the access control for D2D underlaying cellular network.
UR - http://www.scopus.com/inward/record.url?scp=84919326951&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84919326951&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-07782-6_55
DO - 10.1007/978-3-319-07782-6_55
M3 - Conference contribution
AN - SCOPUS:84919326951
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 613
EP - 623
BT - Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings
A2 - Cai, Zhipeng
A2 - Wang, Chaokun
A2 - Cheng, Siyao
A2 - Wang, Hongzhi
A2 - Gao, Hong
PB - Springer Verlag
T2 - 9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014
Y2 - 23 June 2014 through 25 June 2014
ER -