Device To Device (D2D)
Device To Device (D2D)
communications
Zexian Li, Fernando Sanchez Moya, Gabor Fodor, Jose Mairton B. Da Silva Jr.,
and Konstantinos Koufos
5G Mobile and Wireless Communications Technology, ed. A. Osseiran, J. F. Monserrat, and P. Marsch.
Published by Cambridge University Press. © Cambridge University Press 2016.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
108 Zexian Li et al.
Relaying
Discovery (Range extension)
Further, direct D2D facilitates low-latency communication due to the local commu-
nication link between users in proximity. In fact, direct D2D has been seen as one of
the necessary features to support real-time services in the future 5G system [1][2].
Another important aspect is reliability, where an additional D2D link can be employed
to increase reliability through a larger extent of diversity. Moreover, due to the short-
distance transmission, the device power consumption can be reduced significantly.
Figure 5.1 illustrates typical use cases of D2D communication. A more detailed
discussion on different 5G use cases can be found in Chapter 2. Four D2D scenarios
are shown. The first one is about local data sharing where data caching in one device
can be shared with other devices in proximity. In the second scenario, called relaying,
D2D communication can play a key role to improve network availability (i.e. to extend
the coverage area) via a D2D based relay. This is especially important for the use cases
related to public safety and those including both indoor and outdoor users. The third
scenario, called single or multi-hop local proximity communication, is the one con-
sidered in the 3rd Generation Partnership Project (3GPP) Release 12. In this scenario,
the devices within proximity can set up a peer-to-peer link or multicast link that does
not use the cellular network infrastructure. One of the particular applications is the
public safety service. The last scenario is D2D discovery (considered in 3GPP Release
12 as well), which refers to a process that identifies whether a UE is in proximity of
another UE.
Considering D2D air interface design, it is usually assumed that the air interface for
D2D communication is derived from the cellular air interface in order to simplify the
design and implementation. For example in 3GPP Release 12, Single-Carrier Frequency
Division Multiple Access (SC-FDMA) based D2D signaling is employed for all data-
carrying physical channels, and the structure of the Physical Uplink Shared CHannel
(PUSCH), as defined in 3GPP, is re-used (with limited changes) for the D2D communica-
tion channel as well. Regarding spectrum usage, D2D can operate, depending on the
scenario, in licensed spectrum and/or unlicensed spectrum.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
D2D communications 109
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
110 Zexian Li et al.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
D2D communications 111
time
LTE resources
Figure 5.2 D2D resource pool.
scenario where the transmitter selects the resource by itself. At the receiving side, it is
not necessary to listen to the cellular control channels in order to find out where the D2D
data is located. Just based on the content of the D2D control channel, the receiving
devices can find out the right location of the relevant resources. As to the resource usage
for D2D communication, two different modes were specified:
• Mode 1: An eNode-B or relay node schedules the exact resources used by a UE to
transmit D2D data and D2D control information. Obviously, Mode 1 can be only
applied to the scenarios where the transmitting UEs are within network coverage.
• Mode 2: A UE by itself selects resources from the configured resource pools to
transmit D2D data and D2D control information. Mode 2 can be applied no matter
whether the transmitting UE has network coverage or not.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
112 Zexian Li et al.
The 3GPP RAN WGs specified further D2D enhancements in Release 13 as described in
[5]. These enhancements, for the public safety use cases, aimed to solve out-of-coverage
discovery, layer 3 based UE-to-network relays, enhancement of D2D communication to
support group priorities and group call functionality. However, these are different from the
challenges of 5G D2D that aims to address a wider range of use cases.
• Capacity/throughput gain: Because the involved devices are in close proximity with
potentially better propagation conditions comparing to the propagation conditions
toward the Base Station (BS), link throughput can be improved due to e.g. better
Modulation and Coding Scheme (MCS) level. In addition, there is the possibility of
sharing the same radio resources among cellular users and D2D users, which can
improve the overall spectrum usage. System capacity can be improved due to off-
loading and local content sharing gain from D2D communication.
• Latency gain: The End-to-End (E2E) latency may be reduced due to a short distance
with less propagation delay, and no involvement of infrastructure network entities
resulting in reduced transport delay and processing delay.
• Availability and reliability gain: D2D can be used to extend network coverage with
one hop or multi-hop. Network coding and cooperative diversity via D2D can be used
to enhance link quality as well. Furthermore, a D2D ad-hoc network can provide a fall
back solution in case of a failure of the infrastructure or in case the infrastructure
cannot be easily established.
• Enabling new services: Full-blown D2D has great potential to enable new services
and applications not only in the telecommunication area, but also in vertical industries,
as for example Vehicle-to-X (V2X) communication as discussed in Chapters 2 and 4.
The extension of D2D solutions for Vehicle-to-Vehicle (V2V) communication is part
of LTE Release 14.
However, as discussed in [6][7], fully utilizing potential D2D gains poses new challenges
in terms of device discovery, communication mode selection, co-existence, interference
management, efficient multi-hop communication support and multi-operator support
among others.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
D2D communications 113
regular cellular mode (i.e. via a BS). In direct D2D mode, the devices can take
advantage of their proximity and may reuse cellular resources for the direct
communication link. In cellular mode, the devices communicate through a com-
mon or separate serving BS by means of regular cellular links in orthogonal
resources with cellular users. How to select the most appropriate communication
mode in different scenarios is an important issue to be solved, as discussed in
Sections 5.2.3, 5.3.4 and 5.4.2.
• Co-existence and interference management: Considering co-existence and related
interference issues, at least two different aspects should be taken into account:
(1) co-existence among a large number of D2D links, and (2) co-existence among
D2D links and regular cellular links. Efficient schemes to handle the interference
are of importance in order to achieve the potential D2D benefits.
• Multi-operator or inter-operator D2D operation: Inter-operator D2D is a clear
requirement resulting from e.g. V2X communication, and supporting inter-opera-
tor D2D operation is essential for the 5G D2D concept. Without multi-operator
D2D support, the applicability of the future D2D solution to e.g. Cooperative
Intelligent Traffic Systems will be quite limited. Considering inter-operator D2D
operation, issues to be solved include, for example, spectrum usage and how to
control and coordinate UEs in D2D communication across multiple operators’
networks.
Clearly, the above bullets are only a subset of the challenges related to D2D operation. In
this chapter, the focus is on the challenges related to radio resource management with the
proposal of one example of a 5G RRM concept in Section 5.2 followed by multi-hop
D2D operation in Section 5.3. Finally, in Section 5.4, multi-operator D2D is addressed,
including discovery support, distributed mode selection and spectrum for multi-operator
D2D.
In this section, the key aspects related to D2D RRM both from a state of the art and
future research perspective are covered. The focus is on mobile broadband D2D
scenarios, i.e. scenarios with typically low mobility where offloading of the cellular
network, enhancement of system capacity and improvement of user experience in
terms of reduced latency and increased data rates play a dominant role [8]. The focus
will be on in-band underlay D2D, in which D2D communication uses the same
spectrum and resources as cellular communication.
The section is structured as follows. Firstly, a brief overview of RRM techniques for
mobile broadband D2D is presented. It is followed by some of the most significant RRM
and system design challenges to be solved in order to make D2D a native and efficient
technology in 5G systems. Finally, an example of a 5G RRM concept based on flexible
TDD is described and performance numbers illustrating the user experience are
provided.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
114 Zexian Li et al.
• Mode Selection (MoS): Several factors influence the MoS decision such as distance
between devices, path loss and shadowing, interference conditions, network load, etc.
and the time scale on which MoS should be operated. A MoS decision can be made
before or after D2D link establishment, while operating on a slow time scale, e.g. based
on distance or large-scale channel parameters [14]. Further, a MoS can be done on a faster
time scale [15][16], based on changing interference conditions coupled with the resource
allocation phase.
• Resource Allocation (ReA): ReA determines which particular time and frequency
resources should be assigned to each D2D pair and cellular link [9][17]. ReA algorithms
can be broadly classified according to the degree of network control, e.g. centralized
versus distributed, and the degree of coordination between cells, e.g. single-cell (unco-
ordinated) versus multi-cell (coordinated).
• Power Control (PC): In addition to MoS and ReA, PC is another key technique
to deal with the interference, both intra- and inter-cell, that results from underlay
D2D operation [18][19]. The focus is mostly on limiting the interference from
D2D to cellular transmission, in order to improve the overall system performance
while ensuring that the cellular user experience is not degraded. The applicability
of LTE power control mechanisms to efficiently support D2D, and optimizations
that rely on a practical distributed scheme, have been extensively studied in [20].
It is worth mentioning that the different algorithms do not rely on just one RRM
component or isolated technique, but normally combine several of them to achieve
better performance [19].
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
D2D communications 115
D2D from the onset. In Section 5.1.2, some of the general challenges to support D2D in
5G systems, with its broad scope of use cases and scenarios, were highlighted. The
focus here is to specifically address some of the fundamental RRM and system design
questions to be answered for an efficient support of mobile broadband D2D, for
instance:
• How valuable is the usage of D2D across multiple cells, and does this justify the
additional coordination and signaling burden introduced? Enabling inter-cell D2D
requires some kind of basic conflict prevention of RRM decisions between the serving
BSs of the devices involved in D2D communication, even if not targeting optimally
coordinated resource allocation. It could be the case that, in a half-duplex system (e.g.
a 5G system with flexible TDD optimized for dense scenarios), one BS schedules one
of its assigned D2D users for UL transmission (cellular mode selection) while
another BS schedules a direct D2D transmission toward the same user, violating the
half-duplex constraint. Solutions to prevent this issue may include: exchange of
scheduling information between BSs (or via a centralized coordination entity); pro-
tocol-level solutions that orchestrate the order of the transmissions; or simply dis-
abling inter-cell D2D, i.e. only allowing intra-cell D2D and routing the inter-cell D2D
traffic through the infrastructure to avoid the coordination burden.
• Does sophisticated D2D (e.g. fast joint MoS and ReA with flexible TDD) require
centralized radio resource management, or can this be done in a decentralized or
distributed manner? Apart from the multi-cell D2D aspect, it is possible to question
whether centralized RRM can bring substantial benefits to the challenging interfer-
ence conditions of D2D scenarios at a reasonable signaling and computational com-
plexity cost.
• How should MoS between D2D communication and device-infrastructure-device
(DID) be performed, and on which time scale should this be conducted? The possibility
to make use of fast, instantaneous SINR-based MoS against a simpler path-loss based
slow MoS will have a major impact on the protocol stack design. It is needed to carefully
evaluate the trade-off between achievable gains, complexity and signaling overhead.
• Is instantaneous Channel State Information (CSI) of all potentially interfering cellular
and D2D links needed for scheduling purposes, or is the statistical CSI knowledge
enough? In general, D2D communication requires information on the channel gain of
D2D pairs (i.e. the quality of the direct links), the channel gain among D2D pairs (i.e.
generated/received interference to/from other D2D pairs), the channel gain between
D2D transmitters and cellular UEs, and the channel gain between cellular transmitters
and D2D receivers, in addition to the CSI information of cellular-only systems. The
exchange of such extra channel information can become an intolerable overhead to the
system if instantaneous CSI feedback is needed.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
116 Zexian Li et al.
frame structure is presented and the joint multi-cell D2D and cellular resource alloca-
tion is explained for the case of centralized and decentralized schedulers. Afterward,
adequate mode selection schemes for D2D are analyzed. Finally, some performance
numbers showing the gains of D2D with flexible TDD over fixed TDD and centralized
over decentralized scheduling are provided. The performance and the implementation
implications of two MoS algorithms that operate on different time scales are also
compared.
Cell 1 Cell 2
BS1 BS2
UE4 UE5
UE1
Interference
UE2 D2D Signal
UE6
D2D UE3
Figure 5.3 Multi-cell D2D in the context of a flexible UL/DL/D2D air interface.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
D2D communications 117
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
118 Zexian Li et al.
• Direct D2D only: All D2D traffic is served through direct links between devices.
Reuse of resource blocks is allowed between cellular and D2D users.
• Indirect D2D only (Device-Infrastructure-Device, DID): All D2D traffic is routed
through the infrastructure. A D2D communication involves two hops, i.e. a UL
transmission and a subsequent DL transmission. No direct D2D is allowed.
• Path loss-based, slow mode selection: D2D traffic is routed through the infrastruc-
ture when the path loss toward the serving base station and a bias is lower than the path
loss of the corresponding direct D2D link. The bias favors direct D2D communication
over DID due to the inherent advantages of direct D2D. MoS is done before resource
allocation.
• Fast mode selection: D2D traffic is routed through the infrastructure or through the
corresponding direct D2D link depending on the comparison of estimated SINR
conditions between the link that connects the D2D UE to the infrastructure and the
direct D2D link. This calculation is done per scheduling slot based on the interference
conditions in the previous slot. The SINR of direct links is increased by a certain bias
in dBs to favor direct D2D decisions. MoS is made jointly with resource allocation.
More details can be found in [24], which is an extension and more rigorous imple-
mentation of the scheme introduced in [7].
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
D2D communications 119
0.99
0.98
0.97
0.96
0.95
CDF
0.94
0.93
Decentralized flexible UL/DL/D2D
0.92
Centralized flexible UL/DL/D2D
0.91 Decentralized fixed UL/DL/D2D
0.9
0 0.2 0.4 0.6 0.8 1
Packet segment serving delay [s]
Figure 5.4 Overall (including UL, DL and D2D traffic) packet delays for decentralized fixed and flexible
TDD and centralized flexible TDD.
of its global knowledge and coordinated decisions, improving fairness and worst-case
user experience.
The maximum allowed range of D2D links is now extended from 4 m to 8 m (with
10 m × 10 m cells) and mode selection is enabled. The results are shown in Figure 5.5,
that presents an overview of the compromise reached between cellular and D2D delay
performance for the different MoS variants described in Section 5.2.3.3. The vertical
axis averages the values of UL and DL packet segment serving delay at both 95th and
50th percentile. Proximity to the origin of coordinates means overall improved latency
experience, with the possibility to balance out cellular and D2D delays or to give priority
to one specific kind of traffic by applying different biases. The decentralized variants (in
grey) perform better for median delay values whereas the centralized ones (in black)
improve the delay experience at the 95th percentile. In general, fast MoS is able to
reduce the D2D delay (by around 20%), while keeping similar cellular delay values as
for the path loss-based MoS. The results in Figure 5.5 and in [24] show that fast MoS can
indeed bring gains in the form of a reduced 95th percentile packet delay for D2D
transmissions, without sacrificing cellular performance, but it should ideally be done
in conjunction with coordinated RRM across cells. Furthermore, the aforementioned
gains are on an order that requires careful consideration whether performing D2D MoS
on MAC layer is justified, with the associated likely larger burden in terms of signaling
overhead and complexity.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
120 Zexian Li et al.
95th
percentile
0.3
Cellular packet segment delay [s]
0.25
0.2
Decentralized path loss-based MoS
0.15 Centralized path loss-based MoS
50th Decentralized fast MoS
percentile
Centralized fast MoS
0.1 Decentralized direct D2D
Centralized direct D2D
0.05 Decentralized indirect D2D
Centralized indirect D2D
0
0 0.1 0.2 0.3 0.4 0.5
D2D packet segment delay [s]
Figure 5.5 Cellular vs. D2D packet segment delay for different MoS variants.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
D2D communications 121
5.3.1 National security and public safety requirements in 3GPP and METIS
NSPS and PPDR scenarios pose a number of specific requirements that are not
typically found in traditional cellular communications. One of the key requirements
is robustness and ability to communicate irrespective of the presence or absence of a
fixed infrastructure. In many cases, there is at least partial cellular coverage in a
geographical area affected by a disaster or emergency situation, which can be
exploited for communication. Although some of these scenarios can be addressed
by temporary truck-mounted BSs moved into the disaster area, support for proximal
or direct D2D communication – to maintain connectivity among rescue personnel or
between officers and people in need – remains a critical requirement for NSPS
systems [25][26]. Broadband group communication is an example of a requirement
typically not supported or deployed in practice in traditional cellular systems; for
example, when a dispatcher needs to address multiple officers working in an emer-
gency situation, possibly outside network coverage. Figure 5.6 illustrates some of the
use cases that must be supported by the combination and integration of cellular and
D2D technologies.
As illustrated in Figure 5.6, in NSPS and PPDR situations, the rescue personnel,
including officers with public safety UEs, must be able to communicate in situations
in which the cellular BS may provide only partial network coverage. According to
the 3GPP requirements [25], such scenarios include proximity services discovery,
proximity services traffic initiation, UE with multiple traffic sessions, and proximity
services relay. Proximity service discovery is the scenario where a given UE
Public Safety
Officer A moves into the discovery Licensed
proximity of Officer C beacons Spectrum
Officer B
and Officer B
Officer A
communicates with
Officer B and Officer
C concurrently.
Officer A
Officer A
Officer C
Officer B Officer C
Officer C’s UE is not within transmission
range of Officer A’s UE
Officer B
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
122 Zexian Li et al.
discovers one or more other UEs and the given UE can be with or without network
coverage. Proximity services traffic initiation refers to the use case where a public
safety UE initiates one-to-one direct user traffic with another UE. UE with multiple
traffic sessions means that a given public safety UE can concurrently maintain
one-to-one user traffic sessions with several other UEs. With proximity services
relay, it is meant that a given UE can act as proximity communication relay for one or
more UEs.
An important aspect of these scenarios and requirements is the inherent support for in-
coverage, out-of-coverage and partially in-coverage services and specifically the
requirement that local (proximal) communication services must be maintained in the
absence or partial availability of the cellular infrastructure.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
D2D communications 123
Route 1
R-1
D2D Tx
Route 2 R-1
Route 3
R-4
D2D Tx
D2D Rx Range D2D Rx
Extension
R-3
D2D Tx
Figure 5.7 Single and multi-hop routes partially under network coverage [29], reproduced with permission
(Lic. no. 3664040827123).
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
124 Zexian Li et al.
1 1 1
¼ þ ð5:1Þ
Geq GTxRe GReRx
The intuition of defining the equivalent channel according to the above is that the
equivalent channel gain tends to be high only when both composite channels are high;
this makes it an appropriate single measure for mode selection purposes. A pseudo-code
of a heuristic mode selection algorithm based on the equivalent channel is given by
Algorithm 1 below, where the channels are needed from the D2D Tx to the BS ðGTxBS Þ
and to the D2D Rx ðGTxRx Þ:
algorithm 1 Harmonic Mode Selection (HMS) for Proximity Communication
1: if Geq ≥ maxfGTxRx; GTxBS g then
2: Choose D2D two-hop communications
3: else if GTxRx ≥ GTxBS then
4: Choose D2D single-hop communications
5: else
6: Choose cellular mode, that is D2D Tx and Rx communication through the BS.
7: end if
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
D2D communications 125
1 1 1
¼ þ ð5:2Þ
Geq GTxRe GReBs
This makes it possible to use the following modified version of the Harmonic Mode
Selection (HMS) algorithm:
algorithm 2 Harmonic Mode Selection (HMS) for Range Extension
1: if Geq ≥ GTxBS then
2: Choose D2D relay-assisted communication
3: else
4: Choose cellular mode that is D2D Tx transmits directly to the BS.
5: end if
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
126 Zexian Li et al.
50
(5.6, 45.27)
Average throughput [Mbps] 45
40
(0.3, 35.03)
35
(0.41, 33.84)
Fix
30
25 OL
90% energy saving
with UM ω = 100
20 UM ω = 0.1
15 UM ω = 100
(0.03, 13.65)
10
0 1 2 3 4 5 6
Average power consumption [W]
Figure 5.8 The impact of power control on the power consumption–throughput trade-off in the range
extension scenario.
200
(25.29, 191.17)
Average throughput [Mbps]
More than
180 50% throughput
(20, 165.21)
increase
with UM ω = 0.1
160
Fix
(20, 138.06)
140 OL
UM ω = 0.1
120
(20, 112.78) UM ω = 100
100
19 20 21 22 23 24 25 26
Average power consumption [W]
Figure 5.9 The impact of utility maximizing power control on the fundamental trade-off between power
consumption and throughput in the Proximity Communications scenario.
cell radius of 500 m. The D2D users are randomly dropped in the coverage area of a cell
such that their distance is between 75 m and 125 m. There are 18 uplink physical RBs in
each cell. The other parameters of this system are given in [29]. Further, in this system,
D2D communications are supported in UL physical resource blocks using the Harmonic
Mode Selection algorithm detailed in Section 5.3.4.
Figure 5.8 is a scatter plot for the range extension scenario. The fixed power level of
the “Fix” power control scheme is set such that its performance becomes similar to
that of the “OL” scheme. Note that (x, y) near each symbol shows the x-axis (power
consumption in W) and y-axis (throughput in Mbps) values. Compared with the
traditional OL power control, utility maximizing power control (UM with ω = 100)
reduces overall power consumption at the expense of reducing system throughput. For
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
D2D communications 127
UM ω = 0.1, the utility maximization power control algorithm reaches the highest
average throughput, with a gain of approximately 34% over LTE OL power control.
However, this gain comes at the expense of transmitting at much higher power levels.
In contrast, with ω = 100, utility maximizing power control minimizes power con-
sumption at the expense of reducing the achieved throughput. Clearly, utility max-
imizing PC can reach high throughput when using low values of ω and can transmit at
low power levels with high values of ω.
Figure 5.9 is a scatter plot for the proximity communication scenario. Similarly to
Figure 5.8, with UM ω = 0.1 the average throughput gain is large (approximately 69%)
over the LTE OL scheme, at the cost of using approximately 26% more power. Notice
that in Figure 5.9 the average power consumption includes the power consumption of the
BS. However, with UM ω = 100 the average throughput gain is approximately 20%
using similar transmit power levels as LTE OL. UM ω = 100 boosts the average
throughput at the expense of a small increase in the transmit power level. If the power
consumption must be kept at low values with reasonable throughput values, utility
maximization with higher ω values or using the LTE OL power control technique is a
good design choice.
The business potential of commercial D2D would be rather limited if direct commu-
nication between devices subscribed to different cellular operators is not supported.
Inter-operator D2D support is also needed to meet the requirements resulting from D2D-
relevant scenarios, e.g. vehicle-to-vehicle communications [7]. In general, D2D support
in inter-operator scenarios becomes more complex as compared to single-operator D2D.
For instance, operators may not be willing to share operator-specific information, e.g.
network loads, utility functions, between each other or with external parties to identify
how much spectrum to allocate for inter-operator D2D communication. In this section,
inter-operator D2D discovery, mode selection, and spectrum allocation schemes are
discussed. Further, single-hop unicast D2D is considered.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
128 Zexian Li et al.
D2D registration of UE #A
UE#A inter-operator D2D discovery authorization process between UE #A, MME#A and
MODS
(both from the home operator and the other operators) based on the broadcasted
information from its home operator. MODS is a new logical network entity which
could be co-located with certain network elements within an operator’s network or
running independently, e.g. as a network service provided by a 3rd party. Example
functionalities of MODS can include D2D subscription management, network access
control, centralized security and radio resource management functions and so on. The
broadcasted key parameters from the home operator include, for example, radio resource
information related to different operators such as operator identifiers and the correspond-
ing operating frequency bands to facilitate inter-operator discovery. UE#A will listen to
both the home and the other operator’s resources to detect the presence of discovery
messages.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
D2D communications 129
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
130 Zexian Li et al.
Shared Band
Figure 5.11 Spectrum divisions for two operators supporting inter-operator D2D communication.
allocates fractions βic and βid for cellular and intra-operator D2D communication
respectively.
When more than two operators are involved in spectrum sharing, it is possible to
realize inter-operator D2D communication based on bilateral agreements between
operators, or alternatively, all operators may commit some of their spectral resources
in a common spectrum pool, see also Chapter 12 for a detailed description of inter-
operator spectrum sharing based on mutual renting and spectrum pooling. The operators
should negotiate the amount of resources they want to commit, but they should not be
forced to take action. However, once the operators agree to share spectrum for some time
and commit certain resources for multi-operator D2D, they are not allowed to break the
agreement. The duration of the agreement should be set in advance and may depend on
the expected network traffic dynamics.
In general, operators are competitors and they may not want to reveal proprietary
information, e.g. utility functions, and network load. Ideally, the negotiations about
spectrum allocation for multi-operator D2D should be completed without exchanging
proprietary information. One possible way to do that is to model the operators as
selfish players, and use a non-cooperative game theoretical approach. For instance, an
operator can make a proposal about the amount of spectral resources it is willing to
contribute, taking into consideration its own reward and the proposals made by the
competitors. All operators can update their proposals based on the proposals submitted
by the competitors until consensus is reached. This kind of updating procedure is also
known as best response iteration and it is a common method to identify the Nash
equilibrium of a one-shot non-cooperative game [33].
In a non-cooperative game, one of the most important aspects is the existence and
uniqueness of a Nash equilibrium. A situation where there are multiple equilibrium
points may be undesirable because the realized equilibrium will depend on the selection
order and the initial proposals of the operators. As a result, it is important to note that
operators may be interested to share spectrum only if a unique Nash equilibrium exists.
For the time being, the spectrum allocation algorithm does not support coupled con-
straints between the operators. In that case, there may exist infinite normalized equili-
brium points [34]. Hence, some sort of extensive information exchange between the
operators might be needed to obtain an efficient equilibrium.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
D2D communications 131
Operator checks
concavity and
diagonal
dominance
Concave and
diagonal dominant
NO
YES
Optimize Optimize
considering considering Convergence
YES
Figure 5.12 Best response iteration algorithm for spectrum allocation in multi-operator D2D communication.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
132 Zexian Li et al.
2
Operator 2
1.9 Operator 1
1.8
1.7
1.6
Gain
1.5
1.4
1.3
1.2
1.1
0 20 40 60 80 100
Inter-operator D2D user density (#users/km2)
Figure 5.13 Performance gain in terms of average user rate for two operators as compared to the case without
multi-operator D2D support.
scheme described in Section 5.4.3.1, it can be shown that the utilities as well as the
constraint are concave [36]. Besides, in a spectrum-sharing scenario between two
operators, the dominance solvability condition holds always true irrespective of the
user densities [36].
The network is modeled for each operator using a Voronoi tesselation2 with an
average inter-site distance of 100 m. Full-buffer traffic model is assumed, with the user
density directly related to the network load. The densities of cellular and inter-operator
D2D users is 30 users/km2 (per operator) to model a scenario where the densities of the
users are comparable to the densities of BSs. The density of intra-operator D2D users is
30 users/km2 for Operator 1 and it varies for Operator 2 to model asymmetric network
loads between the operators. A 3GPP propagation environment is used with Rayleigh
fading [37]. The average D2D link distance is 30 m. The MoS threshold is fixed to -72
dBm both for inter-operator and intra-operator D2D users. The decision threshold
impacts the density of users selecting a D2D communication mode. A performance
evaluation with other threshold values is available in [36]. The baseline scheme for
comparison is not supporting multi-operator D2D communication. In that scheme, all
inter-operator D2D traffic is routed toward the cellular infrastructure.
In Figure 5.13, the performance gain is shown in terms of average user rate for both
operators. When both operators have an equal network load, they both experience
2
The base stations are distributed uniformly and each point of the plane is associated with the nearest base
station.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
D2D communications 133
1
No sharing
0.9 Spectrum sharing
0.8
0.7
0.6
CDF
0.5
0.4
0.3
0.2
0.1
0
0 0.5 1 1.5 2 2.5 3
Multi-operator D2D user rate [bps]
Figure 5.14 Rate distribution for multi-operator D2D users with and without multi-operator D2D support.
around 50% performance gain. The gains for both operators become high when the
network load of Operator 2 becomes low. In that case, Operator 2 is able to contribute
a high amount of spectral resources for multi-operator D2D support, and both
operators can enjoy performance gains close to 100% due to spectrum sharing and
D2D proximity.
Figure 5.14 depicts the rate distribution for multi-operator D2D users, where sym-
metric operators are assumed. Without spectrum sharing, all inter-operator D2D traffic is
routed to the cellular infrastructure and the achievable D2D user rate is low. One can see
that multi-operator D2D support can boost the median D2D user data rate by up to a
factor of 4. Hence, multi-operator D2D support is required in order to harvest the
business potential of D2D communications, e.g. in the context of vehicular commu-
nication for traffic efficiency and safety.
5.5 Conclusions
It is envisioned that integrated D2D communication will play a more important role in
the future 5G system thanks to the promising benefits on both network and end-user
sides, contributing to traffic offloading, very high throughput, significantly reduced
latency and low power consumption. In addition, D2D has the potential to increase
communication availability and reliability, and provide additional diversity. From a
service and application perspective, D2D possesses the capability of enabling a number
of new applications such as V2V and machine-type communications. Finally, in order to
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
134 Zexian Li et al.
capitalize on the full benefits of a system with native support of D2D operation, it is
needed to address in the coming years additional challenges related to for example
mobility management (exemplary solutions can be found in Chapter 11) and security.
References
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
D2D communications 135
[14] N. Reider and G. Fodor, “A distributed power control and mode selection algo-
rithm for D2D communications,” EURASIP Journal on Wireless Communications
and Networking, vol. 2012, no. 1, December 2012.
[15] S. Hakola, Tao Chen, J. Lehtomaki, and T. Koskela, “Device-To-Device (D2D)
communication in cellular network: Performance analysis of optimum and prac-
tical communication mode selection,” in IEEE Wireless Communications and
Networking Conference, Sydney, April 2010.
[16] K. Doppler, C.H. Yu, C. Ribeiro, and P. Janis, “Mode selection for device-to-
device communication underlaying an LTE-Advanced network,” in IEEE Wireless
Communications and Networking Conference, Sydney, April 2010.
[17] G. Fodor and N. Reider, “A distributed power control scheme for cellular network
assisted D2D communications,” in IEEE Global Telecommunications Conference,
Houston, December 2011.
[18] C.H. Yu, O. Tirkkonen, K. Doppler, and C. Ribeiro, “Power optimization of
device-to-device communication underlaying cellular communication,” in IEEE
International Conference on Communications, Dresden, June 2009.
[19] H. Xing and S. Hakola, “The investigation of power control schemes for a device-to-
device communication integrated into OFDMA cellular system,” in IEEE
International Symposium on Personal Indoor and Mobile Radio Communications,
Istanbul, September 2010, pp. 1775–1780.
[20] G. Fodor, M. Belleschi, D. D. Penda, A. Pradini, M. Johansson, and A. Abrardo,
“A comparative study of power control approaches for D2D communications,” in
IEEE International Conference on Communications, Budapest, June 2013.
[21] P. Mogensen et al., “5G small cell optimized radio design,” in IEEE Global
Telecommunications Conference Workshops, Atlanta, December 2013, pp. 111–116.
[22] E. Lahetkangas, K. Pajukoski, J. Vihriala, and E. Tiirola, “On the flexible 5G dense
deployment air interface for mobile broadband,” in International Conference on
5G for Ubiquitous Connectivity, Levi, November 2014, pp. 57–61.
[23] V. Venkatasubramanian, F. Sanchez Moya, and K. Pawlak, “Centralized and
decentralized multi-cell D2D resource allocation using flexible UL/DL TDD,” in
IEEE Wireless Communications and Networking Conference Workshops, New
Orleans, March 2015.
[24] F. Sanchez Moya, V. Venkatasubramanian, P. Marsch, and A. Yaver, “D2D mode
selection and resource allocation with flexible UL/DL TDD for 5G deployments,”
in IEEE International Conference on Communications Workshops, London, June
2015.
[25] 3GPP TR 22.803, “Feasibility study for Proximity Services (ProSe),” Technical
Report TR 22.803 V12.2.0, Technical Specification Group Radio Access Network,
June 2013.
[26] G. Fodor et al., “Device-to-sevice communications for national security and public
safety,” IEEE Access, vol. 2, pp. 1510–1520, January 2015.
[27] Z. Li, “Performance analysis of network assisted neighbor discovery algorithms,”
School Elect. Eng., Royal Inst. Technol., Stockholm, Sweden, Tech. Rep. XR–EE-
RT 2012:026, 2012.
[28] Y. Zhou, “Performance evaluation of a weighted clustering algorithm in NSPS
scenarios,” School Elect. Eng., Roy. Inst. Technol., Stockholm, Sweden, Tech.
Rep. XR-EE-RT 2013:011, January 2014.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006
136 Zexian Li et al.
Downloaded from http:/www.cambridge.org/core. New York University Libraries, on 16 Dec 2016 at 15:17:03, subject to the Cambridge Core terms of use, available at
http:/www.cambridge.org/core/terms. http://dx.doi.org/10.1017/CBO9781316417744.006