DOI QR코드

DOI QR Code

The Performance Analysis of Cognitive-based Overlay D2D Communication in 5G Networks

  • Abdullilah Alotaibi (King Saud University, Computer Engineering Dept.) ;
  • Salman A. AlQahtani (King Saud University, Computer Engineering Dept.)
  • Received : 2024.02.05
  • Published : 2024.02.29

Abstract

In the near future, it is expected that there will be billions of connected devices using fifth generation (5G) network services. The recently available base stations (BSs) need to mitigate their loads without changing and at the least monetary cost. The available spectrum resources are limited and need to be exploited in an efficient way to meet the ever-increasing demand for services. Device to Device communication (D2D) technology will likely help satisfy the rapidly increasing capacity and also effectively offload traffic from the BS by distributing the transmission between D2D users from one side and the cellular users and the BS from the other side. In this paper, we propose to apply D2D overlay communication with cognitive radio capability in 5G networks to exploit unused spectrum resources taking into account the dynamic spectrum access. The performance metrics; throughput and delay are formulated and analyzed for CSMA-based medium access control (MAC) protocol that utilizes a common control channel for device users to negotiate the data channel and address the contention between those users. Device users can exploit the cognitive radio to access the data channels concurrently in the common interference area. Estimating the achievable throughput and delay in D2D communication in 5G networks is not exploited in previous studies using cognitive radio with CSMA-based MAC protocol to address the contention. From performance analysis, applying cognitive radio capability in D2D communication and allocating a common control channel for device users effectively improve the total aggregated network throughput by more than 60% compared to the individual D2D throughput without adding harmful interference to cellular network users. This approach can also reduce the delay.

Keywords

References

  1. T. Turinawe and I. Mukonyezi, "DEVICE TO DEVICE COMMUNICATION IN 5G TECHNOLOGY," no. August, 2017.
  2. O. Nait Hamoud, T. Kenaza, and Y. Challal, "Security in device-to-device communications: a survey," IET Networks, vol. 7, no. 1, pp. 14-22, 2018. https://doi.org/10.1049/iet-net.2017.0119
  3. N. Panwar, S. Sharma, and A. K. Singh, "A survey on 5G: The next generation of mobile communication," Phys. Commun., vol. 18, pp. 64-84, 2016. https://doi.org/10.1016/j.phycom.2015.10.006
  4. P. Gandotra and R. K. Jha, "Device-to-Device Communication in Cellular Networks: A Survey," J. Netw. Comput. Appl., vol. 71, no. 4, pp. 1801-1819, 2016.
  5. R. I. Ansari et al., "5G D2D Networks: Techniques, Challenges, and Future Prospects," IEEE Syst. J., vol. 12, no. 4, pp. 3970-3984, 2018. https://doi.org/10.1109/JSYST.2017.2773633
  6. U. N. Kar and D. K. Sanyal, "An overview of device-to-device communication in cellular networks," ICT Express, vol. 4, no. 4, pp. 203-208, 2018. https://doi.org/10.1016/j.icte.2017.08.002
  7. A. S. Khan, Y. Javed, J. Abdullah, J. M. Nazim, and N. Khan, "Security issues in 5G device to device communication," vol. 17, no. 5, pp. 366-375, 2017.
  8. V. Shrimali and A. Gaur, "A Review on Communication Infrastructures in 5G Cellular Networks," vol. II, no. Ii, pp. 94-98, 2015.
  9. A. Gupta, S. Member, R. K. Jha, and S. Member, "A survey of 5G network: Architecture and emerging technologies," IEEE access, vol. 3, 2015.
  10. C. H. Yu and O. Tirkkonen, "Device-to-device underlay cellular network based on rate splitting," IEEE Wirel. Commun. Netw. Conf. WCNC, pp. 262-266, 2012.
  11. Z. Liu, T. Peng, S. Xiang, and W. Wang, "Mode selection for Device-to-Device (D2D) communication under LTE-advanced networks," IEEE Int. Conf. Commun., pp. 5563-5567, 2012.
  12. K. Vanganuru, S. Ferrante, and G. Sternberg, "SYSTEM CAPACITY AND COVERAGE OF A CELLULAR NETWORK WITH D2D MOBILE RELAYS Outline.Background.D2D Mobile Relays.High Level Concepts.System Model.Performance Results.Conclusions," 2012.
  13. H. Cai, I. Koprulu, and N. B. Shroff, "Exploiting Double Opportunities for Latency-Constrained Content Propagation in Wireless Networks," IEEE/ACM Trans. Netw., vol. 24, no. 2, pp. 1025-1037, 2016. https://doi.org/10.1109/TNET.2015.2406573
  14. Y. Wu, W. Liu, S. Wang, W. Guo, and X. Chu, "Network coding in device-to-device (D2D) communications underlaying cellular networks," IEEE Int. Conf. Commun., vol. 2015-September, no. July, pp. 2072-2077, 2015.
  15. Y. Cao, T. Jiang, and C. Wang, "Cooperative device-to-device communications in cellular networks," IEEE Wirel. Commun., vol. 22, no. 3, pp. 124-129, 2015. https://doi.org/10.1109/MWC.2015.7143335
  16. A. H. Sakr and E. Hossain, "Cognitive and Energy Harvesting-Based D2D Communication in Cellular Networks: Stochastic Geometry Modeling and Analysis," IEEE Trans. Commun., vol. 63, no. 5, pp. 1867-1880, 2015. https://doi.org/10.1109/TCOMM.2015.2411266
  17. G. A. Shah and O. B. Akan, "Performance analysis of CSMA-based opportunistic medium access protocol in cognitive radio sensor networks," Ad Hoc Networks, vol. 15, pp. 4-13, 2014. https://doi.org/10.1016/j.adhoc.2013.03.014
  18. H. N. Abdulrazzak and A. A. Hussein, "Performance Analysis of CSMA/CA Based on D2D Communication," no. March, 2019.
  19. M. Wellens, J. Riihijarvi, and P. Mahonen, "Modelling primary system activity in dynamic spectrum access networks by aggregated ON/OFF-processes," 2009 6th IEEE Annu. Commun. Soc. Conf. Sensor, Mesh Ad Hoc Commun. Networks Work. SECON Work. 2009, 2009.
  20. F. F. Digham, M. S. Alouini, and M. K. Simon, "On the Energy Detection of Unknown Signals Over Fading Channels," Commun. IEEE Trans., vol. 55, no. 1, pp. 21-24, 2007. https://doi.org/10.1109/TCOMM.2006.887483
  21. W. Y. Lee and I. F. Akyildiz, "Optimal spectrum sensing framework for cognitive radio networks," IEEE Trans. Wirel. Commun., vol. 7, no. 10, pp. 3845-3857, 2008. https://doi.org/10.1109/T-WC.2008.070391
  22. M. Mi, "On the Capacity of p -Persistent CSMA," Int. J. Comput. Sci. Netw. Secur., vol. 7, no. 11, pp. 38-43, 2007.
  23. H. Zhao, E. Garcia-Palacios, J. Wei, and Y. Xi, "Accurate available bandwidth estimation in IEEE 802.11-based ad hoc networks," Comput. Commun., vol. 32, no. 6, pp. 1050-1057, 2009. https://doi.org/10.1016/j.comcom.2008.12.031
  24. J. D. C. Little, " A Proof for the Queuing Formula: L = λ W ," Oper. Res., vol. 9, no. 3, pp. 383-387, 1961. https://doi.org/10.1287/opre.9.3.383