16
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and Admission Control for Device-to-Device Cellular Coexisting Networks Hao Lu, Yichen Wang, Member, IEEE, Yan Chen, Senior Member, IEEE, and K. J. Ray Liu, Fellow, IEEE Abstract—Device-to-device (D2D) communication is proposed as a vital technique to enhance system capacity in cellular net- works, which requires efficient interference modeling and man- agements to improve spectral efficiency. In practice, even when two wireless connections share the same resources, the interference between them may not always exist if there is no conflict at packet- level transmissions. To explore the real effect of interference, in this paper, we establish a cross-layer model for D2D communi- cations underlaying cellular network and derive the closed-form stable throughput region. Then, we formulate an optimization problem to obtain the maximal achievable packet rate for cellular link, which determines whether the D2D pair can share the same resources with a specific cellular link. By dividing the original opti- mization problem into several simplified subproblems, the optimal solution can be calculated with low complexity. Subsequently, our model is extended to a generalized scenario where multiple D2D pairs share the same resources with one cellular link. Due to the complexity of obtaining closed-form expressions on sta- ble throughput regions, we propose an algorithm to determine whether the transmissions of the cellular link and the multi- ple D2D pairs can satisfy the QoS requirements simultaneously. Furthermore, a low-complexity dynamic admission control strat- egy is introduced to deal with the admission process for new D2D requests. As a consequence, the cellular spectrum can allow access of many more D2D pairs than what the conventional model can. The significant improvements are verified by numeral simulations. Manuscript received April 20, 2015; revised August 3, 2015 and October 27, 2015; accepted December 4, 2015. Date of publication December 22, 2015; date of current version April 7, 2016. This work was supported in part by the National High-Tech Research and Development Plan of China (863 Program) under Grant No. 2014AA01A706, the National Natural Science Foundation of China (NSFC) under Grant No. 61401348 and 61431011, the Postdoctoral Science Foundation of China under Grant No. 2014M550493, and the Fundamental Research Funds for the Central Universities. This paper was presented in part at the IEEE Global Conference on Signal and Information Processing, Orlando, FL, USA, December 2015. This work was done while H. Lu, Y. Wang, and Y. Chen were at the University of Maryland, College Park, MD. The associate editor coordinating the review of this paper and approving it for publication was W. Saad. H. Lu is with the Key Laboratory of Wireless-Optical Communications, Chinese Academy of Sciences, School of Information Science and Technology, University of Science and Technology of China, Hefei 230026, China. He was also with the Department of Electrical and Computer Engineering, University of Maryland, College Park, MD 20742 USA (e-mail: [email protected]). Y. Wang was with the Department of Electrical and Computer Engineering, University of Maryland, College Park, MD 20742 USA. He is now with the Department of Information and Communications Engineering, School of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an 710049, China (e-mail: [email protected]). Y. Chen was with the Department of Electrical and Computer Engineering, University of Maryland, College Park, MD 20742 USA. He is now with the School of Electronic Engineering, University of Electronic Science and Technology, Chengdu, China (e-mail: [email protected]). K. J. R. Liu is with the Department of Electrical and Computer Engineering, University of Maryland, College Park, MD 20742 USA (e-mail: kjrliu@umd. edu). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TWC.2015.2511004 Index Terms—Device-to-device communication, resource reusing, stable throughput region, admission control. I. I NTRODUCTION D EVICE-to-device (D2D) communications allow direct transmissions between users underlaying cellular net- works, without the data passing through the base station (BS) [1], [2]. Since it can enhance spectral efficiency, reduce transmission powers and achieve high data rates, D2D serves as a promising technique to improve the overall system capacity. In a D2D-enabled cellular network, the resources can be allocated to D2D links based on three strategies [3]–[6]: 1) Orthogonal Sharing Mode (OSM): one-hop transmission, and orthogonal resources are assigned to D2D links, 2) Cellular Mode (CM): two-hop transmissions, where D2D pairs act the same way as cellular users (CUEs) (i.e., data flows go through D2D transmitter-BS-D2D receiver links), and 3) Non-Orthogonal Sharing mode (NOSM): one-hop trans- mission, and D2D pairs reuse the resources occupied by CUEs. In a network with OSM, the interference management is simple, but the resource utilization may be less efficient. The second strategy is the conventional cellular mode. Due to spec- tral inefficiency of OSM and CM, most recent research focused mostly on NOSM, where D2D transmitters directly send infor- mation to the D2D receivers, reusing cellular resources. Since D2D users (DUEs) may simultaneously reuse an uplink or a downlink resource which is assigned to a CUE by the BS, D2D communications will result in severe interference to the CUE-BS link and vice versa. To prevent harmful intra- cell interference, efficient resources assignment strategies and power allocation schemes have been proposed in related works discussed below. A. Related Work In [7], by monitoring the common control channel, BS will identify the “near-far-risk” cellular users and broadcast the information to D2D pairs. The decisions of resources shar- ing are made by DUEs, rather than BS. As another distributed power control scheme, via minimizing the used sum power, the performance of OSM and NOSM is compared in [8] when the positions of both the D2D pair and the interfering CUE vary within the cell. Since D2D pairs have access to licensed spectrum occu- pied by cellular networks, centralized control by BS will result 1536-1276 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809

Stable Throughput Region and Admission Controlfor Device-to-Device Cellular Coexisting Networks

Hao Lu, Yichen Wang, Member, IEEE, Yan Chen, Senior Member, IEEE, and K. J. Ray Liu, Fellow, IEEE

Abstract—Device-to-device (D2D) communication is proposedas a vital technique to enhance system capacity in cellular net-works, which requires efficient interference modeling and man-agements to improve spectral efficiency. In practice, even whentwo wireless connections share the same resources, the interferencebetween them may not always exist if there is no conflict at packet-level transmissions. To explore the real effect of interference, inthis paper, we establish a cross-layer model for D2D communi-cations underlaying cellular network and derive the closed-formstable throughput region. Then, we formulate an optimizationproblem to obtain the maximal achievable packet rate for cellularlink, which determines whether the D2D pair can share the sameresources with a specific cellular link. By dividing the original opti-mization problem into several simplified subproblems, the optimalsolution can be calculated with low complexity. Subsequently,our model is extended to a generalized scenario where multipleD2D pairs share the same resources with one cellular link. Dueto the complexity of obtaining closed-form expressions on sta-ble throughput regions, we propose an algorithm to determinewhether the transmissions of the cellular link and the multi-ple D2D pairs can satisfy the QoS requirements simultaneously.Furthermore, a low-complexity dynamic admission control strat-egy is introduced to deal with the admission process for new D2Drequests. As a consequence, the cellular spectrum can allow accessof many more D2D pairs than what the conventional model can.The significant improvements are verified by numeral simulations.

Manuscript received April 20, 2015; revised August 3, 2015 and October27, 2015; accepted December 4, 2015. Date of publication December 22,2015; date of current version April 7, 2016. This work was supported inpart by the National High-Tech Research and Development Plan of China(863 Program) under Grant No. 2014AA01A706, the National Natural ScienceFoundation of China (NSFC) under Grant No. 61401348 and 61431011, thePostdoctoral Science Foundation of China under Grant No. 2014M550493, andthe Fundamental Research Funds for the Central Universities. This paper waspresented in part at the IEEE Global Conference on Signal and InformationProcessing, Orlando, FL, USA, December 2015. This work was done while H.Lu, Y. Wang, and Y. Chen were at the University of Maryland, College Park,MD. The associate editor coordinating the review of this paper and approvingit for publication was W. Saad.

H. Lu is with the Key Laboratory of Wireless-Optical Communications,Chinese Academy of Sciences, School of Information Science and Technology,University of Science and Technology of China, Hefei 230026, China. He wasalso with the Department of Electrical and Computer Engineering, Universityof Maryland, College Park, MD 20742 USA (e-mail: [email protected]).

Y. Wang was with the Department of Electrical and Computer Engineering,University of Maryland, College Park, MD 20742 USA. He is now withthe Department of Information and Communications Engineering, School ofElectronic and Information Engineering, Xi’an Jiaotong University, Xi’an710049, China (e-mail: [email protected]).

Y. Chen was with the Department of Electrical and Computer Engineering,University of Maryland, College Park, MD 20742 USA. He is now withthe School of Electronic Engineering, University of Electronic Science andTechnology, Chengdu, China (e-mail: [email protected]).

K. J. R. Liu is with the Department of Electrical and Computer Engineering,University of Maryland, College Park, MD 20742 USA (e-mail: [email protected]).

Color versions of one or more of the figures in this paper are available onlineat http://ieeexplore.ieee.org.

Digital Object Identifier 10.1109/TWC.2015.2511004

Index Terms—Device-to-device communication, resourcereusing, stable throughput region, admission control.

I. INTRODUCTION

D EVICE-to-device (D2D) communications allow directtransmissions between users underlaying cellular net-

works, without the data passing through the base station(BS) [1], [2]. Since it can enhance spectral efficiency, reducetransmission powers and achieve high data rates, D2D serves asa promising technique to improve the overall system capacity.

In a D2D-enabled cellular network, the resources can beallocated to D2D links based on three strategies [3]–[6]:

1) Orthogonal Sharing Mode (OSM): one-hop transmission,and orthogonal resources are assigned to D2D links,

2) Cellular Mode (CM): two-hop transmissions, where D2Dpairs act the same way as cellular users (CUEs) (i.e.,data flows go through D2D transmitter-BS-D2D receiverlinks), and

3) Non-Orthogonal Sharing mode (NOSM): one-hop trans-mission, and D2D pairs reuse the resources occupied byCUEs.

In a network with OSM, the interference management issimple, but the resource utilization may be less efficient. Thesecond strategy is the conventional cellular mode. Due to spec-tral inefficiency of OSM and CM, most recent research focusedmostly on NOSM, where D2D transmitters directly send infor-mation to the D2D receivers, reusing cellular resources. SinceD2D users (DUEs) may simultaneously reuse an uplink ora downlink resource which is assigned to a CUE by theBS, D2D communications will result in severe interference tothe CUE-BS link and vice versa. To prevent harmful intra-cell interference, efficient resources assignment strategies andpower allocation schemes have been proposed in related worksdiscussed below.

A. Related Work

In [7], by monitoring the common control channel, BS willidentify the “near-far-risk” cellular users and broadcast theinformation to D2D pairs. The decisions of resources shar-ing are made by DUEs, rather than BS. As another distributedpower control scheme, via minimizing the used sum power, theperformance of OSM and NOSM is compared in [8] when thepositions of both the D2D pair and the interfering CUE varywithin the cell.

Since D2D pairs have access to licensed spectrum occu-pied by cellular networks, centralized control by BS will result

1536-1276 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Page 2: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

2810 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016

in optimal performance. Hyunkee et al. proposed an inter-ference limited area control scheme to manage interferencefrom CUEs to D2D systems, where the method does not allowCUEs located in the same area to exploit the same resourcesas the DUEs, and receive mode selection among three strate-gies was analyzed in their works [9], [10]. However, theydid not consider the interference from D2D pairs to cellularlinks. On the other hand, without involving cellular transmis-sions, power control among multiple D2D pairs was studied in[11]. Guaranteeing the quality-of-service (QoS) requirementsfor both D2D users and regular CUEs, the resource allocationproblems were studied in [12], [13] to maximize the overall net-work throughput. Previous works are based on user-level, whilerecently, resource blocks-level resources allocation and powercontrol schemes were proposed to achieve more flexible spec-trum reuse [14]–[16]. In [17], [18], power control and channelallocation were studied for D2D communications using a gametheoretic approach. The D2D spectrum sharing schemes weredescribed and analyzed in [6], [19] using a stochastic geometryapproach.

Under specific scenarios rather than general cases, coopera-tive communications could be introduced to deal with inter-linkinterference [20]–[23].

B. Motivation

There exist a major shortcoming in existing works. Theadmission processes of D2D pairs in their works [9]–[19] werebased on information-theoretic studies where both D2D pairsand the cellular connection, which share the same resources,keep transmitting signals simultaneously and interfere witheach other all the time. However, in practice, packets aregenerated and queued for transmission according to certaindynamic processes. Considering the possibility of the transmis-sion queues being empty, all those connections may not accessthe channel simultaneously within each time slot even whenthey share the same resources. Such an issue is also addressedin [24], where interference scenarios among multiple links arecharacterized in distributed Ad Hoc networks. The underutiliza-tion of licensed spectrum has also stimulated the research oncognitive radio [25]–[27].

C. Contributions

In this paper, we propose a new cross-layer model to charac-terize the interference between D2D and cellular transmissions.The “cross-layer” notion represents that the proposed modelis not only based on the physical layer in terms of signal-to-interference-plus-noise ratios (SINRs) and outage probabilities,but also refers to packet-level queueing and transmission pro-cess. We will firstly present the model and analysis with thescenario that only one D2D pair reuses the same resources withone cellular connection. Closed-form expressions on stablethroughput region under this scenario are derived. An optimiza-tion problem is then formulated to find the maximal achievablepacket arrival rate of the cellular link, which provides insights

on the admission process for D2D connections. Through divid-ing the optimization problem into several simple subproblems,the optimal solution is obtained.

Subsequently, the model and analysis will be extended to thegeneralized case where multiple D2D pairs share the same cel-lular resources. Since it is difficult to derive the closed-formexpressions on stable throughput regions, we propose an algo-rithm to determine whether those D2D pairs can share the sameresources with the cellular connection. Furthermore, a low-complexity dynamic admission control scheme is introduced todeal with the admission process for D2D pairs.

As a consequence, the proposed model expands the stablethroughput region among D2D connections and cellular links.In a single D2D pair scenario, the stable throughput region ofthe proposed model is the same as the conventional one whenthe inter-user interference is sufficiently small. Under thiscircumstance, both of them outperform TDMA transmissions.When the two links suffer severe interference from each other,the proposed model can achieve almost the same performanceas that of TDMA while the conventional one can hardly admitD2D pairs. Furthermore, in the multiple D2D pairs scenarios,the proposed model outperforms both the conventional modeland TDMA. With the increase of the number of D2D pairsthat reuse the same cellular resources, the improvement of theproposed model becomes more significant. Therefore, moreD2D pairs have access to cellular resources, enhancing thenetwork capacity.

The proposed model and analysis are different from thosein [28]–[31], which introduced stable throughput analysis intocognitive radio networks. In those works, secondary users haveto sense and access the channels when they are not occupiedby primary users (an overlay model). The analysis is based ona specific scheduling scheme to guarantee the QoS requirementof the primary users while the secondary users are saturated.Stable throughput region is determined by false alarm and mis-detection errors of the secondary users. While in our scheme,we study an underlay model, where both D2D and cellularconnections can be considered as the primary links. Thereis no channel sensing necessary in our model and the QoSrequirements of both connections are satisfied.

The rest of paper is organized as follows: Section II depictsthe system model where one D2D pair reuses the sameresources with one cellular connection. Section III details thestable throughput region and admission control scheme basedon our model. The model and analysis are extended to multi-ple D2D pairs scenario in Section IV. In Section V, simulationresults are given to illustrate the system performance of ourscheme. Finally, Section VI summarizes the paper.

II. SYSTEM MODEL

A. Networks and Links

We consider a hybrid multi-cell network, where direct D2Dconnections coexist with cellular transmissions in each cell. Thediscovery, resources allocation and power control of D2D pairsare performed at the BS. Firstly, we consider a single D2Dpair scenario where one D2D pair coexists with one cellular

Page 3: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

LU et al.: STABLE THROUGHPUT REGION AND ADMISSION CONTROL 2811

Fig. 1. Queuing and transmission model for single D2D pair scenario. Uplinkresources are reused. The dotted lines represent the interference.

link, as shown in Fig. 1. The multiple D2D pairs scenario willbe detailed in Section IV. Assuming slow flat fading channels,the instantaneous channel gain from the transmitter of link i tothe receiver of link j (i, j ∈ {c, d}) accounts for the path-loss,shadow fading, and Rayleigh fading, determined by

Gi j = L−αi j β · |hi j |2, (1)

where Li j is the distance between node i and node j with path-loss exponent α, β is the slow fading gain with log-normaldistribution (i.e., shadow fading), hi j ∼ CN(0, 1) is modeledas zero-mean complex Gaussian random variables with unitvariance, characterizing the Rayleigh fading. Thus, Gcc, Gdd ,Gcd , and Gdc represent the channel gains of the cellular link,the D2D link, the channel from the cellular transmitter to theD2D receiver, and the channel from the D2D transmitter tothe cellular receiver, respectively. All channel coefficients aresupposed to remain constant within one frame and vary inde-pendently from frame to frame. The corresponding noise ateach receiver is assumed to be complex additive white Gaussiannoise (AWGN) with noise power N0.

B. Queueing Model

We consider slot-by-slot transmissions where one second isdivided into T time slots (TSs). Without loss of generality, letthe duration of one TS be one packet transmission period. Bothuplink and downlink resources can be reused by D2D connec-tions. As depicted in Fig. 1, packets are generated at the cellulartransmitter and the D2D transmitter with average rate λc and λd

(packets/TS), respectively, independent from each other, andindependent and identically distributed (i.i.d.) over slots. Thedata queues at the transmitters of the cellular connection and theD2D pair are denoted by Qc and Qd , respectively, with infinitecapacity for storing arriving packets.

Denote by Qti the length of queue i at the beginning of time

slot t . Based on the definition in [32]–[35], the queue is said tobe stable if limt→∞ Pr{Qt

i < x} = F(x) and limx→∞ F(x) =0. The Loynes’ Theorem [36] states that if the arrival and ser-vice processes of a queue are strictly stationary and ergodic, thequeue is stable if and only if the average arrival rate is strictlyless than the average service rate. Thus, the stable throughputregion, where one D2D pair and one cellular link share the sameresources, is expressed as

R = {(λc, λd)| λc < μc & λd < μd}, (2)

where μc and μd are the service rates of the cellular link andthe D2D connection (packets/TS), respectively. We assume thatacknowledgements (ACKs) are instantaneous and error-free.The packet that fails to be decoded by the desired receiverwill stay in the queue for retransmission. The service rate ofeach connection is equal to the probability that one packet issuccessfully decoded at the receiver. Thus we have

μc = Pr{Qd = 0}(1 − ρc) + Pr{Qd > 0}(

1 − ρ(I )c

)(a)=

(1 − λd

μd

)(1 − ρc) + λd

μd

(1 − ρ(I )

c

)(3)

and

μd = Pr{Qc = 0}(1 − ρd) + Pr{Qc > 0}(

1 − ρ(I )d

)(a)=

(1 − λc

μc

)(1 − ρd) + λc

μc

(1 − ρ

(I )d

), (4)

where Qi = 0 (i ∈ {c, d}) denotes that the transmission queuei is empty and no packet is sent within this TS and Qi > 0corresponds to the case that link i is occupying the channel toperform the transmission, ρc is the outage probability of the cel-lular link when it is free from the interference from D2D linkand ρ

(I )c is the outage probability of the interference scenario.

Likewise, ρd and ρ(I )d correspond to the outage probabilities

of the D2D connection under these two circumstances, respec-tively. The deducing (a) in (3) or (4) is based on the Little’sLaw [37], which states that the probability of queue size beingequal to zero in a G/G/1 queue with arrival rate λ and servicerate μ is (1 − λ

μ). Thus, the first term of (3) or (4) denotes that

when one of the links keeps silent within the slot, the servicerate of the transmitting link is determined by the outage prob-ability without intra-cell interference. While, the second termscharacterize the interference scenario when both links carry outtransmissions within the same slot. The overall service rate ofeach link is the weighted sum of the service rates correspondingto the two scenarios.

Although inter-cell interference can be handled via Inter-CellInterference Coordination mechanisms [38], [39], it has alwaysbeen a primary concern in the design of cellular systems dueto the shrink of cells. Thus, we introduce inter-cell interferenceto our model. Assuming there exist NI interfering nodes in thepre-defined certain area of the surrounding cells. Node Ii (i ∈{1, 2, . . . , NI }) has transmission power PIi and the channelgain from Ii to the receiver of link j ∈ {c, d} is G Ii j . The BSmay not know the detail transmission scenarios of other cellsand it requires much more complicated computations whenstudying multiple interactional queues. Furthermore, in mostscenarios, intra-cell interference determines system behaviorsdue to short distances between interfering links. Thus, wewill not establish packet-level transmission models for inter-cell interference. The inter-cell interference is assumed to beexistent within each slot. Then, the outage probabilities arecalculated through

ρc = Pr

⎧⎪⎪⎪⎨⎪⎪⎪⎩

B log

⎛⎜⎜⎜⎝1 + PcGcc

N0 +NI∑

i=1PIi G Ii c

⎞⎟⎟⎟⎠ < Rc

⎫⎪⎪⎪⎬⎪⎪⎪⎭

, (5)

Page 4: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

2812 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016

ρd = Pr

⎧⎪⎪⎪⎨⎪⎪⎪⎩

B log

⎛⎜⎜⎜⎝1 + Pd Gdd

N0 +NI∑

i=1PIi G Ii d

⎞⎟⎟⎟⎠ < Rd

⎫⎪⎪⎪⎬⎪⎪⎪⎭

, (6)

ρ(I )c = Pr

⎧⎪⎪⎪⎨⎪⎪⎪⎩

B log

⎛⎜⎜⎜⎝1+ PcGcc

Pd Gdc+N0+NI∑

i=1PIi G Ii c

⎞⎟⎟⎟⎠< Rc

⎫⎪⎪⎪⎬⎪⎪⎪⎭

, (7)

and

ρ(I )d = Pr

⎧⎪⎪⎪⎨⎪⎪⎪⎩

B log

⎛⎜⎜⎜⎝1 + Pd Gdd

PcGcd + N0 +NI∑

i=1PIi G Ii d

⎞⎟⎟⎟⎠ < Rd

⎫⎪⎪⎪⎬⎪⎪⎪⎭

,

(8)

respectively, where B is the bandwidth, Pc and Pd are the trans-mission powers of the cellular transmitter and D2D transmitter,respectively, Rc = ScT with Rc being the threshold rate relatedto outage event of the cellular link and Sc being the numberof bits contained in one packet sent by the cellular transmitter.Likewise, Rd = Sd T corresponds to the D2D link. The primarynotations are presented in Table I.

We would like to point out that even when the D2D linkreuses the same spectrum with the cellular link, the practicaltransmissions within each TS have two cases. Case 1: One ofthe transmitters sends a packet while the other one keeps silent,corresponding to the first term in (3) or (4). Case 2: both ofthe transmitters send packets, corresponding to the second termin (3) or (4). The “conventional model” in this paper refers tothe common assumptions in existing works [10]–[19], wherethey only considered Case 2 (the worst case) when calculatingSINRs or data rates. In the following, we will present the the-oretical analysis and numerical results on the proposed model,which takes both Case 1 and Case 2 into considerations.

III. STABLE THROUGHPUT REGION AND ADMISSION

CONTROL

In this section, we will develop the stable throughput regionfor the above described scenario where one D2D pair sharethe same resources with one cellular connection. Then anadmission control mechanism will be performed at the BS todetermine whether the D2D link is allowed to access.

A. Stable Throughput Region

Firstly, we derive the stable throughput region. Althoughtwo queues are coupled, for each of them, the departure pro-cess is only determined by the packet delivery rate. Accordingto (3) and (4), as long as λc, λd , Pc, and Pd are given,the average service rates are fixed and time-independent.Thus, we can use Loynes’ Theorem to characterize the sta-ble throughput region. Then, the composite effect of path loss,log-normal shadow fading and Rayleigh fading is analyticallyuntractable. Thus, the theoretical analysis is based on path-loss

TABLE INOTATIONS

and Rayleigh fading channel, while the performance of shadowfading is tested in simulations. Mathematically, according to(1) and the distribution of hi j , channel gains are exponen-tially distributed. Thus we have Gcc ∼ exp(1/σ 2

cc), Gdd ∼exp(1/σ 2

dd), Gcd ∼ exp(1/σ 2cd), Gdc ∼ exp(1/σ 2

dc), G Ii c ∼exp(1/σ 2

Ii c), and G Ii d ∼ exp(1/σ 2Ii d). Before calculating the

outage probabilities, we firstly introduce the following lemma.Lemma 1: Suppose t, t1, t2, . . . , tN (N ≥ 2) are indepen-

dent exponentially distributed random variables with meansσ 2, σ 2

1 , σ 22 , . . . , σ 2

N , respectively. Then, we have

Page 5: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

LU et al.: STABLE THROUGHPUT REGION AND ADMISSION CONTROL 2813

Pr

{N∑

n=1

tn < a

}= 1 −

N∑n=1

σ2(N−1)n

N∏m=1,m �=n

(σ 2n − σ 2

m)

e− a

σ2n (9)

and

Pr

⎧⎪⎪⎪⎨⎪⎪⎪⎩

tN∑

n=1tn + a

<b

⎫⎪⎪⎪⎬⎪⎪⎪⎭

=1−N∑

n=1

σ 2σ2(N−1)n

N∏m=1,m �=n

(σ 2n − σ 2

m)(bσ 2n + σ 2)

e− ab

σ2 ,

(10)

where a > 0 and b > 0.

Proof: The proof of this lemma is provided inAppendix A. �

According to (9) and (10), the outage probabilities ρc and ρd

are given by

ρc=1−NI∑

i=1

Pcσ2cc(PIi σ

2Ii c)

NI −1

NI∏m=1,m �=i

(PIi σ2Ii c−PIm σ 2

Im c)(ηc PIi σ2Ii c+Pcσ 2

cc)

e− ηc N0

Pcσ2cc ,

(11)

and

ρd=1−NI∑

i=1

Pdσ 2dd(PIi σ

2Ii d)NI −1

NI∏m=1,m �=i

(PIi σ2Ii d−PIm σ 2

Im d)(ηd PIi σ2Ii d+Pdσ 2

dd)

e− ηd N0

Pd σ2dd ,

(12)

respectively, where

ηc = 2RcB − 1 (13)

and

ηd = 2RdB − 1. (14)

Then, with interference scenario, the outage probabilities ofthe cellular link and D2D connection are given by

ρ(I )c =1−

NI∑i=0

Pcσ2cc(PIiσ

2Ii c)

NI

NI∏m=0,m �=i

(PIi σ2Ii c−PIm σ 2

Im c)(ηc PIi σ2Ii c+Pcσ 2

cc)

e− ηc N0

Pcσ2cc,

(15)

and

ρ(I )d =

1−NI +1∑i=1

Pdσ 2dd(PIiσ

2Ii d)NI

NI +1∏m=1,m �=i

(PIi σ2Ii d−PIm σ 2

Im d)(ηd PIi σ2Ii d+Pddσ 2

dd)

e− ηd N0

Pd σ2dd ,

(16)

respectively, where, for the simplicities of the expressions, wesubstitute the notation “d” in (7) with “I0” in (15) and substitutethe notation “c” in (8) with “INI +1” in (16).

Then, we can determine the stable throughput region by thefollowing Theorem 1.

Theorem 1: The stable throughput region R = {(λc,

λd)|λc < μc & λd < μd}, where one D2D pair with packetarrival rate λd shares the same resources with one cellular linkwith packet arrival rate λc, is characterized by

R ={(λc, λd)

∣∣∣(λc, λd) ∈ R1

⋃R2

}(17)

where

R1 =

⎧⎪⎪⎪⎪⎨⎪⎪⎪⎪⎩

(a) : λc < (1 − ρc) − λdρ

(I )c − ρc

1 − ρ(I )d

(b) : λc <(1 − ρd − λd)(1 − ρ

(I )c )

ρ(I )d − ρd

⎫⎪⎪⎪⎪⎬⎪⎪⎪⎪⎭

, (18)

and

R2 =

⎧⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎩

(a) : λc≤

(√λd(ρ

(I )c − ρc) − √

(1 − ρc)(1 − ρd)

)2

ρ(I )d − ρd

(b) : λc<(1 − ρc)(1 − ρd) − λd(ρ

(I )c − ρc)

2 − ρd − ρ(I )d

(c) : λd<(1 − ρd)(1 − ρc) − λc(ρ

(I )d − ρd)

2 − ρc − ρ(I )c

⎫⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎬⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎭

.

(19)

Proof: The proof of this lemma is provided inAppendix B. �

Remark: The stable throughput constraint is only deter-mined by the packet arrival rate of each transmitter. Undercertain circumstance, unpredictable and sudden arrival natureof the packets may results in the instantaneous arrival rate beingmuch larger than the service rate. The packet dropout may occurat the source data queue. For many systems and applications,there exist requirements for the probability of packet dropout.Thus, we introduce a bias to the packet arrival rate, i.e., the tar-geted service rate of node i ∈ {c, d} should be larger than theadjusted arrival rate, expressed as {λ̃i |λ̃i = λi + biasi < μi }(bias > 0), where λ̃i ensures that the probability of instanta-neous arrival rate being larger than the service rate is below apre-defined threshold value P(i)

th . This measurement not onlymaintains the stable constraint, but also captures the volatil-ity of the packet arrival process, decreasing the probabilityof packet dropout. Different systems and applications havedifferent distributions of the packet arrival process. For spe-cific system and distribution, we can acquire the correspondingcumulative distribution function of the packet arrival processFi (x). Thus, biasi can be obtained through solving the equa-tion Fi (λi + biasi ) = P(i)

th . Without loss of generality, we stilluse notations λc and λd in the following derivations.

The above method is simple but increases the admissionthreshold for both links. Alternatively, we introduce another

Page 6: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

2814 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016

approach to deal with the bursty nature of packet arrival pro-cess. In the LTE networks, the QoS requirements are associatedwith the SINRs of both cellular and D2D links [40]. The trans-mission powers are limited to ensure that the SINR of eachlink is always larger than the pre-defined threshold. Such QoSrequirements are deployed to limit the interference and guaran-tee the data rate. In our paper, the long-term statistical data ratesare satisfied based on the stable throughput region. However,based on the unpredictable and sudden arrival nature of thepackets, the instantaneous rates cannot be guaranteed. To bespecific, if the cellular transmitter has a large amount of packetsand accesses the channel in each slot within certain time period,the instantaneous service rate of the D2D link will significantlydecrease. Mathematically, if (λc, λd , Pc, Pd) satisfies the stablethroughput constraint, μc, μd can be calculated through (3) and(4). For D2D link,

μd =(

1 − λc

μc

)(1 − ρd) + λc

μc

(1 − ρ

(I )d

)

= 1 − ρd −(ρ

(I )d − ρd

) λc

μc. (20)

Thus, to meet the service rate μd > λd , the ratio of cellular linkoccupying the channel ( λc

μc) should be no larger than 1−ρd−λd

ρ(I )d −ρd

.

Likewise, to meet the service rate μc, the ratio of D2D linkoccupying the channel ( λd

μd) should be no larger than 1−ρc−λc

ρ(I )c −ρc

.

The stable throughput region can only guarantee the long-termrequirements for both ratios. Therefore, if we want to guaranteethe instantaneous rates for both links, we introduce a transmis-sion probability for each transmitter to control the instantaneousinterference to its reusing partner. To do so, cellular transmitterhas a transmission probability P(c)

tr , which means that if thecellular transmitter has a packet to send at the beginning of aslot, it will transmit with probability P(c)

tr and keep silent withprobability (1 − P(c)

tr ). And P(d)tr is deployed at the D2D trans-

mitter. Since P(c)tr and P(d)

tr are associated with instantaneoustransmission rate, they should be updated at the beginning ofeach time slot. Meanwhile, the estimation of the instantaneousratio requires a series of time slots. Thus, we divide the entiretransmission period into many cycles, where one cycle con-sists of K time slots. P(c,t)

tr denotes the transmission probabilityof cellular transmitter in time slot t . Within the mth cycle,(m − 1)K < t ≤ mK , P(c,t)

tr is given by

P(c,t)tr =

⎧⎪⎪⎪⎨⎪⎪⎪⎩

1 if Qtc

μc≤ rc K − Xc((m − 1)K , t − 1)

P̃tr if Qtc

μc> rc K − Xc((m − 1)K , t − 1)

0 if Xc((m − 1)K , t − 1) ≥ rc K

,

(21)

where P̃tr = min{

rc K−Xc((m−1)K ,t−1)mK−t+1 , 1

}. Xc((m−1)K , t−1)

denotes the amount of slots which are occupied by the cellulartransmitter from slot (m − 1)K to slot t − 1, and rc = 1−ρd−λd

ρ(I )d −ρd

is the constraint on the ratio of cellular link occupying the chan-nel. As mentioned before, to meet the service rate of D2D link,the ratio of cellular link occupying the channel ( λc

μc) should be

no larger than rc. Thus, the slots that occupied by the cellularlink throughout the entire K slots should be less than rc K . In(21), Xc((m − 1)K , t − 1) is the slots consumption from thebeginning of the mth cycle to slot t − 1. Thus, to meet therate requirement of D2D link, the available slots which canbe occupied by the cellular link from slot t to mK (i.e., therest of this cycle) is rc K − Xc((m − 1)K , t − 1). Meanwhile,Qt

cμc

denotes the amount of the slots needed to successfullydeliver the packets in the data queue. Since we cannot predictthe incoming packets in the future, the transmission proba-bility is configured based on the past and present. In the firstline of the above equation, if the slots needed for the deliv-ery of Qt

c packets are less than the remaining accessible slotsin this cycle, the source will transmit with probability 1. Ifthe slots needed for the delivery of Qt

c packets are more thanthe available slots, the source will transmit with probabilityrc K−Xc((m−1)K ,t−1)

mK−t+1 , where mK − t + 1 is the rest slots in thiscycle. Once Xc((m − 1)K , t − 1) is equal to or larger than rc K ,the source is prohibited to transmit in this cycle. As a result,the access ratio of the cellular link in each cycle is no largerthan rc K �

K . The similar configuration can be done at the D2Dtransmitter.

Subsequently, we prove that the deployments of transmis-sion probabilities will not change the stable throughput region.If λd is fixed, based on Theorem 1 in our paper, we obtainthe stable throughput region for the cellular link, denoted as{λc|λc ≤ λc,max |λd

}.1) For any λc < λc,max |λd

, we have μc = 1 − ρc −(ρ

(I )c − ρc)

λdμd

> λc and μd = 1 − ρd − (ρ(I )d − ρd) λc

μc> λd .

We assume that the system with the deployments of trans-mission probabilities cannot satisfy the stable throughput con-straint. Thus, we have limt→∞ Qt

c = ∞ and μc,tr < λc, whereμc,tr is the mean service rate of the system with transmis-sion probabilities. According to the configuration in the aboveequation, to limit the interference to the D2D link, the cellu-lar transmitter will have an average transmission probabilityP(c)

tr = rc = 1−ρd−λd

ρ(I )d −ρd

since the data queue of the cellular trans-

mitter is saturated when t → ∞. Thus, the service rate of thecellular link can be calculated as μc,tr = rcμ

′c, where

μ′c = (1 − Pr{D2D transmits}) (1 − ρc)

+ Pr{D2D transmits}(1 − ρ(I )c )

= 1 − ρc − (ρ(I )c − ρc) Pr{D2D transmits} (22)

If the D2D transmitter sends a packet with transmis-sion probability 1, Pr{D2D transmits} = λd

μd, otherwise

Pr{D2D transmits} <λdμd

due to P(d)tr < 1. Then, we have

μ′c ≥ 1 − ρc − (ρ(I )

c − ρc)λd

μd= μc. (23)

As a result,

μc,tr ≥ rcμc = 1 − ρd − λd

ρ(I )d − ρd

μc>1 − ρd − μd

ρ(I )d − ρd

μc

= λc

μcμc = λc, (24)

Page 7: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

LU et al.: STABLE THROUGHPUT REGION AND ADMISSION CONTROL 2815

which is against the assumption μc,tr < λc. Thus, for any λc <

λc,max |λd, the system with the deployments of transmission

probability can still maintain the stability constraint.2) For any λc > λc,max |λd

, we cannot achieve a service ratepair (μc, μd) which satisfies μc > λc and μd > λd . Thus, evenwe can limit the access ratio of either the cellular link or theD2D link to obtain the stability of its partner, its own rate cannotbe satisfied.

Likewise, when λc is fixed, the stable throughput region of λd

remains unchanged. Based on the above discussions, the trans-mission probability introduced at each link not only meets thelong-term statistical stability, but also satisfies the QoS require-ments on instantaneous rates. It serves as an effective methodto well handle the bursty nature of the packet arrival process.

B. Admission Control

When a D2D pair with data arrival rate λd requests to accessthe spectrum occupied by specific cellular link, the BS willdetermine whether this D2D connection can be admitted, oncondition that both transmission queues should satisfy the sta-ble throughput constraints. This can be achieved by comparingλc with the maximum acceptable data arrival rate of the cel-lular link (λ∗

c ). Mathematically, λ∗c can be obtained by solving

the following optimization problem (i.e., when λd is given, weobtain the maximal λc according to R in (17)):

(OP) λ∗c = max

Pc,Pdλc, (25a)

s.t. R, (25b)

Pc ≤ Pc,th, (25c)

Pd ≤ Pd,th, (25d)

where Pc,th and Pd,th are the maximal transmit powers ofthe cellular and D2D transmitters, respectively. This originalproblem (OP) is non-convex and is intractable in its originalform.

In order to obtain the optimal solution, we divide the probleminto several subproblems to reduce the complexity.

Proposition 1: According to Theorem 1, where R =R1

⋃R2, the OP can be divided into the following two sub-

problems (P-1 and P-2)

(P-1) λ∗c-1 = max

Pc,Pdλc, (26a)

s.t. R1, (26b)

Pc ≤ Pc,th, (26c)

Pd ≤ Pd,th, (26d)

and

(P-2) λ∗c-2 = max

Pc,Pdλc, (27a)

s.t. R2, (27b)

Pc ≤ Pc,th, (27c)

Pd ≤ Pd,th . (27d)

The solution of OP can be obtained through

λ∗c = max{λ∗

c-1, λ∗c-2}. (28)

Proof: The optimization solution of OP λ∗c must satisfy

(λ∗c , λd) ∈ R. According to Theorem 1, where R = R1

⋃R2,

(λ∗c-1, λd) ∈ R1 results in (λ∗

c-1, λd) ∈ R. Thus, λ∗c-1 is a fea-

sible solution of the OP, i.e., λ∗c-1 ≤ λ∗

c . Likewise, λ∗c-2 ≤

λ∗c . Thus, max{λ∗

c-1, λ∗c-2} ≤ λ∗

c . Meanwhile, if (λ∗c , λd) ∈ R1,

λ∗c is no larger than the optimal value of P-1, i.e., λ∗

c ≤λ∗

c-1. Likewise, if (λ∗c , λd) ∈ R2, we have λ∗

c ≤ λ∗c-2. Thus,

max{λ∗c-1, λ

∗c-2} ≥ λ∗

c . Based on the above discussions, we havemax{λ∗

c-1, λ∗c-2} = λ∗

c . �Subsequently, to obtain the solution of P-1 and P-2, fur-

ther simplifications are necessary. We take P-1 for an example.Based on (18), we have

λc< min

{(1 − ρc) − λd

ρ(I )c − ρc

1 − ρ(I )d

,(1 − ρd − λd)(1 − ρ

(I )c )

ρ(I )d − ρd

}.

(29)

Thus, the optimization problem P-1 can be further divided intotwo parts as

(P-1-1) λ∗c-1-1 = max

Pc,Pd(1 − ρc) − λd

ρ(I )c − ρc

1 − ρ(I )d

, (30a)

s.t. (1 − ρc) − λdρ

(I )c − ρc

1 − ρ(I )d

≤ (1 − ρd − λd)(1 − ρ(I )c )

ρ(I )d − ρd

,

(30b)

Pc ≤ Pc,th, (30c)

Pd ≤ Pd,th, (30d)

and

(P-1-2) λ∗c-1-2 = max

Pc,Pd

(1 − ρd − λd)(1 − ρ(I )c )

ρ(I )d − ρd

, (31a)

s.t. (1 − ρc) − λdρ

(I )c − ρc

1 − ρ(I )d

>(1 − ρd − λd)(1 − ρ

(I )c )

ρ(I )d − ρd

,

(31b)

Pc ≤ Pc,th, (31c)

Pd ≤ Pd,th, (31d)

and through the similar analysis as that of Proposition 1, it iseasy to prove that the solution of P-1 is given by

λ∗c-1 = max{λ∗

c-1-1, λ∗c-1-2}. (32)

Likewise, we can divide P-2 with the same method, whichwill not be detailed here.

Before calculating the solutions of P-1-1 and P-1-2, weintroduce the following proposition.

Proposition 2: Let P∗c and P∗

d be the transmit powers of thecellular transmitter and D2D transmitter, respectively, when theoptimal solution λ∗

c is obtained. Then we have

{P∗c , P∗

d } = {Pc,th, P∗d } or {P∗

c , P∗d } = {P∗

c , Pd,th}. (33)

Proof: If P∗c < Pc,th and P∗

d < Pd,th , there exists a posi-tive real number α > 1 which satisfies αP∗

c ≤ Pc,th and αP∗d ≤

Page 8: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

2816 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016

Pd,th . Then we plug αP∗c and αP∗

d into (5)–(8) and find outthat all the outage probabilities are smaller than those with P∗

cand P∗

d . The decrease of outage probabilities means that fewerTSs are needed to successfully transmit the packets, result-ing in less interference from/to the transmission partner. Asa consequence, the service rates increase. Thus, the maximalachievable data arrival rates also increase, which is against theassumption. Therefore, to achieve the optimal solution of OP, atleast one of the two transmitters sends its signals with its largestpower. �

According to Proposition 2, both P-1-1 and P-1-2 can befurther simplified. For P-1-1, setting Pd = Pd,th , it can betransformed to

(P-1-1Pd,th) λ∗c-1-1Pd,th

= maxPc∈APc ,P-1-1Pd,th

(1−ρc)−λdρ

(I )c −ρc

1−ρ(I )d

,

(34)

where the range of Pc (APc,P-1-1Pd,th) is calculated through

setting Pd = Pd,th and replacing ρc ρd , ρ(I )c , and ρ

(I )d in

(30b) with (11), (12), (15), and (16), respectively. The opti-mization objective in (34) is a one-dimension differentiablecontinuous function on Pc with finite interval. Due to thecomplicated expressions of ρc ρd , ρ

(I )c , and ρ

(I )d , it is diffi-

cult to analyze its convexity by evaluating second derivative.Whereas, the objective function is a continuous-differentialfunction within a finite interval. It is known that for any con-tinuously differentiable function f (x), the minimum value(min f (x)) or the maximum value (max f (x)) within finiteinterval can be obtained in one of the extreme value pointsof f (x) or the boundary points. Thus, the optimal solutionof the above problem can be calculated by solving for thederivative being zero and comparing the extreme value pointswith the boundary points. Alternatively, we can perform one-dimensional exhaustive search on Pc within the finite inter-val. Assuming the iteration precision of transmission poweris 1/Mpo (i.e., Pc ∈ { 1

MpoPc,th, 2

MpoPc,th, . . . ,

MpoMpo

Pc,th}), wehave a computational complexity of O(Mpo), which is accept-able for practical deployment.

Likewise, setting Pc = Pc,th , we can obtain another simpli-fied subproblem, whose solution is denoted as λ∗

c-1-1Pc,th. Then

the solution of P-1-1 can be obtained as

λ∗c-1-1 = max

{λ∗

c-1-1Pc,th, λ∗

c-1-1Pd,th

}. (35)

Likewise, λ∗c-1-2 can be obtained by the same way.

According to (28), (32), and (35), the solution to the OP canbe achieved through the combinations of the solutions to theaforementioned several simplified subproblems.

Consequently, if the actual λc (QoS requirement) is smallerthan λ∗

c , the D2D connection can be admitted by this cellularlink.

In our paper, the transmission rate is equivalent to the packetsize in one slot. If we change the packet size, the achievablethroughput will be different. Thus, we can optimize the sta-ble throughput via adjusting the packet size. Since Sc denotesthe packet size of cellular link and Sc = Rc/T , the throughput

can be expressed as Scλc (bit/slot). The optimization problem(25) can be rewritten as

S∗c λ∗

c = maxPc,Pd ,Sc,Sd

Scλc, (bit/s) (36a)

s.t. R, (36b)

Pc ≤ Pc,th, Pd ≤ Pd,th (36c)

Sc > 0, Sd > 0, (36d)

where Sd = Rd/T is the packet size of the D2D link. Thisproblem can still be divided into those subproblems. Take thefollowing subproblem ((P-1-1Pd,th )) for example.

(P-1-1Pd,th) S∗c-1-1Pd,th

λ∗c-1-1Pd,th

= maxSc,Sd ,Pc∈APc ,P-1-1Pd,th

Sc

((1 − ρc) − λd

ρ(I )c − ρc

1 − ρ(I )d

), (37)

the solution of which requires a large amount of iterationssince it is difficult to obtain useful properties to simplifythis high-dimension mixed integer non-convex optimizationproblem. We assume the largest packet size is Mpa and theiteration precision of transmission power is 1/Mpo (i.e., Pc ∈{ 1

MpoPc,th, 2

MpoPc,th, . . . ,

MpoMpo

Pc,th}), which generate a com-

putational complexity of O(Mpo M2pa). The complexity will

exponentially increase with the admissions of multiple D2Dpairs, which makes the problem intractable. We consider thefact that a practical system always has finite discrete packetlengths due to finite coding and modulation strategies. Thus,we have finite (Sc, Sd) pairs and the optimization remains tobe a one-dimension search problem with complexity O(Mpo).We will provide the simulation results to show the throughputperformance with different packet sizes.

Remark: In an OFDMA-based LTE network, the resourcesare allocated in the unit of “resource blocks” (RBs). One RBconsists of 15 sub-carriers. The transmissions of the symbolson different sub-carriers are independent from each other. Foradmission control in our paper, we can separately obtain themaximal achievable packet arrival rate for each sub-carrier.Then, we compare the sum of all these rates with the over-all requirement for the packet arrival rate to determine theadmission decision.

C. Discussions

The underlaying transmission process between the D2D linkand the cellular link is shown in Fig. 2(a). In the conventionalmodel, the SINRs or data rates are calculated under the inter-ference scenario within each TS, which is equivalent to thetransmissions depicted in Fig. 2(b), where the blue dotted pack-ets may not exist in practice. Fig. 2(c) characterizes the TDMAtransmissions.

It is known that if the D2D link and the cellular link are closeto each other, TDMA transmissions will achieve better perfor-mance when simultaneously transmissions suffer from severeinter-link interference. Thus, with conventional assumptions,most of the D2D requests will be rejected. Instead, under thesame circumstance, the proposed analysis significantly expands

Page 9: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

LU et al.: STABLE THROUGHPUT REGION AND ADMISSION CONTROL 2817

Fig. 2. Packet-level transmission processes of different schemes.

the stable throughput region of the conventional model viasuccessfully capturing the real underlaying transmission andinterference scenarios. Consequently, the proposed region canachieve almost the same performance as that of TDMA whilethe conventional one have the worst behavior. This will beverified in Section V.

When the distance between the D2D link and the cellularlink is sufficiently large, the interference between them can betoo weak to degrades the simultaneously transmission rates.Thus, TDMA suffers from spectral inefficiency while under-laying transmissions obtain much better performance. Underthis circumstance, the region of the proposed model will notimprove much than that of the conventional model, which ischaracterized by the following property.

Property 1: In a single D2D scenario, if the stable through-put region of the conventional model exceeds that of TDMAtransmission, the stable throughput region of the proposedmodel in Theorem 1 will be the same as the conventional one.

Proof: According to the condition, given λc, the maximalachievable λd with simultaneously transmissions (λ∗

d,simult.) isno less than that with TDMA transmissions (λ∗

d,orth.). In theproposed model, all the TSs can be divided into two categories:only one of the transmitters sending the signal (marked as “A”in Fig. 2(a)) and simultaneously transmission (marked as “C”).For those TSs marked as “A”, the achievable packet rate of theD2D link will be no larger than λ∗

d,orth.. Likewise, for thoseTSs marked as “C”, the achievable packet rate of the D2Dlink will be no larger than λ∗

d,simult.. As a result, the maximalachievable λd of the proposed model will be no larger thanthe conventional one. Meanwhile, the proposed model containsthe simultaneously transmission scene. Therefore, the stablethroughput region of the proposed model will be the same asthe conventional one. �

This property will also be verified by simulations inSection V.

IV. MULTIPLE D2D PAIRS

In this section, we develop the stable throughput region basedadmission control algorithm for multiple D2D pairs scenario.

A. Stable Throughput Region

In a multiple D2D pairs scenario, we assume N (N > 1)D2D pairs share the same resource with one cellular link. Weuse λ0 and μ0 to denote the packet arrival and service ratesof the cellular link, respectively. The packet arrival and ser-vice rates of D2D pair n (n ∈ {1, 2, . . . , N }) are respectivelydenoted by λn and μn . In addition, P0 represents the trans-mission power of the cellular link and Pn corresponds to thetransmission power of D2D pair n. The channel gain fromthe transmitter of connection i to the receiver of connectionj (i, j ∈ {0, 1, 2, . . . , N }), where connection 0 stands for thecellular link, is Gi j ∼ exp(1/σ 2

i j ).The cellular transmissions suffer from the interferences from

all D2D pairs. With packet arrival rate λn and service rate μn ,D2D pair n either transmits (with probability λn

μn) or keeps silent

(with probability 1 − λnμn

) within each TS. Thus, for the cellular

link, there exist 2N interference states for each TS. We use 2N

vectors {v(0)1 , v(0)

2 , . . . , v(0)

2N } to describe different states where

v(0)k = (v(0)

k,1, v(0)k,2, . . . , v(0)

k,N ) (k ∈ {1, 2, . . . , 2N }), and

v(0)k,n =

{1 D2D pair n is transmitting0 D2D pair n keeps silent

(38)

Consequently, the service rate of the cellular link can becalculated by

μ0 =2N∑

k=1

Pr{v(0)k }(1 − ρv(0)

k), (39)

where Pr{v(0)k } is the probability of state k and ρv(0)

kis the cor-

responding outage probability. For D2D pair n, the probabilityof occupying the channel is Pr{Qn > 0} = λn

μn, where Qn is the

transmission queue of D2D pair n. Thus we have

Pr{

v(0)k

}=

N∏n=1

∣∣∣∣1 − v(0)k,n − λn

μn

∣∣∣∣ . (40)

ρv(0)k

is given by

ρv(0)k

= Pr

⎧⎪⎪⎪⎨⎪⎪⎪⎩

B log

⎛⎜⎜⎜⎝1+ P0G00

N∑n=1

vk,n PnGn0+N0+NI∑

i=1PIi G Ii 0

⎞⎟⎟⎟⎠<R0

⎫⎪⎪⎪⎬⎪⎪⎪⎭

,

(41)

where∑NI

i=1 PIi G Ii 0 is the inter-cell interference. Withoutloss of generality, for the simplification of the expressions,we let {N + 1, N + 2, . . . , N + NI } be the indexes for theinter-cell interfering nodes and v(0)

k,n = 1 for ∀n ∈ {N + 1, N +2, . . . , N + NI }. Then, based on Lemma 1, we have

Page 10: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

2818 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016

ρv(0)k

=1−N+NI∑n=1

v(0)k,n P0σ

200(Pnσ 2

n0)||v(0)

k ||1−1

N+NI∏i=1,i �=n,

v(0)k,i �=0

(Pnσ 2n0−Piσ

2i0)(η0 Pnσ 2

n0+P0σ200)

e− η0 N0

P0σ200 ,

(42)

where ||v(0)k ||1 = ∑N+NI

n=1 vk,n , η0 = 2R0B − 1 and R0 is the

threshold rate of the cellular connection.Likewise, for D2D pair n, we have

μn =2N∑

k=1

Pr{v(n)k }(1 − ρv(n)

k), (43)

where v(n)k = (v(n)

k,0, v(n)k,1, . . . , v(n)

k,n−1, v(n)k,n+1, . . . , v(n)

k,N , . . . ,

v(n)k,N+NI

) (k ∈ {1, 2, . . . , 2N }) and v(n)k,m = 1 for ∀m ∈

{N + 1, N + 2, . . . , N + NI }. The outage probability iscalculated by

ρv(n)k

=1−N+NI∑m=0,m �=n

v(n)k,m Pnσ 2

nn(Pmσ 2mn)||v

(n)k ||1−1

N+NI∏i=0,i �=n,i �=m

v(n)k,i �=0

(Pmσ 2mn−Piσ

2in)(ηn Pmσ 2

mn+Pnσ 2nn)

e− ηn N0

Pnσ2nn ,

(44)

where ηn = 2RnB − 1 and Rn is the threshold rate of D2D pair n.

The stable throughput constraint requires that for each con-nection n (n ∈ {0, 1, 2, . . . , N }), the average service rate ofthe data queue is larger than its packet arrival rate, i.e., μn >

λn . Thus, to obtain {μ0, μ1, . . . , μN }, we have to solve thefollowing equations:⎧⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎨

⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎩

μ0 =2N∑

k=1

N∏i=1

∣∣∣∣1 − v(0)k,i − λi

μi

∣∣∣∣ · (1 − ρv(0)k

)

μ1 =2N∑

k=1

N∏i=0,i �=1

∣∣∣∣1 − v(1)k,i − λi

μi

∣∣∣∣ · (1 − ρv(1)k

)

...

μn =2N∑

k=1

N∏i=0,i �=n

∣∣∣∣1 − v(n)k,i − λi

μi

∣∣∣∣ · (1 − ρv(n)k

)...

μN =2N∑

k=1

N−1∏i=0

∣∣∣∣1 − v(N )k,i − λi

μi

∣∣∣∣ · (1 − ρv(N )k

)

. (45)

We cannot obtain the closed-form packet service rates andthroughput region based on the above equations. It is alsoknown that it is very difficult to obtain the exact charac-terization of the stability region of the network with multi-ple interacting queues [32], [41]. The objective of deducingstable throughput region is to determine whether those wirelessconnections can share the same resource with each other. Thus,

Algorithm 1. Decision process on the stability of the multipleD2D pairs scenario

1: Input: (λ0, λ1, . . . , λN ), (P0, P1, . . . , PN ), and(R0, R1, . . . , RN );

2: Initialization: set precision ε;3: (μ

(1)0 , μ

(1)1 , . . . , μ

(1)N )=(1−ρv(0)

k̂, 1−ρv(1)

k̂, . . . , 1 − ρv(N )

k̂),

where v(0)

k̂= v(1)

k̂= · · · = v(N )

k̂= (0, 0, . . . , 0, vk̂,N+1 =

1, 1, . . . , 1).4: j = 15: repeat6: j = j + 1;7: for n = 0 to N do8:

μ( j)n =

2N∑k=1

N∏i=0,i �=n

∣∣∣∣∣∣1 − v(n)k,i − λi

μ( j−1+� i

j �)i

∣∣∣∣∣∣ · (1 − ρv(n)k

);

9: end for10: εmax = max{μ( j)

0 − μ( j−1)

0 , . . . , μ( j)N − μ

( j−1)N };

11: until εmax < ε or μjn < λn ∃n

12: If μjn > λ j ∀n, (λ0, λ1, . . . , λN ) belongs to the stable

throughput region, i.e., the N D2D pairs can share the samespectrum with the cellular link.

we propose the following algorithm to examine whether thetransmissions of the cellular link and N D2D pairs can sat-isfy the QoS requirements, i.e., supporting packet arrival rates(λ0, λ1, . . . , λN ), when reusing the same spectrum.

Within the first iteration of the proposed algorithm, we let

(1)0 , μ

(1)1 , . . . , μ

(1)N

)=(

1 − ρv(0)

k̂, 1 − ρv(1)

k̂, . . . , 1 − ρv(N )

),

(46)where v(0)

k̂= v(1)

k̂= · · · = v(N )

k̂= (0, 0, . . . , 0, vk,N+1 = 1, 1,

. . . , 1). This is corresponding to the ideal case that each linkis only affected by the inter-cell interference and free fromintra-cell interference. Then, based on (μ

(1)0 , μ

(1)1 , . . . , μ

(1)N ),

we can calculate μ(2)0 according to (45). Then, based on

(μ(2)0 , μ

(1)1 , . . . , μ

(1)N ), we obtain μ

(2)1 · · · . After one iteration,

we have the updated service rates as (μ(2)0 , μ

(2)1 , . . . , μ

(2)N ). It is

obvious that μ(2)n < μ

(1)n , ∀n.

Within the j th iteration, μ( j+1)

0 is obtained based on

(μ( j)0 , μ

( j)1 , . . . , μ

( j)N ). μ

( j+1)n is calculated according to

(μ( j+1)

0 , . . . , μ( j+1)

n−1 , μ( j)n+1, . . . , μ

( j)N ). At the end of each

iteration, we compare (μ( j+1)

0 , μ( j+1)

1 , . . . , μ( j+1)N ) with

(μ( j)0 , μ

( j)1 , . . . , μ

( j)N ). If for each n, we have μ

( j+1)n − μ

( j)n ≤

ε, where ε is the pre-defined precision, the iterations end.Finally, if and only if μn > λn , ∀n, we conclude that(λ0, λ1, . . . , λN ) belongs to the stable throughput region. Theoverall algorithm is presented in Algorithm 1.

For the multiple D2D pairs scenario, the transmission prob-abilities can also be configured through (21) with rn = λn

μn.

Page 11: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

LU et al.: STABLE THROUGHPUT REGION AND ADMISSION CONTROL 2819

B. Admission Control

We assume that there already exist N − 1 (N > 1) D2D pairscoexisting with one CUE by sharing the same spectrum band.Then, a new D2D pair requests to access the same spectrum.However, since we cannot obtain the closed-form expressionson the service rate of each link and the stable throughput regionas well, it is difficult to analytically adjust the transmissionpowers to obtain the maximum acceptable packet arrival rate forthe incoming D2D pair. The exhaustive search on transmissionpowers results in a computational complexity of O(M N+1

po ).The number of D2D pairs is assumed to be smaller than thatof CUEs since two users in the same cell communicate witheach other will not often happen [12], [42], [43]. Under mostcircumstances, owing to small N = 2, 3, the exhaustive searchcan be deployed in real networks.

With the increase of N , to reduce the computations, we donot reconfigure the transmission powers of the existing cellularand D2D connections when assigning power to the incomingD2D request, i.e., {P0, P1, P2, . . . , PN−1} are prior knowledgeand fixed. We only need to determine the transmission powerfor the incoming D2D pair. The computational complexity isreduced to be O(Mpo). If there exist multiple transmissionpowers of the N th D2D pair (PN ,1, PN ,2, . . .), which can sat-isfy the stable throughput constraint, we select the power basedon minimizing the energy consumptions. Lower energy con-sumptions not only achieve energy efficiency, but also representlower interference from the D2D link to the cellular connec-tion and vice versa. As a result, more future D2D requestshave access to the cellular spectrum. Mathematically, the powerallocation strategy is formulated as

P∗N = arg min

PN ,i ∈RPN ,i

λN

μN ,i, (47)

where R is the stable throughput region and μN ,i is the packetservice rate when adopting the transmission power PN ,i .

In simulations, we will provide the results for both exhaustivesearch and the above discussed one-dimensional search -basedpower allocation schemes.

V. NUMERICAL RESULTS

This section investigates the performance of the proposedmodel through Monte Carlo simulations to verify the signifi-cant improvement of proposed model. The channel model arepresented in Table II, according to 3GPP evaluation guide-line [44]. In addition, due to short-distance communications ofD2D pairs, we set the path-loss exponent for a D2D link tobe 3 [45] and the path-loss exponent for other links to be 4.The cell radius is 250m and the inter-cell interference is basedon the stochastic geometry model in [19]. According to Friisformula, in 2GHz carrier, additional 38dB path loss is consid-ered. We assume 1000 slots in one second and the packet sizeis 1000bits. The distance between each D2D transmitter andD2D receiver is 20m. We compare the proposed model withthe common conventional model, where whether the D2D paircan be admitted or not is determined based on calculated SINRswhich only characterize the scenario that inter-user interferencealways exists [10]–[19].

TABLE IISIMULATION PARAMETERS

Firstly, we consider the single D2D pair scenario, whereuplink resources are reused. The stable throughput regions indifferent scenarios are given in Fig. 3. The distance betweenthe BS and the CUE (Lcc) is fixed as 100m, and the loca-tion coordinate (in m) of each node is configured in Table III.Thus, the distance between the cellular transmitter to the D2Dreceiver (Lcd ), and the distance between the D2D transmitter tothe cellular receiver (Ldc) in Fig. 3(a) are Lcd = Ldc ≈ 65m.Likewise, we have Lcd = Ldc ≈ 80m in Fig. 3(b) and Lcd =Ldc ≈ 95m in Fig. 3(c). Throughout the entire region of λc, wecalculated the maximum achievable λd and obtain the curvesof the stable throughout region. For the proposed model, thenotation “Theory” stands for the results calculated through thetheoretical analysis in Sec.III-B while “Simulation” denotes theresults from exhaustive search on transmission powers. TheTDMA region with two-user case is known as a straight lineλc + λd ≈ 1 and will not change with different location con-figurations. Thus, for simplification, we do not plot its curvein Fig. 3(a) and 3(c). The dotted lines are the simulationresults which take shadow fading into considerations. Smalldistance leads to severe interference, which requires more accu-rate characterizations on the interference scenario. Thus, whenthe distance between the two links is small, the proposed modelsignificantly enlarges the stable throughput region of the con-ventional one. With the increase of the distance between the twolinks, the conventional region approaches the proposed one andall of them achieve the same boundary when the conventionalone reaches the TDMA region, as depicted in Fig. 3(b). Afterthat, when the distance between the two links continues increas-ing, where the inter-link interference is too small to affect eachother’s transmissions, both the conventional region and the pro-posed one outperform that of TDMA, as shown in Fig. 3(c).In addition, the solid lines are based on the scenarios whichonly include path loss and Rayleigh fading. It is obvious thatthe simulation results match the theoretical calculations, whichvalidates the analysis.

Moreover, detailed test on throughput behaviors of the pro-posed model, based on different locations of D2D pairs, is givenin Fig. 4. The following results are obtained from the theoret-ical computations. For simplification, we still let Lcd = Ldc.The notation “Distance” represents the distance between theD2D pair and the cellular link Lcd(Ldc). When the D2D pairis close to the cellular link, the interactions between eachother are strong and accurate interference model is especiallynecessary to provide insights on transmissions. Meanwhile,with small packet arrival rates, the collision rarely occurs.Thus, the performance of the proposed model approaches that

Page 12: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

2820 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016

Fig. 3. The stable throughput regions of single D2D pair scenarios.

TABLE IIILOCATION COORDINATES (IN M) IN SIMULATION SCENARIOS,

TX:TRANSMITTER, RX:RECEIVER

Fig. 4. Throughput behaviors with different distances between the D2D pairand CUE. Single D2D pair scenario. Lcc = 100m.

of TDMA transmissions. Then, with the increase of the dis-tance, the mutual interferences become weak. According toProperty 1, the underlay transmissions achieve the best behav-ior. Under these circumstances, the maximum accessible packetrates computed via the proposed model are the same as thoseof the conventional one. Finally, with sufficiently large dis-tance, all the curves approach (1 − ρd) ≈ 1. Based on the aboveexperiments, the proposed model can always obtain the bestperformance in different kinds of scenarios. Especially withunderlaying networks, our results demonstrate the potential toexplore the possibility of reusing the cellular resources near theD2D pairs, admitting more D2D pairs to the limited cellularresources.

Fig. 5. Admission behaviors with different locations of CUE. Single D2D pairscenario. λc = 0.5.

Fig. 6. Throughput behaviors when adjusting packet sizes. Single D2D pairscenario.

Since the objective of improving throughput region is toadmit more D2D pairs, we use “Access Probability” in thefollowing figures. The “Access Probability” represents the

Page 13: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

LU et al.: STABLE THROUGHPUT REGION AND ADMISSION CONTROL 2821

Fig. 7. The stable throughput regions in a multiple D2D pair scenario. N = 2.

Fig. 8. Iteration behaviors of Algorithm 1.

possibility that the D2D pair can be admitted by specific cel-lular link in Monte Carlo simulations. We evaluate the systembehaviors when changing the distance (Lcc) between the BSand CUE, as shown in Fig. 5. With the increase of Lcc, theaccess probabilities decrease. This is because that with thesame requirement of data rate, longer distance requires largertransmit power, resulting in more interference. However, thecurves still accord with the trends discussed above, showingthe significant improvement of the proposed model. In addi-tion, with large Lcc, i.e., the CUE is on the edge of the cell,the access probabilities significantly decrease due to inter-cellinterference.

Fig. 6 presents the results when adjusting packet sizes Sc, Sd .The data arrival rate of the cellular link is fixed as 5 × 105bps.The transmission powers of both links are fixed. The horizon-tal axis of the solid line is Sc, where we change the packetsize of the cellular link and the packet size of the D2D linkis fixed as 1000bits. On the other hand, for the dotted line,we change the packet size of the D2D link while the packetsize of the cellular link is fixed as 1000bits. It is obvious that

Fig. 9. Admission behaviors of multiple D2D pairs scenarios. Lcc = 100m.

the maximum achievable data rates can be further improved bycarefully designing the packet sizes. Just as the discussions inSec. III-B, we can separately calculate the results with differ-ent packet sizes and find the optimal coding and modulationstrategies.

The above simulations are based on single D2D pair sce-nario. We extend our experiments to multiple D2D pairs. Thestable throughput regions, when two D2D pairs (N = 2) sharethe same resources with one cellular link, are plotted in Fig. 7,with simulation scenario configured in Table III. The resultsare obtained based on Algorithm 1 with error precision 0.01.As described in Property 1, the performance of the proposedmodel in single D2D pair scenario is equal to either TDMAtransmissions or the conventional model. However, throughFig. 7, it can be easily observed that the stable throughputregion of the proposed model can be larger than both TDMAtransmissions and the conventional model at the same time.Property 1 does not hold in multiple D2D pairs scenarios.

Before further experiments, we would like to examine theeffectiveness of the proposed Algorithm 1. Thus, Fig. 8

Page 14: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

2822 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016

provides the results of the iterations when N = 2 and N = 3.We adopt Monte Carlo simulations and obtain the averagenumber of iterations for one “successful cycle”, where one“successful cycle” is that the changes of the service rates do notexceed the error precision and the stable throughput constraintsare also satisfied after certain times of iterations. Although theclosed-form expressions on the stable throughput regions formultiple D2D pairs scenarios are unavailable, we can determinethe stabilities after a small amount of calculation. In addi-tion, due to the fast convergence, the configuration of the errorprecision will not significantly affect the system performance.

The further simulation results are presented Fig. 9. TheD2D pairs are uniformly distributed in cellular and the averagepacket arrival rates of D2D pairs are uniformly distributed in[0,1]. According to the two admission strategies mentioned inSec. IV-B, “Prop.” denotes the exhaustive method, and “Prop.-low” stands for the scenario where the D2D pairs are admittedone by one and we only configure the transmission power ofthe incoming D2D pair. We can see from the figure that eventhe low-complexity strategy “Prop.-low” can achieve better per-formance than that of conventional model. With large N , theaccuracy of actual interference model plays a more significantrole in determining network performance. Thus our proposedmodel achieves more significant improvement with the increaseof N .

VI. CONCLUSION AND FUTURE WORK

In this paper, we introduce stable throughput analysis intoD2D communications underlaying cellular networks, takinginto consideration the packet arrival and service process at eachtransmitter. A new cross-layer model is established to character-ize the actual inter-user interference scenarios between cellularconnection and D2D link when they share the same resources.The stable throughput region is derived as a guideline for BSto determine whether two wireless connections can share thesame resources. Subsequently, the model and theoretical anal-ysis are extended to a generalized scenario where multipleD2D pairs reuse the same cellular resources. Furthermore, weintroduce a low-complexity dynamic admission control schemeto deal with the admission process for the incoming D2Drequests. As a consequence, the proposed model outperformsboth TDMA and the conventional one, expanding the admissionregion for D2D pairs by accurately characterizing the inter-ference scenarios. With the increase of the number of D2Dpairs that reuse the same cellular resources, the improvementof the proposed model becomes more significant. Such signifi-cant improvement is verified through simulations under variousscenes.

For the future work, we seek for the hybrid transmissionstrategy to further improve the throughput region since eitherorthogonal or non-orthogonal scheduling has its advantagesunder certain circumstances. To be specific, when multiple linksshare the same resources, we can let those links which causesevere interference to each other perform orthogonal trans-missions and those links which are far away from each otherform a random access system. The optimal mode selection andscheduling design need to be fully studied.

APPENDIX APROOF OF LEMMA 1

The proof of (9) can be found in [46].Then, setting t̃ = ∑N

n=1 tn , based on (9), we have

Pr

⎧⎪⎪⎪⎨⎪⎪⎪⎩

tN∑

n=1tn + a

< b

⎫⎪⎪⎪⎬⎪⎪⎪⎭

= E|t̃{Pr{t < b(t̃ + a)|t̃}}

=∫ ∞

0

N∑n=1

σ2(N−2)n

N∏m=1,m �=n

(σ 2n − σ 2

m)

e− t̃

σ2n

(1 − e

b(t̃+a)

σ2

)dt̃

= 1 −N∑

n=1

σ 2σ2(N−1)n

N∏m=1,m �=n

(σ 2n − σ 2

m)(bσ 2n + σ 2)

e− ab

σ2 . (48)

Thus, (10) is also verified.

APPENDIX BPROOF OF THEOREM 1

According to (2), in order to obtain the stable throughputregion, we are supposed to derive the expressions on μc andμd . Replacing μd in (3) with (4), we have

a1μ2c + a2μc + a3 = 0, (49)

where

a1 = 1 − ρd , (50)

a2 = λd(ρ(I )c − ρc) − (1 − ρc)(1 − ρd) − λc(ρ

(I )d − ρd),

(51)

and

a3 = λc

(I )d − ρd

)(1 − ρc). (52)

Let f (μc) = a1μ2c + a2μc + a3, a quadratic function. First, we

should prove the existence of solution in the interval μc ∈(0, 1 − ρc]. Since ρc is the outage probability under non-interference circumstance, the largest achievable service rateis no more than 1 − ρc. It is easy to prove that f (0) > 0,

f (1 − ρc) > 0, 0 < −a2/2a1 < 1 − ρc. Thus, based on theproperties of a quadratic function, the existence of solution isequivalent to = a2

2 − 4a1a3 ≥ 0, i.e.,

(I )d −ρd

)2λ2

c−2(ρ

(I )d −ρd

) [λd

(ρ(I )

c −ρc

)+(1−ρc)(1−ρd)

]λc+

[λd

(ρ(I )

c −ρc

)−(1−ρc)(1−ρd)

]2 ≥0,

(53)

Page 15: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

LU et al.: STABLE THROUGHPUT REGION AND ADMISSION CONTROL 2823

the solution of which is⎧⎪⎪⎪⎪⎪⎪⎪⎪⎨⎪⎪⎪⎪⎪⎪⎪⎪⎩

(a) : λc ≤

(√λd(ρ

(I )c − ρc) − √

(1 − ρc)(1 − ρd)

)2

ρ(I )d − ρd

or (b) : λc ≥

(√λd(ρ

(I )c − ρc) + √

(1 − ρc)(1 − ρd)

)2

ρ(I )d − ρd

⎫⎪⎪⎪⎪⎪⎪⎪⎪⎬⎪⎪⎪⎪⎪⎪⎪⎪⎭

(54)

Since

(√λd (ρ

(I )c −ρc)+√

(1−ρc)(1−ρd )

)2

ρ(I )d −ρd

> 1 − ρc, only

(54).(a) needs to be satisfied. Then, according to λc < μc, we

have λc <

√a2

2−4a1a3−a2

2a1. The solution of λc <

√a2

2−4a1a3−a2

2a1is

expressed as⎧⎪⎪⎪⎪⎨⎪⎪⎪⎪⎩

(a) : λc < (1 − ρc) − λdρ

(I )c − ρc

1 − ρ(I )d

or (b) : λc <(1 − ρc)(1 − ρd) − λd

(I )c − ρc

)2 − ρd − ρ

(I )d

⎫⎪⎪⎪⎪⎬⎪⎪⎪⎪⎭

(55)

Based on (54).(a) and (55).(a), it is easy to prove that

(1 − ρc) − λdρ

(I )c −ρc)

1−ρ(I )d

≤(√

λd (ρ(I )c −ρc)−√

(1−ρc)(1−ρd )

)2

ρ(I )d −ρd

. Thus,

(18).(a) is verified. Likewise, we can obtain (18).(b) throughλd < μd . Meanwhile, (19) is based on (54).(a), (55).(b) and thecorresponding expression on λd .

REFERENCES

[1] G. Fodor et al., “Design aspects of network assisted device-to-devicecommunications,” IEEE Commun. Mag., vol. 50, no. 3, pp. 170–177,Mar. 2012.

[2] L. Song, D. Niyato, Z. Han, and E. Hossain, Wireless Device-to-DeviceCommunications and Networks. Cambridge, U.K.: Cambridge Univ.Press, 2013.

[3] C. H. Yu, O. Tirkkonen, K. Doppler, and C. Ribeiro, “Power optimizationof device-to-device communication underlaying cellular communica-tion,” in Proc. IEEE Int. Conf. Commun. (ICC), Dresden, Germany, Jun.2009, pp. 1–5.

[4] C. H. Yu, K. Doppler, C. Ribeiro, and O. Tirkkonen, “Resource sharingoptimization for device-to-device communication underlaying cellularnetworks,” IEEE Trans. Wireless Commun., vol. 10, no. 8, pp. 2752–2763,Aug. 2011.

[5] H. Zhu and J. Wang, “Device-to-device communication in cellular net-works with fractional frequency reuse,” in Proc. IEEE Int. Conf. Commun.(ICC), Sydney, NSW, Australia, Jun. 2014, pp. 5503–5507.

[6] Q. Ye, M. Al-Shalash, C. Caramanis, and J. G. Andrews, “Resource opti-mization in device-to-device cellular systems using time-frequency hop-ping,” IEEE Trans. Wireless Commun., vol. 13, no. 10, pp. 5467–5480,Oct. 2014.

[7] S. Xu, H. Wang, T. Chen, Q. Huang, and T. Peng, “Effective interferencecancellation scheme for device-to-device communication underlayingcellular networks,” in Proc. IEEE Veh. Technol. Conf. (VTC-Fall), Ottawa,ON, Canada, Sep. 2010, pp. 1–5.

[8] G. Fodor and N. Reider, “A distributed power control scheme for cellu-lar network assisted D2D communications,” in Proc. IEEE GLOBECOM,Houston, TX, USA, Dec. 2011, pp. 1–6.

[9] H. Min, W. Seo, J. Lee, S. Park, and D. Hong, “Reliability improvementusing receive mode selection in the device-to-device uplink period under-laying cellular networks,” IEEE Trans. Wireless Commun., vol. 10, no. 2,pp. 413–418, Feb. 2011.

[10] H. Min, J. Lee, S. Park, and D. Hong, “Capacity enhancement using aninterference limited area for device-to-device uplink underlaying cellularnetworks,” IEEE Trans. Wireless Commun., vol. 10, no. 12, pp. 3995–4000, Dec. 2011.

[11] M. C. Erturk, S. Mukherjee, H. Ishii, and H. Arslan, “Distributions oftransmit power and SINR in device-to-device networks,” IEEE Commun.Lett., vol. 17, no. 2, pp. 273–276, Feb. 2013.

[12] D. Feng, L. Lu, Y. Yuan-Wu, G. Y. Li, G. Feng, and S. Li, “Device-to-device communications underlaying cellular networks,” IEEE Trans.Commun., vol. 61, no. 8, pp. 3541–3551, Aug. 2013.

[13] S. Shalmashi, G. Miao, and S. B. Slimane, “Interference managementfor multiple device-to-device communications underlaying cellular net-works,” in Proc. IEEE 24th Int. Symp. Pers. Indoor Mobile RadioCommun. (PIMRC), London, U.K., Sep. 2013, pp. 223–227.

[14] Y. Chai, Q. Du, and P. Ren, “Partial time-frequency resource allocationfor device-to-device communications underlaying cellular networks,” inProc. IEEE Int. Conf. Commun. (ICC), Budapest, Hungary, Jun. 2013,pp. 6055–6059.

[15] D. Zhu, J. Wang, A. L. Swindlehurst, and C. Zhao, “Downlink resourcereuse for device-to-device communications underlaying cellular net-works,” IEEE Signal Process. Lett., vol. 21, no. 5, pp. 531–534,May 2014.

[16] W. Zhao and S. Wang, “Low complexity power allocation for device-to-device communication underlaying cellular networks,” in Proc. IEEE Int.Conf. Commun. (ICC), Sydney, NSW, Australia, Jun. 2014, pp. 5532–5537.

[17] L. Song, D. Niyato, Z. Han, and E. Hossain, “Game-theoretic resourceallocation methods for device-to-device communication,” IEEE WirelessCommun., vol. 21, no. 3, pp. 136–144, Jun. 2014.

[18] F. Wang, L. Song, Z. Han, Q. Zhao, and X. Wang, “Joint schedulingand resource allocation for device-to-device underlay communication,”in Proc. IEEE Wireless Commun. Netw. Conf. (WCNC), Shanghai, China,Apr. 2013, pp. 732–737.

[19] X. Lin, J. G. Andrews, and A. Ghosh, “Spectrum sharing for device-to-device communications in cellular networks,” IEEE Trans. WirelessCommun., vol. 13, no. 12, pp. 6727–6740, Dec. 2014.

[20] C. Ma, G. Sun, X. Tian, K. Ying, H. Yu, and X. Wang, “Cooperativerelaying schemes for device-to-device communication underlaying cel-lular networks,” in Proc. IEEE GLOBECOM, Atlanta, GA, USA, Dec.2013, pp. 3890–3895.

[21] Y. Pei and Y.-C. Liang, “Resource allocation for device-to-devicecommunications overlaying two-way cellular networks,” IEEETrans. Wireless Commun., vol. 12, no. 7, pp. 3611–3621, Jul.2013.

[22] M. Hasan, E. Hossain, and D. I. Kim, “Resource allocation under channeluncertainties for relay-aided device-to-device communication underlay-ing LTE-A cellular networks,” IEEE Trans. Wireless Commun., vol. 13,no. 4, pp. 2322–2338, Apr. 2014.

[23] L. Wei, R. Q. Hu, Q. C. Li, and G. Wu, “Energy-efficiency of multi-hop device-to-device communications underlaying cellular networks,” inProc. IEEE Int. Conf. Commun. (ICC), Sydney, NSW, Australia, Jun.2014, pp. 5486–5491.

[24] X. Wu et al., “FlashLinQ: A synchronous distributed scheduler forpeer-to-peer ad hoc networks,” IEEE/ACM Trans. Netw., vol. 21, no. 4,pp. 1215–1228, Aug. 2013.

[25] S. Haykin, “Cognitive radio: Brain-empowered wireless communica-tions,” IEEE J. Sel. Areas Commun., vol. 23, no. 2, pp. 201–220,Feb. 2005.

[26] B. Wang and K. J. R. Liu, “Advances in cognitive radio networks: Asurvey,” IEEE J. Sel. Topics Signal Process., vol. 5, no. 1, pp. 5–23,Feb. 2011.

[27] C. X. Jiang, Y. Chen, K. J. R. Liu, and Y. Ren, “Renewal-theoreticaldynamic spectrum access in cognitive radio networks with unknown pri-mary behavior,” IEEE J. Sel. Areas Commun., vol. 31, no. 3, pp. 406–416,Mar. 2013.

[28] S. Kompella, G. D. Nguyen, J. E. Wieselthier, and A. Ephremides,“Stable throughput tradeoffs in cognitive shared channels with coop-erative relaying,” in Proc. INFOCOM, Shanghai, China, Apr. 2011,pp. 1961–1969.

[29] A. Fanous and A. Ephremides, “Effect of secondary nodes on the pri-mary’s stable throughput in a cognitive wireless network,” in Proc.IEEE Int. Symp. Inf. Theory (ISIT), Cambridge, MA, USA, Jul. 2012,pp. 1807–1811.

[30] A. A. El-Sherif, A. K. Sadek, and K. J. R. Liu, “Opportunistic multi-ple access for cognitive radio networks,” IEEE J. Sel. Areas Commun.,vol. 29, no. 4, pp. 704–715, Apr. 2011.

Page 16: IEEE TRANSACTIONS ON WIRELESS …sig.umd.edu/publications/Lu_TWC_201604.pdfIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016 2809 Stable Throughput Region and

2824 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 4, APRIL 2016

[31] A. Fanous and A. Ephremides, “Stable throughput in a cognitive wire-less network,” IEEE J. Sel. Areas Commun., vol. 31, no. 3, pp. 523–533,Mar. 2013.

[32] W. Szpankowski, “Stability conditions for some distributed systems:Buffered random access systems,” Adv. Appl. Probab., vol. 26, pp. 498–515, 1994.

[33] A. K. Sadek, K. J. R. Liu, and A. Ephremides, “Cognitive multiple accessvia cooperation: Protocol design and stability analysis,” IEEE Trans. Inf.Theory, vol. 53, no. 10, pp. 3677–3696, Oct. 2007.

[34] A. A. El-Sherif and K. J. R. Liu, “Joint design of spectrum sensingand channel access in cognitive radio networks,” IEEE Trans. WirelessCommun., vol. 10, no. 6, pp. 1743–1753, Jun. 2011.

[35] I. Krikidis, B. Rong, and A. Ephremides, “Cooperation for multipleac-cess channel via dynamic decode-and-forward,” IEEE Trans. Inf. Theory,vol. 57, no. 12, pp. 7759–7770, Dec. 2011.

[36] R. Loynes, “The stability of a queue with non-interdependent interarrivaland service times,” Proc. Cambridge Philos. Soc., vol. 58, no. 3, pp. 497–520, 1962.

[37] D. Bertsekas and R. Gallager, Data Networks, 2nd ed. Englewood Clifffs,NJ, USA: Prentice-Hall, 1987.

[38] G. Boudreau, J. Panicker, N. Guo, R. Chang, N. Wang, and S. Vrzic,“Interference coordination and cancellation for 4G networks,” IEEECommun. Mag., vol. 47, no. 4, pp. 74–81, Apr. 2009.

[39] R. Madan, J. Borran, A. Sampath, N. Bhushan, A. Khandekar, and T. Ji,“Cell association and interference coordination in heterogeneous LTE-Acellular networks,” IEEE J. Sel. Areas Commun., vol. 28, no. 9, pp. 1479–1489, Dec. 2010.

[40] K. Doppler, M. Rinne, C. Wijting, C. B. Ribeiro, and K. Hugl, “Device-to-device communication as an underlay to LTE-Advanced networks,”IEEE Commun. Mag., vol. 47, no. 12, pp. 42–49, Dec. 2009.

[41] R. Rao and A. Ephremides, “On the stability of interacting queues in amultiple-access system,” IEEE Trans. Inf. Theory, vol. 34, no. 5, pp. 918–930, Sep. 1988.

[42] G. Yu, L. Xu, D. Feng, R. Yin, G. Y. Li, and Y. Jiang, “Joint mode selec-tion and resource allocation for device-to-device communications,” IEEETrans. Commun., vol. 62, no. 11, pp. 3814–3824, Nov. 2014.

[43] H. Min, J. Lee, S. Park, and D. Hong, “Capacity enhancement using aninterference limited area for device-to-device uplink underlaying cellularnetworks,” IEEE Trans. Wireless Commun., vol. 10, no. 12, pp. 3995–4000, Dec. 2011.

[44] 3GPP, “Further advancements for E-UTRA physical layer aspects(Release 9),” v.9.0.0, TR 36.814, Mar. 2010.

[45] H. Li, X. Xu, D. Hu, X. Qu, X. Tao, and P. Zhang, “Graph method basedclustering strategy for femtocell interference management and spectrumefficiency improvement,” in Proc. IEEE 6th Int. Conf. Wireless Commun.Netw. Mobile Comput. (WiCOM), Chengdu, China, Sep. 2010, pp. 1–5.

[46] S. M. Ross, Introduction to Probability Models, 8th ed. New York, NY,USA: Academic, 2003.

Hao Lu was born in 1989. He received the B.S.degree in electronic engineering and information sci-ence (EEIS) from the University of Science andTechnology of China (USTC), Hefei, China in 2011.He is currently pursuing the Ph.D. degree in com-munication and information systems at EEIS, USTC.From September 2014 to September 2015, he workedas a Visiting Scholar at the Signal and InformationGroup, Department of Electrical and ComputerEngineering, University of Maryland, College Park,MD, USA. His research interests include device-

to-device communications, co-operative communication, network coding,wireless sensor networks, and energy harvesting.

Yichen Wang (S’13–M’14) received the B.S.degree in information engineering and the Ph.D.degree in information and communications engi-neering from Xi’an Jiaotong University, Xi’an,China, in 2007 and 2013, respectively. He is cur-rently an Associate Professor of Information andCommunications Engineering with Xi’an JiaotongUniversity. From August 2014 to August 2015,he worked as a Visiting Scholar at the Signaland Information Group, Department of Electricaland Computer Engineering, University of Maryland,

College Park, MD, USA. He has authored more than 50 technical papers oninternational journals and conferences. His research interests include mobilewireless communications and networks with emphasis on cognitive radiotechniques, ad hoc networks, MAC protocol design, statistical QoS provision-ing, and resource allocation over wireless networks. He is currently servingas an Editor of KSII Transactions on Internet and Information Systems.He also serves and has served as the technical program committee mem-ber for many world-renowned conferences including the IEEE GLOBECOM,ICC, and VTC. He was the recipient of the Best Letter Award from IEICECommunications Society in 2010 and the Exemplary Reviewers Award fromIEEE COMMUNICATIONS LETTERS in 2014.

Yan Chen (SM’14) received the Bachelor’s degreefrom the University of Science and Technologyof China, Hefei, China, the M.Phil. degree fromHong Kong University of Science and Technology(HKUST), Hong Kong, and the Ph.D. degree from theUniversity of Maryland, College Park, MD, USA, in2004, 2007, and 2011, respectively. Being a found-ing member, he joined Origin Wireless Inc. as aPrincipal Technologist in 2013. He is currently aProfessor with the University of Electronic Scienceand Technology of China. His research interests

include data science, network science, game theory, social learning, and net-working, as well as signal processing and wireless communications. He wasthe recipient of multiple honors and awards including Best Paper Award atthe IEEE GLOBECOM in 2013, Future Faculty Fellowship and DistinguishedDissertation Fellowship Honorable Mention from the Department of Electricaland Computer Engineering in 2010 and 2011, the Finalist of the Dean’sDoctoral Research Award from the A. James Clark School of Engineering,the University of Maryland in 2011, and the Chinese Government Award foroutstanding students abroad in 2010.

K. J. Ray Liu (F’03) was named a DistinguishedScholar-Teacher of the University of Maryland,College Park, MD, USA, in 2007, where he is aChristine Kim Eminent Professor of InformationTechnology. He leads the Maryland Signals andInformation Group conducting research encompass-ing broad areas of information and communicationstechnology with recent focus on future wireless tech-nologies, network science, and information forensicsand security. Recognized by Thomson Reuters as aHighly Cited Researcher, he is a Fellow of AAAS.

He is a member of the IEEE Board of Directors. He was the Presidentof the IEEE Signal Processing Society, where he has served as the VicePresident—Publications and the Board of Governor. He has also served as theEditor-in-Chief of the IEEE Signal Processing Magazine. He was a recipientof the 2016 IEEE Leon K. Kirchmayer Technical Field Award on graduateteaching and mentoring, the IEEE Signal Processing Society 2014 SocietyAward, and the IEEE Signal Processing Society 2009 Technical AchievementAward. He was also the recipient of teaching and research recognitions fromUniversity of Maryland including university-level Invention of the Year Award,and college-level Poole and Kent Senior Faculty Teaching Award, OutstandingFaculty Research Award, and Outstanding Faculty Service Award, all from theA. James Clark School of Engineering.