A priority-based access control model for device-to-device communications underlaying cellular network using network calculus

Jun Huang, Zi Xiong, Jibi Li, Qianbin Chen, Qiang Duan, Yanxiao Zhao

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Abstract

Device-to-Device (D2D) communication has been proposed as a beneficial complement for cellular networks. Access control for D2D communications underlaying cellular network, however, has not received attention yet. In this paper, we investigate the access control for cellular and D2D communications in a single cell setting. We propose a prioritybased model to characterize access control of both cellular and D2D users. The proposed model prioritizes the cellular communications, cellular mode D2D communications, and reuse mode D2D communications with different priority levels. We then apply Network Calculus theory to analyze the worst-case performance for access control, including service rate, delay, and backlog for processing service requests of cellular and D2D communications. Both of the theoretical analysis and the numerical results verify that the proposed model is valid and applicable to characterize the access control for D2D underlaying cellular network.

Original languageEnglish (US)
Title of host publicationWireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings
EditorsZhipeng Cai, Chaokun Wang, Siyao Cheng, Hongzhi Wang, Hong Gao
PublisherSpringer Verlag
Pages613-623
Number of pages11
ISBN (Electronic)9783319077819
DOIs
StatePublished - 2014
Event9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014 - Harbin, China
Duration: Jun 23 2014Jun 25 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8491
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other9th International Conference on Wireless Algorithms, Systems and Applications, WASA 2014
CountryChina
CityHarbin
Period6/23/146/25/14

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'A priority-based access control model for device-to-device communications underlaying cellular network using network calculus'. Together they form a unique fingerprint.

  • Cite this

    Huang, J., Xiong, Z., Li, J., Chen, Q., Duan, Q., & Zhao, Y. (2014). A priority-based access control model for device-to-device communications underlaying cellular network using network calculus. In Z. Cai, C. Wang, S. Cheng, H. Wang, & H. Gao (Eds.), Wireless Algorithms, Systems and Applications - 9th International Conference, WASA 2014, Proceedings (pp. 613-623). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8491). Springer Verlag. https://doi.org/10.1007/978-3-319-07782-6_55