127
저작자표시-비영리-변경금지 2.0 대한민국 이용자는 아래의 조건을 따르는 경우에 한하여 자유롭게 l 이 저작물을 복제, 배포, 전송, 전시, 공연 및 방송할 수 있습니다. 다음과 같은 조건을 따라야 합니다: l 귀하는, 이 저작물의 재이용이나 배포의 경우, 이 저작물에 적용된 이용허락조건 을 명확하게 나타내어야 합니다. l 저작권자로부터 별도의 허가를 받으면 이러한 조건들은 적용되지 않습니다. 저작권법에 따른 이용자의 권리는 위의 내용에 의하여 영향을 받지 않습니다. 이것은 이용허락규약 ( Legal Code) 을 이해하기 쉽게 요약한 것입니다. Disclaimer 저작자표시. 귀하는 원저작자를 표시하여야 합니다. 비영리. 귀하는 이 저작물을 영리 목적으로 이용할 수 없습니다. 변경금지. 귀하는 이 저작물을 개작, 변형 또는 가공할 수 없습니다.

Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

저 시-비 리- 경 지 2.0 한민

는 아래 조건 르는 경 에 한하여 게

l 저 물 복제, 포, 전송, 전시, 공연 송할 수 습니다.

다 과 같 조건 라야 합니다:

l 하는, 저 물 나 포 경 , 저 물에 적 된 허락조건 명확하게 나타내어야 합니다.

l 저 터 허가를 면 러한 조건들 적 되지 않습니다.

저 에 른 리는 내 에 하여 향 지 않습니다.

것 허락규약(Legal Code) 해하 쉽게 약한 것 니다.

Disclaimer

저 시. 하는 원저 를 시하여야 합니다.

비 리. 하는 저 물 리 목적 할 수 없습니다.

경 지. 하는 저 물 개 , 형 또는 가공할 수 없습니다.

Page 2: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

Thesis for the Degree of Doctor of Philosophy

Self-organizing Resource Allocation for 5Gcellular Networks

S. M. Ahsan Raza Kazmi

Department of Computer Science & EngineeringGraduate School

Kyung Hee UniversitySouth Korea

August 2017

Page 3: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

Self-organizing Resource Allocation for 5Gcellular Networks

S. M. Ahsan Raza Kazmi

Department of Computer Science & EngineeringGraduate School

Kyung Hee UniversitySouth Korea

August 2017

Page 4: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular
Page 5: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

Dedicated To

my beloved parents and wife for their never ending support.

Page 6: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

Abstract

The modern mobile communication by incorporating novel bandwidth hungry applications has

revolutionized our life by empowering us in optimizing our daily life operations, economics and

health. These bandwidth hungry applications has evolved at a very rapid pace, thus, generating a

tsunami of mobile traffic on the existing mobile networks. Moreover, mobile users analyze, gather

and share a huge amount of information among different peers in the network. Thus, operators

are forced to keep up with the requirements of the mobile users and find novel technologies and

solutions to handle this tsunami of mobile traffic.

The existing network capacities requires significant enhancements to cope with the growing

demands of end users. In current mobile network architecture, the major bottleneck is the radio

access networks (RANs) which are typically wireless networks. The dynamic nature of wireless

communications makes these RANs highly uncertain and random. Therefore, the challenge for

the future mobile networks is to design high capacity RANs to handle the growing users’ demand.

However, this would require novel RAN access algorithms and will present novel challenges that

need to be addressed.

A number of challenges need to be addressed to bring the next generation RAN into fruition.

The biggest challenge in RAN pertains to the limited available wireless spectrum. The spectrum

suffers from congestion due to i) exponential increase in number of wireless devices such as smart

phones and tablets ii) novel and abundant bandwidth hungry applications such as online gaming,

high definition videos etc. Therefore, the main goal is to develop efficient RAN schemes that can

deal with scheduling, interference mitigation, resource allocation and power control in this limited

spectrum.

In this dissertation, we consider two 5G RAN enablers, i.e., dense small cell network and

i

Page 7: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

ii

device to device network, each with its respective network optimization problem and challenges.

We design a self-organizing RAN access scheme for both these enabling technologies.

The first scheme is designed for heterogeneous mobile networks which involves solving a net-

work optimization problem that deals with resource allocation for dense networks. Small-cell base

stations have been proposed for the current and next generation cellular network to increase net-

work capacity and reduce the outage. The goal is to reuse the allocated resources in the cellular-tier

by protecting them from harmful interference. The challenge is to solve the classical problem in a

self-organizing or in an autonomous manner without heavy messages exchange. We propose two

schemes to solve this problem. The first scheme is developed by applying the duality-based op-

timization approach, which enables distributed implementation. The second scheme, that enables

coordination, is devised based on matching theory. Simulation results show that the proposed

duality-based scheme outperforms the greedy approach by 4% in terms of sum-rate whereas the

matching-based scheme with tier-coordination yields performance gains up to 17% compared with

the duality-based approach.

The second scheme is designed for dense device-to-device (D2D) communications over ex-

isting mobile cellular networks. Spectrum efficiency can be enhanced by enabling the D2D com-

munication, thus, enhancing the network throughput of existing networks. However, enabling

D2D communication in an underlay fashion poses a significant challenge pertaining to interfer-

ence management. We formulate our problem as a combinatorial problem in which the objective

is to maximize the network utility of all D2D pairs. To solve this problem, a learning framework

is proposed based on a problem-specific Markov chain. From the local balance equation of the

designed Markov chain, the transition probabilities are derived for distributed implementation.

Then, a novel two phase algorithm is developed to perform mode selection and resource allocation

in the respective phases. This algorithm converges to a near-optimal solution. Moreover, to reduce

the computation in the learning framework, two resource allocation algorithms based on matching

theory are proposed to output a specific and deterministic solution. The first algorithm employs the

one-to-one matching game approach, whereas, in the second algorithm, the one-to many matching

game with externalities and dynamic quota is employed. Simulation results show that the proposed

framework converges to a near optimal solution under all scenarios with probability one. More-

Page 8: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

iii

over, our results show that the proposed matching game with externalities achieves a performance

gain of up to 35% in terms of the average utility compared to a classical matching scheme with no

externalities.

Page 9: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

Acknowledgement

In the name of Allah, the Beneficent, the Merciful.

”Read! In the Name of your Lord, Who has created (all that exists), He has created man from

a clot (a piece of thick coagulated blood) Read! And your Lord is the Most Generous, Who has

taught (the writing) by the pen. He has taught man that which he knew not.”

(Quran: Chapter 96: Surah Al-Alaq (The Clot), verses 1-5.)

Above all, I thanks Almighty ALLAH for bestowing His blessings in every possible form upon

me. He gave me strength, courage, patience through which I was able to cope with all obstacles

during this PhD journey. Without His blessing, I could not have made any step forward.

I would like to offer my sincere gratitude to my honorable advisor, Professor Choong Seon

Hong who has spent an enormous deal of time and effort during my studies. I am extremely

grateful for the time, esteemed guidance and advice that helped me in shaping up my research and

achieving significant improvement in this dissertation. I would also like to thank to all my thesis

committee members for providing insightful and constructive comments to significantly improve

the quality of this dissertation.

Next, I would like to thank Dr. Nguyen H. Tran and Mr. Ho Manh Tai, who have helped

and given constructive criticism on my works. The insights provided by them have helped in

significantly improving my work. I also appreciate all the colleagues from Networking Lab for

their generous support that helped making my life in Korea easier.

Lastly, I have no words to express my gratitude to my family for their infinite love, encourage-

ment, and support, especially my parents, S. Azhar Ali Kazmi and S. Nafisa Azhar. I would like

to acknowledge their sacrifices.

S. M. Ahsan Kazmi

iv

Page 10: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

Table of Contents

Abstract i

Acknowledgment iv

Table of Contents v

List of Figures viii

1 Introduction 1

1.1 Background and Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

1.2 Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

1.3 Contribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

1.3.1 Resource Allocation in Heterogeneous Networks . . . . . . . . . . . . . 5

1.3.2 Resource Allocation in Device-to-Device Communications . . . . . . . . 6

1.4 Related Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

1.4.1 Resource Allocation in Heterogeneous Wireless Networks . . . . . . . . 7

1.4.2 Resource Allocation in Device-to-Device Communications . . . . . . . . 8

1.5 Structure of the Dissertation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

Chapter 2 Resource Allocation in Heterogeneous Wireless Networks 12

2.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

2.2 Background and Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

2.3 System Model and Problem Definition . . . . . . . . . . . . . . . . . . . . . . . 14

2.3.1 Resource Allocation and Link Models . . . . . . . . . . . . . . . . . . . 16

v

Page 11: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

vi

2.3.2 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

2.4 Optimization-based Resource Allocation . . . . . . . . . . . . . . . . . . . . . 17

2.4.1 Problem Relaxation and Dual Decomposition . . . . . . . . . . . . . . . 17

2.4.2 Algorithm Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

2.5 Matching-based Resource Allocation . . . . . . . . . . . . . . . . . . . . . . . 21

2.5.1 Matching theory preliminaries . . . . . . . . . . . . . . . . . . . . . . . 21

2.5.1.1 Preferences of the players . . . . . . . . . . . . . . . . . . . . 21

2.5.1.2 Proposed algorithm . . . . . . . . . . . . . . . . . . . . . . . 25

2.5.1.3 Practical Implementation . . . . . . . . . . . . . . . . . . . . 26

2.6 Numerical Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

2.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

Chapter 3 Resource Allocation in underlay Device-to-Device Communications 38

3.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

3.2 Background and Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

3.3 System Model and Problem Definition . . . . . . . . . . . . . . . . . . . . . . . 42

3.3.1 Resource Allocation and Link Model . . . . . . . . . . . . . . . . . . . 42

3.3.2 D2D Decision and Mode Selection model . . . . . . . . . . . . . . . . . 43

3.3.3 Problem Formulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

3.4 JMARA via Markov Approximation . . . . . . . . . . . . . . . . . . . . . . . . 46

3.4.1 Step 1: Log-sum-exp Approximation . . . . . . . . . . . . . . . . . . . 47

3.4.2 Step 2: Markov Chain (MC) . . . . . . . . . . . . . . . . . . . . . . . . 48

3.4.3 Learning Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

3.5 Resource Allocation via Matching . . . . . . . . . . . . . . . . . . . . . . . . . 54

3.5.1 Case 1: Partial-Reuse Mode . . . . . . . . . . . . . . . . . . . . . . . . 54

3.5.1.1 Matching Game Formulation . . . . . . . . . . . . . . . . . . 55

3.5.1.2 Preference Profiles of Players . . . . . . . . . . . . . . . . . . 55

3.5.1.3 Resource Allocation Algorithm . . . . . . . . . . . . . . . . . 57

3.5.2 Case 2: Full-Reuse mode . . . . . . . . . . . . . . . . . . . . . . . . . . 60

3.5.2.1 Matching Game Formulation . . . . . . . . . . . . . . . . . . 61

Page 12: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

vii

3.5.2.2 Preference Profiles of Players . . . . . . . . . . . . . . . . . . 62

3.5.2.3 Preferences and Externalities . . . . . . . . . . . . . . . . . . 63

3.5.2.4 Resource Allocation Algorithm . . . . . . . . . . . . . . . . . 64

3.5.3 Computation Complexity and Implementation . . . . . . . . . . . . . . . 70

3.5.4 Example Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

3.5.4.1 Partial-Reuse Mode . . . . . . . . . . . . . . . . . . . . . . . 72

3.5.4.2 Full-Reuse Mode . . . . . . . . . . . . . . . . . . . . . . . . 72

3.5.4.3 Full-Reuse Mode without Handling Externalities . . . . . . . . 74

3.6 Simulation Results and Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . 76

3.6.1 Simulation Results for Learning . . . . . . . . . . . . . . . . . . . . . . 76

3.6.2 Simulation Results for Resource Allocation . . . . . . . . . . . . . . . . 83

3.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

Chapter 4 Conclusion and Future Directions 95

4.1 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95

4.2 Future Directions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

Bibliography 98

Appendix A List of Publications 110

Page 13: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

List of Figures

1.1 Evolution of Hetnet architecture [3]. . . . . . . . . . . . . . . . . . . . . . . . . 3

1.2 Future wireless architecture by enabling dense small cells and device to device

communication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5

2.1 Proposed system model. Solid line showing the downlink information links while

dotted line showing the cross tier interference. . . . . . . . . . . . . . . . . . . . 15

2.2 Two-sided Matching. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

2.3 Two matchings µ and µ′. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

2.4 Sequence diagram of Algorithm 2. . . . . . . . . . . . . . . . . . . . . . . . . . 28

2.5 Flow diagram of Algorithm 2. . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

2.6 Average Rate at Irmax = −60dBm. . . . . . . . . . . . . . . . . . . . . . . . . . 33

2.7 Average Rate at Irmax = −100dBm. . . . . . . . . . . . . . . . . . . . . . . . . 34

2.8 Average number iterations of M-DRA vs O-DRA, for different number of users. . 35

2.9 Comparison of average sum rate. . . . . . . . . . . . . . . . . . . . . . . . . . 36

3.1 A downlink D2D communication system. The solid line shows the information

links while the dashed line shows the interference links. . . . . . . . . . . . . . . 40

3.2 Block diagram of learning algorithm (LA). . . . . . . . . . . . . . . . . . . . . 53

3.3 Partial Reuse-mode Resource Allocation Algorithm. . . . . . . . . . . . . . . . 59

3.4 Full Reuse-mode Resource Allocation Algorithm. . . . . . . . . . . . . . . . . . 67

3.5 Real-time utility. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

3.6 Real-time performance gap. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

3.7 Standard deviation of real-time performance. . . . . . . . . . . . . . . . . . . . 79

viii

Page 14: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

ix

3.8 Normalized performance gap. . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

3.9 Average Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

3.10 Average successfully joined D2Ds . . . . . . . . . . . . . . . . . . . . . . . . . 82

3.11 Average Stopping time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

3.12 Average utility under Irmax = −80 dBm . . . . . . . . . . . . . . . . . . . . . . 85

3.13 Average utility under Irmax = −100 dBm . . . . . . . . . . . . . . . . . . . . . . 86

3.14 Average utility under Irmax = −120 dBm . . . . . . . . . . . . . . . . . . . . . . 86

3.15 Average utility of the proposed FR-RA scheme under various tolerance levels with

K = 50. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

3.16 Average utility of the proposed PR-RA scheme under various tolerance levels with

K = 50. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

3.17 Average number iterations vs. network size, for Irmax = −80 dBm . . . . . . . . 89

3.18 Average number iterations vs. network size, for Irmax = −100 dBm . . . . . . . . 90

3.19 Average number iterations vs. network size, for Irmax = −120 dBm . . . . . . . . 91

3.20 Average number iterations vs. network size, for Irmax = −100 dBm . . . . . . . . 93

3.21 Average number iterations vs. network size, for Irmax = −120 dBm . . . . . . . . 94

Page 15: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

Chapter 1Introduction

This chapter provides a brief background of the future mobile networks, i.e., 5G networks and

its challenges. Then, we discuss about two 5G enablers, i.e., heterogeneous networks (HetNets)

and device to device (d2d) communication that can bring the 5G networks into fruition. The

motivation, contribution and related works for these two 5G enablers are also provided. Finally,

the organization of this dissertation is presented at the end of this chapter.

1.1 Background and Motivation

The proliferation of high-performance mobile devices, i.e., smart-phones and tablets [1] and band-

width hungry applications, i.e., high definition videos, multimedia etc [2] over the mobile network

have fundamentally changed the existing mobile networks. These bandwidth hungry applications

has evolved at a very rapid pace, thus, generating a tsunami of mobile traffic on the mobile net-

works. This growth of devices and applications has increased exponentially thus creating network

congestion. Thus, the existing network cannot cope with these requirements and will require novel

solutions to handle this tsunami of mobile traffic [3, 4].

A recent survey has fore-casted that mobile traffic will increase about seven-fold per month

from 2016 to 2021 and the number of connected devices is expected to grow from 8.0 billion in

2016 to 11.6 billion by 2021 [1]. This motivates the promotion of current mobile communication

technologies to achieve greater capacity and higher spectral efficiencies. In order to satisfy this in-

creasing traffic demand, both industry [5] and academia [6] are finding potential solutions to cope

with future mobile networks requirements, i.e., the fifth generation (5G) mobile networks. The

existing network capacities require significant enhancements to cope with the growing demands

of end users [4]. In current mobile network architecture, the major and apparent bottleneck is the

1

Page 16: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 1. INTRODUCTION 2

radio access networks (RANs) [4–7].

RAN are typically wireless networks which provide last hop wireless services to users. The

dynamic nature of wireless communications makes these last hop networks highly uncertain and

random. Therefore, the biggest challenge for the future mobile networks is to design high ca-

pacity RANs to handle the growing end users’ demand [8, 9]. However, this would require novel

RAN access algorithms and will present novel challenges that need to be addressed. The biggest

challenge pertains to the limited available wireless spectrum which falls in the resource manage-

ment of RANs. The spectrum suffers from congestion due to the exponential increase in number

of wireless devices and bandwidth hungry applications. Therefore, the main goal is to develop

efficient RAN schemes that can efficiently perform resource management.

The existing centralized resource management solutions are becoming extremely computation-

ally complex and also incur high communication overhead due to the tsunami of traffic generated

by these modern devices and applications. Thus, the traditional resource allocation schemes can-

not be suitable for the future mobile network, i.e., 5G networks [10]. Thus, the resource manage-

ment in 5G networks is migrating to self-organizing management solutions from the centralized

solutions.

To cope with the increasing tsunami of traffic, novel resource management schemes in RAN

are required with the following characteristics. The first requirement is that the RAN scheme

should be simple to implement. Second, the RAN schemes should be adaptable to the dynamic

wireless environment. Third, the RAN schemes should be able to operate in a distributed manner

so that it can scale according to network size. We aim to design novel resource allocation schemes

with these aforementioned characteristics to cope with the projected network growth. In this

dissertation, we consider to provide solutions for two novel 5G network enablers, i.e., dense small

cell networks and device to device (D2D) networks [4, 33]. The goal of this dissertation is to

achieve a self-organizing resource allocation scheme for these two enablers. Moreover, we apply

the analytical tools such as optimization theory, matching theory and Markov approximation to

handle the challenges of the existing works.

These analytical approaches have been widely adopted in the wireless resource allocation

problem. Optimization theory based solutions that are generally centralized can be applied to

Page 17: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 1. INTRODUCTION 3

Figure 1.1: Evolution of Hetnet architecture [3].

calculate the optimal results for the resource allocation problem. However, it may require heavy

message exchanges if not designed intelligently. Moreover, the optimization approach generally

yield significant overhead and complexity for a practical size of mobile network. This overhead

and complexity can increase exponentially when considering combinatorial problems which is the

case in resource allocation problem. We apply matching theory which is a practical framework

and has been successfully applied in many economic field problems. The main motivations to

apply matching theory for wireless resource allocation problem are the followings:

• It has the capability to capture various wireless communication features.

• Its ability to model complex wireless system requirements through preference relations.

• Its can be implemented in a distributed fashion and provide low-complexity and one sided

optimal solutions that are stable.

In this thesis, we provide an approach of applying the matching theory for the aforementioned

5G enablers. Furthermore, we also compare our proposed solutions with existing mathematical

solutions pertaining to resource allocation. Finally, we analyze both theoretical and numerical

benefits of our proposal over the existing solutions for these 5G enablers.

Page 18: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 1. INTRODUCTION 4

1.2 Challenges

The tsunami of traffic generated by the modern wireless devices and the emergence of novel net-

work paradigm has transformed the operations of modern wireless networks. In order to meet the

requirements of end users, a lot of novel paradigms such as heterogeneous networks [11–13],

large-scale D2D communications [14–16], cognitive radios [17–21], LTE-unlicensed [22–26],

large-scale multi-input and multi-output (MIMO) antennas [27–31] and many more have pro-

posed to operate within the current mobile networks [32–34]. In [3], the evolution of HetNet

architecture is presented. It is illustrated that dense small cell base stations along with the afore-

mentioned technologies will coexist with the existing HetNets to fulfill the requirements as shown

in Fig. 1.1. In this dissertation, we only focus and discuss on two enabling technologies, i.e., dense

heterogeneous networks [35] and large-scale D2D communications [36]. Both HetNets and d2d

communication can boost the spectrum utilization as well as the coverage of the existing mobile

networks. Enabling these technologies into the existing network will leads to the future wireless

architecture, as shown in Fig.1.2.

The centralized resource management schemes that have been successfully deployed in ex-

isting mobile networks are no longer able to cope with the requirements of the future networks

[37, 38]. In such complex environments a self-organizing solution would be more suitable. The

reason behind this shift from centralized to self-organizing is motivated by dense network users

and demand for low-latency communication.

Additionally, for resource management in the future multi-tiered heterogeneous wireless ar-

chitecture, there exist another important challenge pertaining to the interference management [39].

Interference management is one of the key requirements that need to be fulfilled through which

the resources can be shared among heterogeneous peers, i.e., macro-cell, small-cell and d2d users.

In order to share the resources, the incumbent tier needs to be protected from interference stem-

ming from other tiers. Moreover, if interference is not well-handled, the resource efficiency can

significantly degrade in such multi-tiered heterogeneous wireless architecture. Thus interference

management is also one of the fundamental challenges that need to be addressed. In this disserta-

tion, we provide self-organizing resource management schemes in the RAN that also addresses the

interference management issue. We present our solutions for two emerging 5G network enablers.

Page 19: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 1. INTRODUCTION 5

Introduction: Problem Statement 7/20

• Centralized Resource allocation can no longer cope with the

tsunami of heterogeneous demands and UEs.

• These systems are unable to scale due to lack of coordination.

• Self-organizing and decentralized resource allocation scheme taking

into account the coexistence of novel heterogeneous technologies

(i.e., 5G networks) that can ensure interference management.

• How to meet these heterogeneous demands with limited wireless

spectrum (channels) ?

• How to protect the incumbent UEs from interference?

• How to reduce the coordinate overhead?

Goals

Challenges

Resource Management

D2D Communication

Figure 1.2: Future wireless architecture by enabling dense small cells and device to device com-munication.

1.3 Contribution

In this dissertation, we consider two emerging 5G network enablers and present resource allocation

schemes for them. We consider their own respective network optimization problems. Due to their

different network environments, both problems have different kinds of constraints corresponding

to different underlying layers.

1.3.1 Resource Allocation in Heterogeneous Networks

In this research topic, we investigate the joint resource allocation (RA) and interference manage-

ment (IM) problem for dense small cell network underlay cellular network. We introduce two

novel algorithms for RA and IM. Both proposed self-organizing algorithms are designed to simul-

taneously enable protection for the macrocell tier and to operate in large-scale dense networks.

Furthermore, unlike existing algorithms such as in [40, 42], and [43], the proposed matching-

based approach achieves efficient coordination between network tiers with minimal message pass-

ing compared to previous works [40, 42]. Our main contributions can thus be summarized as

follows:

• We formulate the RA problem with the macro-tier protection as a mixed-integer optimiza-

Page 20: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 1. INTRODUCTION 6

tion problem.

• To solve this problem, we develop a duality-based RA algorithm that can achieve a near

optimal solution by uniformly assigning cross-tier interference budget for the SBSs. This

approach enables distributed implementation and affordable computational complexity.

• By exploiting non-uniform cross-tier interference using a tier-coordination approach, the

network performance can be improved. However, a duality-based approach with tier-

coordination induces heavy information exchange [43]. Therefore, based on matching the-

ory, we propose a second distributed approach with limited information exchange.

• Numerical results show that, the proposed duality-based algorithm outperforms the greedy

approach by 4% in terms of sum-rate and the use of matching theory can significantly im-

prove the overall network sum-rate. This performance advantage can reach up to 17% com-

pared to the duality-based optimization approach.

1.3.2 Resource Allocation in Device-to-Device Communications

In this research topic, we introduce a self-organizing scalable solution for a dense D2D network

by jointly addressing the problems of mode selection, resource allocation, and interference man-

agement aspects. We propose a novel learning framework based on Markov approximation to

address these issues. Unsupervised learning is used for mode selection and a two-sided matching

game is incorporated to address the resource allocation aspects. The proposed matching game is

shown to reduce the computation and configuration size in the framework while enabling a self-

organizing and distributed control. Furthermore, we consider a practical scenario in which a group

of D2D pairs reuse the same resource simultaneously if the cellular transmission protection can be

guaranteed. In summary, our key contributions include the following:

• First, we formulate the joint problem of mode selection, and resource allocation with an

objective to maximize the utility of all D2D pairs subject to interference protection for

cellular transmission. The formulated problem is a mixed-integer non-linear optimization

problem that is NP-hard and requires exponential computation efforts to obtain the optimal

solution.

Page 21: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 1. INTRODUCTION 7

• Second, to solve the joint problem, we propose a learning framework based on Markov

approximation. Furthermore, we design an ergodic Markov chain and the transition proba-

bilities, which makes the Markov chain converge to its stationary probabilities. Using these

transition probabilities, we propose a novel two phase algorithm to perform mode selec-

tion and resource allocation in the respective phases. This distributed algorithm eventually

converges to the near optimal solution in probability with a bounded performance gap.

• Third, in order to reduce the computation and configuration size in Markov approximation,

we propose two algorithms for resource allocation based on matching theory. Furthermore,

we prove the stability, convergence, and optimality of the matching based resource alloca-

tion algorithms.

• Simulation results show the convergence, optimality gap, and utility gains achieved using

the proposed framework. Results show that the framework converges to a near optimal

solution. Moreover, our results show that the proposed matching game with externalities

achieves a performance gain of up to 35% in terms of the average utility compared to a

classical matching scheme with no externalities.

1.4 Related Works

There has been many works on dense HetNets [37] and d2d communications [44]. Here, we

summarize and restrict the works relevant to the resource management in these enablers:

1.4.1 Resource Allocation in Heterogeneous Wireless Networks

The dense and pervasive deployment of wireless small cells can boost the performance of existing

macrocellular networks; however, it poses significant challenges pertaining to the cross-tier inter-

ference management. In this work, we consider the downlink resource allocation problem for an

underlay small cell network. In this network, the protection of the macrocell tier is achieved by

imposing cross-tier interference constraints in the resource allocation problem.

A centralized resource allocation approach using a greedy algorithm for RA has been pro-

posed in [40]; however, this requires heavy message passing and suffers from scalability issues

Page 22: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 1. INTRODUCTION 8

for densely deployed small cell base-station (SBSs). In next-generation 5G networks, the macro

base station (MBS) must serve a large coverage area with a high number of connected devices [4]

and an important challenge in deploying a large number of SBSs is to reduce the signaling and

communication overhead at the MBS. The main drawback is that this approach can require the

MBS to exchange various information continuously with all SBSs which increases the signaling

overhead and computational load for the MBS and becomes impractical for the dense deployment

of SBSs.

In [42], another distributed scheme has been proposed which achieves a sub-optimal RA so-

lution. However, this scheme may not be suitable for dense heterogeneous networks (HetNets)

because of high signaling overhead required to establish reference users for individual SBSs. A

distributed RA scheme with macro-tier protection is proposed in [43] which is shown to converge

to a centrally calculated solution. However, this approach has slow convergence, which may not

be desirable in dense small cell network. Note that a distributed approach with heavy message ex-

changes among network entities over the control channel such as in [42, 43] would again increase

signaling and communication overhead that is not suitable for dense networks.

1.4.2 Resource Allocation in Device-to-Device Communications

Resource allocation in D2D networks has attracted significant recent attention and a comprehen-

sive survey can be found in [44]. In particular, there has been a number of recent works [45–53],

that focused on underlay D2D networks. For instance, in [45], the authors optimize the through-

put over the shared D2D resources while meeting prioritized cellular service constraints. However,

this work is based on a centralized approach that requires significant overhead and is not tailored

to the dense nature of D2D networks. In [46], a practical and efficient interference-aware resource

allocation scheme is presented for D2D enabled networks. In [45] and [46] resource allocation in

D2D communication is completely base-station (BS) controlled. This centralized control can lead

to significant overhead for a dense D2D network [54]. Indeed, device-centric architectures are

more suitable for dense D2D networks in which a user device is at least able to control his action

based on its local information, thus distributing the control in the network [54].

A distributed scheme for resource allocation is studied in [47] to enable ad-hoc D2D networks

Page 23: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 1. INTRODUCTION 9

during uplink transmission of the cellular system. Despite the resulting improvement in the system

throughput, this approach requires significant message passing to operate in a distributed manner.

In [48], joint power control and reuse partner selection is investigated and shown to have im-

proved performance for D2D systems. Similarly, in [49], a tractable iterative solution is proposed

for improving the energy and resource usage in a D2D network, using fractional programming.

Moreover in [53], a comprehensive survey on the application of different game-theoretic models

for D2D resource allocation problem is demonstrated. In [50], a coalition game approach is pro-

posed to solve the joint power and channel allocation problem in which D2D and cellular links act

as the players. Similarly, in [51], a novel power and channel allocation scheme for a D2D enabled

system is studied using matching theory to improve cellular network throughput. However, the

works in [48–51] do not account for the presence of multiple D2D pairs on the same resource

block, which can improve the overall system resource utilization, particularly in dense networks.

Moreover, in existing works, such as in [47–51], uplink resources for the D2D communication

are considered due to ease of interference management. However, these existing works do not

directly extend to the downlink due to the different system dynamics and interference character-

istics. Furthermore, downlink is the dominating wireless traffic in 5G and beyond systems [55],

thus, novel approaches are needed for the downlink resource reuse in an underlay D2D commu-

nication. Moreover, in most of the aforementioned works (except [45, 48, 50]), a fixed resource

sharing approach for D2D communication is considered, which cannot cope with the dynamic

channel conditions and buffer status of D2D users.

The use of resource sharing can be an effective solution for interference mitigation in D2D

communications. In D2D systems, resource sharing includes mode selection along with resource

allocation. Using mode selection, the network can decide whether dedicated resources or shared

resources are used for D2D communication. In existing works such as [45, 48, 50] that consider

joint mode selection and resource allocation, it has been observed that the shared mode can pro-

vide significant improvement in terms of network throughput compared to the dedicated mode,

especially for dense networks. Moreover, a mixed mode approach in which D2D links can oper-

ate in multiple modes through resource multiplexing has also been studied in [52]. Typically, for

mode selection, a binary mode selection variable can be used, where the decisions for the mode

Page 24: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 1. INTRODUCTION 10

are taken at the BS subject to the D2D users’ channel conditions and buffer status information.

However, under dense deployment scenarios, this centralized control will incur excessive com-

plexity and overhead on the BS. Moreover, a centralized solution for the joint mode selection and

resource allocation in D2D enabled cellular systems is still an open issue. Therefore, distributed

approaches for such joint problems will be needed. In order to address these shortcomings, one

approach is to incorporate learning theory, which will be critical for future deployment of dense

networks.

In general, the use of a Markov approximation framework is suitable for solving a number of

combinatorial optimization problems with feasible learning features [56]. However, the solutions

produced by this framework require complete network information, which rises the scalability is-

sues [56], [57]. Therefore, the work in [58] and [59] presented a near optimal solution for a joint

problem (i.e., user association and resource allocation) in heterogeneous cellular networks. More-

over in [60–62], other learning approaches are applied to address the resource allocation problem

in D2D networks. These works achieved improved system performance by adding the learning

aspect to D2D networks. However, these works have ignored the mode selection aspect for D2Ds,

which can further improve network throughput performance.

1.5 Structure of the Dissertation

The rest of the dissertation is organized as follows: In Chapter 2, we discuss about the resource

allocation problem in an underlay heterogeneous wireless networks. Firstly, the system model is

described in Section 2.3. Secondly, our proposed optimization based resource allocation scheme

is given in Section 2.4. In Section 2.5, we present our second solution based on matching game in

which we derive its preferences and the solution. In Section 2.6, we present our simulation results,

and conclusion are given in Section 2.7. In Chapter 3, we investigate the joint mode selection

and resource allocation problem in D2D network underlay in a cellular networks. In Section 3.3,

we present our system model and formulate our optimization problem. We present our proposed

solution based on Markov approximation in Section 3.4. Then, the resource allocation problem

is formulated as a game in Section 3.5 and present two resource allocation solutions, i.e., partial-

reuse mode and full-reuse mode in Section 3.5.1 and Section 3.5.2, respectively. We present

Page 25: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 1. INTRODUCTION 11

our simulation results in Section 3.6, and we summarize this chapter in Section 3.7. Finally in

chapter 4, we conclude our dissertation and provide future works in section 4.1 and section 4.2,

respectively.

Page 26: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

Chapter 2Resource Allocation in Heterogeneous Wireless Networks

2.1 Overview

The dense and pervasive deployment of wireless small cells can boost the performance of exist-

ing macrocellular networks; however, it poses significant challenges pertaining to the cross-tier

interference management. In next-generation 5G networks, the macro base station (MBS) must

serve a large coverage area with a high number of connected devices [4]. One important chal-

lenge in deploying a large number of small cell base stations (SBSs) is to reduce the signaling and

communication overhead at the MBS. A centralized resource allocation (RA) approach such as

in [4,60] can require the MBS to exchange various information continuously with all SBSs which

increases the signaling overhead and computational load for the MBS and becomes impractical for

the dense deployment of SBSs. Similarly, a distributed approach with heavy message exchanges

among network entities over the control channel such as in [42, 43] would again increase sig-

naling and communication overhead. In this work, the downlink resource allocation problem for

an underlay small cell network is studied and the protection of the macrocell tier is achieved by

imposing cross-tier interference constraints in the resource allocation problem.

In a nutshell, a distributed approach with minimum message passing would be more practical

and important for the proposed resource allocation problem, because of the reasons mentioned

above. To solve the underlying mixed-integer resource allocation problem, we propose two dif-

ferent algorithms. The first algorithm is developed by applying the duality-based optimization

approach for the relaxed problem, which enables distributed implementation. The second algo-

rithm which enables coordination is devised based on matching theory. Toward this end, we claim

that both solutions require minimal message passing.

Simulation results show that the proposed duality-based algorithm outperforms the greedy

12

Page 27: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 13

approach by 4% in terms of sum-rate whereas the matching-based algorithm with tier-coordination

yields performance gains up to 17% compared with the duality-based approach. Therefore, our

proposed solutions are novel and practical which are suitable for a large-scale dense networks of

SBSs.

2.2 Background and Contributions

One promising solution for improving the capacity of wireless networks is via the dense deploy-

ment of small cell base stations (SBSs) [64–67]. However, effective operation of such SBSs

requires meeting several technical challenges including resource allocation (RA) [68–72], inter-

ference management (IM) [73–76], and emerging network engineering issues.

A centralized approach using a greedy algorithm for RA has been proposed in [40]; how-

ever, this requires heavy message passing and suffers from scalability issues for densely deployed

SBSs. In [42], another distributed scheme has been proposed which achieves a sub-optimal RA

solution. However, this scheme may not be suitable for dense heterogeneous networks (HetNets)

because of high signaling overhead required to establish reference users for individual SBSs. A

distributed RA scheme with macro-tier protection is proposed in [43] which is shown to converge

to a centrally calculated solution. However, this approach has slow convergence, which may not

be desirable in dense small cell network.

We address these challenges by introducing two novel algorithms for RA and IM. Both pro-

posed distributed algorithms are designed to simultaneously enable protection for the macrocell

tier and to operate in large-scale dense networks. Furthermore, unlike existing algorithms such

as in [40, 42], and [43], the proposed matching-based approach achieves efficient coordination

between network tiers with minimal message passing compared to previous works. Our main

contributions can thus be summarized as follows:

• We formulate the RA problem with the macro-tier protection as a mixed-integer optimiza-

tion problem.

• To solve this problem, we develop a duality-based RA algorithm that can achieve a near

optimal solution by uniformly assigning cross-tier interference budget for the SBSs. This

Page 28: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 14

approach enables distributed implementation and affordable computational complexity.

• By exploiting non-uniform cross-tier interference using a tier-coordination approach, the

network performance can be improved. However, a duality-based approach with tier-

coordination induces heavy information exchange [43]. Therefore, based on matching the-

ory, we propose a second distributed approach with limited information exchange.

• Numerical results show that, the proposed duality-based algorithm outperforms the greedy

approach by 4% in terms of sum-rate and the use of matching theory can significantly im-

prove the overall network sum-rate. This performance advantage can reach up to 17% com-

pared to the duality-based optimization approach.

The rest of this chapter is organized as follows. Section 2.3 presents the system model and

problem formulation. Section 2.4 describes our proposed optimization based resource allocation

scheme and its limitations. In Section 2.5, we present our second solution based on matching

game, we model the problem as a matching game and then derive its preferences and the solution.

In Section 2.6, we present our simulation results, and conclusion are given in Section 2.7.

2.3 System Model and Problem Definition

Consider a HetNet consisting of a set of SBSs, B = 1, 2, ..., J, located within the coverage of

one macrocell base station (MBS) as shown in Fig. 1. The set of macro-cell users (MUEs) and

small cell users (SUEs) are denoted by M = 1, 2, ...,M and S = 1, 2, ..., S, respectively.

The MBS and SBSs use the same set of orthogonal resources R = 1, 2, ..., R. 1 However,

for any given resource r ∈ R, a predefined interference threshold Irmax must be maintained for

protecting the MUEs.

1One resource corresponds to one subcarrier or subchannel of the LTE network [43].

Page 29: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 15

Controller MBS

SBSSBS

MUE

SC user

SC user

SC user

SC user

MUE

: Interference links

: Information links

: Fiber backhaul links

Figure 2.1: Proposed system model. Solid line showing the downlink information links whiledotted line showing the cross tier interference.

Page 30: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 16

2.3.1 Resource Allocation and Link Models

We assume that all SBSs transmit using a fixed power (e.g., any feasible power for each SBS

transmitter) [42]. However, each SBS can have its own, and different power budgets. In addition,

we assume that the transmit power of each SBS is equally divided among its resources and, thus,

the interference power on each resource is constant. For RA optimization, we introduce binary

variables xrj,k, as follows:

xrj,k =

1, if SUE k in SBS j is assigned resource r,

0, otherwise.

We always set xrj,k = 0 for any SUE k, which is not associated with SBS j. The received SINR

pertaining to the transmission of SBS j to SUE k over resource r with transmit power P rj is:

γrj,k =P rj g

rj,k

P rMgrM,k +

∑i∈Ωr,

P ri gri,k + σ2

, (2.1)

where P rM and P ri ,∀i ∈ Ωr, represent the transmit powers of the MBS and SBS, respectively, in

the set Ωr which are using resource r. The channel gain between SBS j and SUE k is grj,k whereas

grM,k and gri,k are, respectively, the channel gains from the MBS and other underlay SBSs i to SUE

k. The noise power is assumed to be σ2. Then, the data rate of user k associated with SBS j on

resource r is given by Rrj,k = W r log(1 + γrj,k) where W r is the bandwidth of resource r.

2.3.2 Problem Statement

Our objective is to maximize the sum rate of all SBSs by reusing the macrocell resources. The

data rate achieved by an SBS j over all allocated resources is:

Rj =∑

r∈R

∑k∈S

xrj,kWr log(1 + γrj,k). (2.2)

Moreover, the interference experienced by MUE m on resource r is given by Ir =∑j∈B

∑k∈S x

rj,kP

rj g

rj,m, where grj,m is the channel gain between SBS j and MUE m, on re-

Page 31: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 17

source r. Note that the binary RA variables xrj,k ensure that we only account for the interference

created by SUEs that are assigned the same resource. The considered RA problem can be stated

as follows:

P1: maximizexrj,k∈X ,∀k,j,r

∑j∈B

Rj (2.3)

subject to∑

k∈Sxrj,k ≤ 1, ∀r ∈ R,∀j ∈ B, (2.4)

Ir ≤ Irmax, ∀r ∈ R. (2.5)

In P1, constraint (2.4) ensures that each resource can be allocated to at most one user in

each SBS to avoid strong intra-cell interference ; additionally, constraint (2.5) ensures the MUE

protection by keeping its aggregate interference below a predefined threshold. Problem P1 is

a non-convex, integer problem, which is difficult to solve for a practical setting with large sets

of users and resources [63]. Typically, solutions presented for problems similar to P1 requires

significant message exchanges [42], [43]. Therefore, by using optimization and matching theory,

we present two distributed novel and practical algorithms with minimal message passing (i.e., no

message exchange in Alg. 1 due to relaxation and only SBS proposals to MBS in Alg. 2) which

are suitable for a large-scale dense networks of SBSs.

2.4 Optimization-based Resource Allocation

2.4.1 Problem Relaxation and Dual Decomposition

To develop a practical distributed algorithm for the RA problem, we decompose the original prob-

lem into multiple problems which can be solved at individual SBSs. Toward this end, we relax

the coupled interference constraint (2.5) of P1 by dividing the interference threshold into J parts

corresponding to J SBSs [77]. This guarantees that each SBS is allocated the same cross-tier inter-

ference budget on each resource. Note that more complex designs can allocate different cross-tier

interference budgets for different SBSs; however, such design would require heavy message pass-

ing among SBSs, which is impractical in dense HetNets. Thus, the decomposed problem can be

Page 32: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 18

stated as follows:

P2: maximizexrj,k∈X ,∀k,r

Rj (2.6)

subject to∑

k∈Sxrj,k ≤ 1, ∀r ∈ R,∑

k∈Sxrj,kP

rj g

rj,m ≤ Irmax/J, ∀r ∈ R.

The partial Lagrangian with respect to the interference constraint of P2 can be presented as

L(xrj,k, αrk) =∑

r∈R Lr(xrj,k, α

rk), where αrk represents the interference price, and Lr(xrj,k, α

rk)

is equal to:

∑k∈S

xrj,kWr log(1 + γrj,k)− αrk(

∑k∈S

xrj,kPrj g

rj,m −

Irmax

J).

The dual function g(.) is then given as

g(αrk) =

maximize

xrj,k∈0,1∀k,∀rL(xrj,k, α

rk)

subject to∑

k∈S xrj,k ≤ 1.

(2.7)

A dual based approach is a standard technique which has been used typically in finding a

decomposed solution [43, 60]. Finding the global optimal solution for P1 requires heavy mes-

sage exchange and centralized computation which may present several major limitations given the

limited capacity of control channels, latency of control message, and densely deployed network

entities [42]. The message exchanges are typically required to solve P1 while maintaining the

coupling constraint (2.5). Even by using other practical approaches to maintain the interference

constraints (2.5) such as reference user [42] or biased interference constraint which can achieve

a near optimal solution, some heavy message exchanges are required. For a large-scale dense

network of SBSs, as the number of network entities increases, these existing approaches will also

face the aforementioned limitations. Therefore, to alleviate these limitations, we equally divide

the coupled interference constraint (constraint (2.5)) and achieve the followings:

1. A practical and low complexity solution targeting the large-scale dense networks of SBSs.

Page 33: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 19

2. A self-organizing solution which enables distributed operation for each SBS without any

message exchange between network entities.

3. A near optimal solution.

4. Fast convergence time, convergence is an important factor when targeting a large-scale

dense networks.

Furthermore, such an approach can be used as a benchmark for evaluating the performance

achieved by other approaches.

2.4.2 Algorithm Design

Based on the above analysis, we propose, in Alg. 1, an optimization-based distributed resource

allocation algorithm. In this algorithm, the updates of the interference price αrk(t) can be con-

ducted in a distributed way since these updates only require information on the channel gain grj,m,

which can be obtained from the underlying SBS via the MBS. This requires a relatively small

exchange of information compared to the previous works in [40, 42], and [43]. The convergence

can be proved using the gradient-based standard technique [63], and it converges to a near optimal

solution due to the simplified uniform allocation of the cross-tier interference budget [77].

Page 34: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 20

Algorithm 1: Optimization-based distributed RA

1: initialize: t = 0, αrk(0) ≥ 0, step-size κr(0) > 0;

2: repeat

3: t← t+ 1

4: Each SBS j updates xrj,k for its SUEs k and αrk as follows:

• xrj,k(t+ 1) =

1, if r = r∗and k = k∗,

0, otherwise

where, r∗ = arg maxr∈R

(W r log(1 + γrj,k)− αrk(t)P rj grj,m),

k∗ = arg maxk∈S

(W r∗ log(1 + γr∗j,k)− αr

∗k (t)P r

∗j gr

∗j,m);

• αrk(t+ 1) = αrk(t)− κr(t)(∑k∈S

xrj,k(t)Prj g

rj,m − Irmax

/J),

where, κr(t) > 0 is a step-size.

5: if xrj,k = 1 and P rj grj,m > Irmax/J then

6: xrj,k = 0

7: end if

8: until αrk(t+ 1)− αrk(t) ≤ ε

Page 35: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 21

2.5 Matching-based Resource Allocation

Although Algorithm 1 provides a low-complexity solution, it requires relaxing the interference

constraints to eliminate coordination between tiers and maintain the IM process. This can de-

grade the network performance. To improve it, a certain coordination between network tiers for

non-uniform cross-tier interference allocation is required. Hence, a central controller can be im-

plemented at the MBS to enable coordination among macro-SBS tiers [40,41] and to maintain the

interference limit Irmax. In the presence of coordination, we propose a second solution approach

based on matching theory [78–81].

2.5.1 Matching theory preliminaries

The RA problem can be formulated as a two-sided matching game. We assume each SUE can

use a single resource. However, different SBSs can use the same resource to improve the spec-

trum efficiency. Our design corresponds to a many-to-one matching [82] given by the tuple

(B,R, qr,B,R). Here, B , jj∈B and R , rr∈R represent the set of the pref-

erence relations of the SBSs and resources, respectively.

Definition 1 A matching µ is defined by a function from the set B ∪

R into the set of elements of B ∪ R such that: (i) |µ(j)| ≤ 1 and µ(j) ∈ R, (ii)

|µ(r)| ≤ qr and µ(r) ∈ B ∪ φ, where qr is the quota of r, and (iii) µ(j) = r if and only

if j is in µ(r).

2.5.1.1 Preferences of the players

Matching is performed on the basis of preference profiles that can be built by the SBSs Pj and

the controller Pr to rank potential matchings based on the local information. Note that, on each r,

each SBS j will choose its user k with highest data rate Rrj = maxk Rrj,k. Then, an SBS j ranks a

resource r based on the following preference function:

Uj(r) = Rrj . (2.8)

Page 36: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 22

Similarly, for the controller side, each resource r also ranks the SBSs according to the following

preference function:

Ur(j) = Rrj − βIrj , (2.9)

where Irj = P rj grj,m represent interference produced by SBS j to the MUE assigned that resource.

The first term in (2.9), represents the achievable data rate on resource r, the second term accounts

for a penalty due to the interference produced by SBS j, and β represents a weight parameter.

The second term implies that the controller gives less utility to the SBSs which cause higher

interference to the MUE on resource r.

For the formulated two-sides, our goal is to seek a stable matching, which is a key solution

concept [84]. The deferred-acceptance algorithm can be employed [84]. Traditionally, in one-to-

many matching, a fixed, per player quota on one side is assumed according to which a fixed number

of players of the opposite side can be matched. However, our formulated matching game involves

a dynamic quota as the controller allows a number of SBSs (with heterogeneous interference)

to use each resource as long as the interference constraint on that resource is not violated. This

heterogeneous interference of SBSs and dynamic quota of resources introduces new challenges

that prevent the use of standard deferred-acceptance algorithm. Therefore, we formally define the

blocking pair for the formulated game as follows:

Definition 2 A pair (j, r) is a blocking pair for µ if:

a. Irres ≥ Irj , j r ∅ and r j µ(j),

b. Irres < Irj , Irres +

∑j′∈µ(r) Ij′

r ≥ Irj ,

j r j′ and r j µ(j),

where Irres = Irmax − Ir represent the residual of the interference tolerance (remaining quota) on

the resource r. The quota of a resource r ∈ R is filled when Irres < Irj for a requesting j ∈ B.

Definition 2 is based on the following intuition [85]. Whenever an SBS j prefers a resource r to

its assigned resource µ(j), if either: i) r has sufficient interference tolerance Irres and is willing to

Page 37: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 23

admit j (i.e., j r ∅), or ii) its quota is filled but it is able to admit j by rejecting some accepted

SBSs which are ranked lower than j, then j and r can deviate from their assigned µ(j) and µ(r),

respectively. A matching is stable if no blocking pair exists.

In the following, we first explain the high level meaning of a “matching” in Definition 1, and

then explain the “blocking pair” in Definition 2.

SBS Resources

j1

j2

j3

r1

r2

Matching µ

SBS Resources

j1

j2

j3

r1

r2

Figure 2.2: Two-sided Matching.

Fig. 2.2 shows an example with two set of players, i.e., 3 SBSs and 2 resources. According

to Definition 1 (one to many matching). A matching µ is an assignment between the two set of

players such that:

1. Each SBS is assigned to at most one resource i.e., constraints (2.4) of problem P1. For

example, SBS j1 matched to resource r1. SBS j2 and SBS j3 are matched to resource r2.

2. No resource is oversubscribed i.e., constraints (2.5) of problem P1. For example, assume r1

and r2 have limited quota of 1 and 2 players respectively. Then, r1 can be matched to one

SBS only (j1) whereas r2 can support two SBSs, i.e., j2 and j3.

Next, we explain the idea of a blocking pair. Fig. 2.3 shows an example with two matchings

µ and µ′. Additionally, the quota of resources and preference profile for both sides, i.e., SBSs and

resources, is provided. Generally, if an SBS j prefers resource r more than its current matched

resource, and similarly resource r prefers SBS j more than its current matched SBS. Then, the

pair can deviate from the current matching in order to be matched to each other. This is called a

blocking pair [47]. In Fig. 2.3, according to the preference profile, it can be seen that the matching

Page 38: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 24

SBS Resources

j1

j2

j3

r1

r2

Matching µ

SBS Resources

j1

j2

j3

r1

r2

Matching µ´

preferences of SBS

• j1: r

1> r

2• j

2: r

2> r

1• j

3: r

2> r

1

preferences of resources

• r1: j

1> j

3> j

2• r

2: j

2> j

3> j

1

Quota of resources

• r1: 2 SBSs

• r2: 2 SBSs

Figure 2.3: Two matchings µ and µ′.

produced by µ does not contain any blocking pair. However in µ′, SBS j2 is matched to resource

r1 but SBS j2 prefers resource r2 over resource r1 and similarly resource r2 also prefers SBS j2,

thus, a blocking pair exists, i.e., (j2, r2) in µ′, as both prefer to be matched to each other, over

their current partners.

Now, according to Definition 2, if any of the following two condition occur, then the matching

will have a blocking pair:

1. Irres ≥ Irj , j r ∅ and r j µ(j).

Whenever an SBS j prefers a resource r to its assigned resource µ(j) (can be φ, meaning it

is unassigned), and resource r has sufficient interference tolerance Irres and also prefers to

admit SBS j. Then, SBS j and resource r have a strong incentive to deviate from current

matching and form a new matching.

2. Irres < Irj , Irres +

∑j′∈µ(r) Ij′

r ≥ Irj , j r j′ and r j µ(j).

Page 39: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 25

Whenever an SBS j prefers a resource r to its assigned resource µ(j), however, resource

r quota is filled but it is able to admit SBS j by rejecting some previously accepted SBSs

j′ which are ranked lower than SBS j according to the preference profile of resource r.

Then, SBS j and resource r can deviate from their assigned matching and block the current

matching.

2.5.1.2 Proposed algorithm

As a solution to this game, we propose a novel RA scheme to produce a stable matching in Alg.

2 which guarantees macro-tier protection captured in constraint (2.5). At each iteration t, each r

receives proposals from unassigned SBSs j that rank r as the highest in Pj(t)(lines 5-7). i) If r

has sufficient quota Irres(t) to admit j, it accepts the proposal and updates Irres

(t) and µ(r)(t)(lines

8-9). ii) Otherwise, if the quota of r is filled, then r finds all of its current matched j′ which have a

lower ranking than j according to Pr(t)(lines 10-11). Each least preferred SBS jlp ∈ P ′r(t) is then

sequentially rejected, and Irres(t), P ′r

(t), and jlp are updated until j can be admitted or there is no

additional j′ to reject (lines 12-16). After rejecting all j′ ∈ P ′r(t), if r still has an insufficient quota

to admit j, then j is rejected and j is set to the jlp (lines 17-20). Finally, the controller removes

jlp and its less preferred SBSs from the Pr(t), and similarly these SBSs also remove r from their

respective Pj(t)(lines 21-23). With this process, we guarantee that any less preferred SBS will

not be accepted by that resource even if it has sufficient quota to do so, which is crucial for the

matching stability of our design. This process is repeated until the matching converges (line 24).

The flow chat of Alg. 2 is also shown in Fig.2.5.

The output µ(t) of Alg. 2 can be transformed to a feasible allocation vector X of problem

P1 (line 25). Note that, the worst case running time complexity of Alg. 2 is linear in the size of

input preference profiles (i.e., O(JR) where J and R represent SBSs and resources, respectively)

similar to Alg. 1 which also has a linear complexity (i.e.,O(KR), whereK represents the number

of SUEs).

Note that, by using (2.9), each resource ranks all SBSs according to the utility they produce

which depends on the interference they produce on the resource (i.e., penalty term). For example,

Page 40: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 26

if interference produced by an SBS j is higher compared to some other SBS j′ on resource r,

then SBS j will have a lower utility as compared to SBS j′. This implies that SBS j would be

ranked lower in the preference profile of resource r compared to SBS j′. Using this approach

every resource ranks all the SBSs in a non-increasing order of utility in its respective preference

profile Pr. The motivation behind (2.9) is to assign the resource to the SBS which produces the

highest utility. Furthermore, by using (2.9), we build the preference profile of r. This preference

profile is then used by Alg. 2 for rejecting lower ranked SBS, if the interference produced is higher

than the tolerance level. Second, to maintain constraint (2.5) in Alg. 2 the following procedure

is followed. Whenever a proposal is received for any resource r, the controller first evaluates the

proposal’s feasibility (i.e., constraint (2.5), line 8 of Alg. 2 in the manuscript). This is performed

to ensure that interference produced by assigning an SBS j over a resource r (Irj ) is always below

the available quota Irres (i.e., constraint (2.5)). This guarantees that any matched set of SBSs over

a resource will not violate the constraint (2.5). Moreover, the simulation section also validate the

macro-tier protection (constraint (2.5)) by the reduction in rate achieved by Alg. 2 as interference

protection constraint becomes stricter.

2.5.1.3 Practical Implementation

To elaborate this in detail, we discuss about the matching game algorithm and explain the required

overhead that needs to be communicated between the players and base station.

1. Initialization phase: Initially, the preference list is set up. Users/BS collect information lo-

cally, i.e., Interference, propagation gain, transmission rate, monetary offers and etc. How-

ever, in our case the maximum interference value on all resource blocks (RBs) is required by

each player. Such information can be sent to the players via the Physical Broadcast Channel

(PBCH) of LTE. PBCH carries part of the system information, required by the UE terminal

in order to access the network, specifically PBCH carries the Master Information Block of

24 bits which has the following information:

i. DL Bandwidth (3 bits) (i.e., 1.4MHz - 20 MHz)

ii. Physical HARQ Indicator Channel (PHICH) Configuration (3 bits)

iii. System Frame Number (8 bits)

Page 41: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 27

iv. Spare bits (10 bits)

These spare bits can be used to transmit the maximum interference value required to build

the preference profile.

2. Proposing phase: Communication signals are sent from each players to BS for acquiring

resource blocks. This incurs an additional proposal overhead which is not currently sup-

ported by the 3GPP standard of LTE. However, this information can be sent via the Physical

Uplink control Channel (PUCCH) of each proposing transmitter. Typically, PUCCH carries

Uplink Control Information (UCI) which is basically bits and pieces of information that

eNB requires from UE in order to understand what UE (user equipment) needs and carries

other information like channel quality that UE is seeing in downlink. UCI is divided into

three main sub branches i.e. Channel State Information (CSI), Scheduling Requests (SR)

and HARQ ACK/NACK. To facilitate these functions, PUCCH has been categorized by

seven formats. We can adopt the format 1 and format 1a for sending the proposals. We can

see that the proposing message, i.e., scheduling request will be very small, i.e., 1 bit per

transmission time interval (TTI).

3. Accepting/rejecting phase: BS make decisions and send communication signals with re-

ject/accept overhead. Such information can be send via Physical Downlink Control Chan-

nel (PDCCH) where the set of accepted players will be allocated the RBs and the other

will wait. Typically, PDCCH is a physical channel that carries downlink control informa-

tion (DCI) that carries scheduling assignments and other control information for all network

users. There are four formats of PDCCH. The matched lists are then updated by both side of

players. Finally, termination takes place when there is no more RBs to propose or all play-

ers are matched with resources. This complete procedure is also shown via the sequence

diagram.

Page 42: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 28

Figure 4: Sequence diagram of a matching based algorithm

Enhance future work by incorporating millimeter wave

communication for 5G networks.

Millimeter Wave (mmWave) is one proposal to achieve 1000 times network

capacity improvement goal of the fifth generation (5G) mobile network

specification. There are several advantages in moving to the mmWave

spectrum for cellular among which the major one is the channel bandwidth

available which is likely to be much larger (e.g., 500 MHz per channel or more

compared with 5–20 MHz in today’s microwave systems). Using these

mmWave networks in 5G especially for small cells can boost the available

capacity. However, intelligent and efficient resource management schemes

will be required and considered as future direction to deploy efficient

mmWave networks.

Figure 2.4: Sequence diagram of Algorithm 2.

Theorem 1 Alg. 2 converges to a stable allocation.

Proof We prove this theorem by contradiction. Assume that Alg. 2 produces a matching µ with

a blocking pair (j, r) by Definition 2. Since r j µ(j), j must have proposed to r and has

been rejected due to interference violation on r (lines 19-20). When j was rejected, then j′ was

rejected either before j (lines 13-16), or was made unable to propose because r is removed from

j′ preference list (lines 22-23). Thus, j′ /∈ µ(r), a contradiction.

Page 43: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 29

Initialize:

set up preference lists (PLs)

Propose: Each user proposes to its most favorite resource; and

delete it from its PL;

Check: If all users’ all users are matched or PLs are empty?

Accept/reject: Each resource keeps the most favorite players w.r.t. its PL

and quota from the proposals; and reject the rest;

Terminate: A stable matching between users and

resources.

Yes

No

Figure 2.5: Flow diagram of Algorithm 2.

Page 44: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 30

Algorithm 2: Matching-based distributed RA

1: input: Pj , Pr, ∀r, j.

2: initialize: t = 0, µ(t) , µ(j)(t), µ(r)(t)j∈B,r∈R = ∅, Irres(t) = Irmax, Kr(t) = ∅, Pj(0) = Pj ,

Pr(0) = Pr, ∀r, j.

3: repeat

4: t← t+ 1

5: for r ∈ R do

6: for j ∈ B with r as its most preferred in Pj(t) do

7: whilej /∈ µ(r)(t) and P(t)j 6= ∅ do

8: if Irres(t) ≥ Irj , then

9: µ(r)(t) ← µ(r)(t) ∪ j; Irres(t) ← Irres(t) − Irj ;

10: else

11: P ′(t)r = j′ ∈ µ(r)(t)|j r j′

12: jlp ← the least preferred j′ ∈ P ′(t)r ;

13: while(P ′(t)r 6= ∅) ∪ (Irres(t) < Irj ) do

14: µ(r)(t) ← µ(r)(t) \ j′; P ′(t)r ← P ′(t)r \ jlp;

15: Irres(t) ← Irres

(t) + Irj′;

16: jlp ← the least preferred j′ ∈ P ′r(t);

17: end while

18: if Irres(t) ≥ Irj , then

19: µ(r)(t) ← µ(r)(t) ∪ j; Irres(t) ← Irres(t) − Irj ;

20: else

21: jlp ← j;

22: end if

23: Kr(t) = k ∈ Pr(t)|jlp r k ∪ jlp

24: for k ∈ Kr(t) do

25: Pk(t) ← Pk(t) \ r; Pr(t) ← Pr(t) \ k;

Page 45: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 31

26: end for

27: end if

28: end while

29: end for

30: end for

31: until µ(t) = µ(t−1)

32: output: µ(t)

2.6 Numerical Results

In our simulations, we consider a network with 5 SBSs each of which supports 3 UEs, and 5

MUEs using 5 resources. All users are randomly located inside the coverage of an MBS which

has a radius of r1 = 1000 m, whereas the coverage distance of each small cell is r2 = 100 m. The

bandwidth of each resource W r is set equal to 1 and the weighting parameter β is set to a normal-

ized value of 1, whereas the background noise power is assumed to be −90 dBm. The channel

power gain is modeled as grj,k = 10(−L(dj,k))/10, where L(dj,k) represents the path loss and dj,k is

the distance between BS j and user k. We assume that L(dM,k) = 16.62 + 37.6 log10(dM,k) for

the channel gain from the MBS to UE k and L(dj,k) = 37 + 32 log10(dj,k) for the channel gain

from SBS j to UE k. The SBSs transmit with varying power over simulation runs ranging from 15

dBm to 23 dBm [83]. Moreover, we compare the proposed algorithms with a centralized greedy

scheme that sequentially allocates resources to users in each SBS until the interference constraint

is violated. All results are obtained by averaging over a large number of independent simulation

runs, each of which realizes random locations of base stations, users, and channel power gains.

Results corresponding to the optimization-based, matching-based, and greedy algorithms are de-

noted as “O-DRA”, “M-DRA”, and “Greedy”, respectively.

In Figs. 2.6 and 2.7, we compare the sum rate of SBSs achieved by different schemes for

two different interference thresholds Irmax = −60 and −100 dBm. It can be observed that both

proposed algorithms and greedy algorithm result in indistinguishable performance when Irmax =

−60 dBm. However, for decreased macro-tier interference threshold (Irmax = −100 dBm), lower

Page 46: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 32

sum rate of the SBSs can be achieved since the interference protection constraint becomes stricter.

Moreover, the matching approach outperforms the optimization-based approach in terms of the

sum rate at this lower interference protection threshold. This is because the optimization approach

splits the interference budget Irmax uniformly among all SBSs and does not coordinate with the

macro-tier. Moreover, each SBS may prevent its UEs from using resource r if the uniformly

assigned interference limit is violated. On the other hand, in the matching-based approach, the

controller performs coordination between the network tiers and, thus, it only rejects the least pre-

ferred SBS-UE pair from the set of potential SBS-UE pairs.

Page 47: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 33

50 1000

0.2

0.4

0.6

0.8

1

UEs sum rate (Mbps)

Cum

ulat

ive

dist

ribut

ion

M−DRAGreedyO−DRA

Figure 2.6: Average Rate at Irmax = −60dBm.

Page 48: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 34

0 50 100 1500

0.2

0.4

0.6

0.8

1

UEs sum rate (Mbps)

Cum

ulat

ive

dist

ribut

ion

M−DRAO−DRAGreedy

Figure 2.7: Average Rate at Irmax = −100dBm.

Page 49: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 35

0 5 10 15 20 25 300

2

4

6

8

10

12

Number of UEs

Itera

tions

M−DRAO−DRA

Figure 2.8: Average number iterations of M-DRA vs O-DRA, for different number of users.

Fig. 2.8 compares the average number of iterations required by both M-DRA and O-DRA

versus the number of users (i.e., network size) as Irmax = −80 dBm. It can be observed that the

number of iterations increase with the number of users. Moreover, M-DRA convergence time is

reasonable i.e., it is around 11 iterations with 5 resources. Moreover, for O-DRA, the maximum

number of iterations is smaller than 7 for all network sizes. This fast convergence time can be

achieved due to a completely distributed design of O-DRA with no message passing.

In Fig. 2.9, the average sum rate of all UEs versus the number of UEs is shown for the proposed

and greedy algorithms as Irmax = −80 dBm. Moreover, we use two benchmarks here, first, the

upper bound (UB) of problem P1 which is obtained by relaxing the binary indicator variable so

that it can take any value in the range [0, 1] and then we use the tier-aware approach in [43] as

our second benchmark. It can be inferred that the matching-based, optimization-based and Greedy

approaches achieve up to 96.8%, 82.6%, and 80.2% of the average sum rate obtained by the UB,

respectively for a network with 20 UEs. Thus, it is clear that the matching-based approach is

close to optimal. Furthermore, it can be observed that the sum rate increases with more UEs,

Page 50: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 36

5 10 15 20 25 3030

60

90

120

Number of UEs

Ave

arge

sum

rat

e (M

bps)

M−DRAUBO−DRATier aware

Figure 2.9: Comparison of average sum rate.

which, however, saturates as the number of UEs becomes sufficiently large. This is because of the

limited number of resources at each SBS (r = 5). Additionally, the optimization-based approach

achieves a performance benefit up to 4% compared to the greedy approach while the matching-

based approach achieves 17% and 21% higher sum rate compared to the optimization-based and

greedy approaches, respectively for a network with 20 UEs.

2.7 Summary

In this work, we proposed two resource allocation algorithms for the two-tier heterogeneous net-

work, namely the optimization-based and matching-based algorithms. Distributed implementa-

Page 51: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 2. RESOURCE ALLOCATION IN HETEROGENEOUS WIRELESS NETWORKS 37

tion of these algorithms have also been discussed in details. Numerical studies have shown that

the matching-based algorithm outperforms the optimization-based algorithm especially in the low

macro-tier interference limit. However, the performance of both algorithms is almost indistin-

guishable as the macro-tier interference limit becomes sufficiently large.

Page 52: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

Chapter 3Resource Allocation in underlay Device-to-Device

Communications

3.1 Overview

Spectrum efficiency can be enhanced by enabling the D2D communication, thus, enhancing the

network throughput of existing networks. However, enabling D2D communication in an under-

lay fashion poses a significant challenge pertaining to interference management. In this research,

mode selection and resource allocation is studied for an underlay D2D network while providing

interference management. We formulate this problem as a combinatorial problem in which we

aim to maximize the utility of all D2D pairs. To solve this problem, a learning framework is pro-

posed based on a problem-specific Markov chain. From the local balance equation of the designed

Markov chain, the transition probabilities are derived for distributed implementation. Then, a

novel two phase algorithm is developed to perform mode selection and resource allocation in the

respective phases. This algorithm converges to a near-optimal solution. Moreover, to reduce the

computation in the learning framework, two resource allocation algorithms based on matching

theory are proposed to output a specific and deterministic solution. The first algorithm employs

the one-to-one matching game approach whereas in the second algorithm, the one-to many match-

ing game with externalities and dynamic quota is employed. Simulation results show that the

proposed framework converges to a near optimal solution under all scenarios with probability one.

Moreover, our results show that the proposed matching game with externalities achieves a perfor-

mance gain of up to 35% in terms of the average utility compared to a classical matching scheme

with no externalities.

38

Page 53: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 39

3.2 Background and Contributions

To efficiently cope with the rapid increase in wireless traffic, device-to-device (D2D) communica-

tions over wireless cellular networks has emerged as a promising technique to boost the capacity

and coverage of tomorrow’s 5G systems [54, 86, 87]. Using D2D communication, a D2D trans-

mitter can directly transmit to the D2D receiver without routing its traffic through the cellular base

station (BS). The use of D2D communications over cellular networks can significantly improve

the network performance in terms of data offload [54, 88], content sharing/dissemination [89, 90],

energy efficiency [92], coverage extension [54], and improved spectrum efficiency [44, 93, 94].

However, reaping the benefits of D2D communications requires meeting significant challenges in

terms of resource allocation and interference management [45–47].

One of the most critical challenges in D2D is to manage the interference stemming from the

reuse of spectrum resources [86]. D2D links can use either the unlicensed spectrum (i.e, out-

band) [94] or the licensed spectrum (i.e., in-band) [45] for transmission. In both cases due to

spectrum reuse, the D2D transmission links can cause interference to other users in the network.

We focus on the use of in-band spectrum (i.e., cellular resources) for D2D communication, as

in-band D2D communication can provide better quality of service guarantees compared to the

out-band spectrum [44]. Furthermore, in an in-band D2D communication, cellular resources can

be allocated to D2D links in either an orthogonal manner, i.e., the D2D connections use reserved

resources (the dedicated mode or overlay), or in a non-orthogonal manner, i.e., the D2D connec-

tions use same resources as the cellular connections (the shared mode or underlay). In this work,

we adopt the underlay (shared) mode since it provides a much better spectral efficiency than the

dedicated mode, particularly in dense networks.

Then, our challenge is to manage the interference stemming from the reuse of cellular re-

sources between D2D links and regular cellular links. In such a D2D enabled network, both cross

tier (i.e., between a D2D pair and cellular user) and co-tier (i.e., between two D2D pairs when in

close proximity) interference can occur, which significantly degrades the network performance.

Moreover, unlike classical approaches for resource allocation, in a D2D enabled system, the num-

ber of choices for allocating resources exponentially increase as D2D pairs in network increase.

Thus, centralized solutions [45, 46] are not suitable which can incur massive overhead in terms of

Page 54: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 40

CU 1CU 2

Cellular BS

D2D pair 1

D2D pair 2

D2D p

air 4

CU 3

D2D pair 3

D2D p

air 5

Figure 3.1: A downlink D2D communication system. The solid line shows the information linkswhile the dashed line shows the interference links.

required computation and signaling. Therefore, an efficient resource allocation scheme is required

that guarantees interference protection to cellular links and operates in a distributed fashion.

The main contribution of this research is to introduce a distributed scalable solution for a

dense D2D network by jointly addressing the problems of mode selection, resource allocation,

and interference management aspects. We propose a novel learning framework based on Markov

approximation to address these issues. Unsupervised learning is used for mode selection and a

two-sided matching game is incorporated to address the resource allocation aspects. The proposed

matching game is shown to reduce the computation and configuration size in the framework while

enabling a self-organizing and distributed control. Furthermore, we consider a practical scenario

in which a group of D2D pairs reuse the same resource simultaneously if the cellular transmission

protection can be guaranteed. In summary, our key contributions include the following:

• First, we formulate the joint problem of mode selection, and resource allocation with an

objective to maximize the utility of all D2D pairs subject to interference protection for

cellular transmission. The formulated problem is a mixed-integer non-linear optimization

Page 55: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 41

problem that is NP-hard and requires exponential computation efforts to obtain the optimal

solution.

• Second, to solve the joint problem, we propose a learning framework based on Markov

approximation. Furthermore, we design an ergodic Markov chain and the transition proba-

bilities, which makes the Markov chain converge to its stationary probabilities. Using these

transition probabilities, we propose a novel two phase algorithm to perform mode selec-

tion and resource allocation in the respective phases. This distributed algorithm eventually

converges to the near optimal solution in probability with a bounded performance gap.

• Third, in order to reduce the computation and configuration size in Markov approximation,

we propose two algorithms for resource allocation based on matching theory. Furthermore,

we prove the stability, convergence, and optimality of the matching based resource alloca-

tion algorithms.

• Simulation results show the convergence, optimality gap, and utility gains achieved using

the proposed framework. Results show that the framework converges to a near optimal

solution. Moreover, our results show that the proposed matching game with externalities

achieves a performance gain of up to 35% in terms of the average utility compared to a

classical matching scheme with no externalities.

The rest of this chapter is organized as follows. In Section 3.3, we present our system model and

formulate our optimization problem. Section 3.4 describes in detail how we map the proposed

optimization problem into the learning framework and derive a distributed algorithm. Then, we

formulate the resource allocation problem as a matching game in Section 3.5 and present two

resource allocation solutions, i.e., partial-reuse mode and full-reuse mode in Section 3.5.1 and

Section 3.5.2, respectively. We present our simulation results in Section 3.6, and we summarize

this chapter in Section 3.7.

Page 56: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 42

3.3 System Model and Problem Definition

Consider the downlink of a cellular network consisting of a single BS and a set K of K D2D pairs

located under its coverage, as shown in Fig. 1. The choice of downlink reflects the worst case

interference scenario.1 We use the index k0 to indicate the BS. We let set C be the set of C cellular

users. The BS and D2D pairs use the same setR ofR orthogonal resource blocks (RBs).2 For any

given RB r ∈ R, a predefined interference threshold Irmax must be maintained for protecting the

cellular users. Our system model is focused on a dense communication environment in which the

density of the users is higher than the number of connections that a given BS can support (e.g., a

football stadium). Typically, in such an environment, congestion occurs due to the high number of

connections. Therefore, D2D communication can be used to improve the area spectral efficiency

and increase the number of connected devices per shared RBs.

3.3.1 Resource Allocation and Link Model

In our model, the D2D transmissions are synchronized to the cellular transmissions. We assume

that all transmitters (BS and D2D pairs) transmit using a fixed power within the RB duration.

However, each transmitter can have its individual value for the power budget. In addition, we

assume that the transmit power of each transmitter is equally divided among its RBs and thus, the

interference power is constant. The D2D pairs at each time slot need to determine which RB is

feasible in order to maximize the utility of the system while protecting the cellular users. For RB

allocation, we introduce the binary variables xrk:

xrk =

1, if D2D pair k is assigned RB r,

0, otherwise.(3.1)

The received signal to interference noise ratio (SINR) pertaining to the transmission of the1The developed methodology can also be applied to the uplink case by simply considering the protection of cellular

BS.2One resource block can correspond to one sub-carrier of the OFDM-based LTE network.

Page 57: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 43

D2D pair k over RB r with transmit power P rk is:

γrk =xrkP

rk g

rk

P rk0grk0,k

+∑

i∈Ωr,i 6=k xriP

ri g

ri,k + σ2

, (3.2)

where the RB gain over the link of D2D pair k is grk, gri,k represents the RB gain between D2D

pair i and D2D pair k, and grk0,k is the RB gain from the BS to D2D pair k. P rk0 and P ri , ∀i ∈ Ωr,

represent the transmit powers of the BS and the other D2D pairs, respectively, and Ωr is the set

of D2D pairs which are using RB r. Note that, the set of D2D pairs Ωr using RB r is updated

dynamically. The noise power is assumed to be σ2. Similarly, the SINR of cellular user c over RB

r is given as:

γrc =P rk0g

rk0,c∑

i∈ΩrxriP

ri g

ri,c + σ2

, (3.3)

where grk0,c and gri,c represent the RB power gains from the BS to cellular user c and D2D pair

i to cellular user c, respectively. Note that∑

i∈ΩrxriP

ri g

ri,c is the interference experienced by

the cellular user c from a set of D2D pairs Ωr that use RB r. Then, the data rate of any user

u ∈ K \ k0 ∪ C on RB r is represented as follows:

Rru = W r log(1 + γru), (3.4)

where W r is the bandwidth of RB r.

3.3.2 D2D Decision and Mode Selection model

Next, we present the models for D2D decision and mode selection used in our system. In the D2D

decision model, each D2D pair acts based on its achieved utility. The action here represents the

D2D decision to use a given mode or not. We assume that each D2D pair selfishly and rationally

acts in a way that maximizes its utility. Moreover, each D2D pair has knowledge of its own utility

functions. Therefore, each D2D pair only acts to maximize its own utility. A decision variable αk

Page 58: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 44

is used to indicate if D2D pair k will follow a specific mode, as follows:

αk =

1, if D2D pair k uses the mode,

0, otherwise.

This D2D decision model assists the BS in the mode selection process. For mode selection,

we consider two modes that can be selected for RB allocation for the D2D pairs. Motivated by

the resource utilization gain achieved by the reuse mode, we only employ the reuse mode in our

model. However, we propose to classify the reuse mode for our network into two modes:

• Partial reuse mode: Only one D2D pair can be allocated to an RB currently in use by a

cellular user, only if the interference is below a pre-defined threshold. By using this mode,

there exists no co-tier interference (i.e., between D2D pairs). This mode is suitable for

scenarios in which the number of D2D pairs is limited compared to the RBs or the D2D

pairs are in close proximity with each other.

• Full reuse mode: A group of D2D pairs can share an RB only if the interference produced

by this group is below the predefined threshold for protecting the cellular tier. However, by

using this mode, co-tier interference will also occur. This mode is preferred in the scenario

where there exist a large number of D2D pairs compared to RBs. Moreover, this mode can

further enhance the RB efficiency, if co-tier interference is well handled.

However, in any given time slot only one mode will be activated for use in the network [52]. A

binary variable y is defined to represent the two modes, controlled by the BS:

y =

1, partial-reuse mode,

0, full-reuse mode.

In contrast to previous works [45, 48, 50] and [52], in our model, the BS does not choose a mode

for individual D2D pairs based on their channel conditions and buffer status. Here, the BS chooses

a mode depending upon the utility achieved by the network. This significantly reduces the com-

putational load since the BS will only need to calculate the network utility. However, to obtain the

Page 59: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 45

utility for the network, the D2D pairs and BS need to respectively learn which D2D users can be

successfully admitted under which mode such that the global network utility is maximized.

3.3.3 Problem Formulation

Our goal is to maximize a utility function that captures the sum rate of the D2D pairs by selecting

the optimal mode for communication, admitting the best D2D pairs, and properly reusing the RBs

already occupied by the cellular tier. Therefore, we define the utility function of the D2D network

as follows:

U(y,α, x) =∑

k∈K

∑r∈R

[yαkRrk + (1− y)αkR

rk]. (3.5)

Here, we note that a D2D pair can only use a given RB if the interference level is less than

the predefined interference threshold Irmax set by the BS on each r. Moreover, the interference

experienced by cellular user c over RB r from a D2D pair k is given by Irk = αkxrkP

rk g

rk,c. Note

that the binary D2D decision αk and RB allocation variables xrk ensure that we only account for

the interference created by the D2D pair that use the given mode and is assigned the same RB.

Then our considered joint mode selection and RB allocation (JMARA) problem can be stated as

follows:

JMARA: maximizey,α,x

U(y,α, x) (3.6)

s.t.∑

r∈Rxrk ≤ 1, ∀k ∈ K, (3.7)

yαkIrk +

|Ωr|∑k=1

(1− y)αkIrk ≤ Irmax, ∀r ∈ R, (3.8)

xrk ∈ 0, 1 , ∀k ∈ K, ∀r ∈ R, (3.9)

αk ∈ 0, 1 , ∀k ∈ K, (3.10)

y ∈ 0, 1 . (3.11)

In JMARA, the first constraint (3.7) ensures that each D2D transmitter can be allocated to only

one RB. The condition in (3.7) is used to better manage the interference stemming from D2D

Page 60: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 46

communications. The second constraint (3.8) ensures the protection of cellular user by keeping the

interference produced by D2D transmitters below a predefined threshold under either partial-reuse

mode (y = 1) or full-reuse mode (y = 0). Finally, the binary indicator variables for RB allocation

xrk, D2D decision αk, and mode selection y are represented by constraints (3.9), (3.10) and (3.11),

respectively. The problem JMARA is a non-convex, integer problem, which is difficult to solve in

practical settings with a large set of D2D pairs and RBs [63]. Thus, Markov approximation [56,57]

framework is used to find a solution for JMARA as it possess the capability to solve combinatorial

problems, which will be presented in the next section.

3.4 JMARA via Markov Approximation

Our proposed solution framework is composed of two steps. The first step is to create a log-sum-

exp approximation and the second step is to derive the Markov chain for our problem.

We let f = y,α, x be a network configuration and F be the set of all F feasible configura-

tions defined by constraints (3.7) and (3.8). We let Uf = U(y,α, x). Therefore, JMARA can be

written as

maxf∈F

Uf . (3.12)

However, Uf in not differentiable. Thus, we transform (3.12) from a discrete function of f to

an equivalent continuous function of pf (i.e., an equivalent maximum weight independent set

problem) as:

maxp≥0

∑f∈F

pfUf

s.t.∑f∈F

pf = 1,(3.13)

where pf represents the probability of choosing configuration f , i.e., the weight of the configura-

tion. pf can be viewed as the fraction of the time a configuration f is activated. Note that, both

problems given in (3.12) and (3.13) have the same optimal value [56]. However, (3.13) is still chal-

lenging to solve due to the combinatorial nature of the variables. Next, to solve this combinatorial

Page 61: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 47

problem, we use the Log-sum-exp Approximation.

3.4.1 Step 1: Log-sum-exp Approximation

The Log-sum-exp function is a convex and closed function [56] mainly used by machine learning

algorithms as a smooth approximation of the max function. Therefore, we interpreted it as a

differentiable approximation of the max function given in (3.12) [63, pp. 72]. Hence, we have:

maxf∈F

Uf ≈ gβ(Uf ) =1

βlog

∑f∈F

exp(βUf )

, (3.14)

where β is a positive constant. Furthermore, the approximation gap is upper-bounded by F , where

F is the size of the set F , and Umax = maxf∈F

Uf , and then the approximation accuracy will be [63]:

0 ≤ |Umax − gβ(Uf )| ≤ 1

βlogF. (3.15)

Clearly, as β →∞, 1β logF → 0, which renders the approximation exact. The following problem

is equivalent to solving the log-sum-approximation in (3.14) [56, 63]:

maxp≥0

∑f∈F

pfUf −1

β

∑f∈F

pf log pf

s.t.∑

f∈Fpf = 1,

(3.16)

where the first term in (3.16) represents the MWIS objective and the second term represents the

entropy term. We can obtain the optimal probability distribution p∗ by solving the Karush-Khun-

Tucker (KKT) condition for the above problem [63], given as follows ∀f ∈ F :

p∗f (Uf ) =exp(βUf )∑

f ′∈Fexp(βUf ′)

=1∑

f ′∈Fexp(β(Uf ′ − Uf ))

, (3.17)

where (Uf ′ − Uf ) is the difference in utilities. The optimal solution in (3.17) presents an implicit

solution for (3.16) that differs from (3.13) by an entropy term − 1β

∑f∈F pf log pf . Furthermore,

Page 62: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 48

the solution to (3.16) requires complete information of F . Thus, to find F , a computationally

exhaustive approach is needed, which is not practical.

3.4.2 Step 2: Markov Chain (MC)

The solution given in (3.17) is not practical since complete information on all feasible configu-

rations F is required, which is not possible as discussed in Section 3.1. Hence, we view (3.17)

as a Markov chain. To this end, each configuration f corresponds to a state with (3.17) being

its stationary distribution. Then, the goal is to derive the Markov chain for the problem given

in (3.16) and reach to the optimal stationary distribution given in (3.17) that represents its solu-

tion. From [56], it is shown that there exists at least one continuous-time time-reversible ergodic

Markov chain with stationary distribution p∗f (Uf ) for any probability distribution of the product

form p∗f (Uf ) presented in (3.17).

In order to construct a time-reversible Markov chain with stationary distribution p∗f (Uf ), we

let configuration f , f ′ ∈ F be the states of a time-reversible ergodic Markov chain and let q(f→f ′)

and q(f ′→f) denote the nonnegative transition rates from states f → f ′ and f ′ → f , respectively.

Then, the following two conditions are sufficient for the Markov chain design [56]:

• any two states are accessible from each other.

• the local balanced equation satisfies (3.18), ∀f, f ′ ∈ F ,

p∗f (Uf ) q(f→f ′) = p∗f ′(Uf ′)q(f ′→f),

exp(βUf )q(f→f ′) = exp(βUf ′)q(f ′→f).(3.18)

These equation are useful because they eliminates the need for all information of the complete

configurations space F . Any q(f→f ′) and q(f ′→f) values for the design of the algorithm can

be adopted as long as (3.18) is satisfied. Therefore, we limit the number of configurations to

f and f ′, i.e., F = f, f ′. We set the conditional probabilities as the transition rates, i.e.,

q(f ′→f) = p∗f |f,f ′(Uf ) and q(f→f ′) = p∗f ′|f,f ′(U′f ). Hence, we obtain

p∗f |f,f ′(Uf ) + p∗f ′|f,f ′(U′f ) = 1,

q(f ′→f) + q(f→f ′) = 1.(3.19)

Page 63: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 49

Thus, by solving (3.18) and (3.19) we obtain the transition probabilities as a logistic function of

utility difference as

q(f→f ′) = (1 + exp[β(Uf − Uf ′)])−1, (3.20)

q(f ′→f) = (1 + exp[β(Uf ′ − Uf )])−1. (3.21)

These transition probabilities are used to derive the Markov chain towards the optimal solution

in (16). However, we cannot design a distributed and scalable algorithm using (3.20) and (3.21),

which use the global utility, i.e., Uf . As we know that the network is distributed in nature, a player

k is only aware of its own individual local utility Ufk without additional signaling and overhead.

Therefore, we define Uk,fk = Uk(m,αk, xk) as the local utility for each player k. Then, we

substitute the local utilities in (3.20) and (3.21) to obtain

q(fk→f ′k) = (1 + exp[βk(Uk,fk − Uk,f ′k)])−1, (3.22)

q(f ′k→fk) = (1 + exp[βk(Uk,f ′k − Uk,fk)])−1. (3.23)

Hence, the Markov chain based on using these local utilities converges to a distribution pf (Uf )

instead of p∗f (Uf ) given in (3.17). However, the gap between this distribution pf (Uf ) and the

optimal p∗f (Uf ) is also bounded [57, 58].

Page 64: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 50

Algorithm 3: Learning Algorithm (LA)

1: initialize: i[1] ← 0, y[1] ← rand ∈ 0, 1,

Υk(1)← 0, ωk ← 1, βk(1)← 1, ∀k.

αk[1] , [∅]k∈K, xk [1] , [∅]k∈K.

2: while t 6= T and D 6= ∅ and ω0 > 0 do

Phase 1: Mode Selection

3: if i[t] 6= 1 then

4: y, α[t+1]k ←

randy, αk with prob. ωk,

y, α[t]k with prob. 1− ωk.

5: else

6: Calculate ν ← q(fk→fk′) using (3.22).

7: y, α[t+1]k ←

y, α[t−1]

k with prob. ν,

y, α[t]k with prob. 1− ν.

8: βk(n+ 1)← βk(n) ∗ βstep.

9: Υk(n− 1)← Υk(n).

10: Υk(n)← y, α[t+1]k .

11: if Υk(n− 1) = Υk(n) then

12: ωk ← max0, ωk − ωstep

13: i[t+1] ← 1− i[t]

Phase 2: Resource Allocation:

14: if y[t+1] = 1 then

15: Run Alg. 4 for α[t+1] to obtain x[t+1].

16: else

17: Run Alg. 5 for α[t+1] to obtain x[t+1].

18: Calculate utility U [t+1]k,fk

,∀D.

Phase 3: Update:

19: µ(r)(t) ← µ(r)(t) ∪ j; Irres(t) ← Irres(t) − Irj ;

Page 65: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 51

20: if ωk = 0 then

21: D ← D \ k.

3.4.3 Learning Algorithm

Next, based on the analysis of the Markov chain in Section 3.4.2, we present the learning algorithm

shown in Alg. 3 for solving the modeled Markov chain. The algorithm consists of three phases:

(i) the mode selection phase (lines 3-13), (ii) resource allocation phase (lines 14-18), and (iii)

update phase (line 19-21) as illustrated in Fig. 3.2. In Phase 1, we use unsupervised learning

using the logistic equations given by (3.22) and (3.23). The learning approach uses properties

from log-linear learning [95] and simulated annealing [96] for selection of the control variables

action (i.e., y and α). For our scenario, the BS chooses the mode action and all D2D pairs choose

their admission action. In Phase 2, resource allocation (i.e., x) is performed (details of resource

allocation are presented in Sec. 3.5), for the given mode and D2D pairs that decide to use this

mode. Once the first two phases are executed, all control variables are updated in Phase 3.

In line 1 of Alg. 1, all the control variables and the auxiliary variables are initialized. We intro-

duce the auxiliary variables as Υk = [Υ1, ...,Υ|n|], i[t], βk and ωk. Here, these auxiliary variables

are used to control the mixing characteristics and stopping time for the underlying Markov chain.

The vector Υk is used for convergence analysis, and i[t] is an experimentation indicator that indi-

cates whether or not experimentation takes place at time slot t. βk controls the gap given in (3.15)

and ωk balances between exploration and exploitation rates. As explained earlier, as βk →∞, the

gap 1βk

logFk → 0 and the βk update control the mixing of the Markov chain, which can be either

linear or geometric. We implement the geometric update (line 8), which gradually yields zero gap.

The learning algorithm starts by the BS (i.e., k0) selecting a random mode y[1] (i.e., partial or

full-reuse mode) when there exists no configuration (line 1). In Phase 1, the set of players D ⊆ K

either performs experimentation or consolidation. In experimentation, for time slot t + 1, each

player executes one of the two actions, i.e., a new random configuration is chosen (exploration)

or it stays with the current configuration (exploitation) with probability ωk or 1−ωk, respectively

(line 4). During consolidation, the current utility obtained at time slot t is compared with the

previously achieved utility at time slot t−1 by all players. Then, each player probabilistically (i.e.

Page 66: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 52

with probability ν) chooses its action for time slot t+ 1. Furthermore, the actions that achieve the

maximum utility have a higher probability to be chosen (lines 5-7). Furthermore, as the Markov

chain moves towards convergence (line 11), we reduce the exploration rate by a constant step

size (line 12). Note that all players are aware of the their own utility received, the configuration

employed for the last two time slots, and whether or not they experimented in the last time slot.

After Phase 1 is completed for time slot t + 1, Phase 2 starts. In this phase (details of this

phase are presented in Section 3.5), based on the players actions, a resource allocation algorithm

is executed to obtain the resource allocation vector x[t+1] (lines 14-17). Then, the utility of con-

figuration U [t+1]k,fk

is evaluated for all players D.

Finally, we update both the the control variables in Phase 3 for the next time slot. Moreover, as

the exploration rate ωk approaches zero, we remove the player from learning, as it operates in the

best configuration (lines 20-21). These three phases are repeated until convergence (line 2), i.e.,

the Markov chain reaches the stationary state. Moreover, in our learning framework, the matching

algorithm outputs a specific and deterministic solution for resource allocation. This matching

outcome is then used in the learning framework as a joint configuration with D2D decision and

mode selection. Since, the overall framework is based on an ergodic Markov chain, after sufficient

time slots T , converges to a near optimal solution is achieved in probability [56], [58] and [59].

Page 67: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 53

Experimentation Consolidation

If experimented

at tTrue

False

Phase 1: Mode Selection

Phase 2: Resource Allocation

If

Choose randomly

True Flase

Choose configuration at

time (t-1)

Calculate transition

probability using (21),

Generate a random

number

IfTrue

Choose flow

configuration at time (t)

Flase

( )k t

[ 1] , , t

k ky rand y

( )t

0 1

( )t

[ 1] [ ] , , t t

k ky y[ 1] [ 1] , , t t

k ky y

Phase 3: Update[ 1] [ 1] [ 1], ,t t t

k ky x

If[ 1] 1ty

Full Reuse Mode: Partial Reuse Mode[ 1]t

kx[ 1]t

kx

Start

If

False

TrueStop0k

[ ]i 1t

Generate a random

number

0 1

Choose flow

configuration at time (t)

[ 1] [ ] , , t t

k ky y

TrueFalse

Figure 3.2: Block diagram of learning algorithm (LA).

Page 68: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 54

3.5 Resource Allocation via Matching

Once Phase 1 of Alg. 3 is executed, we obtain the mode y as well as the D2D pairs α that use

the selected mode at time slot t + 1. The next goal here is to perform RB allocation for the

given mode and D2D pairs. For a given mode selection variable y, problem JMARA can be

divided into two combinatorial problems, depending upon the value of y. In this section, we apply

matching theory for solving these problems under two cases: the partial-reuse or the full-reuse

modes. The motivation to apply matching theory for the RB allocation problem is its ability to

tackle combinatorial problems and achieve a distributed solution [81,98]. The benefits of matching

theory come from the distributed nature of control in the system. Furthermore, matching theory

allows each player (i.e., D2D pairs and RBs) to define its individual utilities depending upon its

local information.

3.5.1 Case 1: Partial-Reuse Mode

In the partial reuse mode, i.e., y = 1, only one D2D pair can use an RB if the interference level is

less than the predefined interference threshold Irmax set by the BS. Then, we can state the following

problem, as derived directly from JMARA:

PR: maximizexrk∈x

∑r∈R

∑k∈K

Rrk (3.24)

subject to (3.7), (3.9),

Irk ≤ Irmax, ∀r ∈ R. (3.25)

In PR, the objective is reduced to maximizing the sum-rate of all D2D pairs by assigning the RBs.

The constraint given by (3.25) ensures the protection of cellular users by keeping the interference

produced by the D2D transmitter below a predefined threshold. This allows the re-usability of an

RB r to increase RB efficiency if the interference constraint can be maintained. Problem PR is still

a combinatorial problem, and finding the solution becomes NP-hard, for a large set of D2D pairs

and RBs in a practical amount of time [63]. Note that PR is desired to be solved in a distributed

Page 69: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 55

manner by each D2D pair such that it maximizes its own rate. Therefore, we use matching theory

to map the problem PR into a matching game and then discuss the details of the solution in the

following subsections.

3.5.1.1 Matching Game Formulation

Next, the RB allocation problem is formulated as a two-sided matching game, then we define the

utility and finally present a matching algorithm that achieve a stable solution.

We assume each D2D pair forms a set that can use a single RB. However, to use this RB, the

interference produced by D2D pairs to RBs should be under the tolerable predefined interference

level, i.e., constraint (3.25). Similarly, every RB also forms a set to accommodate a D2D pair

among all the pairs. Therefore, our design corresponds to a one-to-one matching given by the

tuple (K,R,K,R). Here,K , kk∈K andR , rr∈R represent the set of preference

relations of D2D pairs and RBs, respectively. Formally, we define the matching as follows:

Definition 3 A matching µ is defined by a function from the set K ∪

R into the set of elements of K ∪R such that k = µ(r) if and only if r = µ(k).

3.5.1.2 Preference Profiles of Players

Matching is performed by the two sets of players using preference profiles. For each player, the

preference profile is used to rank the players of the opposite side. In the proposed game, the two

sides, D2D pairs and RBs, will build their preference profiles by utilizing local information avail-

able at each side. The preference profile for the D2D pairs is based on the following preference

function of the achievable data rate on RB r:

Uk(r) = W r log(1 + γrk). (3.26)

The intuition for such a preference function comes from the objective of problem PR, where each

D2D pair wants to maximize its sum rate. Hence, each D2D pair ranks all the RBs r in a non-

increasing order in its preference profile represented by Pk. Note that an RB r ∈ R that produces

a higher utility (consequently the data rate achieved by using the more preferred RB is higher)

Page 70: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 56

according to (3.26) will be preferred over an RB r′ ∈ R by a D2D pair k, i.e., r k r′, for

carrying out its transmission and will thus be placed higher in its preference profile.

Similarly, each RB r also needs to have a preference profile that ranks all the D2D pairs k ∈ K

according to its preference function. By using a two-sided matching game for our problem so

we can guarantee cellular tier protection by the RB defined preferences. This is important for the

proposed game to guarantee (3.25). This is one of the main motivations for using a two-sided

matching game for our problem. Moreover, the preference list for each RB is formed by the

BS. The information required at the BS includes the power level of the D2D transmitters pk, the

predefined maximum interference threshold Irmax for each RB, and the RB power gain between the

D2D transmitter and cellular user grk,c. The preference function is given by:

Ur(k) = max (Irmax − Irk , 0). (3.27)

According to this preference function, an RB gives less utility to a D2D pair k, which creates

more interference. Additionally, all D2D pairs that violate (3.25) receive a zero utility and are

ranked as the lowest in the preference profile of r. Furthermore, to calculate the ranking of each

D2D pair, the BS for each r needs to calculate the interference Irk induced by the D2D pair k if an

RB r is in use. As we assume the power levels of the D2D pair are fixed and known to the BS, the

calculation of Irk only depends on the RB gain grk,c.

Here, we note that RB power gain grk,c can be estimated by cellular users and sent back to the

BS by using the pilot signal or any standard RB estimation technique. The total interference for

each cellular user can be estimated as follows. All cellular users estimate the total received power

and send this value to the BS. The BS can then calculate the interference induced by the D2D pair

on RB r. Therefore, calculation of the interference only requires the standard RB estimation of

grk,c. In addition, signaling is only involved in sending these values from the cellular user to the

BS, which only occurs once during the initialization phase. Once this information is acquired,

Irk is calculated and the BS ranks each D2D pair k for each RB r in the preference profile of r

represented by Pr.

Page 71: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 57

3.5.1.3 Resource Allocation Algorithm

We present the RB allocation algorithm based on the proposed matching game. The aim of this

algorithm is to find a stable allocation that is a key solution concept in matching theory [84, 99]

and can be defined as follows:

Definition 4 A matching µ is stable if there exists no blocking pair (k, r), where k ∈ K, r ∈ R,

such that r k µ(k) and k r µ(r), where µ(k) and µ(r) represent, the current matched partners

of k and r, respectively.

In our game, a stable solution ensures that no matched D2D pair would benefit from deviating

from their assigned RB r with a new RB r′. The output of our algorithm is the RB allocation vector

x of D2D pairs that maximizes the objective of the optimization problem PR, and the pseudo code

is given in Alg. 4. The presented algorithm converges to a stable allocation as it is a variant of the

well-known deferred acceptance algorithm [84].

Alg. 4 has three phases namely, the initialization phase, the matching phase and the RB alloca-

tion phase. In the initialization phase, information on the active D2D pairsα and local information

required is attained to build the preference profiles (lines 1-3).

In the second phase matching, each unassigned D2D pair k proposes to its most preferred

RB r according to Pk (lines 7-8). The BS determines the interference Irk produced and evaluates

(3.25). If (3.25) is violated, the D2D pair k is rejected. Otherwise, the BS checks the preference

ranking of the resource r. If ranked higher than the current match (µ(r)t), the D2D pair k will

be accepted. Otherwise, it will be rejected. Finally, all the rejected D2D pairs at iteration t, i.e.,

the set Lr(t), are removed by both sides in order to update their preference profiles. The matching

process is carried out iteratively until a stable match is found between both sides. The process will

terminate when all the D2D pairs that can maintain the interference tolerance level are assigned to

RBs or there are no more RBs to propose. The algorithm will converge when the matching of two

consecutive iterations t remains unchanged (lines 4-22) [84]. The final stage is the RB allocation

phase in which the matched D2D pairs are allowed to transmit on the matched RBs (lines 23-24).

Page 72: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 58

Algorithm 4: Partial Reuse-mode Resource Allocation Algorithm

1: Phase 1: Initialization:

2: input: α, Pk, Pr, ∀r, k.

3: initialize: t = 0, µ(t) , µ(k)(t), µ(r)(t)k∈K,r∈R = ∅, Lr(t) = ∅ Pk(0) = Pk, Pr(0) = Pr,

Irmax, ∀r, k.

4: Phase 2: Matching:

5: repeat

6: t← t+ 1.

7: for k ∈ K, propose r according to Pk(t) do

8: while k /∈ µ(r)(t) and P(t)k 6= ∅ do

9: if Irmax ≥ Irk then

10: if k r µ(r)(t) then

11: µ(r)(t) ← µ(r)(t) \ k′.

12: µ(r)(t) ← k.

13: P ′(t)r = k′ ∈ µ(r)(t)|k r k′.

14: else

15: P ′′(t)r = k ∈ K|µ(r)(t) r k.

16: else

17: P ′′′(t)r = k ∈ K|Irmax ≤ Irk.

18: Lr(t) = P ′(t)r ∪ P ′′(t)r ∪ I ′

(t)r .

19: for l ∈ Lr(t) do

20: Pl(t) ← Pl(t) \ r.

21: Pr(t) ← Pr(t) \ l

22: until µ(t) = µ(t−1). Phase 3: Update:

23: output: µ(t).

Page 73: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 59

Initialize:

set up preference lists (PLs)

Propose: Each user proposes to its most favorite resource

Check: If all users’ all users are matched or PLs are empty?

Accept/reject: Each resource keeps the most favorite users w.r.t. its PL

from the proposals; and reject the rest;

Terminate: A stable matching between users and

resources.

Yes

No

Figure 3.3: Partial Reuse-mode Resource Allocation Algorithm.

Page 74: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 60

Theorem 2 The stable solution resulting from Alg. 4 is also a local maximum of the PR problem.

Proof We prove that the stable point produced as an outcome by Alg. 4 is also a local maximum

for the PR problem. As the objective function of PR is used to maximize the utility of all the D2D

pairs, then the outcome of Alg. 4 at each iteration t can be mapped to the RB allocation vector x

as follows:

µ(t) 7→ x(t). (3.28)

Note that the utility for an RB allocation vector x for all D2D-RB pairs can be represented as

follows:

U(x) =∑r∈R

∑k∈K

Rrk(x). (3.29)

Then, based on the reject/accept operation at each iteration t in Alg. 4, the matching µ cap-

tures the value of∑

r∈R∑

k∈KRrk(x), in which the matching at the t-th iteration guarantees that∑

r∈R∑

k∈KRrk(x)(t) ≥

∑r∈R

∑k∈KR

rk(x)(t−1). This gives us the following relation:

U(x(t)) ≥ U(x(t−1)). (3.30)

Thus, we can see that the objective function of problem PR is captured using a non-decreasing

function with the binary variable x in the reject/accept operation of Alg. 4. Then, the matching

algorithm converges to a local maximal value of the problem PR.

3.5.2 Case 2: Full-Reuse mode

In the full-reuse mode, i.e., y = 0, the BS allows a set of D2D pairs to reuse the RB with a cellular

user in such a manner that this allocation does not violate the interference constraint, i.e., Irmax set

Page 75: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 61

by the BS. Then, we can state the following problem:

FR: maximizexrk∈x

∑r∈R

∑k∈K

Rrk (3.31)

subject to (3.7), (3.9),∑|Ωr|

k=1xrkP

rk g

rk,c ≤ Irmax . (3.32)

Similar to problem PR, the objective in FR is to maximize the sum rate of all D2D pairs. However,

in FR, the constraint given by (3.32) reflects reuse of the same RB by a set of D2D pairs Ωr only

if the interference is not violated (i.e., Irmax) over RB r. The formulated problem FR is also a

combinatorial problem and solving FR is an NP-hard problem, i.e., the complexity of FR will

remain intractable for a sufficiently large set of RBs and D2D pairs. This motivates the use of

matching theory.

3.5.2.1 Matching Game Formulation

Similar to the partial-reuse mode, in the full-reuse mode there are also two disjoint sets of agents,

the set of RBs, R, and the set of D2D pairs, K. Each RB r has a strict, transitive, and complete

preference profile Pr defined over D2D pairs, i.e., 2K. Note that under the full-reuse mode, D2D

pairs can operate on the same RB, which can cause severe interference to cellular users as well

as other D2D pairs operating on the same RBs. This can be observed from (3.2), the SINR of a

D2D pair k. From (3.7), it is given that each D2D pair can use a single RB. However, different

D2D pairs can use the same resource to improve RB efficiency. Therefore in full-reuse mode, the

preference profile Pk of D2D pairs is defined over the RBs, i.e., R. Note that, other D2D pairs

k′ operating on that RB implicitly affect the preference ranking of the D2D pair k. Therefore,

our design corresponds to the one-to-many matching given by the tuple (K,R,K,R). Here,

K , kk∈K and R , rr∈R represent the set of preference relations of the D2D pairs

and RBs, respectively. Formally, we define the matching as follows:

Definition 5 A matching µ is defined on the set K ∪R, which satisfies for all r ∈ R and k ∈ K:

1. |µ(k)| ≤ 1 and µ(k) ∈ R ∪ φ,

Page 76: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 62

2. |µ(r)| ≤ qr and µ(r) ∈ 2K ∪ φ,

3. If k ∈ µ(r) then µ(k) = r,

4. If µ(k) ∈ r for RB r then µ(r) =M,

where qr denotes the quota of RB r,M ⊂ K denotes the set of acceptable D2D pairs who prefer

r, and |µ(.)| denotes the cardinality of the matching outcome µ(.). Then, the first two conditions

here represent constraints given by (3.7) and (3.32), respectively, where qr represents the total

tolerable interference Irmax of RB r. Note that, by using qr, which represents the total tolerable

interference, we can make a decision on the number of D2D pairs that can be allocated a given

RB r without violating condition (3.32). Here, µ(k) = φ means that k is not matched to any RB.

Similarly, if µ(r) = φ, then there are no D2D pairs matched to RB r.

3.5.2.2 Preference Profiles of Players

Similar to the partial-reuse mode in the full-reuse mode, the agents on both sides need to rank each

other using the preference profile. However, the preference profiles of D2D pairs here depend on

the RBs as well as other D2D pairs assigned to that RB. externalities are such relationships which

are interdependent [81]. Due to these externalities, an agent changes its preference order based on

matching formation of other agents and thus agents may never reach to a final RB allocation.

In order to build the preference profile of D2D pairs, each D2D pair calculates the achievable

data rate for each RB and then ranks them in a descending order. The following preference function

is used by each D2D pair:

Uk(r, µ) = W r log(1 + γrk). (3.33)

Note that, channel gains in LTE-A system are acquired for sub-bands (i.e., group of RBs) rather

than for each RB [100]. Then, each D2D pair k will have the same preference over that group

of RBs, i.e., the RBs with same gains will result in the same achievable rate, thus, creating ties

among these RBs in D2D’s preference list. We can simply break all such ties in any arbitrary way

and rank them in a strict order to achieve a stable allocation [101]. Thus, for any D2D pair k, a

Page 77: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 63

preference relationk is defined over the set of RBsR such that, for any two RBs i, j ∈ R, i 6= j,

and two matchings µ and µ′ ∈ K ×R, i = µ(k), j = µ′(k),

(i, µ) k (j, µ′)⇔ Uk(i, µ) > Uk(j, µ′). (3.34)

Similarly, each RB r creates its preference profile by using the following preference function:

Ur(M, µ) = maxi|Mi| : IrMi

≤ Irmax. (3.35)

According to (3.35), each RB r chooses a subset of D2D pairs M such that the interference

produced by M is less than the tolerable interference threshold Irmax. This preference function

maximizes the number of elements inM, i.e., it maximizes the D2D pairs. Note that this allows

the D2D pairs that produce the lowest interference to be preferred by RB r. The subset with

the highest number of elements is the most preferred among all the feasible subsets and ranked

accordingly. Moreover, for any RB r, a preference relation r is defined such that for any two

subsets of D2D pairsM,N ∈ K, whereM 6= N , andM = µ(r),N = µ′(r):

(M, µ) r (N , µ′)⇔ Ur(M, µ) > Ur(N , µ′). (3.36)

Once the matching game and preference profile of both agent sides have been defined, we now aim

to find a stable RB allocation scheme for the proposed game. However, it is evident from (3.33)

and (3.35) that our preferences are a function of the existing matching µ, and from (3.2), it is clear

that the D2D pairs affect each others performance through co-tier interference. Therefore, in the

next subsection, we present a novel approach adopted to handle such externalities.

3.5.2.3 Preferences and Externalities

Next, we develop a novel approach to handle externalities in the proposed game and analyze its so-

lution. In the proposed game, if D2D pair k is assigned to a RB r, it will produce interference with

the cellular user as well as with the neighboring D2D pairs using the same RB r. Consequently,

an agent (D2D pair) may change its preference order with regards to a given RB r in response to

Page 78: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 64

the action of other agents, i.e., D2D pairs k′ that have been assigned to RB r. This may lead to a

situation in which agents never reach a final allocation.

Therefore, to build D2D pair preferences that can also handle the externalities, we represent the

initial D2D network as an interference graph. To deal with the externalities caused by neighboring

D2D pairs, we use an approach similar to [102], [103]. In a graph, the nodes represent D2D pairs,

and the edges indicate the interference between connected nodes. We assume that each D2D pair

first evaluates its interfering neighboring D2D pairs. This can be done by assuming two D2D pairs

i and k are connected by an edge that satisfies the following condition, i.e., the required signal

ratio to the interference signal is below a threshold ζk:

Pkgrk

Pigri,k≤ ζk.

Here, ζk is the predefined thresholds of D2D pair k selected to determine the severity of the

interference. This indicates that D2D pair k cannot share the same RB with D2D pair i if an edge

exists. Once all the interfering D2D pairs are identified for each D2D pair, the D2D pairs send this

set to the BS. We call this set as a conflict set for a D2D pair k and denote it as follows:

Ck =

k′ ∈ K :

Pkgrk

Pigri,k≤ ζk

. (3.37)

The main idea here is to restrict the reuse of RBs between D2D pairs who are very close to each

other, as this will cause instability and will have an adverse effect on the network.

3.5.2.4 Resource Allocation Algorithm

In order to find a stable RB allocation scheme, first, we need to define the blocking pair. However,

in our formulated game there is an additional challenge of dynamic quota, i.e., the BS allows a

number of D2D pairs (with heterogeneous interference) to use each RB as long as the interference

constraint on that RB is not violated. This heterogeneous interference of D2D pairs and dynamic

quota of resources introduces new challenges in the game similar to [85]. Moreover, our formu-

lated game has the additional challenge of externalities, which is not addressed in [85]. Therefore,

the blocking pair for the formulated game with dynamic quota and externalities is defined as fol-

Page 79: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 65

lows:

Definition 6 A matching µ is said to be stable if there exists no blocking pair (k, r) such that:

a. Irres ≥ Irk , k r ∅, r k µ(k), and µ(r) /∈ Ck,

b. Irres < Irk , Irres +

∑k′∈µ(r) Ik′

r ≥ Irk , k r k′, r k µ(k), and µ(r) /∈ Ck,

where Irres = Irmax −∑

k∈µ(r) Irk represents the residual of the interference tolerance (remaining

quota) on RB r. The quota of an RB r ∈ R is filled when Irres < Irk for a requesting k ∈ K.

Definition 6 is based on the following intuition. Whenever a D2D pair k prefers an RB r over its

assigned RB µ(k) that does not contain a conflicting D2D pair (i.e., µ(r) /∈ Ck), if either: i) r

has sufficient interference tolerance Irres and is willing to accept k (i.e., k r ∅), or ii) its quota

is filled but it is able to accept k by rejecting some accepted D2D pairs which are ranked lower

than k, then k and r can deviate from their assigned matching to form a blocking pair. A stable

matching represents a matching if no blocking pairs exist.

In contrast to the partial reuse mode, here, the preference profile of the D2D pairs are interde-

pendent through the interference terms, as seen in (3.2). Therefore, to achieve stability, a sufficient

condition is that the formation of any new D2D-RB pair does not undermine the stability of ex-

isting matched D2D-RB pairs. By employing such a condition, the preference profile of currently

matched D2Ds on an RB will remain unaltered even after this new pair formation. Stability in our

solution ensures that after RB allocation, no matched pair (D2D-RB) in the network would deviate

from their assigned RB with a new better RB and vice versa.

Algorithm 5: Full Reuse-mode Resource Allocation Algorithm

1: input: α, P(t)k , P(t)

r , Ck, ∀r, k.

2: initialize: t = 0, µ(1) , µ(k)(1), µ(r)(1)k∈K,r∈R = ∅, Irres(1) = Irmax, Jr(1) = ∅, C(1)r = ∅,

∀r, k.

3: t← t+ 1.

4: Update ∀k, Pk(t) for given µ(r)(t−1).

5: ∀k ∈ K with r as its most preferred in P(t)k

Page 80: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 66

6: while k /∈ µ(r)(t) and P(t)k 6= ∅ do

7: if Irres(t) < Irj , then

8: P ′(t)r = k′ ∈ µ(r)(t)|k r k′.

9: jlp ← the least preferred k′ ∈ P ′(t)r .

10: while (P ′(t)r 6= ∅) ∪ (Irres(t) < Irj ) do

11: µ(r)(t) ← µ(r)(t) \ jlp, P ′(t)r ← P ′(t)r \ jlp.

12: Irres(t) ← Irres

(t) + Irjlp .

13: if Irres(t) < Irj , then

14: jlp ← k

15: else

16: if C(t)r = k′ ∈ µ(r)(t) ∪ Ck = ∅, then

17: µ(r)(t) ← µ(r)(t) ∪ k, Irres(t) ← Irres

(t) − Irk .

18: else

19: D(t)r = k′ ∈ C(t)

r |k r k′.

20: for jlp ∈ D(t)r do

21: µ(r)(t) ← µ(r)(t) \ jlp.

22: Irres(t) ← Irres

(t) + Irjlp .

23: if C(t)r = k′ ∈ µ(r)(t) ∪ Ck = ∅, then

24: µ(r)(t) ← µ(r)(t) ∪ k, Irres(t) ← Irres

(t) − Irk .

25: else

26: jlp ← k.

27: Jr(t) = j ∈ Pr(t)|jlp r j ∪ jlp.

28: for j ∈ Jr(t) do

29: Pj(t) ← Pj(t) \ r, Pr(t) ← Pr(t) \ j

30: output: µ(t).

Page 81: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 67

Initialize:

set up preference lists (PLs)

Propose: Each user proposes to its most favorite resource; and

delete it from its PL;

Check: If all users’ all users are matched or PLs are empty?

Accept/reject: Each resource keeps the most favorite users w.r.t. its PL,

Conflict graph and quota from the proposals; and reject the rest;

Terminate: When two matching are same, it

converges

Yes

Up

dat

e P

refe

ren

ce b

ased

on

pre

vio

us

mat

chin

g

Figure 3.4: Full Reuse-mode Resource Allocation Algorithm.

Page 82: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 68

Next, we present a novel and stable RB allocation algorithm. The algorithm starts by using the

local information to build the preference profiles (lines 1-3) similar to Alg. 4. At each iteration t,

each D2D pair k, first calculates its utility and ranks all the RBs based on the previous matching

µ(r)(t−1) (line 4). Then, each D2D pair k proposes to the most preferred r, which can result in

either of the two following cases.

The first case is when r does not have sufficient quota Irres(t) to accept k, and so r then finds the

current matched D2D pairs that rank lower than D2D pair k according to Pr(t) (lines 7-9). Each

of the least preferred D2D pairs k′ is sequentially rejected until either k can be accepted or there

is no additional k′ to reject (lines 10-12). If sufficient quota to accept k is not created, then k is

also rejected and considered as the least preferred D2D pair represented by jlp (lines 13-14).

The second case is when the quota of r is enough to accommodate k, in which it then checks the

conflict set Ck. If the conflict set is empty, the D2D pair k is accepted (lines 15-17). Otherwise, it

removes all lower ranked conflicting D2D pairs compared to D2D pair k from its current matching

(lines 18-22). If the conflict set is still non-empty, the D2D pair k is rejected and is considered as

the least preferred jlp (lines 23-26).

Finally, the least preferred D2D pair jlp and all D2D pairs ranked lower than jlp are removed from

Pr(t), and similarly these D2D pairs also remove r from their respective Pk(t) (lines 27-29). With

this process, we guarantee that any less preferred D2D pair will not be accepted by that RB even

if it has sufficient quota to do so, which is crucial for the matching stability of our design. This

process is repeated until the matching converges. The algorithm will converge when the matching

of two consecutive iterations t remains unchanged.

Theorem 3 Alg. 5 converges to a stable allocation.

Proof We prove this theorem by contradiction. In any iteration t, assume that Alg. 5 produces a

matching µ(t) with a blocking pair (k, r) according to Definition 4. Then, we have, k r(t) µ(r)

and r k(t) µ(k) at iteration t. Therefore, we prove that these two conditions k r(t) µ(r) and

r k(t) µ(k) cannot hold simultaneously.

Assuming r k(t) µ(k), this implies that D2D pair k must have proposed to RB r according to the

Alg. 5. However, the matching result µ(k)(t) 6= r represents that r prefers µ(r) to k at iteration

t, i.e., µ(r) r(t) k. According to Alg. 5, a proposing pair k can be rejected due to the following

Page 83: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 69

two reasons:

1. D2D pair k gets rejected due to the quota limitation, i.e., Irres < Ik (lines 7-14 of Alg. 5).

This can only occur when φ r k. This implies RB r remains unmatched rather than

accommodating D2D pair k. Furthermore, when k was rejected, any lower ranked D2D pair

k′ was also either rejected before D2D pair k (lines 10-12 of Alg. 5) or was made unable to

propose because r is removed from all lower ranked D2D pairs preference list (lines 27-29

of Alg. 5).

2. D2D pair k gets rejected due to the current matched D2D pair, µ(r) (lines 18-26 of Alg. 5).

This states that RB r has sufficient quota to accommodate D2D pair k, but it also belongs

to the conflict set of current matched D2D pair (i.e., k ∈ Cµ(r)) and satisfies µ(r) r(t) k,

i.e., the current matched D2D pair µ(r) is ranked higher than the proposing pair k in the

preference profile of RB r (Pr).

Despite that k prefers to be matched with r rather than µ(r), r still prefers to be matched with

µ(r) rather than k, i.e., the condition k r(t) µ(r) does not hold when r k(t) µ(k). Similarly,

we can prove that the condition r k(t) µ(k) does not hold if k r(t) µ(r). Hence, D2D pair k

and RB r cannot form a blocking pair, and the matching obtained at each iteration t by Alg. 5 is

stable.

The optimality property of the stable matching approach can be observed using the definition of

weak Pareto optimality [104]. Let U(µ) denote the utility obtained by matching µ. A matching

µ is weak Pareto optimal if there is no other matching µ′ that can achieve a better utility, i.e.,

U(µ′) u∑

r∈R∑

k∈KRrk(µ′) ≥ U(µ) u

∑r∈R

∑k∈KR

rk(µ′). Formally, we state this as

follows:

Page 84: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 70

Definition 7 A matching µ is weak Pareto optimal (PO) if there is no other matching µ′ with

U(µ′) ≥ U(µ) [104].

Theorem 4 Alg. 5 produces a weak PO solution for the FR problem.

Proof Let us consider µ(t) to be the stable match obtained by Alg. 5 at iteration t. Assume µ′(t)

be a new arbitrary unstable matching that is better than µ(t) in that it achieves a higher utility for

all D2D-RB pairs, i.e., U(µ′) u∑

r∈R∑

k∈KRrk(µ′(t)) ≥ U(µ) u

∑r∈R

∑k∈KR

rk(µ

(t)).

Since µ′ is unstable, then, there exists at least one blocking pair. Let D2D-RB pair, i.e., (k, r)

be a blocking pair. Then, from Definition 5, we have two cases:

1. Irres ≥ Irk , k r ∅, r k µ(k)′, and µ(r) /∈ Ck.

For case 1, Alg. 5 will construct a new stable matching µ by assigning RBs r to D2D pair k instead

of the currently assigned RB µ(k)′. This increases the utility compared to the current match µ′,

i.e., since all other utilities are left unchanged in µ′, this shows that U(µ) ≥ U(µ′).

2. Irres < Irk , Irres +

∑k′∈µ(r) Ik′

r ≥ Irk ,

k r k′, r k µ(k), and µ(r) /∈ Ck.

For case 2, Alg. 5 will construct a new stable matching µ by removing low ranked D2D pairs

k′ from RB r, and then assigning RB r to D2D pair k. Since a lower ranked D2D pair k′ is

replaced with a higher ranked D2D pair k, the utility obtained by µ will be grater than µ′, i.e.,

U(µ) ≥ U(µ′). Hence, under both cases, the unstable matching µ′ is replaced by the new matching

µ. Thus, from the above arguments, we conclude there is no unstable matching µ′ that can achieve

better utility compared to a stable matching µ. Then, based on Definition 5, µ produced by Alg. 5

is a stable outcome and a weak PO allocation for the problem FR.

3.5.3 Computation Complexity and Implementation

In order to quantify the computational complexity of Alg. 4 and Alg. 5, first, we discuss the

complexity of building the preference profile by both set of players (i.e., D2D pairs and RBs) that

are the input to Alg. 4 and Alg. 5. Then, we discuss the running time of both algorithms.

Page 85: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 71

For each D2D pair k, the complexity of building the preference profile using any standard

sorting algorithm is O(R log(R)). Similarly the complexity of building the preference profile at

the central BS for all RBs R is O(KR log(KR)), where R and K represent the total number of

RBs and D2D pairs, respectively. So, the input to Alg. 2 is η =∑

k∈K |Pk|+∑

r∈R |Pr| = 2KR,

where |P| denote the size of preference profile P . Moreover, Alg. 2 terminates after a finite

number of iterations [84]. Under the worst case, when the preferences of all D2D pairs for all

RBs are the same, it can be seen that the time complexity is linear in the size of input preference

profiles (i.e., O(η) = O(KR)) [105].

In Alg. 5 to handle the externalities, at each iteration, all D2D pairs update their preference list

(i.e., O(R log(R))) based on the current matching. This is different from Alg. 4 whose preference

list is updated only once during the initialization phase. Moreover, an additional input vector of

the conflict set Ck will be added as an input with maximum size of K − 1 (i.e., the worst case

occurs when all D2D pairs are a member of the conflict set of all other D2D pairs). However, in

general, the size of Ck will be far smaller than the total number (K) of D2D pairs in the network.

Then, Alg. 5 input is equal to η=∑

k∈K |Pk|+∑

r∈R |Pr|+∑

k∈K |Ck| = 2KR+K(K− 1)/2.

From Theorem. 1, we state that Alg. 5 terminates after a finite number of iterations. Then it can be

stated that under worst case, the time complexity of Alg. 5 is also linear with respect to the size of

input preference profiles (i.e., O(η) = O(KR+ K2−K2 )). Thus, both algorithms show reasonable

computational complexity for practical implementation.

3.5.4 Example Scenario

In this subsection, we provide a detailed discussion supported with examples for the RB allocation

schemes. First, RB allocation using the partial reuse mode is discussed, i.e., Alg. 4. Then, we

discuss the RB allocation process for the full-reuse mode i.e., Alg. 5. Moreover, we elaborate in

detail the effect of externalities and their consequences if not well handled.

We consider Fig. 3.1 as our example for a D2D enabled system, where the dashed lines repre-

sent the interfering links. Note that the BS interferes with all D2D pairs, which is not shown in the

figure. From Fig. 1, we consider that all D2D pairs choose to use the given mode (i.e., controlled

by the vector α) so the two sides are K = k1, k2, k3, k4, k5, and R = r1, r2, r3. Let PK and

Page 86: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 72

PR, represent the preference profile of all players as follows:

Pk1 = Pk5 = r1, r3, r2, Pr1 = k1, k2, k5, k4, k3, qr1 = 1,

Pk2 = r3, r1, r2, Pr2 = k5, k4, k2, k1, k3, qr2 = 3,

Pk3 = Pk4 = r2, r3, r1, Pr3 = k4, k2, k5, k1, k3, qr3 = 1.

3.5.4.1 Partial-Reuse Mode

We first check the case when the partial-reuse mode (i.e., y = 1) is activated. Under this mode,

there is no co-tier interference (no externalities among D2D pairs), thus we have a one-to-one

matching scenario. From Alg. 4, all five D2D pairs propose to their respective preferred RBs

simultaneously. Note that the BS manages the RBs preference profiles. From the preference

profiles, we can see that k1 and k5 propose to r1, k2 proposes to r3, and k3 and k4 propose to r2 at

time instant t. At t, we have:

µ(r1) = k1, µ(r2) = k4, µ(r3) = k2.

Now at time instant t+1, the rejected D2D pairs k3 and k5 will update the preference by removing

the RBs that have rejected them and then propose to the next best option, i.e., r3 for both rejected

D2D pairs. On receiving these proposals, r3 compares its current match with the new proposals.

It chooses the best among them (i.e., k2) and rejects the rest (i.e., k3, k5). Now, the rejected pairs

again update and propose until there are no more RBs to propose or all D2D pairs are matched.

Finally, we have the following matching:

µ(r1) = k1, µ(r2) = k5, µ(r3) = k2.

3.5.4.2 Full-Reuse Mode

Now consider the second case, i.e., the full-reuse mode (y = 0). As stated earlier, this is a one-

to many matching. For ease of understanding, we assume each pair has a uniform interference

(opposed to dynamic interference) on all RBs and a predefined quota for RBs (i.e., qr1 = 1, qr2 =

3, qr3 = 1). Under this scenario, each D2D pair first identifies its conflict set and sends it to the

Page 87: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 73

BS. Note that this is done only once in the initialization phase. Additionally, this is important for

handling the externalities as explained in Sec. 3.5.2.3. Considering Fig. 1, the conflict set using

(3.37) is Ck1 = φ, Ck2 = k3, k4, Ck3 = k2, k4, Ck4 = k2, k3, and Ck5 = φ.

Similar to the first scenario, all D2D pairs propose to the most preferred RBs at time instant t

and we obtain

µ(r1) = k1, µ(r2) = k4, µ(r3) = k2.

This information is broadcast in the network by the BS. Note that, k5 is rejected by r1 due to the

quota limitation qr1 = 1, but k3 is rejected by r2 because k3 ∈ Ck4 (i.e., k3 exists in the conflict

set of a D2D pair k4) and from Pr2 , we have k4 r2 k3. After receiving the current matching of all

D2D pairs, we recalculate their respective utilities using (3.33) and re-rank all the RBs according

to their utility. In this example, k3 and k4 change their preferences from r3 ki r1 to r1 ki r3

because µ(r3) = k2 and k2 ∈ Cki , where i = 3, 4. Hence, the new preference list, at time instant

t+ 1 is as follows:

Pk1 = r1, r3, r2, Pr1 = k1, k2, k4, k3, qr1 = 0,

Pk2 = r3, r1, r2, Pr2 = k4, k2, k1, k5, qr2 = 2,

Pk3 = r1, r3, Pr3 = k4, k2, k5, k1, k3, qr3 = 0,

Pk4 = r2, r1, r3,

Pk5 = r3, r2.

Now the rejected pairs, i.e., k3 and k5, propose to r1 and r3, respectively; k3 and k5 are rejected

by r1 and r3 because µ(r1) r1 k3 and µ(r3) r3 k5 with qr = 0. Again, all pairs update the

preference profiles accordingly. k3 and k5 again propose at time instant t + 2 with the update

preference list to r3 and r2, respectively. k3 is again rejected because µ(r3) r3 k3 and qr3 = 0,

but k5 is accepted because qr2 = 2 and k5 /∈ Cµ(r2). Therefore, the final matching from Alg. 5 is

µ(r1) = k1, µ(r2) = k4, k5 µ(r3) = k2.

Note that k3 has no more RBs to propose to and all the other D2D pairs are matched. Thus, the

Page 88: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 74

algorithm stops. Furthermore, we can observe that the spectral efficiency is improved by reusing

the resources more in Alg. 5 (4 D2D pairs on 3 RBs) compared to Alg. 4 (3 D2D pairs on 3 RBs).

However, Alg. 5 has an additional overhead due to coordination (i.e., conflict set information and

matching update) compared to Alg. 4.

3.5.4.3 Full-Reuse Mode without Handling Externalities

Now consider the case where externalities are not handled. This means there is no conflict sets

information available. Under this scenario, with the same initial quota information, k1 and k5

propose to r1, k2 proposes to r3, and k3 and k4 propose to r2 at time instant t. We obtain the

following matching:

µ(r1) = k1, µ(r2) = k3, k4 µ(r3) = k2.

With this matching, the problem arises with µ(r2), as both pairs when assigned to r2 interfere with

each other. This can reduce their actual utilities when compared to other RBs. Thus, they may be

willing to switch to a new RB that provides them a higher utility. Assuming their second choice is

better than their current match, then at time instant t+ 1, the rejected pair k5 and both unsatisfied

pairs k3 and k4 propose once more to their best choices; they apply to r3 in this example, and r3

chooses k4 due to the quota limitation. We then have

µ(r1) = k1, µ(r2) = φ µ(r3) = k4.

With this assignment, we can see that both k3 and k4 prefer r2 and that r2 also prefers them to its

current match. Both pairs will propose again in the next time instant and will be accepted. This

brings us back to the initial case. Thus, under the case where externalities are not handled, these

D2D pairs will always switch between their preferences and will never be able to converge to a

stable allocation.

Page 89: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 75

Table 3.1: Default Simulation ParametersSimulation Parameters ValuesRadius of MBS 500 mCarrier frequency (f ) 2 GHzFrame Structure Type 1 (FDD)Transmission Time Interval (TTI) 1 msTotal transmit power of BS 46 dBmTotal transmit power of D2Ds 23 dBmSystem bandwidth 3 MHzBandwidth of each RB (W ) 180 kHzNumber of subcarriers per RB 12Neighboring subcarrier spacing 15 kHzModulation and coding scheme (MCS) [106] QPSK: 1/12, 1/9, 1/6, 1/3, 1/2, 3/5

16QAM: 1/3, 1/2, 3/5Path loss (cellular link) 128.1 + 37.6 log(d), d[km]Path loss (D2D links) [107] 32.45 + 20 log(f) + 20 log(d), f[MHz]Shadow fading standard deviation [107] 3 dBProximity of D2Ds (R2) random 20 ∼ 30 mThermal noise for 1 Hz at 20 ˙C −174 dBm

Page 90: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 76

3.6 Simulation Results and Analysis

We consider a downlink system in which the BS is assumed to be deployed at a fixed location, and

we randomly deploy C cellular users and K D2D pairs following a homogeneous Poisson point

process (PPP). We assume the system bandwidth to be 3 MHz3 which is occupied by theC cellular

users. Moreover, we consider a full buffer model for all K D2D pairs. The main parameters

used in our simulations are shown in Table 3.1 unless stated otherwise. These parameters are

chosen according to the system model guidelines in [106–108]. Note that, all statistical results are

averaged over 100 runs of random locations of D2D pairs, cellular users, and RB gains.

3.6.1 Simulation Results for Learning

In this subsection, we perform simulations to evaluate our proposed learning scheme. For this

simulation, we first generate an instance of network with K = 20 D2D pairs. We then evaluate

the following aspects of the learning scheme: the convergence of the learning scheme and the nor-

malized performance gap. Second, we generate instances of the network starting from K = 5 to

K = 50. For this simulation, we run each instance 100 times to obtain the sample average of util-

ity, the average number of successfully joined4 D2D pairs in the system, and the average stopping

time for convergence. Note that for these simulations, we assume the cellular-tier interference tol-

erance level to be fixed at Irmax = −80 dBm for all RBs. Finally, to evaluate our learning scheme,

we define the normalized performance gap as follows:

ε(t) = 1− U(t)

Umax, (3.38)

where U(t) is the utility at time-slot t, and Umax = maxf∈F Uf . We use the built-in simulated

annealing functions in MATLAB to obtain optimal solution Umax.

Fig. 3.5 shows the real-time utility values calculated using (3.5) along with its time average

values, which are obtained by means of a sliding window. We observe that as the time slot in-3The methodologies developed in this research can also be applied to any value of system bandwidth. The motivation

for our choice (i.e., 3 MHz) is to analyze the performance under dense environment with peak network traffic and forthe sake of simulation simplicity.

4Successfully joined D2D pairs represent the D2D pairs which choose to use the given mode and are also allocatedRBs.

Page 91: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 77

creases, each D2D pair learns its possible configurations and chooses high utility configurations

with high probabilities. Despite the fluctuations of the utility, the time average values show an in-

creasing trend in Fig. 3.5. This shows that the learning scheme converges in probability. However

once the convergence is achieved, the configurations do not change, i.e., after time-slot 184.

In Fig. 3.6, we can see the corresponding performance gap calculated using (3.38), which

has a descending trend with time. Furthermore, after a very short time-period (less than 20), we

observe that the ε(t) values becomes less than ε0, where ε0 = 1 − 1/e, which is the typical gap

for randomized greedy algorithms [109].

50 100 150 200 250

1

2

3

← t =184

Util

ity (

Mbp

s)

Time slot (ms)

UmaxUlearning Uavg

Figure 3.5: Real-time utility.

Page 92: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 78

50 100 150 200 2500

0.2

0.4

0.6

0.8

ε(t)

Time slot (ms)

← t =184

1 − 1/e

ε0 ε(t)

Figure 3.6: Real-time performance gap.

Page 93: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 79

1 1.5 2 2.50

20

40

Average utiliy for interval 1−75 ms, Std: 0.44.

1 1.5 2 2.50

20

40

Average utiliy for interval 75−150 ms, Std: 0.22.

1 1.5 2 2.50

20

40

Average utiliy for interval 150−250 ms, Std: 0.10.

Figure 3.7: Standard deviation of real-time performance.

Page 94: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 80

In Fig. 3.7, we calculate the standard deviation of the real-time performance. Here, we take

three intervals, i.e., 1 − 75 ms, 75 − 150 ms, and 150 − 250 ms. We observe that as the time

increases, all players learn their optimal actions and move towards the convergence. Thus, the

standard deviation reduces for the next interval and finally the solution converges to the stationary

distribution when all players stop learning.

Next, we test the normalized performance gap under three cases, K = 20, K = 30, and

K = 40. It is observed that under all cases, the learning scheme converges to a near optimal

solution. Additionally, when the ratio of the available RBs (i.e., 15 RBs with system bandwidth

3 MHz) to the number of D2D pairs satisfies (RK ≥ 0.5), the mode selection does not affect the gap

and the normalized performance gap is below the randomized greedy algorithm gap (ε0). However,

if the ratio of available RBs to the number of D2D pairs is less than 0.5, (i.e., RK < 0.5) (e.g., the

K = 40 case), the impact of mode selection becomes apparent and increases the performance gap

from the optimal. Still, as shown in Fig. 3.8, Prε ≤ ε0 > 0.9 for the majority of the time. This

shows that the learning scheme selects the best mode of operation according to the network size

the majority of the time, i.e., for a large network size (K = 40), the full-reuse mode is selected.

Hence, we can infer that the network operates under the best configurations for most of the time.

Page 95: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 81

0 0.2 0.4 0.6 0.8 10

0.2

0.4

0.6

0.8

1

Normalized performance gap, ε

Pr

(ε≤

ε0)

Emprical CDF

← 1 − 1/e

εK=40

εK=30

εK=20

Figure 3.8: Normalized performance gap.

Figs. 3.9 and 3.10 show the average utility achieved and fraction of successful joined D2D

pairs for different network sizes, K. We observe that the utility increases with the network size

despite a fixed number of RBs, i.e., R = 15. This is because according to the network size, the

learning algorithm switches to the best suited mode, i.e., the partial-reuse mode for a small network

size or the full-reuse mode for a larger network size. However, as the network size becomes larger

(K ≥ 40), the average utility approaches a saturation state due to limited RBs and the predefined

Irmax values. This trend is also evident in Fig. 3.10, where the fraction of successfully joined

D2D pairs decrease drastically after the saturation point (i.e., K ≥ 40). In Fig. 3.11, we evaluate

the average stopping time for our learning scheme. It can be seen that for all network sizes, the

learning scheme has a reasonable stopping time that increases sub-linearly with the network size.

Moreover, it is observed that the stopping time has high confidence intervals which are a result of

the mixing characteristic of the underlying Markov chain.

Page 96: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 82

10 20 30 40 500

1

2

3

4

5A

vera

ge U

tility

(M

bps)

Network Size (K)

Figure 3.9: Average Utility

10 20 30 40 5050

60

70

80

90

100

Join

ed D

2Ds

(%)

Network size (K)10 20 30 40 50

0

10

20

30

40

50

No.

of j

oine

d D

2Ds

Figure 3.10: Average successfully joined D2Ds

Page 97: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 83

10 20 30 40 50100

150

200

250

300

350S

topp

ing

time

(ms)

Network Size (K)

Figure 3.11: Average Stopping time

3.6.2 Simulation Results for Resource Allocation

In order to evaluate the performance of the RB allocation schemes, first, we show the comparison

in terms of average utility achieved by enabling the full-reuse and partial-reuse mode schemes

under different network sizes (i.e., the number of Joined D2D users, K). Second, we evaluate

the average utility for four different system bandwidth values, i.e., 1.4 MHz, 3 MHz, 5 MHz, and

10 MHz for a fixed network size, i.e., K = 50. Finally, we show the average number of iterations

resulting for different network sizes. Note that, the performance of the RB allocation scheme

depends upon the predefined max interference level Irmax of the RB r. Therefore, we analyze

the performance of RB allocation schemes with respect to three different maximum interference

tolerance thresholds set by the cellular tier, Imax = −120,−100, and −80 dBm [43, 98]. In our

simulations for all D2D pairs K, we set the co-tier interference threshold to ζk = 10 dB (i.e.,

between two D2D pairs).

We compare our proposed approaches with two other approaches: 1) The first approach (Base-

line 1) is a distributed algorithm that is based on the one-to-many matching game, similar to our

proposed algorithm for the full-reuse mode; however, no inter-tier interference among the D2D

Page 98: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 84

pairs is incorporated (i.e., without externalities). This approach aims to maximize the network

utility while providing cellular tier interference protection. However, this approach is unstable

due to the reasons discussed in Sec. 3.5.4.3. This benchmark algorithm is in line with some ex-

isting works used for RB allocation such as [98, 110], 2) The second is a centralized approach

(Baseline 2) that uses the Hungarian assignment method for RB allocation [112]. Results corre-

sponding to the full-reuse mode and partial-reuse mode algorithms are denoted as FR-RA, and

PR-RA, respectively.

First, the achievable utility by D2D pairs is shown with respect to three different Irmax values

for system bandwidth value of 3 MHz (i.e., 15 RBs). In this simulation, we increase the network

size (D2D pairs) and observed the average utility. First, we find that for the FR-RA and Baseline

1 schemes, the average utility increases as the network size grows. However, for Baseline 1,

after the network size is sufficiently large (above 30 D2D pairs and higher), the utility starts to

degrade. The reason for this performance degradation is as the network size increases, the inter-

D2D interference also increases, which degrades the performance. A performance gain in terms of

average utility up to 35%, 27%, and 13% under Irmax = −80, −100, and −120 dBm, respectively

is observed by the FR-RA when compared to Baseline 1 for a network of 50 D2D pairs.

Second, the utility saturates as the network grows when Irmax = −80 and −100 dBm for the

PR-RA and the Baseline 2 schemes. This is because of the limited amount of RBs (i.e., 15 in

3 MHz of bandwidth) in the simulation, and both schemes allow a single D2D pair on an RB.

Therefore, only the best one is allocated to the RB. Moreover, the performance of the PR-RA

scheme and Baseline 2 is indistinguishable under all scenarios.

Third, it is observed from Figs. 3.12, 3.13, and 3.14 that the FR-RA scheme is highly affected

by different Irmax thresholds compared to the PR-RA scheme (i.e., at Irmax = −120 dBm, the utility

drops to up to 52% of the utility obtained at Irmax = −80 dBm). This is mainly because the

interference protection constraint becomes stricter and a smaller number of users can reuse the

RBs in the FR-RA scheme, whereas in the PR-RA scheme, only one D2D pair is using the RB.

Moreover, for a loose protection threshold (i.e., Irmax = −80 and −100 dBm), the FR-RA scheme

yields a performance benefit of up to 158% and 123% compared to the PR-RA scheme, whereas

for a tighter protection threshold, Irmax = −120 dBm, the performance gain is reduced to 36%.

Page 99: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 85

Finally, we can infer that for a network size of less than 15 D2D pairs, the performance of all the

schemes are indistinguishable.

10 20 30 40 500

2

4

6

Network Size (K)

Ave

rage

Util

ity (

Mbp

s)

FR−RA PR−RA Baseline 1 Baseline 2

Figure 3.12: Average utility under Irmax = −80 dBm

Page 100: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 86

10 20 30 40 500

1

2

3

4

5

Network Size (K)

Ave

rage

Util

ity (

Mbp

s)

FR−RA PR−RA Baseline 1 Baseline 2

Figure 3.13: Average utility under Irmax = −100 dBm

10 20 30 40 500

1

2

3

4

5

Network Size (K)

Ave

rage

Util

ity (

Mbp

s)

FR−RA PR−RA Baseline 1 Baseline 2

Figure 3.14: Average utility under Irmax = −120 dBm

Page 101: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 87

Fig. 3.15 and Fig. 3.16 compares the performance of the proposed FR-RA and PR-RA

schemes. In this simulation, we fix the network size to 50 D2D pairs for four different system

bandwidth values, i.e., 1.4 MHz (6 RBs), 3 MHz (15 RBs), 5 MHz (25 RBs), and 10 MHz (50

RBs) under different Irmax values. It can be observed that under all Irmax values, the average utility

of the PR-RA scheme increases. This is because the unassigned D2D pairs are able to acquire RBs

as the RBs in the system are increased. Moreover, we find that, the average utility for the FR-RA

scheme almost saturates as the number of RBs increases in the system. The main reason for such

an action is that under loose interference thresholds ranging from Irmax = −80 to−100 dBm, most

of the D2D pairs get RBs assigned and under tight interference thresholds Irmax = −120 dBm, a

few D2D pairs are allocated RBs while the rest are rejected.

1020

3040

50

−120

−100

−801

2

3

4

5

6

Number of RBs (R)Ir

max(dBm)

Ave

rage

Util

ity (

Mbp

s)

Figure 3.15: Average utility of the proposed FR-RA scheme under various tolerance levels withK = 50.

Page 102: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 88

1020

3040

50

−120

−100

−800

2

4

6

Number of RBs (R)Ir

max (dBm)

Ave

rage

Util

ity (

Mbp

s)

Figure 3.16: Average utility of the proposed PR-RA scheme under various tolerance levels withK = 50.

Finally, the average iterations versus the network size for two different system bandwidth val-

ues, i.e., 1.4 MHz, and 3 MHz are compared. It can be observed that for a loose interference

tolerance threshold level Irmax = −80 dBm (Fig. 3.17), the proposed FR-RA scheme has a re-

markable convergence time and is around 5 and 7 iterations for both 1.4 MHz, and 3 MHz cases,

respectively. This fast convergence time can be achieved due to the loose tolerance threshold level,

as most of the D2D pairs are accepted at their initial proposals (line 15 of Alg. 5). Additionally,

the average iterations increase with the network size because of the increase in inter D2D interfer-

ence (i.e., less than 3 average iterations for a network size of 10 compared to 7 average iterations

for a network size 50). However, the use of the PR-RA scheme under Irmax = −80 has a higher

number of average iterations for both the 1.4 MHz (less than 6) and 3 MHz (less than 8) cases

compared to the FR-RA scheme for all network sizes. In the PR-RA scheme, for a relatively loose

Irmax value, all the users meet the interference constraint (line 9 of Alg. 4). Then, to assign an RB

Page 103: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 89

0 10 20 30 40 500

5

10

15

Network Size (K)

Ave

rage

iter

atio

ns

FR−RA, 3 MHzPR−RA, 3 MHzFR−RA, 1.4 MhzPR−RA, 1.4 MHz

Figure 3.17: Average number iterations vs. network size, for Irmax = −80 dBm

to a D2D pair, all low ranked D2D pairs have to be analyzed and rejected (lines 10-15 of Alg. 4).

This increases the average iterations even for a small network size (i.e., less than 15). However

for a tighter Irmax value (Fig. 3.18 and Fig. 3.19), a number of D2D pairs will be initially rejected

due to tighter interference constraint (line 9 of Alg. 4), which reduces the average iterations for

a small network size. In the FR-RA scheme, at a tighter interference tolerance threshold level of

Irmax = −100 dBm (Fig. 3.18), the iterations increases with network size increase, but is around 6

and 9 iterations with 1.4 MHz and 3 MHz bandwidth, respectively. Moreover, under Irmax = −120

dBm (Fig. 3.19), the average iteration converges to 14 and 6 iterations for even a small network

size (i.e., less than 5 D2D pairs) when bandwidth values of 3 MHz and 1.4 MHz are considered,

respectively. This is because most of the D2D pairs are rejected by RBs due to the tight Irmax (line

7 of Alg. 5. This then forces the pairs to propose to the next RBs, and consequently most of the

D2D pairs re-propose until they are either accepted or rejected by all RBs in the system. Note that

under all cases, the average number of iterations will always be less than the number of RBs. This

can be achieved due to a completely distributed design of the FR-RA and PR-RA schemes.

Page 104: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 90

0 10 20 30 40 500

5

10

15

Network Size (K)

Ave

rage

iter

atio

ns FR−RA, 3 MHz

PR−RA, 3 MHzFR−RA, 1.4 MhzPR−RA, 1.4 MHz

Figure 3.18: Average number iterations vs. network size, for Irmax = −100 dBm

Page 105: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 91

0 10 20 30 40 500

5

10

15

Network Size (K)

Ave

rage

iter

atio

ns FR−RA, 3 MHzPR−RA, 3 MHzFR−RA, 1.4 MhzPR−RA, 1.4 MHz

Figure 3.19: Average number iterations vs. network size, for Irmax = −120 dBm

Page 106: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 92

Finally, the achievable utility by D2D pairs is compared with respect to system bandwidth

value of 3MHz (i.e., 15 RBs). In this simulation, we increase the network size (D2D pairs) and

observed the average utility. First, we find that for all the schemes, the average utility increases as

the network size grows. However, for traditional matching, after the network size is sufficiently

large (above 30 D2D pairs and higher), the utility starts to degrade. The reason for this perfor-

mance degradation is as the network size increases, the inter-D2D interference also increases,

which degrades the performance. A performance gain in terms of average utility up to 35% is

observed by the FR-RA when compared to traditional matching for a network of 50 D2D pairs.

Moreover, both proposed and swap matching have indistinguishable performances. Second, the

utility saturates as the network grows. This is because of the limited amount of RBs (i.e., 15 in

3MHz of bandwidth) in the simulation.

Then, we compare the average iterations required to converge to a stable solution for both the

proposed matching and swap matching schemes. Here, we increase the network size to study the

effect of average iterations. As the network size grows, more number of users need to propose to

the RBs and the average iterations increase. However, for the proposed scheme, fast convergence

time can be achieved due to updating and removing the rejected players from the preference list.

However, in case of swap matching the converge time almost increases sub-linearly with network

size due to more number of users and accept-reject procedure of swap matching. In swap matching,

all the players make appropriate swaps until there exist no swap such that the utility of the network

can increase. Thus it has a very high converge time compared to the proposed scheme which is

not suitable for many 5G bandwidth hungry applications.

Page 107: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 93

network grows. This is because of the limited amount of RBs (i.e., 15 in 3MHz of

bandwidth) in the simulation.”

Figure 2: Comparison of average utility

“In figure 3, we compare the average iterations required to converge to a stable

solution for both the proposed matching and swap matching schemes. Here, we

increase the network size to study the effect of average iterations. As the network

size grows, more number of users need to propose to the RBs and the average

iterations increase. However, for the proposed scheme, fast convergence time can

be achieved due to updating and removing the rejected players from the

preference list. However, in case of swap matching the converge time almost

increases sub-linearly with network size due to more number of users and accept-

reject procedure of swap matching. In swap matching, all the players make

appropriate swaps until there exist no swap such that the utility of the network can

Figure 3.20: Average number iterations vs. network size, for Irmax = −100 dBm

3.7 Summary

In this work, we designed a resource allocation framework for D2D communication over cellular

networks by using Markov approximation and matching-game approaches. We considered two

important aspects: mode-selection and resource block allocation for the performance of the D2D

network. We used a learning framework based on Markov approximation in which we have de-

signed a problem specific Markov chain that converges close to an optimal solution with probabil-

ity one. Furthermore, we proposed novel resource allocation algorithms based on matching theory

that can work within the proposed learning framework. These resource allocation algorithms help

us obtain a stable resource allocation that is a locally optimal solution of an NP-hard resource allo-

cation problem at each time slot of the Markov approximation process. Our framework has shown

Page 108: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 3. RESOURCE ALLOCATION IN UNDERLAY DEVICE-TO-DEVICE COMMUNICATIONS 94

increase. Thus it has a very high converge time compared to the proposed scheme

which is not suitable for many 5G bandwidth hungry applications.’’

Figure 3: Comparison of average iterations

References

[1] A. Abdelnasser, E. Hossain, and D. I. Kim, “Tier-aware resource allocation in ofdma macrocell-

small cell networks,” IEEE Trans. Commun., vol. 63, no. 3, pp. 695-710, Mar. 2015.

[2] H. Zhang; Y. Liao; L. Song, "D2D-U: Device-to-Device Communications in Unlicensed Bands for

5G System," in IEEE Transactions on Wireless Communications , vol.PP, no.99, pp.1-1, 2017 doi:

10.1109/TWC.2017.2683479.

Figure 3.21: Average number iterations vs. network size, for Irmax = −120 dBm

that it achieves a stable, distributed and scalable solution for the network. Simulation results have

shown that the proposed framework convergence in probability, achieves interference protection

and closely approaches the optimal solution. Furthermore, we have also validated the stability and

convergence of the resource allocation algorithm.

Page 109: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

Chapter 4Conclusion and Future Directions

This final chapter summarizes the major contributions of the dissertation and highlights the future

research topic.

4.1 Conclusion

In this dissertation, we have investigated two network optimization problems for two novel radio

access technologies that will enable the 5G paradigm. Each network optimization problem has its

own objective and constraints due to the underlying characteristics of the corresponding network

environment.

For the first optimization problem, we have proposed two novel approaches for resource allo-

cation in underlay small cells while protecting the macro tier. In the first approach, we relax the

original problem and present a self-organizing approach using the optimization theory. Then, for

the second approach, we formulated the resource allocation problem as a many-to-one matching

game in which a BS builds the preference profile on behalf of all channels and each SBSs build

their own preference profile for each channel using local conventional rate maximization param-

eter. Through these preference profiles each set of players can evaluate each other based on their

defined utilities. In order to solve the problem, we proposed a novel resource allocation algo-

rithm which guarantees macro tier protection and a stable match for the underlay SCs. Both our

proposed schemes can be implemented distributively, thus, a self-organizing solution. Simulation

results presented for the proposal showed the interference protection for macro tier, convergence

of algorithm in terms of rate and stable matching for underlay SC network.

Second, we studied the advantages of enabling D2D communication that can coexist with the

traditional cellular system. To solve this problem, we designed a resource allocation framework for

95

Page 110: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 4. CONCLUSION AND FUTURE DIRECTIONS 96

D2D communication over cellular networks by using Markov approximation and matching-game

approaches. We considered two important aspects: mode-selection and resource block allocation

for the performance of the D2D network. We used a learning framework based on Markov ap-

proximation in which we have designed a problem specific Markov chain that converges close to

an optimal solution with probability one. Furthermore, we proposed novel resource allocation al-

gorithms based on matching theory that can work within the proposed learning framework. These

resource allocation algorithms help us obtain a stable resource allocation that is a locally optimal

solution of an NP-hard resource allocation problem at each time slot of the Markov approximation

process. Our framework has shown that it achieves a stable, distributed and scalable solution. The

proposed framework convergence in probability, achieves interference protection and closely ap-

proaches the optimal solution. Furthermore, we have also validated the stability and convergence

of the resource allocation algorithm both analytically and via extensive simulation.

All algorithms proposed in this dissertation are self-organizing, scalable and can be imple-

mented distributively in the cellular network.

4.2 Future Directions

Novel network application and services are being developed and incorporated in the current net-

work at a very rapid pace, thus requiring solutions to a number of potential challenges. This is

creating new network optimization problems that need to be addressed. The followings are some

open issues and future directions.

1. Due to the proliferation of smart mobiles devices, there has been a great diversity both in

the contents as well as the devices. These factors need to be taken into account by adding the user

QoS based on its capability. By incorporating the device heterogeneity along with its demand, it

is expected that we can even support delay-sensitive traffic based on prioritizing the traffic.

2. Multi-point connectivity is also among one proposal to meet the users QoS requirements.

Using multi-point approach, a user device can maintain multiple connections with multiple re-

ceivers based on its application. Thus, intelligent and efficient resource management schemes will

be required in such multi-point systems.

3. Millimeter Wave (mmWave) is also a proposal that can meet the future network require-

Page 111: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

CHAPTER 4. CONCLUSION AND FUTURE DIRECTIONS 97

ments. Using these mmWave networks in 5G especially for small cells can boost the available

capacity. However, intelligent and efficient resource management schemes will be required to

deploy efficient mmWave networks.

Page 112: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

Bibliography

[1] Cisco, “Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016-

2021 White Paper”, http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-

networking-index-vni/mobile-white-paper-c11-520862.html [online].

[2] Ullah, Saeed, Kyi Thar, and Choong Seon Hong. “Management of scalable video streaming

in information centric networking” Multimedia Tools and Applications, vol. PP, 2016.

[3] Hong, Choong Seon, SM Ahsan Kazmi, Seungil Moon, and Nguyen Van Mui. “SDN Based

Wireless Heterogeneous Network Management.” In AETA 2015: Recent Advances in Electrical

Engineering and Related Sciences, Springer International Publishing, pp. 3-12, Vietnam, 2016.

[4] J. G. Andrews, S. Buzzi, W. Choi, S. V. Hanly, A. Lozano, A. C. Soong, and J. C. Zhang,

What will 5g be?, IEEE J. Sel. Areas Commun., vol. 32, no. 6, pp.1065-1082, 2014.

[5] Alliance, N. G. M. N. ”5G white paper.” Next generation mobile networks, white paper, 2015.

[6] Hossain, Ekram, and Monowar Hasan. ”5G cellular: key enabling technologies and research

challenges.” IEEE Instrumentation & Measurement Magazine, vol. 18, no. 3, 2015.

[7] Demestichas, Panagiotis, Andreas Georgakopoulos, Dimitrios Karvounas, Kostas Tsagkaris,

Vera Stavroulaki, Jianmin Lu, Chunshan Xiong, and Jing Yao. ”5G on the horizon: key chal-

lenges for the radio-access network.” IEEE Vehicular Technology Magazine, vol. 8, no. 3, 2013.

[8] Osseiran, Afif, Federico Boccardi, Volker Braun, Katsutoshi Kusume, Patrick Marsch, Michal

Maternia, Olav Queseth et al. ”Scenarios for 5G mobile and wireless communications: the

vision of the METIS project.” IEEE Commun. Mag., vol. 52, no. 5, 2014.

98

Page 113: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

BIBLIOGRAPHY 99

[9] Elshaer, Hisham, Federico Boccardi, Mischa Dohler, and Ralf Irmer. ”Downlink and uplink

decoupling: A disruptive architectural design for 5G networks.” In IEEE Global Communica-

tions Conference (GLOBECOM), pp. 1798-1803, Austin, Dec. 2014.

[10] Wang, Cheng-Xiang, Fourat Haider, Xiqi Gao, Xiao-Hu You, Yang Yang, Dongfeng Yuan,

Hadi Aggoune, Harald Haas, Simon Fletcher, and Erol Hepsaydir. ”Cellular architecture and

key technologies for 5G wireless communication networks.” IEEE Commun. Mag., vol. 52, no.

5, 2014.

[11] Lopez-Perez, David, Ismail Guvenc, Guillaume De la Roche, Marios Kountouris, Tony QS

Quek, and Jie Zhang. ”Enhanced intercell interference coordination challenges in heteroge-

neous networks.” IEEE Wireless Commun., vol. 18, no. 3, 2011.

[12] Nigam, Gaurav, Paolo Minero, and Martin Haenggi. ”Coordinated multipoint joint trans-

mission in heterogeneous networks.” IEEE Trans. Commun., vol. 62, no. 11, pp. 4134-4146,

2014.

[13] Bu, Shengrong, F. Richard Yu, and Halim Yanikomeroglu. ”Interference-aware energy-

efficient resource allocation for OFDMA-based heterogeneous networks with incomplete chan-

nel state information.” IEEE Trans. Veh. Technol., vol. 64, no. 3, pp. 1036-1050, 2015.

[14] Sakr, Ahmed Hamdi, and Ekram Hossain. ”Cognitive and energy harvesting-based D2D

communication in cellular networks: Stochastic geometry modeling and analysis.” IEEE Trans.

Commun., vol. 63, no. 5, pp. 1867-1880, 2015.

[15] Liu, Yuanwei, Lifeng Wang, Syed Ali Raza Zaidi, Maged Elkashlan, and Trung Q. Duong.

”Secure D2D communication in large-scale cognitive cellular networks: A wireless power

transfer model.” IEEE Trans. Commun., vol. 64, no. 1, pp. 329-342, 2016.

[16] Mumtaz, Shahid, Kazi Mohammed Saidul Huq, Ayman Radwan, Jonathan Rodriguez, and

Rui L. Aguiar. ”Energy efficient interference-aware resource allocation in LTE-D2D commu-

nication.” In IEEE International Conference on Communications (ICC), pp. 282-287, Sydney,

Jun. 2014.

Page 114: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

BIBLIOGRAPHY 100

[17] Li, Bin, Mengwei Sun, Xiaofan Li, Arumugam Nallanathan, and Chenglin Zhao. ”Energy

detection based spectrum sensing for cognitive radios over time-frequency doubly selective

fading channels.” IEEE Trans. on Signal Processing, vol. 63, no. 2, pp. 402-417, 2015.

[18] Xiong, Cong, Lu Lu, and Geoffrey Ye Li. ”Energy-efficient spectrum access in cognitive

radios.” IEEE J. Sel. Areas Commun., vol. 32, no. 3, pp. 550-562, 2014.

[19] Li, Bin, Chenglin Zhao, Mengwei Sun, Zheng Zhou, and Arumugam Nallanathan. ”Spectrum

sensing for cognitive radios in time-variant flat-fading channels: a joint estimation approach.”

IEEE Trans. Commun., vol. 62, no. 8, pp. 2665-2680, 2014.

[20] Jiang, Jing, Hongjian Sun, David Baglee, and H. Vincent Poor. ”Achieving autonomous

compressive spectrum sensing for cognitive radios.” IEEE Trans. Veh. Technol., vol. 65, no. 3,

pp. 1281-1291, 2016.

[21] Zeng, Weiliang, Yahong Rosa Zheng, and Chengshan Xiao. ”Global optimization of precoder

for multi-antenna secure cognitive radios with finite-alphabet inputs and statistical CSI.” In

IEEE International Conference on Communications (ICC), pp. 1-6, Kuala Lumpur, May 2016.

[22] Ko, Haneul, Jaewook Lee, and Sangheon Pack. ”A fair listen-before-talk algorithm for co-

existence of LTE-U and WLAN.” IEEE Trans. Veh. Technol., vol. 65, no. 12, pp. 10116-10120,

2016.

[23] Chen, Mingzhe, Walid Saad, and Changchuan Yin. ”Echo state networks for self-organizing

resource allocation in lte-u with uplink-downlink decoupling”, IEEE Trans. Wireless Commun.,

Vol. 16, no. 1, Jan. 2017.

[24] Zhang, Ran, Miao Wang, Lin X. Cai, Zhongming Zheng, Xuemin Shen, and Liang-Liang

Xie. ”LTE-unlicensed: the future of spectrum aggregation for cellular networks.” IEEE Wireless

Commun., vol. 22, no. 3, pp. 150-159, 2015.

[25] He, Hongli, Hangguan Shan, Aiping Huang, Lin X. Cai, and Tony Quek. ”Proportional

Fairness-Based Resource Allocation for LTE-U Coexisting with Wi-Fi.” IEEE Access , 2016.

Page 115: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

BIBLIOGRAPHY 101

[26] Hamidouche, Kenza, Walid Saad, and Mrouane Debbah. ”A multi-game framework for har-

monized LTE-U and WiFi coexistence over unlicensed bands.” IEEE Wireless Commun., vol.

23, no. 6, pp. 62-69, 2016.

[27] Bjrnson, Emil, Erik G. Larsson, and Thomas L. Marzetta. ”Massive MIMO: Ten myths and

one critical question.” IEEE Commun. Mag., vol. 54, no. 2, pp. 114-123, 2016.

[28] Chen, Jian, Xiaoming Chen, Wolfgang H. Gerstacker, and Derrick Wing Kwan Ng. ”Re-

source allocation for a massive MIMO relay aided secure communication.” IEEE Transactions

on Information Forensics and Security, vol. 11, no. 8, pp. 1700-1711, 2016.

[29] Yang, Gang, Chin Keong Ho, Rui Zhang, and Yong Liang Guan. ”Throughput optimization

for massive MIMO systems powered by wireless energy transfer.” IEEE J. Sel. Areas Commun.,

vol. 33, no. 8, pp. 1640-1650, 2015.

[30] Nguyen, Tri Minh, Vu Nguyen Ha, and Long Bao Le. ”Resource allocation optimization in

multi-user multi-cell massive MIMO networks considering pilot contamination.” IEEE Access,

vol. 3, pp. 1272-1287, 2015.

[31] Wang, Ping, Wei Song, Dusit Niyato, and Yong Xiao. ”QoS-aware cell association in 5G

heterogeneous networks with massive MIMO.” IEEE Network, vol. 29, no. 6, pp. 76-82, 2015.

[32] Bangerter, Boyd, Shilpa Talwar, Reza Arefi, and Ken Stewart. ”Networks and devices for the

5G era.”IEEE Commun. Mag., vol. 52, no. 5, 2014.

[33] Talwar, Shilpa, Debabani Choudhury, Konstantinos Dimou, Ehsan Aryafar, Boyd Bangerter,

and Kenneth Stewart. ”Enabling technologies and architectures for 5G wireless.” In IEEE MTT-

S International Microwave Symposium (IMS), pp. 1-4, 2014.

[34] Gohil, Asvin, Hardik Modi, and Shobhit K. Patel. ”5G technology of mobile communication:

A survey.” In International Conference on Intelligent Systems and Signal Processing (ISSP), pp.

288-292, 2013.

[35] Ge, Xiaohu, Song Tu, Guoqiang Mao, Cheng-Xiang Wang, and Tao Han. ”5G ultra-dense

cellular networks.” IEEE Wireless Commun., vol. 23, no. 1, pp. 72-79, 2016.

Page 116: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

BIBLIOGRAPHY 102

[36] Tehrani, Mohsen Nader, Murat Uysal, and Halim Yanikomeroglu. ”Device-to-device com-

munication in 5G cellular networks: challenges, solutions, and future directions.” IEEE Com-

mun. Mag., vol. 52, no. 5, 2014.

[37] Bhushan, Naga, Junyi Li, Durga Malladi, Rob Gilmore, Dean Brenner, Aleksandar Damn-

janovic, Ravi Sukhavasi, Chirag Patel, and Stefan Geirhofer. “Network densification: the dom-

inant theme for wireless evolution into 5G.” IEEE Commun. Mag., vol. 52, no. 2, 2014.

[38] Chen, Shanzhi, Fei Qin, Bo Hu, Xi Li, and Zhonglin Chen. ”User-centric ultra-dense net-

works for 5G: challenges, methodologies, and directions.” IEEE Wireless Commun., vol. 23,

no. 2, 2016.

[39] Hossain, Ekram, Mehdi Rasti, Hina Tabassum, and Amr Abdelnasser. ”Evolution toward 5G

multi-tier cellular wireless networks: An interference management perspective.” IEEE Wireless

Commun., vol. 21, no. 3, 2014.

[40] Y.-S. Liang,W.-H. Chung, G.-K. Ni, I.-Y. Chen, H. Zhang, and S.-Y. Kuo, “Resource alloca-

tion with interference avoidance in ofdma femtocell networks,” IEEE Trans. Veh. Technol., vol.

61, no. 5, pp. 2243-2255, Jun. 2012.

[41] MOON, Seungil, Thant Zin OO, Ahsan SM, Bang Ju PARK, and Choong Seon HONG.

“SDN-Based Self-Organizing Energy Efficient Downlink/Uplink Scheduling in Heterogeneous

Cellular Networks.” IEICE Transactions on Information and Systems, vol., 100, no. 5, 2017.

[42] K. Son, S. Lee, Y. Yi, and S. Chong, Refim: A practical interference management in hetero-

geneous wireless access networks, IEEE J. Sel. Areas Commun., vol. 29, no. 6, pp. 1260-1272,

2011.

[43] A. Abdelnasser, E. Hossain, and D. I. Kim, “Tier-aware resource allocation in ofdma

macrocell-small cell networks,” IEEE Trans. Commun., vol. 63, no. 3, pp. 695-710, Mar. 2015.

[44] A. Asadi, Q. Wang, and V. Mancuso, “A survey on device-to-device communication in cel-

lular networks, IEEE Commun. Surveys Tuts., vol. 16, no. 4, pp. 1801-1819, Fourth quarter

2014.

Page 117: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

BIBLIOGRAPHY 103

[45] C.-H. Yu, K. Doppler, C. Ribeiro, and O. Tirkkonen, “Resource sharing optimization

for device-to-device communication underlaying cellular networks, IEEE Trans. on Wireless

Comm., vol. 10, no. 8, pp. 2752-2763, Aug. 2011.

[46] P. Janis, V. Koivunen, C. Ribeiro, J. Korhonen, K. Doppler, and K. Hugl, “Interference-

aware resource allocation for device-to-device radio underlaying cellular networks, in Proc.

IEEE Vehicular Technology Conference, Barcelona, Spain, Apr. 2009.

[47] B. Kaufman, J. Lilleberg, and B. Aazhang, “Spectrum sharing scheme between cellular users

and ad-hoc device-to-device users, IEEE Trans. on Wireless Comm., vol. 12, no. 3, pp. 1038-

1049, Mar. 2013.

[48] D. Feng, L. Lu, Y. Yuan-Wu, G. Y. Li, G. Feng, and S. Li, “Device-to-device communications

underlaying cellular networks, IEEE Trans. Commun., vol. 61, no. 8, pp. 3541-3551, Aug. 2013.

[49] Y. Jiang, Q. Liu, F. Zheng, X. Gao, and X. You, Energy efficient joint resource allocation

and power control for D2D communications, IEEE Trans. Veh. Technol., vol. 65, no. 8, pp.

6119-6127, Aug. 2016.

[50] D. Wu, Y. Cai, R. Hu, and Y. Qian, “Dynamic distributed resource sharing for mobile D2D

communications, IEEE Trans. Wireless Commun., vol. 14, no. 10, pp. 5417-5429, Oct. 2015.

[51] Y. Gu, Y. Zhang, M. Pan, and Z. Han, “Matching and cheating in device to device com-

munications underlying cellular networks, IEEE J. Sel. Areas Commun., vol. 33, no. 10, pp.

2156-2166, Oct. 2015.

[52] H. Tang and Z. Ding, “Mixed mode transmission and resource allocation for d2d communi-

cation, IEEE Trans. on Wireless Comm., vol. 15, no. 1, pp. 162-175, Jan. 2016.

[53] L. Song, D. Niyato, Z. Han, and E. Hossain, “Game-theoretic resource allocation methods

for device-to-device communication, IEEE Wireless Commun., vol. 21, no. 3, pp. 136-144, Jun.

2014.

[54] F. Boccardi, R. W. Heath, A. Lozano, T. L. Marzetta, and P. Popovski, “Five disruptive

technology directions for 5G, IEEE Commun. Mag., vol. 52, pp. 74-80, Feb. 2014.

Page 118: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

BIBLIOGRAPHY 104

[55] Ericsson, A. B. “Ericsson mobility report: On the pulse of the Networked Society”, Ericsson,

Sweden, Tech. Rep. EAB-14 61078, Jun. 2015.

[56] M. Chen, S. C. Liew, Z. Shao, and C. Kai, “Markov approximation for combinatorial network

optimization, IEEE Trans. on Information Theory, vol. 59, no. 10, pp. 6301-6327, Oct. 2013.

[57] S. Zhang, Z. Shao, M. Chen, and L. Jiang, “Optimal distributed P2P streaming under node

degree bounds, IEEE/ACM Trans. on Networking, vol. 22, no. 3, pp. 717-730, Jun. 2014.

[58] T. Z. Oo, N.H. Tran, W. Saad, J. Son, and C.S. Hong, Traffic offloading via Markov approx-

imation in heterogeneous cellular networks, in IEEE/IFIP Network Operations and Manage-

ment Symposium, pp.52-60, Apr. 2016.

[59] T. Z. Oo, N. H. Tran, W. Saad, D. Niyato, Z. Han, C. S. Hong, “Offloading in HetNet: A

Coordination of Interference Mitigation, User Association and Resource Allocation,” in IEEE

Trans. on Mobile Comput., vol. PP, no. 99, pp. 1-1.

[60] S. Maghsudi, and S. Stanczak, “Channel selection for network-assisted D2D communication

via no-regret bandit learning with calibrated forecasting, IEEE Tran. on Wireless Comm., vol.

14, no. 3, pp. 1309-1322, Mar. 2015.

[61] S. Maghsudi and E. Hossain, “Multi-armed bandits with application to 5G small cells, in

IEEE Wireless Commun., vol. 23, no. 3, pp. 64-73, Jun. 2016.

[62] Z. Zhou, G. Ma, M. Dong, K. Ota; C. Xu, Y. Jia, “Iterative Energy-Efficient Stable Matching

Approach for Context-Aware Resource Allocation in D2D Communications,” in IEEE Access,

vol.PP, no.99, pp.1-1, 2016.

[63] S. Boyd, and L. Vandenberhe “Convex Optimization”, Cambridge University Press, 2004.

[64] Hoydis, Jakob, Mari Kobayashi, and Mrouane Debbah. ”Green small-cell networks.” IEEE

Vehicular Technology Magazine, issue 6, no. 1, Mar. 2011.

[65] Zhang, Haijun, Xiaoli Chu, Weisi Guo, and Siyi Wang. ”Coexistence of Wi-Fi and heteroge-

neous small cell networks sharing unlicensed spectrum.” IEEE Commun. Mag., vol. 53, no. 3,

2015.

Page 119: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

BIBLIOGRAPHY 105

[66] Hoadley, John, and Payam Maveddat. ”Enabling small cell deployment with HetNet.” IEEE

Wireless Commun., vol. 19, no. 2, 2012.

[67] Correia, Luis M., Dietrich Zeller, Oliver Blume, Dieter Ferling, Ylva Jading, Istvn Gdor,

Gunther Auer, and Liesbet Van Der Perre. ”Challenges and enabling technologies for energy

aware mobile radio networks.” IEEE Commun. Mag., vol. 48, no. 11, 2010.

[68] Urgaonkar, Rahul, Ulas C. Kozat, Ken Igarashi, and Michael J. Neely. ”Dynamic resource

allocation and power management in virtualized data centers.” In IEEE Network Operations

and Management Symposium (NOMS), pp. 479-486, 2010.

[69] Ho, Tai Manh, Nguyen H. Tran, Long Bao Le, SM Ahsan Kazmi, Seung Il Moon, and

Choong Seon Hong. ”Network economics approach to data offloading and resource partition-

ing in two-tier LTE HetNets.” In IFIP/IEEE International Symposium on Integrated Network

Management (IM), pp. 914-917, 2015.

[70] Oo, Thant Zin, Nguyen H. Tran, Tuan LeAnh, SM Ahsan Kazmi, Tai Manh Ho, and Choong

Seon Hong. ”Traffic offloading under outage QoS constraint in heterogeneous cellular net-

works.” In IEEE 17th Asia-Pacific Network Operations and Management Symposium (AP-

NOMS), pp. 436-439, 2015.

[71] Kazmi, SM Ahsan, Nguyen H. Tran, Tai Manh Ho, Thant Zin Oo, Tuan LeAnh, Seungil

Moon, and Choong Seon Hong. ”Resource management in dense heterogeneous networks.”

In IEEE 17th Asia-Pacific Network Operations and Management Symposium (APNOMS), pp.

440-443, 2015.

[72] Kazmi, SM Ahsan, Tai Manh Ho, Oanh Tran Thi Kim, and Choong Seon Hong. ”Resource

Allocation and User Associations in Dense Heterogeneous Wireless Networks.” KIISE, 2015.

[73] ElSawy, Hesham, Ekram Hossain, and Martin Haenggi. ”Stochastic geometry for modeling,

analysis, and design of multi-tier and cognitive cellular wireless networks: A survey.” IEEE

Commun. Surveys Tuts., vol., 15, no. 3, 2013.

Page 120: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

BIBLIOGRAPHY 106

[74] Ghosh, Amitabha, Nitin Mangalvedhe, Rapeepat Ratasuk, Bishwarup Mondal, Mark Cudak,

Eugene Visotsky, Timothy A. Thomas et al. ”Heterogeneous cellular networks: From theory to

practice.” IEEE Commun. Mag., vol. 50, no. 6, 2012.

[75] Andrews, Jeffrey G., Holger Claussen, Mischa Dohler, Sundeep Rangan, and Mark C. Reed.

”Femtocells: Past, present, and future.” IEEE J. Sel. Areas Commun., vol. 30, no. 3, 2012.

[76] Dhillon, Harpreet S., Radha Krishna Ganti, Francois Baccelli, and Jeffrey G. Andrews.

”Modeling and analysis of K-tier downlink heterogeneous cellular networks.” IEEE J. Sel. Ar-

eas Commun., vol. 30, no. 3, 2012.

[77] T. Ho, N. Tran, C. Do, S. Kazmi, E.-N. Huh, and C. Hong, Power control for interference

management and qos guarantee in heterogeneous networks, IEEE Commun. Lett., vol. 19,no.

8, pp. 1402-1405, Aug. 2015.

[78] Kazmi, SM Ahsan, Nguyen H. Tran, Walid Saad, Zhu Han, Tai Manh Ho, Thant Zin Oo,

and Choong Seon Hong. ”Mode Selection and Resource Allocation in Device-to-Device Com-

munications: A Matching Game Approach.” IEEE Transactions on Mobile Comput., vol.PP,

no.99, pp.1-1, 2017.

[79] Kazmi, SM Ahsan, and Choong Seon Hong. “A matching game approach for resource allo-

cation in wireless network virtualization.” In Proceedings of the 11th International Conference

on Ubiquitous Information Management and Communication, Jan. 2017.

[80] S. M. A. Kazmi; N. Tran; T. Ho; C. S. Hong, ”Hierarchical Matching Game for Service

Selection and Resource Purchasing in Wireless Network Virtualization,” in IEEE Communica-

tions Letters, vol.PP, no.99, pp.1-1, 2017.

[81] Y. Gu, W. Saad, M. Bennis, M. Debbah, and Z. Han, “Matching theory for future wireless

networks: fundamentals and applications, IEEE Commun. Mag., vol. 53, no. 5, pp. 52-59, May

2015.

[82] J. Sethuraman, C.-P. Teo, and L. Qian, Many-to-one stable matching: Geometry and fairness,

Mathematics of Operations Research, vol. 31, no. 3, pp. 581-596, 2006.

Page 121: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

BIBLIOGRAPHY 107

[83] Ho, Tai Manh, Nguyen H. Tran, S. M. Kazmi, Seung Il Moon, and Choong Seon Hong. ”Dis-

tributed Pricing Power Control for Downlink Co-tier Interference Coordination in Two-Tier

Heterogeneous Networks.” In Proceedings of the 10th International Conference on Ubiquitous

Information Management and Communication,, Jan. 2016.

[84] A. E. Roth, “Deferred acceptance algorithms: History, theory, practice, and open questions,

Int. J. Game Theory, vol. 36, no. 3-4, pp. 537-569, Mar. 2008.

[85] H. Xu and B. Li, “Anchor: A versatile and efficient framework for resource management in

the cloud, IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1066-1076, Jun. 2013.

[86] C. Xu, L. Song, and Z. Han, Resource Management for Device-to Device Underlay Commu-

nication. New York, NY, USA: Springer-Verlag, 2013.

[87] O. Semiari, W. Saad, S. Valentin, M.Bennis, and H. V. Poor, “Context-Aware Small Cell Net-

works: How Social Metrics Improve Wireless Resource Allocation,” IEEE Trans. on Wireless

Comm., vol. 14, no. 11, pp. 5927-5940, Nov. 2015.

[88] S. Andreev, O. Galinina, A. Pyattaev, K. Johnsson, and Y. Koucheryavy, “Analyzing assisted

offloading of cellular user sessions onto D2D links in unlicensed bands, IEEE J. Sel. Areas

Commun., vol. 33, no. 1, pp. 67-80, Jan. 2015.

[89] A. Antonopoulos, E. Kartsakli, and C. Verikoukis, Game theoretic D2D content dissemina-

tion in 4G cellular networks, IEEE Commun. Mag., vol. 52, no. 6, pp. 125-132, Jun. 2014.

[90] L. Militano, A. Orsino, G. Araniti, A. Molinaro, and A. Iera, “A Constrained Coalition For-

mation Game for Multihop D2D Content Uploading, IEEE Tran. on Wireless Comm., vol. 15,

no. 3, pp. 2012-2024, Mar. 2016.

[91] X. Lin, J. G. Andrews, and A. Ghosh, “Spectrum sharing for device-to-device communica-

tion in cellular networks, IEEE Trans. Wireless Commun., vol. 13, no. 12, pp. 6727-6740, Dec.

2014.

Page 122: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

BIBLIOGRAPHY 108

[92] E. Datsika, A. Antonopoulos, N. Zorba, and C. Verikoukis, “Green cooperative device-to-

device communication: A socialaware perspective, IEEE Access, vol. 4, pp. 36973707, Jun.

2016.

[93] P. Li, S. Guo and I. Stojmenovic, “A Truthful Double Auction for Device-to-device Commu-

nications in Cellular Networks,” in IEEE J. Sel. Areas Commun., vol. 34, no. 1, pp. 71-81, Jan.

2016.

[94] A. Asadi, V. Mancuso, “Network-assisted Outband D2D-clustering in 5G Cellular Networks:

Theory and Practice,” IEEE Trans. on Mobile Comput., vol.PP, no.99, pp.1-1, 2016.

[95] J. Marden and J. Shamma, “Revisiting log-linear learning: Asynchrony, completeness and

payoff-based implementation, in 48th Annual Allerton Conference on Communication, Control,

and Computing, Monticello, Illinois, Sep. 2010.

[96] P. Laarhoven and E. Aarts, Simulated Annealing: Theory and Applications. New York, NY:

Springer-Verlag, 1987.

[97] S. Kirkpatrick, “Optimization by simulated annealing: Quantitative studies, Journal of sta-

tistical physics, vol. 34, no. 5-6, pp. 975-986, Mar. 1984.

[98] S. M. Ahsan Kazmi, N. H. Tran, W. Saad, L. B. Le, T. M. Ho and C. S. Hong, “Optimized

Resource Management in Heterogeneous Wireless Networks,” in IEEE Commun. Lett., vol. 20,

no. 7, pp. 1397-1400, Jul. 2016.

[99] D. Gale, and L. Shapley, “College Admissions and the Stability of Marriage, The American

Mathematical Monthly, vol. 69, no. 1, pp. 9-15, Jan. 1962.

[100] E. Dahlman, S. Parkvall, and J. Skld, 4G LTE/LTEAdvanced for Mobile Broadband, Aca-

demic Press, Apr., 2011.

[101] D. F. Manlove, Algorithmics of Matching Under Preferences. World Scientific, 2013.

[102] R. Zhang, X. Cheng, L. Yang, and B. Jiao, “Interference graph based resource allocation

(InGRA) for D2D communications underlaying cellular networks, IEEE Trans. Veh. Technol,

vol. 64, no. 8, pp. 3844-3850, Aug. 2015.

Page 123: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

BIBLIOGRAPHY 109

[103] R. Zhang, X. Cheng, Q. Yao, C.-X. Wang, Y. Yang, and B. Jiao, “Interference graph based

resource sharing schemes for vehicular networks, IEEE Trans. Veh. Technol, vol. 62, no. 8, pp.

4028-4039, Oct. 2013.

[104] E. Jorswieck, “Stable matchings for resource allocation in wireless networks,” in Proc. of

IEEE International Conference on Digital Signal Processing, Greece, Jul. 2011.

[105] M. Hasan and E. Hossain, “Distributed resource allocation in 5G cellular networks, in To-

wards 5G: Applications, Requirements and Candidate Technologies, Hoboken, NJ, USA: Wi-

ley, 2015.

[106] 3GPP TR 36.843, “Study on LTE Device to Device Proximity Services: Radio Aspects“,

Mar. 2014.

[107] Huawei, HiSilicon, “Channel model for D2D evaluations,” 3GPP TSG RAN WG1 Meeting

#73, May. 2013.

[108] 3GPP, “Evolved universal terrestrial radio access (E-UTRA): Physical layer procedures,

Release 11,” Tech. Rep. TS 36.213, Dec. 2012.

[109] N. Buchbinder, and J. Naor, The Design of Competitive Online Algorithms via a Primal-

Dual Approach., Hanover, MA: NOW Publishers, 2009.

[110] A. Leshem, E. Zehavi, and Y. Yaffe, “Multichannel opportunistic carrier sensing for stable

channel access control in cognitive radio systems, IEEE J. Select. Areas Commun., vol. 30, no.

1, pp. 82-95, Jan. 2012.

[111] Y. Wu, H. Viswanathan, T. Klein, M. Haner and R. Calderbank, “Capacity Optimization in

Networks with Heterogeneous Radio Access Technologies,” in Proc. of IEEE Global Commu-

nication Conference, Houston, TX, Dec. 2011.

[112] H. W. Khun, The Hungarian method for the assignment problem, Nav. Res. Logist. Quart.,

vol. 2, pp. 83-97, Mar. 1955.

Page 124: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

Appendix AList of Publications

International Journal Papers:

[1] S. M. Ahsan Kazmi, Nguyen H. Tran, Walid Saad, Long Bao Le, Tai Manh Ho, Choong

Seon Hong, Optimized Resource Management in Heterogeneous Wireless Networks, IEEE

Communications Letters, Vol.20, No.7, July 2016. (SCI, IF: 1.291).

[2] S. M. Ahsan Kazmi, Nguyen H. Tran, Walid Saad, Zhu Han, Tai Manh Ho, Thant Zin Oo,

Choong Seon Hong, Mode Selection and Resource Allocation in Device-to-Device Commu-

nications: A Matching Game Approach, IEEE Transactions on Mobile Computing, 2017 (in

press). (SCI, IF: 2.456)

[3] S.M. Ahsan Kazmi, Nguyen H. Tran, Tai Manh Ho, Choong Seon Hong, Hierarchical

Matching Game for Wireless Network Virtualization, IEEE Communications Letters, 2017

(in press). (SCI, IF: 1.291).

[4] Tai Manh Ho, Nguyen H. Tran, Cuong T. Do, S.M Ahsan Kazmi, Eui-Nam Huh and Choong

Seon Hong, ”Power Control for Interference Management and QoS Guarantee in Hetero-

geneous Networks,” IEEE Communications Letters, pp.1402-1405, VOL.19, NO.8, AUG.

2015. (SCI, IF: 1.291).

[5] VanDung Nguyen, S.M. Ahsan Kazmi, and Choong Seon Hong, ECCT: An Efficient-

Cooperative ADHOC MAC for Cluster-Based TDMA System in VANETs, International

Journal of Distributed Sensor Networks, Volume 2015 (2015), Article ID 746438, 12 pages,

July, 2015. (SCIE, IF: 0.906)

110

Page 125: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

LIST OF PUBLICATIONS 111

[6] Tai Manh Ho, Nguyen H. Tran, Long Bao Le, Walid Saad, S.M. Ahsan Kazmi and Choong

Seon Hong, Coordinated Resource Partitioning and Data Offloading in Wireless Heteroge-

neous Networks, IEEE Communications Letters, Vol.20, No.5, May 2016. (SCI, IF: 1.291).

[7] Seungil Moon, Than Zin Oo, S.M. Ahsan Kazmi, Bang Ju PARK, Choong Seon Hong,

SDN-based Self-Organizing Energy Efficient Downlink/Uplink Scheduling in Heterogeneous

Cellular Networks IEICE TRANSACTIONS on Information and Systems, vol.100, no. 5,

2017. (SCIE, IF: 0.245).

[8] Dai H. Tran, Nguyen H. Tran, Chuan Pham, S.M. Ahsan Kazmi, Eui-Nam Huh, Choong

Seon Hong,“ OaaS: offload as a service in fog networks Computing, 2017 (in press). (SCI,

IF: 0.872).

[9] Tai M. Ho, Nguyen H. Tran, S.M. Ahsan Kazmi, , Choong Seon Hong, Wireless Virtu-

alization Design with Dynamic Isolation Provisioning and Energy Efficiency Optimization

for Wireless Heterogeneous Networks, IEEE Transactions on Mobile Computing, (under-

review). (SCI, IF: 2.456).

International Conference Papers:

[10] S. M. Ahsan Kazmi, Nguyen H. Tran, Tai Ho, Thant Zin Oo, Choong Seon Hong, Tuan

Le, Seungil Moon, ”Resource Management in Dense Heterogeneous Networks,” The 17th

Asia-Pacific Network Operations and Management Symposium(APNOMS 2015), Aug 19-

21, 2015, Busan, Korea.

[11] S. M. Ahsan Kazmi, Nguyen H. Tran, Tai Manh Ho, Dong Kyu Lee, and Choong Seon

Hong, ”Decentralized Spectrum Allocation in D2D Underlying Cellular Networks” The 18th

Asia-Pacific Network Operations and Management Symposium (APNOMS 2016), Oct. 5-7,

2016, Kanazawa, Japan.

[12] S. M. Ahsan Kazmi, Choong Seon Hong, ”A matching game approach for resource alloca-

tion in wireless network virtualization”, The International Conference on Ubiquitous Infor-

mation Management and Communication (IMCOM 2017), Jan. 05-07, 2017, Beppu, Japan.

Page 126: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

LIST OF PUBLICATIONS 112

[13] Choong Seon Hong , S. M. Ahsan Kazmi, Seungil Moon, Nguyen Van Mui, SDN Based

Wireless Heterogeneous Network Management, the 2nd International Conference Advanced

Engineering - Theory and Applications 2015(AETA 2015), Dec 9-11, Ho Chi Minh city,

Vietnam.

[14] Tai Manh Ho, Tuan LeAnh, S. M. Ahsan Kazmi, Choong Seon Hong, ”Opportunistic Re-

source Allocation via Stochastic Network Optimization in Cognitive Radio Networks,” The

16th Asia-Pacific Network Operations and Management Symposium (APNOMS 2014), Sep

17-19(18), 2014, Hsinchu, Taiwan.

[15] Tuan LeAnh, Nguyen H. Tran, S. M. Ahsan Kazmi, Thant Zin Oo, Choong Seon Hong,

”Joint Pricing and Power Allocation for Uplink Macrocell and Femtocell Cooperation,” The

International Conference on Information Networking(ICOIN 2015), Jan 12-14(13), 2015,

Siem Reap, Cambodia.

[16] Tai Manh Ho, Nguyen H. Tran, Long Bao Le, S. M. Ahsan Kazmi, Seung Il Moon, Choong

Seon Hong, ”Network Economics Approach to Data Offloading and Resource Partitioning in

Two-Tier LTE HetNets,” 2015 IFIP/IEEE International Symposium on Integrated Network

Management(IM 2015), Ottawa, Canada, May 11-15. 2015.

[17] Thant Zin Oo, Nguyen H. Tran, Tuan Le, S. M. Ahsan Kazmi, Tai Ho, Choong Seon Hong,

”Traffic Offloading under Outage QoS Constraint in Heterogeneous Cellular Networks,” The

17th Asia-Pacific Network Operations and Management Symposium(APNOMS 2015), Aug

19-21, 2015, Busan, Korea.

[18] Tai Manh Ho, Nguyen H. Tran, Cuong T. Do, S. M. Ahsan Kazmi, Tuan LeAnh, Choong

Seon Hong, ”Data Offloading in Heterogeneous Cellular Networks: Stackelberg Game Based

Approach,” The 17th Asia-Pacific Network Operations and Management Symposium (AP-

NOMS 2015), Aug 19-21, 2015, Busan, Korea.

[19] Tuan LeAnh, Nguyen H.Tran, S. M. Ahsan Kazmi, Thant Zin Oo, Kyi Thar, Tai Manh Ho,

Choong Seon Hong, ”Load-Sharing based on Relay-aided Cooperative Modeling in Uplink

Page 127: Disclaimernetworking.khu.ac.kr/layouts/net/publications/data/phd... · 2020-02-10 · Thesis for the Degree of Doctor of Philosophy Self-organizing Resource Allocation for 5G cellular

LIST OF PUBLICATIONS 113

Two-Tier Cellular Networks,” The 17th Asia-Pacific Network Operations and Management

Symposium(APNOMS 2015), Aug 19-21, 2015, Busan, Korea.

[20] Seungil Moon,Tuan Le, S. M. Ahsan Kazmi, Thant Zin Oo, Choong Seon Hong, ”SDN

Based Optimal User Association and Resource Allocation in Heterogeneous Cognitive Net-

works ,” The 17th Asia-Pacific Network Operations and Management Symposium(APNOMS

2015), Aug 19-21, 2015, Busan, Korea.

[21] Tai Manh Ho, Nguyen H. Tran,S. M. Ahsan Kazmi, Seung Il Moon, Choong Seon Hong,

”Distributed Pricing Power Control for Downlink Co-tier Interference Coordination in Two-

Tier Heterogeneous Networks”, International Conference on Ubiquitous Informing Manage-

ment and Communication(ACM IMCOM 2016), Jan 4-6, 2016, Danang, Vietnam.

[22] Tri Nguyen Dang, S. M. Ahsan Kazmi, Tai Manh Ho, Nguyen H. Tran, Choong Seon Hong,

”A Double-Auction Mechanism for Wireless Charging Networks” The 18th Asia-Pacific Net-

work Operations and Management Symposium(APNOMS 2016), Oct. 5-7, 2016, Kanazawa,

Japan.

[23] Tai Manh Ho, Nguyen H. Tran, S. M. Ahsan Kazmi, Do Hyun Kim and Choong Seon

Hong, ”Distributed Resource Allocation for Interference Management and QoS Guarantee

in Underlay Cognitive Femtocell Networks” The 18th Asia-Pacific Network Operations and

Management Symposium(APNOMS 2016), Oct. 5-7, 2016, Kanazawa, Japan.

[24] Tai Manh Ho, Nguyen H. Tran, S. M. Ahsan Kazmi, Choong Seon Hong, ”Dynamic Pric-

ing for Resource Allocation in Wireless Network Virtualization: A Stackelberg Game Ap-

proach”, The International Conference on Information Networking (ICOIN 2017), Jan. 11-

13, 2017, Da Nang, Vietnam.