This application claims the benefit under 35 U.S.C. §119(a) of a Korean patent application filed on Dec. 7, 2012 in the Korean Intellectual Property Office and assigned Serial number 10-2012-0142263, the entire disclosure of which is hereby incorporated by reference.
The present disclosure was made by or on behalf of the below listed parties to a joint research agreement. The joint research agreement was in effect on or before the date the present disclosure was made and the present disclosure was made as a result of activities undertaken within the scope of the joint research agreement. The parties to the joint research agreement are 1) SAMSUNG ELECTRONICS CO., LTD. 2) KOREA UNIVERSITY RESEARCH AND BUSINESS FOUNDATION.
The present disclosure relates to a scheduling method and apparatus for use in a Device-to-Device (D2D) communication system.
In an Orthogonal Frequency Division Multiplexing (OFDM) synchronous D2D communication system, maximizing the spatial resource reuse efficiency is preferred. In order to achieve maximization of the spatial resource reuse efficiency, maximizing a number of terminals in communication while maintaining Signal-to-Interference Ratio (SIR) of the recipient terminals at certain levels according to the channel condition is generally necessary.
For D2D communication without assistance of a base station, a scheduling procedure for configuring links in a distributed manner. For example, in the case of Carrier Sense Multiple Access with Collision Avoidance (CSMA-CA) adopted by the Institute of Electrical and Electronics Engineers (IEEE) 802.11 Wireless Local Area Network (WLAN) standard, Request to Send (RTS) and Clear to Send (CTS) control frames are used. In this method, the transmitter and the receiver perform handshaking by exchanging the RTS/CTS control frames for link scheduling. For example, the D2D transmission node sends an RTS frame, and the D2D reception node sends a CTS frame in reply such that the neighboring nodes receiving this message suspend transmission temporarily. Through this RTS-CTS handshaking procedure, preventing the hidden nodes from incurring interference to the transmission node of D2D link so as to secure D2D link successfully is possible.
Referring to
Referring to
The detailed link scheduling procedure for this is performed as follows. First, all D2D links are assigned unique Connection Identifiers (CIDs). Each CID is allocated a single tone corresponding to the transmission node and a single tone corresponding to the reception node according to a unique number of the CID. The link uses one of the single tone corresponding to the transmission node and the single tone corresponding to the reception node that are orthogonal to each other. The transmission node and the reception node are respectively allocated one tone, a set of the transmission node tones, and a set of the reception node tones are respectively defined as Transmission (Tx) block and Reception (Rx) block. The Tx block is the set of tones which the transmission node uses to request for scheduling, and the transmission node transmits a symbol of the tone corresponding to a corresponding CID thereof. This process is referred to as Request To Send (RTS). The RTS acts in a role similar to the RTS transmission in IEEE 802.11, and whether the reception node yield the reception is determined based on the transmission of the tone. If the reception node determines to do not yield, the reception node transmits Clear To Send (CTS) using one tone allocated in the Rx block such that the transmission node estimates an SIR at external reception node using this tone. If both the transmission and reception nodes determine to not yield, the transmission node transmits data.
Referring to
The above information is presented as background information only to assist with an understanding of the present disclosure. No determination has been made, and no assertion is made, as to whether any of the above might be applicable as prior art with regard to the present disclosure.
Aspects of the present disclosure are to address at least the above-mentioned problems and/or disadvantages and to provide at least the advantages described below. Accordingly, an aspect of the present disclosure is to provide a Device-to-Device (D2D) communication scheduling method and apparatus that is capable of efficient spatial reuse rate.
In accordance with an aspect of the present disclosure, a scheduling method of a node in a wireless communication system is provided. The scheduling method includes acquiring a first data rate on a first link in consideration of interference occurring when a second link is established, acquiring a second data rate on the first link without consideration of the second link, acquiring, when the second link is established, a third data rate on the second link, and determining whether to establish the second link in consideration of the first data rate, second data rate, and third data rate.
In accordance with another aspect of the present disclosure, a scheduling apparatus is provided. The scheduling apparatus includes a controller which controls acquiring a first data rate on a first link in consideration of interference occurring when a second link is established, acquiring a second data rate on the first link without consideration of the second link, acquiring, when the second link is established, a third data rate on the second link, and determining whether to establish the second link based on the first data rate, second data rate, and third data rate, and a receiver which receives a Request to Send (RTS) requesting for establishment of the second link.
In accordance with still another aspect of the present disclosure, a scheduling apparatus is provided. The scheduling apparatus includes a transmitter which transmits a Request to Send (RTS) and a controller which adjusts a transmit power of the RTS according to a state of a buffer.
Other aspects, advantages, and salient features of the disclosure will become apparent to those skilled in the art from the following detailed description, which, taken in conjunction with the annexed drawings, discloses various embodiments of the present disclosure.
The same reference numerals are used to represent the same elements throughout the drawings.
The following description with reference to the accompanying drawings is provided to assist in a comprehensive understanding of various embodiments of the present disclosure as defined by the claims and their equivalents. It includes various specific details to assist in that understanding but these are to be regarded as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the various embodiments described herein can be made without departing from the scope and spirit of the present disclosure. In addition, descriptions of well-known functions and constructions may be omitted for clarity and conciseness.
The terms and words used in the following description and claims are not limited to the bibliographical meanings, but, are merely used by the inventor to enable a clear and consistent understanding of the present disclosure. Accordingly, it should be apparent to those skilled in the art that the following description of various embodiments of the present disclosure is provided for illustration purpose only and not for the purpose of limiting the present disclosure as defined by the appended claims and their equivalents.
It is to be understood that the singular forms “a,” “an,” and “the” include plural referents unless the context clearly dictates otherwise. Thus, for example, reference to “a component surface” includes reference to one or more of such surfaces.
The present disclosure proposes a scheduling method and apparatus that is capable of achieving throughput higher than throughput of a Orthogonal Frequency Division Multiplexing (OFDM)-based synchronous Device-to-Device (D2D) communication link scheduling method. According to various embodiments of the present disclosure, performing additional scheduling in a tolerable range of adjacent link having low priority is possible by preventing acquisition of unnecessarily high link quality with the buffer status of the link having the high priority.
The synchronous system designates relative priorities to all of the links for link scheduling based on Signal to Interference Ratio (SIR) such that the low priority link is scheduled only when the high priority link is not degraded in SIR. For this purpose, all links have to be allocated priorities and, in this case, priorities are assigned cyclically to give fair link acquisition changes to all of the nodes.
Referring to
Referring to
Referring to
The Tx node of the low priority link checks determines whether the transmission from the Tx node incurs interference to the high priority link. If the Tx node determines that interference to the high priority link is not great, then the Tx node transmits signals. For example, in the state in which the low priority Tx node incurs interference to the high priority link, the Tx node yields D2D communication for protecting the high priority link.
Referring to
In order to confirm the conditional inequality of Equation (2), the Tx node C has to capability of estimating the value of (PA|hAB|2)/(|hBC|2). For this purpose, the high priority Rx node B transmits inverse power echo. The inverse power echo is used to transmit an inverse value of the Rx power from the Tx node A, and the power of the inverse power echo signal is transmitted at PE=1/(PA|hAB|2). Meanwhile, the inverse power echo signal is received by the Tx node C at the power of rP=(|hBC|2)/(PA|hAB|2) to which the channel gain hBC is reflected. Accordingly, if the uplink power echo signal is received, the Tx node C is capable of estimating the left hand side of the above inequality of Equation (2) with 1/(rp×PC) and compares this with the Tx yield threshold to determine whether to yield transmission.
System Model
In the following various embodiments of the present disclosure, the description is directed to the D2D communication system in which the nodes communicate data through direct links therebetween in OFDM-based synchronous Media Access Control mechanism. This system performs scheduling based on the signaling scheme and SIR-based yielding procedure defined in FlashLinQ.
Analysis on Throughput Improvement of Transmission Backoff-Based Adaptive Yielding
Referring to
Referring to
Referring to
Referring to
If the low priority link C-D has the required capacity of μC, the SIR of the link C-D is SIRC=PC|hCD|2/(PA|hAD|2+ΣPA
CTS Power Control for “Conservative Yielding
The Rx node of the high priority link may allow for scheduling of the low priority links in the range of additionally tolerable interference range. For this purpose, calculating the interference in the range tolerable at the Rx node of the high priority link may be required. Accordingly the CTS signal transmit power are determined such that the connection allowable low priority links do not yield transmission.
Referring to
Referring to
It=I0+Σk=mMPC
I0 denotes the interference from the links having high priorities that are uncontrollable. Assuming the SIR of Rx node B is SIR′A, the channel capacity of the link A-B can be expressed as R′A=log(1+SIR′A)=log(1+(PA|hAB|2/(I0+Σk=mMPC
μA≦R′A=log(1+PA|hAB|2/Imax) Equation (4)
According to various embodiments of the present disclosure, the maximum allowable interference can be expressed by Equation (5).
Imax=PA|hAB|2/(2μ
From Equations (4) and (5), the condition for actual control can be expressed by Equation (6).
It≦Imax Equation (6)
According to the condition of Equation (6), the scheduling can be allowed to the Tx node Cm
m*=min{m|Imax≧I0+Σk=mMPC
Yielding for links having low priorities in the range of fulfilling the required bandwidth efficiency is referred to as conservative yielding and, in order to achieve this, preventing the scheduling-allowed low priority links from yielding transmission is required. The transmission yielding is determined based on the reverse power of the Rx node B in
According to various embodiments of the present disclosure, CTS power control coefficient α is introduced and 0<α<1 has to be fulfilled. The reverse power can be expressed by Equation 8:
If the Tx nodes which has received CTS satisfy inequality expressed by Equation (9), the Tx nodes are allowed for scheduling without transmission yielding.
(1/α)·{PA|hAB|2/(PC
The CTS power control coefficient fulfilling the above condition may be expressed by Equation (10):
Referring to
At operation 710, the node determines whether the Rx yielding is applied.
If the node determines that the Rx yielding is applied at operation 710, the procedure proceeds to operation 750.
If the node determines that the Rx yielding is not applied at operation 710, the procedure proceeds to operation 715 at which node calculates I0 as described above.
At operation 720, the node calculates μA using Equation (4).
At operation 725, the node calculates Imax using Equation (5) as described above.
At operation 730, the node set k to 0.
At operation 735, the node increase k by 1.
At operation 740, the node performs comparison to determine whether the inequality expressed by Equation (7) is satisfied.
If the node determines that the inequality expressed by Equation 7 is not satisfied at operation 740, then the procedure returns to operation 735. The node repeats operations 735 and 740 by increasing k by 1 until the node determines a k for which the inequality expressed by Equation (7) is satisfied.
If the node determines that the inequality expressed by Equation 7 is satisfied at operation 740, then the procedure proceeds to operation 745. For example, if the node determines a k for which the inequality expressed by Equation (7) is satisfied, the procedure goes to operation 745.
At operation 745, the node calculates αB using Equation (10). αB corresponds to α* of Equation (10).
At operation 750, the node transmits CTS at the power PE. PE may be acquired using Equation (8) as described above.
In order to apply the conservative yielding, the Rx node is generally required to know the number of bits waiting in the buffer of the Tx node. The Tx node quantizes the number of bits waiting in the buffer through a predetermined quantization procedure and transmits the quantization result along with the data.
RTS Power Control for “Generous Yielding”
The low priority links allowed for scheduling through the conservative yielding may not perform conservative yielding due to the Rx yielding in the Tx block. In order to solve this problem, there is a need of the generous yielding of the high priority links.
Whether to apply the generous yielding is determined based on the amount of bits waiting in the buffer of the high priority link and, for this purpose, a buffer threshold is configured. If the number of bits to be transmitted is equal to or less than the buffer threshold, the RTX power decreases to prevent Rx yielding. Because it is difficult know the extent of the generous yielding required by the low priority, the power control has to be performed in stepwise manner. For this purpose, a power control factor Δ is configured to increase the power in stepwise manner or to increase the power in stepwise manner when the transmission bit amount is greater than the threshold.
Referring to
If the transmission bit amount exceeds the threshold value, the Tx node A increases the Tx power using the power control coefficient 1/β to give up the generous yielding.
Referring to
At operation 910, the node initializes PA to Pmax.
At operation 920, the node compares B with τB. B denotes the transmission bit amount waiting in the buffer, and τB denotes the buffer threshold.
If the node determines that B>τB at operation 920, then the node proceeds to operation 940 at which the node increases the transmit power as much as Δ(dB). Thereafter, the node proceeds to operation 950.
In contrast, if the node determines that B>τB at operation 920, then the node proceeds to operation 930 at which the node decreases the Tx power as much as Δ(dB). Thereafter, the node proceeds to operation 950.
At operation 950, the node transmits RTS at power PA.
At operation 960, the node determines whether the next slot has arrived. For example, the node waits for the next slot and repeats operations 920 to 950 at the next slot.
Referring to
The transmitter 1010 may transmit RTS to the reception node and transmits CTS to the transmission node. The transmitter 1010 may transfer the data indicating the state of the buffer 1040 to the reception node. The state of the buffer 1040 may be the data amount or a number of bits queued in the buffer 1040.
The receiver 1020 may receive the RTS from the transmission node and the CTS from the reception node.
The controller 1030 controls overall operations of the scheduling apparatus 1000, particularly the transmitter 1010 and the receiver 1020. For example, according to various embodiments of the present disclosure, the controller 1030 may operatively perform operations 705 to 750 of
The buffer 1040 may buffer the transmitted data.
The D2D communication scheduling method and apparatus of the present disclosure is capable of acquiring efficient spatial reuse rate.
It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer program instructions may also be stored in a non-transitory computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the non-transitory computer-readable memory produce an article of manufacture including instruction means which implement the function/act specified in the flowchart and/or block diagram block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
Furthermore, the respective block diagrams may illustrate parts of modules, segments or codes including at least one or more executable instructions for performing specific logic function(s). Moreover, it should be noted that the functions of the blocks may be performed in different order in several modifications. For example, two successive blocks may be performed substantially at the same time, or may be performed in reverse order according to functions thereof.
According to various embodiments of the present disclosure, the term “module”, means, but is not limited to, a software or hardware component, such as a Field Programmable Gate Array (FPGA) or Application Specific Integrated Circuit (ASIC), which performs certain tasks. A module may advantageously be configured to reside on the addressable storage medium and configured to be executed on one or more processors. Thus, a module may include, by way of example, components, such as software components, object-oriented software components, class components and task components, processes, functions, attributes, procedures, subroutines, segments of program code, drivers, firmware, microcode, circuitry, data, databases, data structures, tables, arrays, and variables. The functionality provided for in the components and modules may be combined into fewer components and modules or further separated into additional components and modules. In addition, the components and modules may be implemented such that they execute one or more CPUs in a device or a secure multimedia card.
The foregoing disclosure has been set forth merely to illustrate the present disclosure and is not intended to be limiting. Because modifications of the disclosed various embodiments incorporating the spirit and substance of the present disclosure may occur to persons skilled in the art, the present disclosure should be construed to include everything within the scope of the appended claims and equivalents thereof.
While the present disclosure has been shown and described with reference to various embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present disclosure as defined by the appended claims and their equivalents.
Number | Date | Country | Kind |
---|---|---|---|
10-2012-0142263 | Dec 2012 | KR | national |
Number | Name | Date | Kind |
---|---|---|---|
7983230 | Li et al. | Jul 2011 | B1 |
20070054690 | Wu et al. | Mar 2007 | A1 |
20070147322 | Agrawal et al. | Jun 2007 | A1 |
20110090855 | Kim | Apr 2011 | A1 |
20130142185 | Leizerovich et al. | Jun 2013 | A1 |
Number | Date | Country | |
---|---|---|---|
20140160966 A1 | Jun 2014 | US |