 Research
 Open access
 Published:
Joint user clustering and resource allocation for devicetodevice communication underlaying MUMIMO cellular networks
EURASIP Journal on Wireless Communications and Networking volume 2015, Article number: 145 (2015)
Abstract
In this paper, multiple devicetodevice (D2D) communication underlaying cellular multiuser multiple inputs multiple outputs (MUMIMO) systems is investigated. This type of communication can improve spectral efficiency to address future demand, but interference management, user clustering, and resource allocation are three key problems related to resource sharing. Interference alignment (IA) is proposed to better mitigate incluster interference compared with a multiplex scheme, and user clustering and resource allocation are jointly investigated using binaryinteger programming. In addition to an exhaustive search for a maximum throughput, we propose a twostep suboptimal algorithm by reducing the search space and applying branchandbound searching (BBS). To further obtain a good tradeoff between performance and complexity, we propose a novel algorithm based on distanceconstrained criteria for user clustering. The simulation results show that the IA and multiplex schemes acquiring user clustering gains outperform the orthogonal scheme without user clustering. Besides, the proposed twostep and locationbased algorithms achieve little losses compared with the optimal algorithm under low complexities.
1 Introduction
In recent years, devicetodevice (D2D) communication underlaying cellular infrastructures has attracted considerable attention on both academia and industry. This infrastructure permits peertopeer communication without base station (BS) relays but should be under the control of the BS. With the increasing use of local applications, such as shortdistance data transmission in social networks, D2D communication which is an effective proximity transmission scheme has seen substantial demand. D2D communication has great potential to improve spectrum efficiency and system performance by reusing cellular resources [1,2].
Multiuser multiple inputs multiple outputs (MUMIMO), which is regarded as a very important technology, has been applied in numerous systems, including longterm evolution (LTE) uplink and other cooperative networks, to obtain higher multiuser diversity gain [3]. To address future increased demand, the combination of MUMIMO networks and D2D underlaying communications, as a novel research field, can further improve spectral efficiency and increase the number of access users [4,5]. The relatively sparse literature only focuses on a single D2D pair reusing a cellular user equipment (CUE) resource, and the scenario where multiple D2D pairs reuse resources with CUEs in the MUMIMO uplinks has not been widely investigated. In this work, we divide CUEs and D2D pairs into several clusters. Each cluster has a certain number of CUEs and D2D pairs. For maximizing the system rate, there are three key issues related to the system optimization problem, i.e., 1) how to mitigate the serious incluster interference, 2) how to determine which D2D pairs and CUEs are clustered together, and 3) how to allocate appropriate resources to the clusters.
The investigated communication pattern will cause excessive and serious interference in the network, including D2D links to cellular links and cellular links to D2D links [6]. To obtain a better system or personal performance, the effective methods of interference management in D2D communication underlaying cellular networks include power control [710], resource allocation [1118], interference awareness [1921], and precoding [22]. Xing and Hakola [8] employ LTE openloop and closedloop power control schemes in a D2D scenario. The resource allocation problem is solved by an iterative combinatorial auction method in [14]. By identifying interference, Min et al. [21] propose interferencelimited areas of D2D pairs to prohibit them from reusing resources with CUEs if the interference at D2D receivers is greater than a threshold. In MIMO transmission, the interference alignment (IA) technique, which is an effective precoding mechanism that can align the interference at the receiver together to improve receiving signaltointerferenceplusnoise ratio (SINR), has attracted substantial attention in recent years [2325]. As the earliest research about IA, Cadambe and Jafar [23] provide a linear precoding codebook design in Kuser interference channels.
Furthermore, the second issue in clustering and the third issue in resource allocation are coupled with each other. It is thus necessary to jointly study them. Recently, increasingly more works about jointly considering various optimization issues have been discussed [11,17,2628] and have been shown to further improve system performances. In [27], the authors analyze optimum power control and resource allocation with different sharing modes between CUEs and D2D pairs in a singlecell scenario. Generally, these types of problems are too hard to directly solve, i.e., NPhard problems [29,30]. An optimal and direct solution to these problems is exhaustive searching, which is used as a benchmark in our paper. In this work, we attempt to design lowcomplexity suboptimal algorithms for joint user clustering and resource allocation optimization programming. Heuristic greedy algorithms [26], reverse iterative combinatorial auction approaches [14,28], and D2D pair association vector search algorithms [5] are some examples of effective solutions to the NPhard problem. The inspiration of Xu et al. [28] comes from game theory. The study sets the resources and D2D links as bidders and goods and then conducts a price iteration process. Its result can converge in a finite number of rounds and is better than random allocation, but it exhibits some performance loss.
1.1 Our contribution
According to the studies mentioned above, we perform the contributions as following:

(1)
We consider multiple D2D pairs reusing resources with CUEs in the MUMIMO uplink system and formulate the joint user clustering of CUEs and D2D pairs and resource allocation optimization programming.

(2)
We employ a linear IA technique in the scenario to eliminate interference inside clusters, and we then propose evaluation comparisons between the schemes with IA and without IA which is the traditional multiplex scheme.

(3)
A twostep optimization algorithm is designed to first reduce the search space, thereby decreasing the search difficulty, and then obtain the solution using a branchandbound searching (BBS) algorithm. To further reduce the complexity for practical communications, we propose a locationbased algorithm that divides a single cell into an inner round employing the IA scheme and an outer circle employing the multiplex scheme.
The simulation results first show that the IA and multiplex schemes acquiring user clustering gains outperform the orthogonal scheme without employing user clustering. The IA scheme outperforms the multiplex scheme in a large range of the D2D user equipment transmit (DUETX) power. Second, the twostep algorithm exhibits minimal losses compared to the optimal exhaustive search. The proposed locationbased algorithm, whose performance is near optimal under low practical complexity, exhibits a good tradeoff between performance and complexity. Third, it is better to keep the distance between D2D users sufficiently small to obtain a better system performance. Finally, the appropriate inner round radius r _{0} of the locationbased algorithm monotonously increases with increasing DUETX power. With high DUETX power, a large r _{0} is more suitable.
The remainder of this paper is organized as follows. Section 2 generalizes the scenario’s system and signal models in the IA scheme and multiplex scheme. We then deduce the SINR expressions. Section 3 proposes the objective and constraint conditions of the joint resource allocation and clustering programming. In Section 4, a twostep algorithm and a locationbased algorithm are proposed in detail. Section 5 presents the numerical results, complexities, and analysis. A further discussion is demonstrated in Section 6. Finally, conclusions are shown in Section 7.
1.2 Scenario description and symbol notations
As shown in Figure 1, our research focuses on uplink transmission in a single cell, where a total of K _{ c } CUEs and K _{ d } D2D pairs share K _{ rb } frequency resource blocks (RBs). The BS is equipped with N _{ r } antennas, while all users are equipped with N _{ t } antennas (N _{ t } < N _{ r }). A D2D pair consists of a DUETX and a D2D user equipment receiver (DUERX). The interference in the investigated scenario is so complicated, including DUETX to BS, CUEs to DUERX, and DUETX to DUERX of other D2D pairs. Power control is used to satisfy the target CUE SINR. All DUETX powers are equal and set to P _{ D }. In the clustering course, each user cluster will consist of N _{ c } CUEs chosen from K _{ c } CUEs and N _{ d } D2D pairs chosen from K _{ d } D2D pairs. The sets of CUEs in user clusters, named CUE subclusters, are denoted as \( {\mathrm{\mathbb{C}}}_k=\left\{\left({C}_1,\dots, {C}_{N_c}\right)\Big1\le {C}_1\le \dots \le {C}_{N_C}\le {K}_c\right\} \). \( {\mathbb{D}}_{\mathrm{l}}=\left\{\left({D}_1,\dots, {D}_{N_d}\right)\Big1\le {D}_1\le \dots {D}_{N_d}\le {K}_d\right\} \) denotes the sets of D2D pairs, named DUE subclusters. Here, \( k\left(1\le k\le {N}_{all.c}={C}_{K_c}^{N_c}\right),l\left(1\le l\le {N}_{all.d}={\mathrm{C}}_{K_d}^{N_d}\right) \) are the indices of CUE subclusters and DUE subclusters, respectively, where \( {\mathrm{C}}_q^p=q!/\left(p!\left(qp\right)!\right) \). The users in the same cluster are assigned the same resources. Each RB consists of M subcarriers. We assume that each cluster can occupy any number of RBs from 0 to K _{ rb }, and its occupied RBs must be adjacent. Thus, there are N _{ all. rb } = K _{ rb }(K _{ rb } + 1)/2 + 1 different resource patterns meeting the requirement [31]. ℝ_{ n }(1 ≤ n ≤ N _{ all. rb }) denotes the nth resource pattern, where ℝ_{1} is the empty resource pattern. Moreover, none of the resources are permitted to be assigned more than one cluster, and we define that the clusters that are assigned resources cannot contain the same user. The channel we consider includes largescale path loss related to user position and smallscale path loss related to subcarrier and antenna.
Uppercase boldface letters denote matrices and lowercase boldface letters denote vectors. Similarly, span(X), rank(X), and vec(X) denote the column space, rank, and vector obtained by stacking the columns of matrix X, respectively. The superscripts ⊗, (·)^{T}, (·)^{H}, and (·)^{1} denote the Kronecker product, transpose, Hermitian transpose, and matrix inversion, respectively. (·)^{+} sets the negative elements of a vector to 0, and I _{n} denotes the identity matrix. Other key mathematical notations used in the paper are listed in Table 1.
2 System model
In this section, we first introduce a traditional D2D underlaying MUMIMO uplink scenario employing a multiplex scheme. After deducing a cluster’s received SINRs with minimum meansquare error (MMSE) frequencydomain equalization, we calculate its sum throughput. Then, we formulate the precoding and decoding process of the scenario using IA and give some feasibility conditions and derive the total throughput.
2.1 D2D underlaying MUMIMO systems using a multiplex scheme
In this scheme, each antenna transmits an independent data stream. With regard to the BS, all CUE signals are target signals. The BS employs MMSE frequencydomain equalization [31] for multiuser receiving to distinguish different target signals. Compared to the zeroforcing (ZF) method for multiple user detection, MMSE is able to obtain a good tradeoff between the performance of interference mitigation and noise amplification. There is no interference between CUEs. The transmit symbol vector of CUEs can be estimated. The received signals at the mth subcarrier of the BS and DUERX antenna frontends are written as
For BS receiving, for conciseness, the combined target channel gain and the combined CUE transmit signals are
Then, the received signal at the BS at the mth subcarrier is rewritten as
The MMSE equalization matrix is written as
where \( {\mathbf{I}}_{N_r\times {N}_r} \) is denoted as the unit diagonal matrix and
where \( {\upsigma}_{Bs}^2 \) is the average power of n _{BS}. Then, the SINR of the pth data stream (p = 1,…N _{ t } × N _{ c }) at the mth subcarrier after MMSE equalization can be obtained as
where the target receive signal after MMSE is
and its corresponding received power is in the numerator of (8). In the denominator, the generated noise is composed of white noise, the interference from the other data streams of the CUEs, and the interference from D2D data streams. The interference from the other data streams of the CUEs is shown below
Similarly, for DUERX receiving, we write the target channel gain between DUEs as
The equalization matrix is
where \( {\mathbf{I}}_{N_t\times {N}_t} \) is denoted as the unit diagonal matrix and
(13) presents the combination of noise and interference that originate from CUEs and other D2D pairs in terms of DUERX. Subsequently, the SINR of the qth data stream (q = 1,…,N _{ t }) of the jth DUERX at the mth subcarrier after MMSE equalization can be obtained as
where the target receive signal after MMSE is
and its corresponding received power is in the numerator of (14). In the denominator, the generated noise is composed of white noise, the interference from the other data stream of the same D2D pair, the interference from the data streams of the other D2D pairs, and the interference from CUE data streams. The interference from the other data streams of the same D2D pair is shown below:
Because there exist M continuous subcarriers in an RB, the postprocessing SINR of the pth data stream (p = 1,…N _{ t } × N _{ c }) at the BS is
and the postprocessing SINR of the qth data stream (q = 1,…,N _{ t }) at the jth DUERX is
Hence, the throughput of the kth CUE subcluster and lth DUE subcluster in the rbth resource is given as
2.2 D2D underlaying MUMIMO systems using the IA scheme
2.2.1 Signal model through IA
This multiplex scheme is simple and can be easily implemented without channel state information (CSI) feedback, but it has no interference mitigation mechanism and thus results in a degraded performance. We utilize a linear IA mechanism for the clusters. To provide successful receiving, we assume each transmitter only sends a data stream to its corresponding receiver. Thus, each receiver can see N _{ c } + N _{ d } independent data flows. DUERX should align N _{ c } + N _{ d } – 1 interfering flows to a certain space to enlarge the space of the target flow. In term of the BS, N _{ c } independent spaces are required to receive N _{ c } target flows.
The receiving signal at the mth subcarrier of BS and DUERX before decoding can be written as
where
where P represents the IAnormalized precoding matrix. Subsequently, by applying a ZF algorithm for decoding, the interference spaces will be set to 0 and the target spaces will be preserved. We can obtain
where \( {\mathbf{U}}_{\mathrm{BS}}^m \) and \( {\mathbf{U}}_{D_j}^m\left(j=1,\dots, {N}_d\right) \) are the interferencenulling matrices at the BS and DUERX. The precoding and decoding matrix designs will be described later. After ZF decoding, the postprocessing SINR of the jth DUETX (j = 1, …, N _{ d }) can be obtained as
where
The SINR of the ith CUE (i = 1, …, N _{ c }) is
where the MMSE is added at the BS receiver after decoding to distinguish different CUE flows [31] as
The throughput of the kth CUE subcluster and the lth DUE subcluster in the rbth resource is expressed as
2.2.2 Limitation and feasibility of the scenario using IA
The basic condition of feasible IA is shown in [25]. The feasibility is mainly related to the user number, antenna number, and data stream number which preform interaction to each other. In this scenario, it can be transformed as
where b ′ denotes the target of b and a is not the target of b. DOF is the degree of freedom representing the number of data streams in the bth link. Yetis et al. [25] utilize Bezout’s theorem to determine whether the system is feasible. It presents that if the system is feasible, the number of equations must be less than or equal to the number of variables.
In future, the BS has enough ability to possess more antennas. Thereby, there can be more spaces to store interference at the BS. In this first analysis, we assume the BS uses N _{ b } spaces to align N _{ d } interference, while each DUERX uses one space to align N _{ c } + N _{ d } – 1 interference. The interference aligning to the D2D receivers can be expressed as
where β represents the subscript of the user set of the transmit side. The number of precoding matrix is N _{ c } + N _{ d }, and the number of uncorrelated equations for D2D receivers is N _{ d }(N _{ c } + N _{ d } – 2). In terms of BS, there are N _{ d } − N _{ b } uncorrelated equations. The overall system is solvable if and only if N _{ c } + N _{ d } ≥ N _{ d }(N _{ c } + N _{ d } − 2) + N _{ d } − N _{ b }. Since N _{ b } ≥ 0, N _{ d } being set to 1 can acquire feasible cases no matter which N _{ c } is. If N _{ d } denotes larger than 1, then
As (36) and (37) show, if N _{ b } = 1, the feasible combinations do not exist. If N _{ b } = 2, then the only two feasible cases are N _{ c } = 1, N _{ d } = 2 and N _{ c } = N _{ d } = 2. In normalization, a relatively lower bound of N _{ b } will be satisfied when N _{ c } = N _{ d } which is without loss of generality. Then, (37) is transformed into N _{ c } = N _{ d } ≤ N _{ b }. That means BS must use at least N _{ d } spaces to align interference. Besides, BS acquires N _{ c } target signals. Combining the target and interference spaces, the total antenna number of BS, N _{ r }, must be at least N _{ c } + N _{ d } for a feasible system.
It can be inferred that the more antenna number is, the more users the system can contain. If we assume D2D receivers have more spaces to align interference, the minimum implementation needs to be figured out for a feasible system. In the second analysis, we use a method similar to [25] to evaluate the relation between N _{ t } and N _{ d }. We add the influence of antenna. The number of equation is
We assume each user transmits a data stream at one time. That means its DOF is 1. Also, BS receives N _{ c } data streams simultaneously so its DOF is N _{ c }. The equation number is
where the terms are respectively DUETX to BS, CUE to DUERX, and DUETX to the other D2D pairs’ DUERX in a cluster. Next, after removing the superfluous variables, the effective variable number for each user is N _{u} = N _{t} − 1, while the BS’s is N _{v} = N _{c}(N _{r} − N _{c}). The inequality must be satisfied which is shown below
The deriving result of (40) is the general restricted relation between user number and antenna number in the investigated scenario. If N _{ r } = N _{ c } + N _{ d } and N _{ c } = N _{ d }, then
As (41), the feasible user antenna number increases linearly with D2D user number. As long as there is enough antenna number, the more satisfied users can be accommodated in the system. IA has a great potential to increase the number of users. The feasible implementations for a practical N _{ c } = N _{ d } system of the investigated scenario are N _{ r } = N _{ c } + N _{ d } and N _{ t } ≥ (2N _{ d } + 2)/3. It is worth noting that these two conditions are the sufficient but not the necessity conditions of feasible IA in the investigated scenario.
2.2.3 Precoding and decoding designs
The linear precoding and decoding codebook designs are related to specific scenario parameters, particularly the number of users and antennas. Cadambe and Jafar [23] state that each receiver should use at least one antenna to receive a target signal and at least one antenna to receive the interference. We select a group of the feasible implementation from the last section. As the standard implementation in 3GPP LTE [32,33] presents, the BS is configured with 4 with antennas, i.e., N _{ r } = 4, and each user is configured with 2 antennas, i.e., N _{ t } = 2. As a simple example, we assume N _{ c } = N _{ d } = 2 in a cluster. The parameters submitting formula (40) are general in practical usage.
Using the above parameter setting, three interference signals seen by each DUERX are aligned into a signal space. Thus, the transmitter strategy is to select beamforming vectors to satisfy the following constraints:
where span(A) stands for the vector space spanned by the column vectors of the matrix A. Then,
As (47) expresses, \( {\mathbf{Q}}_{C_1}^m \) can be set as the eigenvector of \( {{\mathbf{G}}_{D_1,{C}_1}^m}^{1}{\mathbf{G}}_{D_1,{C}_2}^m{{\mathbf{G}}_{D_2,{C}_2}^m}^{1}{\mathbf{G}}_{D_2,{C}_1}^m \), and then, all precoding matrices \( {\mathbf{Q}}_{C_1}^m,{\mathbf{Q}}_{C_2}^m,{\mathbf{Q}}_{D_1}^m,{\mathbf{Q}}_{D_2}^m \) can be similarly determined.
After deriving precoding matrices, the corresponding ZF decoding matrices also need to be derived to preserve the target spaces. Taking \( {\mathbf{y}}_{D1}^m \) as an example, because \( {\mathbf{G}}_{D1,C1}^m{\mathbf{Q}}_{C1}^m \), \( {\mathbf{G}}_{D1,C2}^m{\mathbf{Q}}_{C2}^m \), and \( {\mathbf{G}}_{D1,D2}^m{\mathbf{Q}}_{D2}^m \) have been aligned in the same space, we select any one of them and then use SVD decomposition, i.e., \( {\mathbf{G}}_{D1,C1}^m{\mathbf{Q}}_{C1}^m=\left[{\mathbf{U}}_1\boldsymbol{\Lambda} \mathbf{V}\right] \). We take the second column of U _{1}, which is denoted as U _{1} ^{(2)}. Then, the ZF matrix at DUERX1, D _{1}, is \( {\mathbf{U}}_{D_1}^m={\left({\mathbf{U}}_1^{(2)}\right)}^T \). Because U _{1} is a unitary matrix, \( {\left({\mathbf{U}}_1^{(2)}\right)}^T{\mathbf{G}}_{D1,C1}^m{\mathbf{Q}}_{C1}^m \) can preserve the target signal and eliminate the interference signal. Similar to D _{1}, \( {\mathbf{U}}_{D_2}^m \) can be derived. In terms of the BS receiving the C _{1} signal, after using SVD decomposition to obtain \( {\mathbf{G}}_{\mathrm{BS},C1}^m{\mathbf{Q}}_{C1}^m=\left[{\mathbf{U}}_2\boldsymbol{\Lambda} \mathbf{V}\right] \), we select the second, the third, and the fourth columns as U _{2} ^{(2–4)}, and \( {\mathbf{U}}_{C_1}^m \) is (U _{2} ^{(2–4)})^{T}. To obtain the C _{2} signal, \( {\mathbf{U}}_{C_1}^m{\mathbf{G}}_{\mathrm{BS},C2}^m{\mathbf{Q}}_{C2}^m=\left[{\mathbf{U}}_3\boldsymbol{\Lambda} \mathbf{V}\right] \), then, we set \( {\mathbf{U}}_{C_2}^m \) is (U _{3} ^{(3–4)})^{T}.
3 Formulation of joint user clustering and resource allocation problem
The prior section presents the cluster throughput calculation of each RB in the multiplex (19) and IA (31) schemes. Regardless of the employed scheme, the objective is to maximize the overall system throughput via joint user clustering and resource allocation. Before solving the optimization problem, we need to derive the throughput of each resource pattern as
The indicator x _{ k,l,n } = 1 represents that the nth resource pattern is assigned to the CUE subcluster ℂ_{ k } and DUE subcluster \( {\mathbb{D}}_l \); otherwise, x _{ k,l,n } = 0. If n = 1 and x _{ k,l,n } = 1, it means that there is no resource assigned to this cluster; thus, t ' _{ k,l,1} = 0. Mathematically, the optimization problem can be formulated as
subject to
The descriptions of constraints (a) to (f) are as follows:

(a)
indicates that each CUE subcluster can share a resource allocation pattern, including an empty resource pattern, with at most one DUE subcluster;

(b)
indicates that each DUE subcluster can share a resource allocation pattern, including an empty resource pattern, with at most one CUE subcluster;

(c)
indicates that each resource allocation pattern, except the empty pattern, can only be allocated to at most one CUE subcluster and one DUE subcluster;

(d)
guarantees that each CUE can only be selected by one CUE subcluster. k1 and k2 represent the indices of the selected CUE subclusters that are allocated resources;

(e)
guarantees that each D2D pair can only be selected by one DUE subcluster. l1 and l2 represent the indices of selected DUE subclusters that are allocated resources;

(f)
guarantees that each RB is only allocated to a cluster. n1 and n2 represent the indices of the employed resource pattern.
The joint optimization used to maximize the overall rates of the CUEs and DUEs sharing the same resources is a typical discrete optimization problem and must be nonconvex. The usual method to obtain the optimal result of such types of problem is exhaustive searching which is extremely difficult, i.e., NPhard [29,30]. Because x _{ k,l,n } is 0 or 1, the problem can be transformed as a standard binaryinteger programming problem. In this paper, we utilize lowcomplexity heuristic algorithms to obtain approximately optimal results that do not have much loss of performance compared to the optimal one.
4 Joint user clustering and resource allocation algorithms
In this section, we first present the standard binaryinteger programming of the optimization problem and subsequently develop a twostep algorithm to solve it. Finally, a locationbased algorithm is provided to obtain a good tradeoff between performance and complexity.
4.1 Standard binaryinteger programming form
Define a N _{ all. c } N _{ all. d } K _{ all. rb } × 1 user clustering and resource allocation vector and a N _{ all. c } N _{ all. d } K _{ all. rb } × 1 normalized throughput vector whose elements are calculated by (48) as
Reformulate the optimization as
subject to
where R is a (N _{ c } N _{ d } K _{ rb } + K _{ c } + K _{ d }) × N _{ all. c } N _{ all. d } N _{ all. rb } constraint matrix containing only 0 and 1. This matrix can be expressed as
The first bar represents the extended resource constraint matrix used to ensure the constraints (c) and (f) of (49), where J is a (N _{ c } N _{ d } K _{ rb }) × N _{ all. rb } resource pattern matrix for each cluster. Because there are N _{ c } CUEs and N _{ d } D2D pairs in a cluster utilizing the same resource pattern, J can be expressed as
where T is a K _{ rb } × N _{ all. rb } basic resource pattern matrix used to list all types of adjacent resources, including an empty pattern. The second bar represents the extended CUE constraint matrix used to ensure the constraints (a) and (d) of (49), where F is a K _{ c } × N _{ all. c } CUE subcluster matrix for a fixed resource allocation pattern and a fixed DUE subcluster. The third bar represents the extended DUE constraint matrix used to ensure the constraints (b) and (e) of (49), where N is a K _{ d } × N _{ all. d } DUE subcluster matrix for a fixed resource allocation pattern and a fixed CUE subcluster. For example, N _{ c } = N _{ d } = 2, K _{ rb } = 6, and K _{ c } = K _{ d } = 12 is a group of example parameters in this paper; thus, there are N _{ all. c } = K _{ c }(K _{ c } − 1)/2 different types of CUE subcluster and N _{ all. d } = K _{ d }(K _{ d } − 1)/2 different types of DUE subcluster. Then,
An exhaustive search is a straightforward and basic algorithm used to find the optimal solution of binaryinteger programming problems. However, it is overly complex and impractical in realworld scenarios.
4.2 Twostep algorithm
To reduce the complexity, we propose a twostep optimization algorithm. In this algorithm, an exhaustive search algorithm is first used to find the optimal user cluster at each RB. Then, we reserve the elements in (51) that contain the users in RBs’ optimal clusters and abandon the remainder. Based on such a reduceddimension CUE subcluster subset and DUE subcluster subset, we implement the BBS algorithm [31] to realize the joint optimization.
Let us use an example to illustrate the advantage of reducing the search space by utilizing a twostep algorithm. When K _{ c } = K _{ d } = 12 and K _{ rb } = 6, the extreme case is that 6 CUE and 6 DUE subclusters will be selected to form the reduceddimension CUE subcluster subset and DUE subcluster subset. Clearly, the dimension of such a CUE subcluster subset is substantially smaller than that of the full CUE subcluster set, i.e., N _{ all. c } = 66. The same effect will occur in the DUE subcluster. Consequently, the search space for the optimization can be reduced, thereby decreasing its complexity.
The pseudocode of the algorithm is shown in Table 2, where \( \overline{k} \) and \( \overline{l} \) denote that the \( \overline{k} \) th CUE subcluster and \( \overline{l} \) th DUE subcluster are the most suitable for rb. K and L denote the CUE subcluster subset and DUE subcluster subset, respectively. S represents the index set of all combinations between \( \widehat{k} \) from K and \( \widehat{l} \) from L. \( \widehat{x_S} \) denotes the target vector of user clustering and resource allocation.
4.3 Random clustering scheme based on distance (locationbased algorithm)
When there are a large number of CUEs and DUEs in the cell, the computation is quite complex when using exhaustive searching or the twostep algorithm. Therefore, we propose a novel locationbased algorithm to randomly select CUEs and D2D pairs based on a distanceconstrained criterion to assemble a user cluster.
The cell is divided into two areas by a circle of radius r _{0}, as shown in Figure 2. The area inside the circle is denoted as A, and the area outside the circle is denoted as B. Multiplex (Section 2.1) and IA (Section 2.2) schemes are employed in those respective areas. The users are randomly distributed in the cell. Users in area A and area B are independent and are randomly combined into clusters. In a cluster, N _{ c } and N _{ d } are equal to 2. Each user is only clustered in one group. We set each user’s antenna number as N _{ t } = 2. Each user in area A transmits a single data stream, whereas each user in area B transmits two data streams. The employed resource assignment is a random scheme, and the RBs used in different areas are orthogonal. We can suppose that there will be greater opportunity to assign resources for the area that is larger. All the RBs are fully exploited to support as many users as possible.
We assume that area B is divided into six equal sections, denoted by B1 to B6, as illustrated in Figure 2. The main incluster interference is between D2D pairs and between CUEs and D2D pairs. Two D2D pairs and two CUEs are randomly located at three nonadjacent sections so that the mutual interference can be reduced to a low level. We select two D2D pairs from two of the three nonadjacent sections and two CUEs from the remaining section. Then, we combine these users into a cluster, which is employed in the multiplex scheme.
In area A, the mutual interference cannot be neglected because the distance between the CUEs and D2D pairs is not sufficiently large. Therefore, the IA scheme is adopted. The area does not need to be divided because the mutual interference is nearly nonexistent when the IA scheme is used.
Next, we define r _{0} and P _{ D }, where P _{ D } is the maximum transmit power of the D2D transmitter. We employ a type of dynamic power control to adjust the CUE’s uplink transmit power P _{ c } to the target SINR (the smallest SINR satisfying quality of service (QOS) requirements), while all of the D2D communications are being performed with a fixed transmission power P _{ D }. The initial P _{ c } is set at the maximum 23 dBm. The locationbased algorithm’s procedure is described in detail in Table 3.
5 Simulation results
In this section, we present the performance of the proposed algorithms and other comparison schemes. For simplicity, we consider a singlecell scenario with various simulation parameters based on the 3GPP LTE standard [32,33], which are listed in Table 4. In this scenario, we employ IA, multiplex, and orthogonal schemes, each of which considers optimal, twostep, and random algorithms. The locationbased algorithm is also considered. The orthogonal scheme is the mechanism whereby each CUE or D2D pair utilizes an independent orthogonal resource, where K _{ rb,c } and K _{ rb,d } are the numbers of resources for the CUE and D2D pairs. The random algorithm indicates that user clustering and resource allocation are random. We attempt to consider various factors, including the effect of the DUE transmit power, D2D pair mutual distance, and inner round radius.
5.1 Effect of D2D transmit power
Figure 3 illustrates the average capacity versus the DUE transmit power for various schemes, where the distance between D2D pairs is 20 m and the inner round radius of the locationbased algorithm is 300 m. In the figure, the multiplex and IA scheme simultaneously allocate each RB to two CUEs and two D2D pairs. In addition, the orthogonal scheme allocates one third of the RBs to CUEs, whereas the remaining RBs are allocated to the DUEs, and each RB is shared by two CUEs or by one pair of DUEs. Initially, in addition to the locationbased algorithm, the average capacities of the IA and orthogonal schemes monotonously increase with increasing DUE transmit power. In regard to the multiplex scheme, although the useful received power increases with increasing DUE transmit power, the interference power also increases; therefore, the performance trend does not vary with the DUE transmit power. The IA and multiplex schemes using user clustering outperform the orthogonal scheme, which does not use user clustering. Additionally, when the DUE transmit power is higher than 0 dBm, which means a large power range in practical implementation, the IA scheme outperforms the multiplex and orthogonal schemes in both the twostep and optimal algorithms.
As shown in Table 5, the twostep algorithm (polynomial complexity) is less complex than the optimal algorithm (exponential complexity). For a typical example of K _{ rb } = K _{ c } = K _{ d } = 4 and N _{ c } = N _{ d } = 2, the search complexity of the twostep algorithm is 144, whereas that of the optimal algorithm is approximately 1.6E6. When K _{ rb } = 6 and K _{ c } = K _{ d } = 12, the search complexities of the twostep and optimal algorithms are 2.6E4 and 6.8E21, respectively. Obliviously, the growth in the optimal algorithm’s complexity is greater.
Figure 3 also shows that regardless of whether the scheme is an IA, multiplex, or orthogonal, the twostep algorithm has an average capacity that is similar to the optimal algorithm, and both of them outperform the random algorithm. In summary, the proposed twostep algorithm exhibits not only a higher average capacity but also a lower complexity. Nevertheless, the performance of the locationbased algorithm, which employs a random algorithm, is greater than that of any other scheme using a random algorithm, and it is closer to that of the twostep algorithm in the multiplex and IA schemes. The complexity of the locationbased algorithm is linear, which is considerably lower than that of the twostep algorithm and is equal to that of the random algorithm. The performance and complexity of the optimal or random algorithm cannot become optimal simultaneously because a conflict always exists between performance and complexity. However, the locationbased algorithm can achieve a good tradeoff between these two criteria.
5.2 Effect of distance between D2D pairs
Figure 4 presents the average capacity versus the DUE transmit power for various schemes and for different distances between DUETX and DUERX in a D2D pair (i.e., 10, 20, and 30 m). In this case, the inner round radius in the locationbased algorithm is 300 m. The average capacity increases with increasing DUE transmit power. A shorter D2D mutual distance results in a superior performance for all schemes because the DUE receivers experience lower interference when the distances between D2D pairs decrease. In addition, the performance of the locationbased algorithm is close to that of the IA using the twostep algorithm when the D2D mutual distance is small, whereas the performance remains close to that of the IA scheme using the random algorithm if the D2D mutual distance is large. These results occur mainly because SINR decreases with increasing path loss resulting from the increase in the D2D pair mutual distance and vice versa (in this scenario, interference remains invariant; however, the signal decreases rapidly compared to the interference variance). The simulation results imply that it is better to keep the distance between D2D users sufficiently small for the sake of good performance.
5.3 Effect of the inner round radius
Figure 5 presents the average capacity versus the DUE transmit power using the locationbased algorithm for different inner round radii, where the D2D pair mutual distance is 20 m. Different radii lead to different performances. For example, when the DUE transmit power is 5 dBm, r _{0} = 300 m provides the best performance, whereas r _{0} = 500 m provides the worst performance. This is mainly because the performance is determined by the inner part, whose performance decreases with increasing r _{0}, and the outer part, whose performance increases with increasing r _{0}. Therefore, an appropriate r _{0} position can likely be determined to maximize the performance, but this position varies when the DUE transmit power is varied. The appropriate r _{0} position monotonously increases with increasing DUE transmit power. With high DUETX power, a large r _{0} is more suitable.
Figure 6 presents a CDF plot to illustrate the dynamic range and the scale of the throughput. DUE transmit power is set as 5 dBm in the proposed and comparative schemes. The locationbased algorithm and the IA scheme using the random algorithm have similar dynamic ranges, whereas the multiplex scheme using the random algorithm produces a larger dynamic range. Thus, compared to the multiplex scheme using the random algorithm, the locationbased algorithm is fairer to the user. In terms of the scale of the throughput, the locationbased algorithm with r _{0} = 200, 300, and 400 m outperforms the IA and multiplex schemes using the random algorithm. One of the reasons for this result is that the throughput of the outer circle in the locationbased algorithm using a double stream is greater than that in the IA scheme using a single stream. Another reason for this is that because the outer circle is divided into six sections, a lower level of mutual interference between multiplex users can occur. The receivers using the multiplex scheme using the random algorithm will receive the complex interference, which decreases the multiplex gain. However, the locationbased algorithm can be used to minimize this influence.
Figure 7 presents a CDF plot analyzing the different locations’ performance and distribution situations using the locationbased algorithm, where the DUE transmit power is 5 dBm. Area A denotes the inner round using IA, whereas area B denotes the outer circle using multiplex. The inner average capacity is large when r _{0} = 200 m because the inner CUEs are closer to the BS, i.e., their path losses are smaller than those of the outer CUEs. However, in this case, the outer average capacity is minimized when the mutual interference is strong. Thus, the inner performance has a positive overall impact when r _{0} is small. In contrast, when r _{0} = 400 m, the outer average capacity is larger than the inner average capacity. This is mainly because the performance of the outer circle is primarily determined by that of the outer circle D2D users. The increase in the average distance between CUEs and DUEs leads to the decrease in mutual interference; therefore, the D2D SINR increases. As a result, when r _{0} is large, the outer performance is beneficial to the whole. Therefore, to improve the celledge performance, a larger radius for the inner round can be employed. Otherwise, the central performance can be improved when the radius of the inner round is decreased.
6 Discussions
As well as [23,26], our research is based on the assumption of the global CSI known by transmitters or central BS. In terms of the IA scheme, the global CSI acquisition is an important problem and needs significant attention; otherwise, it will cause signals overhead. Jin et al. [34] provided a feedback topology design that can be used to acquire sufficient CSI and reduce signaling overhead. The method helps each transmitter to easily acquire the knowledge of the CSI. However, if the CSI condition cannot be satisfied, the IA scheme will suffer a performance loss. Once it happens, we can only employ statistical CSI as a replacement for instant CSI. The result will most likely be lower than the multiplex performance which does not require CSI knowledge. And this will make the IA scheme no sense.
Additionally, the IA scheme is to a great extent limited by the number of antennas and users. The investigated scenario is regarded as the combination of multiple access channel (MAC) [35] and Kuser [23]. But to the best of our knowledge, there is no previous research on joint considering of MAC and Kuser scenarios. In this paper, we mainly consider whether a feasible IA can improve the system performance besides a feasibility evaluation. The feasible inequality condition (40) is sufficient but not necessary of IA. The condition is not so tight.
Furthermore, the algorithm convergence is mainly affected by IA and power control in this research. The linear IA [23] is used in this paper which only requires a few calculation steps for precoding and decoding and cannot lead to serious signaling overhead. In order to satisfy the feasibility of linear IA, the number of antennas and users should be implemented appropriately. The iteration method is not our concern which has few differences with the linear method except for IA precoding and decoding. In terms of power control, the powers are iteratively modified by ΔP for the CUE target SINR. The solution will converge more quickly if ΔP is bigger, but the system will be unstable. We employ an abandon mechanism to guarantee convergence. If the number of iterations in an RB is more than a critical value, the corresponding communications are abandoned and reallocated. This mechanism can also prevent the system from signaling overhead.
The CSI acquirement, feasibility, and convergence issues are very important but not completely studied in this paper. In addition to the locationbased algorithm utilizing fractional frequency reuse (FFR) and soft frequency reuse (SFR) algorithms in multiplecell scenarios, they will be considered in our future work.
7 Conclusions
In this paper, we consider a singlecell scenario of multiple D2D communications underlaying MUMIMO cellular uplink networks. First, we investigate IA and multiplex schemes in user clustering. The IA scheme can eliminate interference, and it obtains higher performance than the multiplex scheme in a large range of DUETX power. These two schemes can achieve higher performances compared to the orthogonal scheme, which does not employ user clustering. Second, we generalize a joint optimization problem of user clustering and resource allocation to maximize the overall throughput. To derive the solution, because the global optimal method is an exhaustive search with very high complexity, we propose a twostep algorithm and a locationbased algorithm to reduce the complexities with minimal loss of performance. The locationbased algorithm, composed of IA and multiplex schemes, has both the low interference advantage of the IA scheme and the easy implementation advantage of the multiplex scheme. The simulation results show that the proposed locationbased algorithm produces low levels of mutual interference for multiplex users and that its performance is near optimal under low practical complexity; therefore, it exhibits a good tradeoff between performance and complexity. Finally, we evaluate the effect of the distance between D2D pairs and the effect of the appropriate inner round radius r _{0} of the locationbased algorithm. The results show that it is better to keep the distance between DUETX and DUERX sufficiently small to obtain a better performance and that it is more suitable to select a larger r _{0} with a higher DUETX power condition.
References
S Andreev, A Pyattaev, K Johnsson, O Galinina, Y Koucheryavy, Cellular traffic offloading onto networkassisted devicetodevice connections. IEEE. Commun. Mag. 52(4), 20–31 (2014)
X Lin, J Andrews, A Ghosh, R Ratasuk, An overview of 3GPP device to device proximity services. IEEE. Commun. Mag. 52(4), 40–48 (2014)
GPP TS 36.213 V12.2.0, Technical specification group radio access network: evolved Universal Terrestrial Radio Access (EUTRA), Available from: http://www.3gpp.org/, Jun. 2014.3
JCF Li, M Lei, FF Gao, Devicetodevice (D2D) communication in MUMIMO cellular networks (IEEE Global Communication Conference (GLOBECOM), Anaheim, CA, USA, 2012), pp. 3583–3587
L Wei, RQ Hu, T He, Y Qian, Devicetodevice (D2D) communications underlaying MUMIMO cellular networks. (IEEE GLOBECOM Workshops, 2013), pp. 4902–4907
T Peng, Q Lu, H Wang, S Xu, W Wang, Interference avoidance mechanisms in the hybrid cellular and devicetodevice systems (IEEE 20th International Symposium on Personal Indoor and Mobile Radio Commun, Tokyo, 2009), pp. 617–621
Y Cheng, Y Gu, X Lin, Combined power control and link selection in devicetodevice enabled cellular systems. IET. Commun. 7(12), 1221–1230 (2013)
H Xing, S Hakola, The investigation of power control schemes for a devicetodevice communication integrated into OFDMA cellular system (IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), Istanbul, Turkey, 2010), pp. 1775–1780
Q Duong, S OhSoon, Distancebased interference coordination for devicetodevice communications in cellular networks (IEEE Fifth International Conference on Ubiquitous and Future Networks (ICUFN), Da Nang, Vietnam, 2013), pp. 776–779
MGDS Rego, TF Maciel, HDHM Barros, FRP Cavalcanti, G Fodor, Performance analysis of power control for devicetodevice communication in cellular MIMO systems (IEEE International Symposium on Wireless Communication Systems (ISWCS), Paris, France, 2012), pp. 336–340
D Feng, L Lu, Y Yi, GY Li, G Feng, S Li, Devicetodevice communications underlaying cellular networks. IEEE. Trans. Commun. 61(8), 3541–3551 (2013)
B Kaufman, J Lilleberg, B Aazhang, Spectrum sharing scheme between cellular users and adhoc devicetodevice users. IEEE. Trans. Wireless. Commun. 12(3), 1038–1049 (2013)
P Phunchongharn, E Hossain, DI Kim, Resource allocation for devicetodevice communications underlaying LTEadvanced networks. IEEE. Wireless. Commun. 20(4), 91–100 (2013)
X Chen, LY Song, Z Han, Q Zhao, X Wang, X Cheng, B Jiao, Efficiency resource allocation for devicetodevice underlay communication systems: a reverse iterative combinatorial auction based approach. IEEE. J. Select. Areas. Commun. 31(9), 348–358 (2013)
M Hasan, E Hossain, DI Kim, Resource allocation under channel uncertainties for relayaided devicetodevice communication underlaying LTEA cellular networks. IEEE. Trans. Wireless. Commun. 13(4), 2322–2338 (2014)
DH Lee, KW Choi, WS Jeon, DG Jeong, Twostage semidistributed resource management for devicetodevice communication in cellular networks. IEEE. Trans. Wireless. Commun. 13(4), 1908–1920 (2014)
D Zhu, J Wang, AL Swindlehurst, C Zhao, Downlink resource reuse for devicetodevice communications underlaying cellular networks. IEEE. Signal. Process. Lett. 21(5), 531–534 (2014)
M Belleschi, G Fodor, A Abrardo, Performance analysis of a distributed resource allocation scheme for D2D communications (IEEE GLOBECOM Workshops, Houston, America, 2011), pp. 358–362
P Janis, V Koivunen, C Ribeiro, J Korhonen, K Doppler, K Hugl, Interferenceaware resource allocation for devicetodevice radio underlaying cellular networks (IEEE Vehicular Technology Conference Spring, Barcelona, 2009), pp. 1–5
S Xu, H Wang, T Chen, Q Huang, T Peng, Effective interference cancellation scheme for devicetodevice communication underlaying cellular networks (IEEE Vehicular Technology Conference Fall, Ottawa, 2010), pp. 1–5
H Min, J Lee, S Park, D Hong, Capacity enhancement using an interference limited area for devicetodevice uplink underlaying cellular networks. IEEE. Trans. Wireless. Commun. 10(12), 3995–4000 (2011)
P Janis, V Koivunen, CB Ribeiro, K Doppler, K Hugl, Interferenceavoiding MIMO schemes for devicetodevice radio underlaying cellular networks (IEEE 20th International Symposium on Personal Indoor and Mobile Radio Communications, Tokyo, Japan, 2009), pp. 2385–2389
VR Cadambe, SA Jafar, Interference alignment and degrees of freedom of the Kuser interference channel. IEEE. Trans. Inf. Theory. 54(8), 3425–3441 (2008)
SA Jafar, Interference alignment  a new look at signal dimensions in a communication network. Found. Trends Commun. Inform. Theory. 7(1), 2010
CM Yetis, TG Gou, SA Jafar, AH Kayran, On feasibility of interference alignment in MIMO interference networks. IEEE. Trans. Signal. Process. 58(9), 4771–4782 (2010)
M Zulhasnine, C Huang, A Srinivasan, Efficient resource allocation for devicetodevice communication underlaying LTE network (IEEE 6th International conference on WiMob, Niagara Falls, Ottawa, Canada, 2010), pp. 368–375
CH Yu, K Doppler, C Ribeiro, O Tirkkonen, Resource sharing optimization for devicetodevice communication underlaying cellular networks. IEEE. Trans. Wireless. Commun. 10(8), 2752–2763 (2011)
C Xu, LY Song, Z Han, Resource management for devicetodevice underlay communication. Springer Briefs in Computer Science, 2014
S Boyd, L Vandenberghe, Convex optimization. Cambridge University Press, 2004
MR Garey, DS Johnson, Computers and intractability: a guide to the theory of NPcompleteness. Freeman, 1979
J Fan, GY Li, Q Yin, B Peng, X Zhu, Joint user pairing and resource allocation for LTE uplink transmission. IEEE. Trans. Wireless. Commun. 11(8), 2838–2847 (2012)
GPP TR 36.843 V12.0.1, Technical specification group radio access network: study on LTE device to device proximity services. Available from: http://www.3gpp.org/, Mar. 2014
GPP TR 36.942 V11.0.0, Technical specification group radio access network: Evolved Universal Terrestrial Radio Access (EUTRA), Available from: http://www.3gpp.org/, Sep. 2012
J Jin, L Li, H Tian, Q Wang, X Gao, New feedback topology designs with reduced CSI overhead for MIMO interference alignment. IEEE. Signal. Process. Lett. 21(2), 176–179 (2014)
X Qu, CG Kang, A closedform solution to implement interference alignment and cancellation for Gaussian Interference Multiple Access Channel. IEEE. Trans. Wireless. Commun. 13(2), 710–723 (2014)
Acknowledgements
This work is supported in part by the National Natural Science Foundation of China under Grant 61302082 and in part by the National Hightech Research and Development Program of China under Grant 2014AA01A701.
Author information
Authors and Affiliations
Corresponding author
Additional information
Competing interests
The authors declare that they have no competing interests.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0), which permits use, duplication, adaptation, distribution, and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Wang, Q., Lai, C., Dong, Y. et al. Joint user clustering and resource allocation for devicetodevice communication underlaying MUMIMO cellular networks. J Wireless Com Network 2015, 145 (2015). https://doi.org/10.1186/s1363801503586
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s1363801503586