• ### Device-to-Device Load Balancing for Cellular Networks(1710.02636)

Dec. 12, 2018 cs.NI
• ### EdgeFlow: Open-Source Multi-layer Data Flow Processing in Edge Computing for 5G and Beyond(1801.02206)

April 3, 2018 cs.NI
Edge computing has evolved to be a promising avenue to enhance the system computing capability by offloading processing tasks from the cloud to edge devices. In this paper, we propose a multi-layer edge computing framework called EdgeFlow. In this framework, different nodes ranging from edge devices to cloud data centers are categorized into corresponding layers and cooperate together for data processing. With the help of EdgeFlow, one can balance the trade-off between computing and communication capability so that the tasks are assigned to each layer optimally. At the same time, resources are carefully allocated throughout the whole network to mitigate performance fluctuation. The proposed open-source data flow processing framework is implemented on a platform that can emulate various computing nodes in multiple layers and corresponding network connections. Evaluated on the face recognition scenario, EdgeFlow can significantly reduce task finish time and perform more tolerance to run-time variation, compared with the pure cloud computing, the pure edge computing and Cloudlet. Potential applications of EdgeFlow, including network function visualization, Internet of Things, and vehicular networks, are also discussed in the end of this work.
• ### Load Balancing for 5G Ultra-Dense Networks using Device-to-Device Communications(1803.06082)

March 29, 2018 cs.IT, math.IT
Load balancing is an effective approach to address the spatial-temporal fluctuation problem of mobile data traffic for cellular networks. The existing schemes that focus on channel borrowing from neighboring cells cannot be directly applied to future 5G wireless networks, because the neighboring cells will reuse the same spectrum band in 5G systems. In this paper, we consider an orthogonal frequency division multiple access~(OFDMA) ultra-dense small cell network, where Device-to-Device~(D2D) communication is advocated to facilitate load balancing without extra spectrum. Specifically, the data traffic can be effectively offloaded from a congested small cell to other underutilized small cells by D2D communications. The problem is naturally formulated as a joint resource allocation and D2D routing problem that maximizes the system sum-rate. To efficiently solve the problem, we decouple the problem into a resource allocation subproblem and a D2D routing subproblem. The two subproblems are solved iteratively as a monotonic optimization problem and a complementary geometric programming problem, respectively. Simulation results show that the data sum-rate in the neighboring small cells increases 20\% on average by offloading the data traffic in the congested small cell to the neighboring small cell base stations~(SBSs).
• ### Mobile Social Big Data: WeChat Moments Dataset, Network Applications, and Opportunities(1710.07756)

Feb. 24, 2018 cs.SI
In parallel to the increase of various mobile technologies, the mobile social network (MSN) service has brought us into an era of mobile social big data, where people are creating new social data every second and everywhere. It is of vital importance for businesses, government, and institutes to understand how peoples' behaviors in the online cyberspace can affect the underlying computer network, or their offline behaviors at large. To study this problem, we collect a dataset from WeChat Moments, called WeChatNet, which involves 25,133,330 WeChat users with 246,369,415 records of link reposting on their pages. We revisit three network applications based on the data analytics over WeChatNet, i.e., the information dissemination in mobile cellular networks, the network traffic prediction in backbone networks, and the mobile population distribution projection. Meanwhile, we discuss the potential research opportunities for developing new applications using the released dataset.

Jan. 28, 2018 cs.NI, cs.SI, eess.SP
Unmanned Aerial Vehicle (UAV) has been recognized as a promising way to assist future wireless communications due to its high flexibility of deployment and scheduling. In this paper, we focus on temporarily deployed UAVs that provide downlink data offloading in some regions under a macro base station (MBS). Since the manager of the MBS and the operators of the UAVs could be of different interest groups, we formulate the corresponding spectrum trading problem by means of contract theory, where the manager of the MBS has to design an optimal contract to maximize its own revenue. Such contract comprises a set of bandwidth options and corresponding prices, and each UAV operator only chooses the most profitable one from all the options in the whole contract. We analytically derive the optimal pricing strategy based on fixed bandwidth assignment, and then propose a dynamic programming algorithm to calculate the optimal bandwidth assignment in polynomial time. By simulations, we compare the outcome of the MBS optimal contract with that of a social optimal one, and find that a selfish MBS manager sells less bandwidth to the UAV operators.
• ### Cellular UAV-to-X Communications: Design and Optimization for Multi-UAV Networks in 5G(1801.05000)

Jan. 5, 2018 eess.SP
In this paper, we consider a single-cell cellular network with a number of cellular users~(CUs) and unmanned aerial vehicles~(UAVs), in which multiple UAVs upload their collected data to the base station (BS). Two transmission modes are considered to support the multi-UAV communications, i.e., UAV-to-infrastructure (U2I) and UAV-to-UAV~(U2U) transmissions. Specifically, a UAV either uploads its collected data to the BS through U2I overlay transmission or offloads the data to a neighboring UAV through U2U underlay transmission when facing on-board battery outage. We formulate the subcarrier allocation and trajectory control problem to maximize the uplink sum-rate taking the delay of sensing tasks into consideration. To solve this NP-hard problem efficiently, we decouple it into three sub-problems: U2I and cellular user (CU) subcarrier allocation, U2U subcarrier allocation, and UAV trajectory control. An iterative subcarrier allocation and trajectory control algorithm (ISATCA) is proposed to solve these sub-problems jointly. Simulation results show that the proposed ISATCA can upload 20\% more data than the one without U2U offloading, and 10\% more than that obtained by the random algorithm.
• ### Short-Packet Two-Way Amplify-and-Forward Relaying(1712.03653)

Dec. 11, 2017 cs.IT, math.IT
This letter investigates an amplify-and-forward two-way relay network (TWRN) for short-packet communications. We consider a classical three-node TWRN consisting of two sources and one relay. Both two time slots (2TS) scheme and three time slots (3TS) scheme are studied under the finite blocklength regime. We derive approximate closed-form expressions of sum-block error rate (BLER) for both schemes. Simple asymptotic expressions for sum-BLER at high signal-to-noise ratio (SNR) are also derived. Based on the asymptotic expressions, we analytically compare the sum-BLER performance of 2TS and 3TS schemes, and attain an expression of critical blocklength, which can determine the performance superiority of 2TS and 3TS in terms of sum-BLER. Extensive simulations are provided to validate our theoretical analysis. Our results discover that 3TS scheme is more suitable for a system with lower relay transmission power, higher differences between the average SNR of both links and relatively lower requirements on data rate and latency.
• ### Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard(1709.08317)

Sept. 25, 2017 cs.NI, cs.GT
In cognitive radio networks (CRNs), spectrum trading is an efficient way for secondary users (SUs) to achieve dynamic spectrum access and to bring economic benefits for the primary users (PUs). Existing methods requires full payment from SU, which blocked many potential "buyers", and thus limited the PU's expected income. To better improve PUs' revenue from spectrum trading in a CRN, we introduce a financing contract, which is similar to a sealed non-cash auction that allows SU to do a financing. Unlike previous mechanism designs in CRN, the financing contract allows the SU to only pay part of the total amount when the contract is signed, known as the down payment. Then, after the spectrum is released and utilized, the SU pays the rest of payment, known as the installment payment, from the revenue generated by utilizing the spectrum. The way the financing contract carries out and the sealed non-cash auction works similarly. Thus, contract theory is employed here as the mathematical framework to solve the non-cash auction problem and form mutually beneficial relationships between PUs and SUs. As the PU may not have the full acknowledgement of the SU's financial status, nor the SU's capability in making revenue, the problems of adverse selection and moral hazard arise in the two scenarios, respectively. Therefore, a joint adverse selection and moral hazard model is considered here. In particular, we present three situations when either or both adverse selection and moral hazard are present during the trading. Furthermore, both discrete and continuous models are provided in this paper. Through extensive simulations, we show that the adverse selection and moral hazard cases serve as the upper and lower bounds of the general case where both problems are present.
• ### Hypergraph Theory: Applications in 5G Heterogeneous Ultra-Dense Networks(1709.07129)

Sept. 21, 2017 cs.IT, math.IT
Heterogeneous ultra-dense network (HUDN) can significantly increase the spectral efficiency of cellular networks and cater for the explosive growth of data traffic in the fifth-generation (5G) communications. Due to the dense deployment of small cells (SCs), interference among neighboring cells becomes severe. As a result, the effective resource allocation and user association algorithms are essential to minimize inter-cell interference and optimize network performance. However, optimizing network resources in HUDN is extremely complicated as resource allocation and user association are coupled. Therefore, HUDN requires low-complexity but effective resource allocation schemes to address these issues. Hypergraph theory has been recognized as a useful mathematical tool to model the complex relations among multiple entities. In this article, we show how the hypergraph models can be used to effectively tackle resource allocation problems in HUDN. We also discuss several potential research issues in this field.
• ### V2X Meets NOMA: Non-Orthogonal Multiple Access for 5G Enabled Vehicular Networks(1705.08709)

May 24, 2017 cs.IT, math.IT, cs.NI
Benefited from the widely deployed infrastructure, the LTE network has recently been considered as a promising candidate to support the vehicle-to-everything (V2X) services. However, with a massive number of devices accessing the V2X network in the future, the conventional OFDM-based LTE network faces the congestion issues due to its low efficiency of orthogonal access, resulting in significant access delay and posing a great challenge especially to safety-critical applications. The non-orthogonal multiple access (NOMA) technique has been well recognized as an effective solution for the future 5G cellular networks to provide broadband communications and massive connectivity. In this article, we investigate the applicability of NOMA in supporting cellular V2X services to achieve low latency and high reliability. Starting with a basic V2X unicast system, a novel NOMA-based scheme is proposed to tackle the technical hurdles in designing high spectral efficient scheduling and resource allocation schemes in the ultra dense topology. We then extend it to a more general V2X broadcasting system. Other NOMA-based extended V2X applications and some open issues are also discussed.
• ### Non-orthogonal Multiple Access for High-reliable and Low-latency V2X Communications in 5G Systems(1705.08711)

May 24, 2017 cs.NI, cs.GT
In this paper, we consider a dense vehicular communication network where each vehicle broadcasts its safety information to its neighborhood in each transmission period. Such applications require low latency and high reliability, and thus, we exploit non-orthogonal multiple access to reduce the access latency and to improve the packet reception probability. In the proposed two-fold scheme, the BS performs semi-persistent scheduling and allocates time-frequency resources in a non-orthogonal manner while the vehicles autonomously perform distributed power control with iterative signaling control. We formulate the centralized scheduling and resource allocation problem as equivalent to a multi-dimensional stable roommate matching problem, in which the users and time/frequency resources are considered as disjoint sets of objects to be matched with each other. We then develop a novel rotation matching algorithm, which converges to an $L$-rotation stable matching after a limited number of iterations. Simulation results show that the proposed scheme outperforms the traditional orthogonal multiple access scheme in terms of the access latency and reliability.
• ### Full-duplex Amplify-and-Forward Relaying: Power and Location Optimization(1703.07088)

March 21, 2017 cs.IT, math.IT
In this paper, we consider a full-duplex (FD) amplify-and-forward (AF) relay system and optimize its power allocation and relay location to minimize the system symbol error rate (SER). We first derive the asymptotic expressions of the outage probability and SER performance by taking into account the residual self interference (RSI) in FD systems. We then formulate the optimization problem based on the minimal SER criterion. Analytical and numerical results show that optimized relay location and power allocation can greatly improve system SER performance, and the performance floor caused by the RSI can be significantly reduced via optimizing relay location or power allocation.
• ### D2D-U: Device-to-Device Communications in Unlicensed Bands for 5G and Beyond(1610.04982)

March 7, 2017 cs.NI, cs.PF
Device-to-Device (D2D) communication, which enables direct communication between nearby mobile devices, is an attractive add-on component to improve spectrum efficiency and user experience by reusing licensed cellular spectrum in 5G system. In this paper, we propose to enable D2D communication in unlicensed spectrum (D2D-U) as an underlay of the uplink LTE network for further booming the network capacity. A sensing-based protocol is designed to support the unlicensed channel access for both LTE and D2D users. We further investigate the subchannel allocation problem to maximize the sum rate of LTE and D2D users while taking into account their interference to the existing Wi-Fi systems. Specifically, we formulate the subchannel allocation as a many-to-many matching problem with externalities, and develop an iterative user-subchannel swap algorithm. Analytical and simulation results show that the proposed D2D-U scheme can significantly improve the system sum-rate.
• ### Resource Management in Non-orthogonal Multiple Access Networks for 5G and Beyond(1610.09465)

Feb. 14, 2017 cs.IT, math.IT
Non-orthogonal multiple access (NOMA) schemes have been proposed for the next generation of mobile communication systems to improve the access efficiency by allowing multiple users to share the same spectrum in a non-orthogonal way. Due to the strong co-channel interference among mobile users introduced by NOMA, it poses significant challenges for system design and resource management. This article reviews resource management issues in NOMA systems. The main taxonomy of NOMA is presented by focusing on the following two categories: power-domain NOMA and code-domain NOMA. Then a novel radio resource management framework is presented based on game-theoretic models for uplink and downlink transmissions. Finally, potential applications and open research directions in the area of resource management for NOMA are provided.
• ### X-duplex Relaying: Adaptive Antenna Configuration(1701.07168)

Jan. 25, 2017 cs.IT, math.IT
In this letter, we propose a joint transmission mode and transmit/receive (Tx/Rx) antenna configuration scheme referred to as X-duplex in the relay network with one source, one amplify-and-forward (AF) relay and one destination. The relay is equipped with two antennas, each of which is capable of reception and transmission. In the proposed scheme, the relay adaptively selects its Tx and Rx antenna, operating in either full-duplex (FD) or half-duplex (HD) mode. The proposed scheme is based on minimizing the symbol error rate (SER) of the relay system. The asymptotic expressions of the cumulative distribution function (CDF) for the end-to-end signal to interference plus noise ratio (SINR), average SER and diversity order are derived and validated by simulations. Results show that the X-duplex scheme achieves additional spatial diversity, significantly reduces the performance floor at high SNR and improves the system performance.
• ### On the Performance of X-Duplex Relaying(1701.05740)

Jan. 20, 2017 cs.IT, math.IT, cs.NI
In this paper, we study a X-duplex relay system with one source, one amplify-and-forward (AF) relay and one destination, where the relay is equipped with a shared antenna and two radio frequency (RF) chains used for transmission or reception. X-duplex relay can adaptively configure the connection between its RF chains and antenna to operate in either HD or FD mode, according to the instantaneous channel conditions. We first derive the distribution of the signal to interference plus noise ratio (SINR), based on which we then analyze the outage probability, average symbol error rate (SER), and average sum rate. We also investigate the X-duplex relay with power allocation and derive the lower bound and upper bound of the corresponding outage probability. Both analytical and simulated results show that the X-duplex relay achieves a better performance over pure FD and HD schemes in terms of SER, outage probability and average sum rate, and the performance floor caused by the residual self interference can be eliminated using flexible RF chain configurations.
• ### Sub-channel and Power Allocation for Non-orthogonal Multiple Access Relay Networks with Amplify-and-Forward Protocol(1611.04235)

Nov. 14, 2016 cs.IT, math.IT, cs.NI
In this paper, we study the resource allocation problem for a single-cell non-orthogonal multiple access (NOMA) relay network where an OFDM amplify-and-forward (AF) relay allocates the spectrum and power resources to the source-destination (SD) pairs. We aim to optimize the resource allocation to maximize the average sum-rate. The optimal approach requires an exhaustive search, leading to an NP-hard problem. To solve this problem, we propose two efficient many-to-many two-sided SD pair-subchannel matching algorithms in which the SD pairs and sub-channels are considered as two sets of players chasing their own interests. The proposed algorithms can provide a sub-optimal solution to this resource allocation problem in affordable time. Both the static matching algorithm and dynamic matching algorithm converge to a pair-wise stable matching after a limited number of iterations. Simulation results show that the capacity of both proposed algorithms in the NOMA scheme significantly outperforms the conventional orthogonal multiple access scheme. The proposed matching algorithms in NOMA scheme also achieve a better user-fairness performance than the conventional orthogonal multiple access.
• ### Resource Allocation in Wireless Powered Relay Networks: A Bargaining Game Approach(1611.04145)

Nov. 13, 2016 cs.IT, math.IT, cs.GT
Simultaneously information and power transfer in mobile relay networks have recently emerged, where the relay can harvest the radio frequency (RF) energy and then use this energy for data forwarding and system operation. Most of the previous works do not consider that the relay may have its own objectives, such as using the harvested energy for its own transmission instead of maximizing transmission of the network. Therefore, in this paper, we propose a Nash bargaining approach to balance the information transmission efficiency of source-destination pairs and the harvested energy of the relay in a wireless powered relay network with multiple source-destination pairs and one relay. We analyze and prove that the Nash bargaining problem has several desirable properties such as the discreteness and quasi-concavity, when it is decomposed into three sub-problems: the energy transmission power optimization, the power control for data transmission and the time division between energy transmission and data transmission. Based on the theoretical analysis, we propose an alternating power control and time division algorithm to find a suboptimal solution. Simulation results clearly show and demonstrate the properties of the problem and the convergence of our algorithm.
• ### Cost Efficiency for Economical Mobile Data Traffic Management from Users' Perspective(1610.08152)

Oct. 26, 2016 cs.NI
Explosive demand for wireless internet services has posed critical challenges for wireless network due to its limited capacity. To tackle this hurdle, wireless Internet service providers (WISPs) take the smart data pricing to manage data traffic loads. Meanwhile, from the users' perspective, it is also reasonable and desired to employ mobile data traffic management under the pricing policies of WISPs to improve the economic efficiency of data consumption. In this paper we introduce a concept of cost efficiency for user's mobile data management, defined as the ratio of user's mobile data consumption benefits and its expense. We propose an integrated cost-efficiency-based data traffic management scheme including long-term data demand planning, short-term data traffic pre-scheduling and real-time data traffic management. The real-time data traffic management algorithm is proposed to coordinate user's data consumption to tailor to the pre-scheduled data traffic profile. Numerical results demonstrate the effectiveness of cost efficiency framework in indicating and motivating mobile user's data consumption behavior. The proposed management scheme can effectively motivate the user to adjust its data consumption profile to obtain the optimal data consumption cost efficiency.
• ### Sub-channel Assignment, Power Allocation and User Scheduling for Non-Orthogonal Multiple Access Networks(1608.08313)

Aug. 30, 2016 cs.IT, math.IT, cs.NI
In this paper, we study the resource allocation and user scheduling problem for a downlink nonorthogonal multiple access network where the base station allocates spectrum and power resources to a set of users. We aim to jointly optimize the sub-channel assignment and power allocation to maximize the weighted total sum-rate while taking into account user fairness. We formulate the sub-channel allocation problem as equivalent to a many-to-many two-sided user-subchannel matching game in which the set of users and sub-channels are considered as two sets of players pursuing their own interests. We then propose a matching algorithm which converges to a two-side exchange stable matching after a limited number of iterations. A joint solution is thus provided to solve the sub-channel assignment and power allocation problems iteratively. Simulation results show that the proposed algorithm greatly outperforms the orthogonal multiple access scheme and a previous non-orthogonal multiple access scheme.
• ### Collaborative Smartphone Sensing using Overlapping Coalition Formation Games(1608.00307)

Aug. 1, 2016 cs.DC, cs.NI, cs.GT
With the rapid growth of sensor technology, smartphone sensing has become an effective approach to improve the quality of smartphone applications. However, due to time-varying wireless channels and lack of incentives for the users to participate, the quality and quantity of the data uploaded by the smartphone users are not always satisfying. In this paper, we consider a smartphone sensing system in which a platform publicizes multiple tasks, and the smartphone users choose a set of tasks to participate in. In the traditional non-cooperative approach with incentives, each smartphone user gets rewards from the platform as an independent individual and the limit of the wireless channel resources is often omitted. To tackle this problem, we introduce a novel cooperative approach with an overlapping coalition formation game (OCF-game) model, in which the smartphone users can cooperate with each other to form the overlapping coalitions for different sensing tasks. We also utilize a centralized case to describe the upper bound of the system sensing performance. Simulation results show that the cooperative approach achieves a better performance than the non-cooperative one in various situations.
• ### Caching as a Service: Small-cell Caching Mechanism Design for Service Providers(1607.04894)

July 17, 2016 cs.NI, cs.GT
Wireless network virtualization has been well recognized as a way to improve the flexibility of wireless networks by decoupling the functionality of the system and implementing infrastructure and spectrum as services. Recent studies have shown that caching provides a better performance to serve the content requests from mobile users. In this paper, we propose that \emph{caching can be applied as a service} in mobile networks, i.e., different service providers (SPs) cache their contents in the storages of wireless facilities that owned by mobile network operators (MNOs). Specifically, we focus on the scenario of \emph{small-cell networks}, where cache-enabled small-cell base stations (SBSs) are the facilities to cache contents. To deal with the competition for storages among multiple SPs, we design a mechanism based on multi-object auctions, where the time-dependent feature of system parameters and the frequency of content replacement are both taken into account. Simulation results show that our solution leads to a satisfactory outcome.
• ### Radio Resource Allocation for Device-to-Device Underlay Communication Using Hypergraph Theory(1604.03246)

April 12, 2016 cs.IT, math.IT, cs.NI
Device-to-Device (D2D) communication has been recognized as a promising technique to offload the traffic for the evolved Node B (eNB). However, the D2D transmission as an underlay causes severe interference to both the cellular and other D2D links, which imposes a great technical challenge to radio resource allocation. Conventional graph based resource allocation methods typically consider the interference between two user equipments (UEs), but they cannot model the interference from multiple UEs to completely characterize the interference. In this paper, we study channel allocation using hypergraph theory to coordinate the interference between D2D pairs and cellular UEs, where an arbitrary number of D2D pairs are allowed to share the uplink channels with the cellular UEs. Hypergraph coloring is used to model the cumulative interference from multiple D2D pairs, and thus, eliminate the mutual interference. Simulation results show that the system capacity is significantly improved using the proposed hypergraph method in comparison to the conventional graph based one.
• ### Listen-and-Talk: Protocol Design and Analysis for Full-duplex Cognitive Radio Networks(1602.07579)

Feb. 24, 2016 cs.NI
In traditional cognitive radio networks, secondary users (SUs) typically access the spectrum of primary users (PUs) by a two-stage "listen-before-talk" (LBT) protocol, i.e., SUs sense the spectrum holes in the first stage before transmitting in the second. However, there exist two major problems: 1) transmission time reduction due to sensing, and 2) sensing accuracy impairment due to data transmission. In this paper, we propose a "listen-and-talk" (LAT) protocol with the help of full-duplex (FD) technique that allows SUs to simultaneously sense and access the vacant spectrum. Spectrum utilization performance is carefully analyzed, with the closed-form spectrum waste ratio and collision ratio with the PU provided. Also, regarding the secondary throughput, we report the existence of a tradeoff between the secondary transmit power and throughput. Based on the power-throughput tradeoff, we derive the analytical local optimal transmit power for SUs to achieve both high throughput and satisfying sensing accuracy. Numerical results are given to verify the proposed protocol and the theoretical results.
• ### Source and Physical-Layer Network Coding for Correlated Two-Way Relaying(1602.00132)

Jan. 30, 2016 cs.IT, math.IT
In this paper, we study a half-duplex two-way relay channel (TWRC) with correlated sources exchanging bidirectional information. In the case, when both sources have the knowledge of correlation statistics, a source compression with physical-layer network coding (SCPNC) scheme is proposed to perform the distributed compression at each source node. When only the relay has the knowledge of correlation statistics, we propose a relay compression with physical-layer network coding (RCPNC) scheme to compress the bidirectional messages at the relay. The closed-form block error rate (BLER) expressions of both schemes are derived and verified through simulations. It is shown that the proposed schemes achieve considerable improvements in both error performance and throughput compared with the conventional non-compression scheme in correlated two-way relay networks (CTWRNs).