Skip to main content
Top
Published in: Mobile Networks and Applications 6/2017

Open Access 16-02-2017

Optimal Virtualized Inter-Tenant Resource Sharing for Device-to-Device Communications in 5G Networks

Authors: Christoforos Vlachos, Vasilis Friderikos, Mischa Dohler

Published in: Mobile Networks and Applications | Issue 6/2017

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Device-to-Device (D2D) communication is expected to enable a number of new services and applications in future mobile networks and has attracted significant research interest over the last few years. Remarkably, little attention has been placed on the issue of D2D communication for users belonging to different operators. In this paper, we focus on this aspect for D2D users that belong to different tenants (virtual network operators), assuming virtualized and programmable future 5G wireless networks. Under the assumption of a cross-tenant orchestrator, we show that significant gains can be achieved in terms of network performance by optimizing resource sharing from the different tenants, i.e., slices of the substrate physical network topology. To this end, a sum-rate optimization framework is proposed for optimal sharing of the virtualized resources. Via a wide site of numerical investigations, we prove the efficacy of the proposed solution and the achievable gains compared to legacy approaches.

1 Introduction

The Device-to-Device (D2D) communication paradigm is expected to become the key enabler for propelling local, proximity-based communications in future wireless networks. In this communication type, two closely located user equipments (UEs) are eligible to bypass the cellular base station (BS) and effectively communicate in a direct mode [1]. The integration of D2D in emerging 5G systems is expected to be beneficial for mobile stakeholders, mainly by unlocking new applications related to services based on proximity, vehicular-to-vehicular (V2V) communications and other commercial opportunities that D2D can offer [2]. In addition to that, there are also radical benefits in the overall network operation: first, the UEs’ proximity entails increased data rate performance, low energy consumption as well as low transmission latency. Also, the reuse ability of the cellular and D2D links to simultaneously utilize the same radio resources translates to noteworthy spectral efficiency [3]. Thus, because of the limited cellular resources and the ongoing proliferation of simultaneous data requests that need to be satisfied, the underlay notion of D2D communication is preferred due to its resource efficiency attribute.
In parallel, the virtualization of wireless radio resources has arisen as a promising solution to encounter the ongoing increasing data demand in today’s and emerging future networks. Wireless resource virtualization (WRV) is currently emerging as a disruptive technology that offers significant benefits to different networks and service providers (N&SPs) [4] as well as enabling vertical industries to create their own wireless network. Briefly, other than the fact that co-existing networks, which will be called tenants in the sequel, are able to share the substrate physical infrastructure that entails reduced capital and operational expenditures (CAPEX and OPEX, respectively), WRV ameliorates the utilization of radio resources via sharing them among the different N&SPs [5]. Hence, the exploitation of the wireless virtualization and network programmability merits on top of the integration of D2D paradigm can lead to improved network performance in terms of spectrum efficiency as well as overall network performance.
However, the advent of the data-driven era brings in a number of challenges mainly due to the resulting cell and user densification [6]. Among all, a prevalent problem that is expected to attract not only academic but also industrial interest is that of direct communication between users that are subscribed to different mobile network operators (MNOs). A solution to this problem can create a fertile ground for introducing new business models that will fully leverage the D2D potentials. Technically, the weight should be primarily put on defining how the involved MNOs will coordinate their spectrum to satisfy their subscribers’ quality of service (QoS) requirements. In the case of single MNO, underlaying D2D links are allowed to utilize the licensed cellular spectrum that is provided by the operator. On the other hand, in the case where two devices belong to two different operators, it needs to be decided which resources from which MNO will be utilized to realize the D2D connection. Therefore, the principal aim is to support a significant number of direct connections along different network operators while at the same time respect the performance of cellular users as well as the overall welfare of the system.
In the next subsection, we delve further into the above issues as with respect to resource sharing across different tenants of the substrate infrastructure.

1.1 Network function virtualization (NFV) & service creation

In envisioned future virtualized and programmable 5G wireless network architectures, different tenants (virtual network providers) will be sharing the physical (substrate) network resources using a combination of Software Defined Networking1 (SDN) and Network Function Virtualization2 (NFV) architectures. The core idea behind NFV is to capitalize on virtualization technologies to decouple physical network equipment from the services or functions that run on top of them [7]. Under the NFV framework, a network service can be decomposed into a set of virtual network functions (vNFs) which are implemented in software and are able to run in general purposed hardware where they can be dispatched on demand. An overview of the NFV architecture is shown in Fig. 1 which conforms to the ETSI NFV framework. As depicted in this figure, a service request will be handled by the Orchestrator which will then inform the Virtual Function Manager about which vNFs are required to be activated for this specific service, whereas the actual physical resources for the vNFs will be handled by the Virtualization Infrastructure Manager (VIM). The above defined policies for the service creation will be distributed using the SDN controller (based for example on OpenFlow).3
Since each tenant will be allocated a slice of the available network resources (including also spectrum), mobile users that will require device-to-device communication from different tenants will be allocated resources (resource blocks) from the device which is originating the communication. This operation might lead to inefficient usage of the tenant’s available resources in the long run. We therefore propose the use of an inter-slice coordinator that will allow for optimal usage of multiple tenants’ resources in the case where the communication is taking place between users subscribed to different tenants. An illustrative example of an inter-slice controller is shown in Fig. 2, for the case of two tenants. Such cross-tenant orchestration would allow a more efficient use of the available physical resources per tenant. The concept of inter-slice coordination is being developed within the EU 5G-PPP 5G-NORMA project where the key motivation is to replace single RAN’s networked entities by a network slice with a graph of programmable network functions.4 A cross-tenant controller should be a trusted entity since in order to optimize the overall performance tenants will have to provide intra-slice topological information to the controller which might include, inter alia, the number and location of users in each slice. Depending on the actual implementation, the cross-tenant controller can be considered as a broker that runs by the substrate network provider, which can be deemed as a trusted element. Note, there is an incentive for all tenants to cooperate since overall network performance is increased; however, trusted entities in virtualized architectures is a topic well beyond the scope area of this paper. Based on that fundamental assumption, the aim of this paper is to quantify the potential achievable gains enabled by such a cross-slice controller.

1.2 Contribution and structure

In this work, we assume that separate network slices allow for multi-tenant D2D discovery and session initiation procedures with similar techniques as the ones defined in [8], where a protocol is designed to permit the inter-operator D2D communication. Without loss of generality, we consider two tenants and for each tenant we assume a number of subscribed cellular and D2D UEs (CUEs and DUEs, respectively), randomly distributed in a typical hexagonal cell layout. Each DUE is considered to be communicating in a maximum allowed distance with a peer that belongs to different tenant. Based on this topological modelling, we propose an integer linear programming (ILP) optimization framework that aims at maximizing the sum-rate performance of the involved inter-tenant D2D links while retaining the cellular UEs’ QoS requirements of the involved tenants above a predefined performance threshold. To the best of our knowledge, this is the first paper that deals with the inter-tenant D2D communication optimization in virtualization-enabled networks.
The structure of this paper is as follows: Section 2 quotes a number of significant, closely related work on the issue of D2D virtualization. In Section 3, the system model that considers the integration of inter-operator (inter-tenant) D2D communications is initially described. Then, we proceed by formulating the sum-rate maximization problem for this communication paradigm. Section 4 illustrates the performance that is achieved based on this optimization methodology and compared to legacy techniques. Finally, concluding remarks are provided in Section 5.
In order to efficiently leverage the radical merits that D2D offers, the interference patterns that are being developed due to the resource reuse need to be limited. To this direction, several works within the literature have been elaborating on devising efficient resource allocation and mode selection techniques for D2D communications that mainly aim at improving network throughput as well as spectrum efficiency [9]. Optimal usage of the available radio resources is a well-known nonlinear NP-hard problem that becomes even more complex with the integration of D2D communications that underlay the cellular network [10]. For this reason, a common practice has been to devise low-complexity, heuristic algorithmic solutions or to relax part of the constraints (e.g. power or resource block allocation related) and propose sub-optimal techniques for D2D-aware resource allocation [10, 11].
So far, the problem of inter-operator D2D communication is inadequately explored, thus it needs to be carefully encountered in order to harvest the business dynamics of this specific communication type. To the best of our knowledge, the only existing work on this particular topic is [12]. Therein, the authors propose the allocation of inter-operator D2D communications over dedicated licensed radio resources (overlay D2D) which the different operators have to negotiate between each other about the amount of spectrum that they will finally dedicate. They formulate this problem as a game between two distinct mobile network operators and decide about the offered spectrum with a best response method that runs in a sequential manner. Compared to it, our approach differs in that we consider a virtualized RAN infrastructure where inter-operator D2D links can utilize the whole available spectrum (underlay as opposed to overlay) to achieve efficient resource sharing other than sum-rate maximization.
However, even the dynamics of intra-operator D2D communications in RAN virtualized ecosystems are barely explored in up-to-date literature. One of the first efforts towards this direction is the work in [13], where the authors address the problem of network state information (NSI) imperfectness in virtual wireless networks and resource allocation for the software-defined D2D connections. They devise a discrete stochastic optimization formulation to the problem of resource sharing given imperfect NSI and, then, proceed with the introduction of stochastic approximation algorithms for both static and varying channels resource manageability. Further, our work in [14] considered the virtualization of the resources offered by different mobile virtual network operators (MVNOs) in order to support and improve the performance of intra-MVNO D2D connections in the uplink scenario. The problem was formulated as an ILP sum-rate maximization problem, based on the constraint that the allocated resources per D2D should be contiguous. Heuristic proposed methods were also included as low-complexity solutions.
Virtualization of the core as well as the radio access network is envisioned as the de-facto way forward for 5G networks since it can provide higher degree of flexibility to the mobile network operator, whilst with a careful design it can reduce overall network cost [15, 16]. A preliminary study as with respect to use cases and requirements has also been defined within the 3GPP [17]. Also, important architectural aspects have also been discussed in order to support such advanced mechanisms [18]. Finally, under the assumption of a virtualized mobile network, the work in [19] considers the issue of resource allocation for D2D nodes via a non-linear optimization framework but does not consider the issue of inter-tenant D2D resource optimization.

3 System model

3.1 Preliminaries

The studied hexagonal cell area consists of a center-located RAN virtualized BS equipped with omni-directional antennas and a number of cellular users and D2D links uniformly distributed. Part of the distributed cellular and D2D users are assumed to belong to a specific tenant and are served by its designated slice, whereas the rest of them are subscribed to a second tenant, hence, a separate slice is dedicated to serve them. Note that, without loss of generality, we hereafter assume the existence of two tenants. Figure 3 depicts the described scenario where intra and inter-slice/tenant D2D communications can take place. The establishment of D2D communication is out of the scope of this paper. Briefly, intra-operator D2D session setup is carried out by the session initiation protocol (SIP) discussed in [20], whereas the establishment and realization of the inter-operator D2D connection is detailed in [8].
As already mentioned in Section 1.1, each tenant is assigned with a slice that will provide, inter alia, spectrum allocation in order to fulfill the expected demand from the serving users. Quantitative, this translates to a number of resource blocks (RBs) which constitute the available resource pool of the users that are subscribed to specific tenant. Considering the legacy procedure, in order to support a D2D link between two users (intra or inter-operator), the resources used for it are allocated only from the RB pool that corresponds to the user that inaugurates the direct communication. However, in this work, we leverage the ability of an inter-slice manager to fuse the available RB pools of multiple tenants in order to enlarge the spectrum availability for inter-operator D2D links (Fig. 2).
Following the principles of D2D cellular spectrum reusability in the underlay notion, D2D users are able to utilize the resources of multiple cellular users simultaneously [21]. However, it is important to ensure that the cellular transmissions whose resources are being reused by a D2D pair satisfy their QoS minimum requirements. For ease of comprehension, we presume that cellular users primarily occupy one but orthogonal radio resource based on the LTE specifications.

3.2 Problem definition

The reason why we consider this multi-tenant unified RB pool is to increase the resource efficiency for cross-tenant D2D links which are expected to be a significant part of future network connections. This will not only lead to effective usage of the available spectrum, but also improve the overall network performance by potentially increasing throughput and reducing interference. To this direction, an integer linear programming (ILP) optimization solution is proposed to maximize the sum-rate for inter-slice D2D links by respecting at the same time the cellular transmissions’ performance not to degrade below a predefined threshold.
Before we formulate the D2D sum-rate optimization problem, the following sets need to be defined:s
  • \(\mathcal {I}\) is the set of distributed cross-tenant D2D links; \(\mathcal {I} = \{1, 2, ...., I\}\).
  • \(\mathcal {C}\) is the set of cellular UEs; \(\mathcal {C} = \{1, 2, ...., C\}\).
  • \(\mathcal {N}\) is the set of tenants; \(\mathcal {N} = \{1, 2, ...., N\}\).
  • \(\mathcal {K}\) is the set of available resources; \(\mathcal {K} = \{1, 2, ...., K\}\).
\(\mathcal {C}\) contains all the cellular users that belong to different tenants and are consequently served by separate slices It can be represented as follows: \(\mathcal {C} = \mathcal {C}_{1} \cup \mathcal {C}_{2} \hdots \mathcal {C}_{N}\), where \(|\mathcal {C}_{j}| < C, ~\forall j \in \mathcal {C}\). Similarly, regarding the fused set of resource blocks (RBs) \(\mathcal {K}\), it consists of all tenants’ radio resources, so it can be written as \(\mathcal {K} = \mathcal {K}_{1} \cup \mathcal {K}_{2} \hdots \mathcal {K}_{N}\), where \(|\mathcal {K}_{n}| < K, ~\forall n \in \mathcal {N}\).
Further, we need to introduce the binary decision variable that indicates if a D2D link \(i \in \mathcal {I}\) utilizes a specific RB k that belongs to one of the tenants’ available resource pool. This can be mathematically represented as:
$$ x_{ink} = \left\{\begin{array}{ll} 1, & \text{if D2D link } i \text{ uses RB } k \text{ of tenant } n \\ \\ 0, & \text{otherwise} . \end{array}\right. $$
(1)
We further proceed with some important system model admissions to pave the way for the problem formulation. First, the path-loss is modeled as follows:
$$\begin{array}{@{}rcl@{}} PL_{\text{D2D}} &=& 148 + 40\log_{10}d \end{array} $$
(2)
$$\begin{array}{@{}rcl@{}} PL_{\text{CUE}} &=& 128.1 + 37.6\log_{10}d \end{array} $$
(3)
for D2D pairs and cellular users, respectively [22], [23]. Parameter d stands for the Euclidean distance and is expressed in kilometers (Km). Additionally, the signal-to-interference-plus-noise-ratio (SINR) at the D2D receiver of link i that uses RB k = k d of tenant n needs to be satisfied. If we denote by \(\gamma _{ink_{d}}\) this value which translates for the receiver’s need to correctly decode transmitted packets, this constraint can be practically expressed as follows:
$$ \gamma_{ink_{d}} = \frac{ h_{ii}^{nk_{d}} P_{d}}{\sum\nolimits_{n \in \mathcal{N}} \sum\nolimits_{k \in \mathcal{K}} x_{ink}h_{ci}^{nk} P_{c}+I+\sigma^{2}} \geq \gamma_{\text{th}} $$
(4)
where \(h_{ii}^{nk_{d}}\) is the link gain (path-loss and slow fading dependent) of the i th D2D pair, and P d is the transmission power of the D2D transmitter over this RB. In the denominator, \(h_{ci}^{nk}\) expresses the link gain between the transmitting cellular user equipment (CUE) c and the receiver of D2D link i when using RB k of tenant n (CUE-D2D interference will be developed when k = k d and x i n k =1). As it will be mentioned in the sequel, we consider that D2D links will be using orthogonal RBs among each other, i.e. the received interference of the D2D links will be only deriving from cellular UEs (and vice versa). Lastly, σ 2 denotes the lump sum power of background/thermal noise and I the co-channel interference from other cells (if existent). In that case, we assume that inter-cell interference can be controlled via the application of powerful inter-cell interference cancellation (ICIC) techniques, thus, we are focusing on a single-cell scenario (I=0) where the main part of interference (i.e. intra-cell) is effectively captured.
The SINR threshold (\(\tilde {\gamma }_{\text {th}}\)) needs to be also satisfied for the cellular transmissions that utilize the same RB (e.g. k = k c ) with a D2D link i during the uplink session. This constraint can be written as follows:
$$ \frac{h_{cb}^{nk_{c}} P_{c}}{{\sum}_{i \in \mathcal{I}} {\sum}_{n \in \mathcal{N}}{\sum}_{k \in \mathcal{K}} x_{ink}h_{ib}^{nk} P_{d}+I+\sigma^{2}} \geq \tilde{\gamma}_{\text{th}} $$
(5)
where P c is the transmission power of a cellular user, \(h_{cb}^{nk}\) is the link gain between the CUE c that belongs to tenant n and its associated BS b when using RB k, whereas \(h_{ib}^{nk}\) accounts for the link gain between the D2D transmitter of link i and the BS b that transmit/receive over the same channel k.
Considering the above definitions, the achievable rate for D2D link i that utilizes RB k of n tenant can be calculated according to the well-known Shannon capacity formula:
$$ r_{ink} = B_{\text{RB}} \log_{2} \left( 1 + \gamma_{ink} \right) $$
(6)
where B RB is the LTE-based resource block bandwidth (180 kHz) and γ i n k is expressed in power ratio.
Lastly, even though we focus on the uplink scenario where communications happen according to the SC-FDMA principles, we herein consider that the RBs allocated per user can be non-adjacent ([24]) as the evolution of LTE towards 5G systems will eventually enable fully non-contiguous allocation. Considering this, we will practically provide an upper bound of the D2D-based rate performance. Following the previous admissions, the sum-rate maximization problem for cross-tenant D2D communications can be formulated as follows:
$$\begin{array}{@{}rcl@{}} && \underset{x}{\max} \sum\limits_{i \in \mathcal{I}} \sum\limits_{n \in \mathcal{N}} \sum\limits_{k \in \mathcal{K}} r_{ink} x_{ink}\\ \text{s.t.} &&~ \sum\limits_{i \in \mathcal{I}} \sum\limits_{n \in \mathcal{N}}\sum\limits_{k \in \mathcal{R}} x_{ink}h_{nk}^{ib}P_{d} \tilde{\gamma}_{\text{th}} \leq \end{array} $$
(7)
$$\begin{array}{@{}rcl@{}} &&- \Big(\tilde{\gamma}_{\text{th}}(W + I) - h_{nk_{c}}^{cb}P_{c} \Big), \forall c \in \mathcal{C}, ~ k_{c} \in \mathcal{K} \end{array} $$
(7a)
$$\begin{array}{@{}rcl@{}} && \sum\limits_{n \in \mathcal{N}} \sum\limits_{k \in \mathcal{K}} r_{ink} x_{ink} \geq r_{i}^{\text{th}}, ~ \forall i \in \mathcal{I} \end{array} $$
(7b)
$$\begin{array}{@{}rcl@{}} && \sum\limits_{n \in \mathcal{N}} \sum\limits_{k \in \mathcal{K}} x_{ink} \geq 1, ~ \forall i \in \mathcal{I} \end{array} $$
(7c)
$$\begin{array}{@{}rcl@{}} && \sum\limits_{n \in \mathcal{N}} \sum\limits_{k \in \mathcal{K}} x_{ink} \leq L_{\max}, ~ \forall i \in \mathcal{I} \end{array} $$
(7d)
$$\begin{array}{@{}rcl@{}} && \sum\limits_{i \in \mathcal{I}} x_{ink} \leq 1, ~ \forall n \in \mathcal{N}, \forall k \in \mathcal{K} \end{array} $$
(7e)
$$\begin{array}{@{}rcl@{}} && x_{ink} \in \{0,1\}, ~ \forall i \in \mathcal{I}, ~ \forall n \in \mathcal{N}, ~ \forall k \in \mathcal{K} . \end{array} $$
(7f)
Constraint (7a) ensures that each cellular transmission’s SINR doesn’t fall below a predefined value \(\tilde {\gamma }_{\text {th}}\), whereas (7b) guarantees the minimum rate requirement for each D2D link \(i \in \mathcal {I}\). Constraints (7c) and (7d) account for the radio resource allocation of each D2D link; the former ensures that each D2D pair will be assigned with at least one RB to satisfy its transmission needs, whereas the latter upper bounds the resources used by each link to \(L_{\max }\) to avoid any resource deficiency for some D2D UEs (DUEs). Then, the restriction that each RB can be used by only one D2D link is realized by (7e). Finally, (7f) denotes the binary nature of the decision variable.
Finally, it is obvious that the overall rate achieved by a D2D link i is \( r_{i}^{\text {tot}} = {\sum }_{n \in \mathcal {N}} {\sum }_{k \in \mathcal {K}} r_{ink} x_{ink}\) and depends on the value assignment of the decision vector x that solves this optimization problem.

4 Numerical investigations

In this section, a set of evaluation results is provided to shed light on the performance of the proposed inter-tenant D2D sum-rate optimization problem compared to legacy approaches and heuristic solutions.

4.1 Compared methodology

In this subsection, a number of different D2D-based resource allocation techniques for inter-tenant communications are briefly described. These techniques constitute the compared methodology through which the results to follow are produced.
1.
Inter-tenant optimal: The proposed method was detailed in Section 3.2. As previously explained, it yields optimal sum-rate performance for inter-tenant D2D users via a powerful ILP solution that virtually fuses the provided to the tenants RB pools and orchestrates the links’ resource assignment.
 
2.
Inter-tenant heuristic: Complementary to the previous technique, a heuristic algorithm is proposed to seek for a low-complexity, near optimal solution for D2D users that belong to different tenants. One of its chief characteristics is that it tries to achieve a fairly balanced, inter-slice resource allocation by sequentially running for D2D receivers that belong to different tenants. Its resource assignment rationale is based on allocating the resource blocks that provide the best channel conditions to each D2D link (in a sorted way) following the aforementioned sequential mode. Herein, it has to be noted that in order for some RB to be assigned to a D2D link, first, it must be an unallocated one (among D2Ds) and second, not to degrade the performance of the cellular uplink transmission that utilizes the same RB. Then, the algorithm iterates over and over, until one of the following conditions is violated: (i) all D2D users reach their upper RB usage limit (i.e. \(L_{\max }\) used RBs), (ii) the fused RB pool is fully utilized by the active D2D transmissions, or (iii) DUEs’ SINR requirements over the remaining RBs are not satisfied. The explained method is outlined in Algorithm 1.
 
3.
Intra-tenant optimal: With this technique, problem (7) is decoupled into two separate resource allocation problems for the two different tenants. This means that each tenant solves separately the sum-rate optimization problem for its subscribed D2D users that initiate direct peer communications, based on its corresponding dedicated slice resources. Due to the restricted RB availability for the different tenants, this method, even though it is able to provide optimal sum-rate performance from each tenant’s side, it is expected to provide a sub-optimal solution in overall.
 
4.
Intra-tenant heuristic: Depending on the number of DUEs that are subscribed to a specific tenant and initiate a number of inter-slice connections, this tenant is the one to provide the corresponding direct communications with the suitable RB pool to satisfy their transmission needs. To this end, each one of the tenants allocates resources to the corresponding D2Ds in a greedy and sorted manner according to best-given channel conditions. This method is similar to the inter-tenant heuristic approach but again is decoupled as it needs to be solved by each different tenant for the subscribed users.
 

4.2 Simulation setup

The considered system was modeled in MATLAB, following the LTE-A milestones and corresponding network parameters and standards. All the produced results derived after averaging over 1000 Monte Carlo simulations which have been executed on a Intel(R) Core(TM) i7-6500 at 2.50 GHZ and 8 GB RAM machine.
Regarding the topology, it consists of a hexagonal single cell with randomly distributed cellular users and D2D links. Each D2D link consists of two users that are assumed to belong to different tenants. Also, the number of cellular users being subscribed to different tenants is varying and considers the tenants’ disparities in terms of number of subscriptions. Without loss of generality, two tenants, A and B, with separate slices are considered. All simulation parameters are listed in Table 1.
Table 1
Simulation Parameters
Parameter
Value
Cell layout
Hexagonal grid
Number of tenants (\(\mathcal {N}\))
2
CUEs-D2Ds distribution
Uniform
Macro cell radius
400m
Maximum D2D link range
100 m
Number of CUEs (C)
50
Number of D2D links (I)
[10,40]
D2D Path-Loss model
148+40 log10d
CUE-BS Path-Loss model
128.1+37.6 log10d
Maximum CUEs’ power
20 dBm
Maximum DUEs’ power
15 dBm
Maximum number of RBs (\(L_{\max }\))
4
Shadowing standard deviation
8 dB
Noise power spectral density
−174 dBm/Hz
System bandwidth (B W)
10 MHz

4.3 Results

Due to the load discrepancies and divergent number of subscriptions that might characterize the two or more tenants (either MVNOs or MNOs), the slice that each one is assigned with is expected to be different (i.e., having heterogeneous slices). Popular tenants can be normally allocated with more resources to serve the high number of subscribed users compared to less popular ones. To this end, we consider the case where a popular tenant (hereafter denoted as tenant A) is allocated with double-sized RB pool to serve its subscribers. Initially, we assume that for both tenants all the radio resources are occupied by a number of cellular UEs according to a Round Robin scheduling. Figure 4 depicts the sum-rate performance for inter-tenant (inter-slice) D2D links in relation to varying number of them. On average, almost 11.3 % sum-rate gain is achieved by making use of the fused RB pools of the two tenants (inter-tenant optimal) compared to the case that a D2D link can be assigned resources only from the resource pool that belongs to the slice to which the user that initiates the direct communication is subscribed (intra-tenant optimal). The maximum performance gap among the illustrated scenarios is met in the case of 16 D2D links, where 12.5 % higher sum-rate is achieved with the inter-tenant optimization solution. Further, compared to the heuristic inter-tenant approach, the optimal solution is averagely 8.45 % better and gradually behaves better with the increase of inter-tenant D2D links’ number. Also, the intra-tenant heuristic algorithm falls short compared to the above-mentioned approaches and it exhibits a maximum of more than 18 % sum-rate degradation in comparison to the optimal solution. Last, for all the considered approaches, the sum-rate drop that is observed in the two last cases (i.e., 30 and 40 D2D links) is explained by the interference increase to/from CUEs, as the resource availability gets more restricted.
Considering the same case study, the cumulative distribution function (CDF) of the achieved SINR values for the inter-tenant D2D links is represented in Fig. 5. Indicatively, in the 50th percentile, the inter-tenant optimal solution’s SINR for D2Ds is 29.1 dBs, whereas the corresponding values for the inter-tenant heuristic, the intra-tenant optimization and the intra-tenant heuristic are 26, 25.7 and 23.8 dBs, respectively. This can be interpreted as more than 2 times higher SINR power ratio compared to the inter-tenant heuristic approach. Last, the intra-tenant optimal and intra-tenant heuristic methods’ estimated SINR is almost 2.2 and 3.4 times worse compared to the optimal value.
Then, we consider the scenario where the two tenants are characterized by the same RB availability but with different utilization levels (active cellular transmissions per case). To this direction, tenant’s A radio resources are supposed to be fully occupied by its subscribed CUEs, whereas tenant’s B resource block availability ranges from 20 % to 100 %. Figure 6 depicts the sum-rate performance of all compared methods in relation to the normalized resource utilization of tenant B. As expected, while the resource occupancy increases, the sum-rate decreases for all methods as new interference patterns between cellular and D2D users arise. However, the performance gap between the inter-tenant optimal and heuristic technique lessens with the increase of the RB occupation levels for tenant B, as opposed to the rest of the methods where the gap slightly increases. Quantifying the above observations, the inter-tenant proposed optimization formulation outperforms the rest of the algorithms in an average of almost 6.5 %, 12 % and 17.5 %, respectively. When both tenants’ RB pools are fully utilized (reaching 100 % of resource utilization), all D2D links are reusing part of the cellular spectrum that CUEs occupy. In that case, the inter-tenant optimal solution achieves its peak sum-rate gain compared to the intra-tenant methodology; a 14.3 % improvement is observed over the intra-tenant optimal and 18.7 % over the related heuristic, respectively. This result can be deemed as highly interesting because the maximum gains take place when needed, i.e., during network congestion episodes.
Further, the sum-rate performance of D2D users in relation to maximum link length is evaluated Fig. 7. By increasing the maximum allowable D2D link length, the sum-rate performance of all compared methods follows a decreasing trend. This is expected, as the increase of D2D link length implies higher SINR degradation not only due to path-loss and shadowing effects but also due to different emerging interference patterns. The performance gains become more clear for the largest values of link lengths. Therein, the inter-tenant optimization problem is almost 8.15 %, 18.9 % and 27.4 % better in terms of sum-rate when compared to inter-tenant heuristic, intra-tenant optimal and heuristic solutions, respectively. Also, on average, the inter-tenant heuristic method is the one that provides again the closest among all performance as it falls short almost 6 % in terms of throughput compared to the optimal one. Considering the rest, the optimal solution provides an average gain of almost 16 % and more than 22 % compared to the intra-tenant optimal and heuristic techniques.
Finally, in order to give a glimpse of their computational complexity, the running times of the aforementioned algorithms are listed in Table 2. It is shown that with the increase of the number of D2D inter-tenant links, the running times of all compared algorithms decrease. This can be explained by the fact that when less D2D links exist in the topology, the probability that all or many of them will utilize the maximum assignable number of resources (\(L_{\max }\)) - in order to increase as much as possible their rate performance - raises. Consequently, the number of combinations for the orthogonal assignment of D2D links increases. Although the inter-tenant optimal solution is proven to be the most complex, its running time remains in acceptable levels.
Table 2
Algorithm running times
https://static-content.springer.com/image/art%3A10.1007%2Fs11036-017-0822-0/MediaObjects/11036_2017_822_Figb_HTML.gif
I = 10
I = 20
I = 30
I = 40
Inter-tenant optimal
0.4516 s
0.0465 s
0.0392 s
0.0342 s
Inter-tenant heuristic
0.0342 s
0.0182 s
0.0086 s
0.0048 s
Intra-tenant optimal
0.0786 s
0.0412 s
0.0351 s
0.0332 s
Intra-tenant heuristic
0.0282 s
0.0204 s
0.0169 s
0.0055 s

5 Conclusions

D2D communications are expected to play a key role in emerging 5G wireless networks by unlocking a plethora of new proximity based applications while preserving the scarce wireless resources for the cellular users. Despite the fact that D2D communications received significant attention there has been limited attention to the problem where the two UEs of a D2D communication belong to different service and/or network providers. Under the assumption of full virtualized core/access networks, the paper provides an optimization framework for efficiently use of virtualized resources across different tenants enabled by a cross-tenant controller. Via a wide set of numerical investigations it has been shown that significant throughput gains of over 10 % compared to legacy solutions can be achieved for inter-tenant D2D communications. These results also reinforce the need for implementing a cross-slice coordinator, which can be considered as an extension to SDN/NFV frameworks, in order to efficiently utilize the scarce wireless resources across separate network slices.

Acknowledgments

This work, as a part of CROSSFIRE project, has received funding from European Union’s Seventh Programme for research, technological development and demonstration under grant agreement No. 317126. This work has also been performed in the framework of H2020-ICT-2014-2 project 5G NORMA. The authors would like to acknowledge the contributions of their colleagues, although the views expressed are those of the authors and do not necessarily represent the project.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Our product recommendations

ATZelektronik

Die Fachzeitschrift ATZelektronik bietet für Entwickler und Entscheider in der Automobil- und Zulieferindustrie qualitativ hochwertige und fundierte Informationen aus dem gesamten Spektrum der Pkw- und Nutzfahrzeug-Elektronik. 

Lassen Sie sich jetzt unverbindlich 2 kostenlose Ausgabe zusenden.

ATZelectronics worldwide

ATZlectronics worldwide is up-to-speed on new trends and developments in automotive electronics on a scientific level with a high depth of information. 

Order your 30-days-trial for free and without any commitment.

Footnotes
3
Open Networking Foundation, OpenFlow Switch Specification Version 1.3.2 April 25, 2013
 
4
Mark Doll, 5G NORMA “A Novel Radio Multi-service adaptive network Architecture for the 5G era”, 1 s t Sino-Europe 5G Workshop, November 2015, Beijing, China
 
Literature
1.
go back to reference 3GPP TR 36.843 (2014) Technical Specification Group Radio Access Network; Study on LTE device to device proximity services 3GPP TR 36.843 (2014) Technical Specification Group Radio Access Network; Study on LTE device to device proximity services
2.
go back to reference Tehrani MN, Uysal M, Yanikomeroglu H (2014) Device-to-Device Communication in 5G Cellular Networks: Challenges, Solutions, and Future Directions. IEEE Commun Mag 52(5):86–92CrossRef Tehrani MN, Uysal M, Yanikomeroglu H (2014) Device-to-Device Communication in 5G Cellular Networks: Challenges, Solutions, and Future Directions. IEEE Commun Mag 52(5):86–92CrossRef
3.
go back to reference Lei L, Zhong Z, Lin C, Shen X (2012) Operator controlled device-to-device communications in LTE-advanced networks. IEEE Wirel Commun 19(3):96–104CrossRef Lei L, Zhong Z, Lin C, Shen X (2012) Operator controlled device-to-device communications in LTE-advanced networks. IEEE Wirel Commun 19(3):96–104CrossRef
4.
go back to reference Kalil M, Shami A, Ye Y (2014) Wireless resources virtualization in LTE systems”, IEEE International Conference on Computer Communications (INFOCOM Workshops) Kalil M, Shami A, Ye Y (2014) Wireless resources virtualization in LTE systems”, IEEE International Conference on Computer Communications (INFOCOM Workshops)
5.
go back to reference Liang C, Yu F (2015) Wireless network virtualization: A survey, some research issues and challenges, IEEE Communication Surveys & Tutorials Liang C, Yu F (2015) Wireless network virtualization: A survey, some research issues and challenges, IEEE Communication Surveys & Tutorials
6.
go back to reference CISCO (2016) Global Mobile Data Traffic Forecast Upyear, 2015-2020, Cisco White Paper CISCO (2016) Global Mobile Data Traffic Forecast Upyear, 2015-2020, Cisco White Paper
7.
go back to reference Guerzoni R (2012) Network Functions Virtualisation: An Introduction, Benefits, Enablers, Challenges and Call for Action, Introductory white paper, SDN and OpenFlow World Congress Guerzoni R (2012) Network Functions Virtualisation: An Introduction, Benefits, Enablers, Challenges and Call for Action, Introductory white paper, SDN and OpenFlow World Congress
8.
go back to reference Phan VV, Yu L, Horneman K, Hakola S-J (2011) D2D Communications Considering Different Network Operators, Patent US20110258327 A1 Phan VV, Yu L, Horneman K, Hakola S-J (2011) D2D Communications Considering Different Network Operators, Patent US20110258327 A1
9.
go back to reference Asadi A, Wang Q, Mancuso V (2014) A Survey on Device-to-Device Communication in Cellular Networks. IEEE Commun Surv Tutorials 16(4):1801–1819CrossRef Asadi A, Wang Q, Mancuso V (2014) A Survey on Device-to-Device Communication in Cellular Networks. IEEE Commun Surv Tutorials 16(4):1801–1819CrossRef
10.
go back to reference Zhang R, Cheng X, Yang L, Jiao B (2013) Interference-Aware Graph Based Resource Sharing for Device-to-Device Communications Underlaying Cellular Networks, IEEE Wireless Communications and Networking Conference (WCNC) Zhang R, Cheng X, Yang L, Jiao B (2013) Interference-Aware Graph Based Resource Sharing for Device-to-Device Communications Underlaying Cellular Networks, IEEE Wireless Communications and Networking Conference (WCNC)
11.
go back to reference Belleschi M, Fodor G, Abrardo A (2011) Performance Analysis of a Distributed Resource Allocation Scheme for D2D Communications, IEEE Global Communications Conference (GLOBECOM) Workshops Belleschi M, Fodor G, Abrardo A (2011) Performance Analysis of a Distributed Resource Allocation Scheme for D2D Communications, IEEE Global Communications Conference (GLOBECOM) Workshops
12.
go back to reference Cho B, Koufos V, Jäntti R, Li Z, Uusitalo M (2015) Spectrum Allocation for Multi-Operator Device-to-Device Communication, IEEE International Communications Conference (ICC) Cho B, Koufos V, Jäntti R, Li Z, Uusitalo M (2015) Spectrum Allocation for Multi-Operator Device-to-Device Communication, IEEE International Communications Conference (ICC)
13.
go back to reference Cai Y, Yu F, Liang C (2014) Resource Sharing for Software Defined D2D Communications in Virtual Wireless Networks with Imperfect NSI, IEEE Global Communications Conference (GLOBECOM), December 2014 Cai Y, Yu F, Liang C (2014) Resource Sharing for Software Defined D2D Communications in Virtual Wireless Networks with Imperfect NSI, IEEE Global Communications Conference (GLOBECOM), December 2014
14.
go back to reference Vlachos C, Friderikos V (2015) Optimal Virtualized Resource Slicing for Device-to-Device Communications”, IEEE Global Communications Conference (GLOBECOM) Vlachos C, Friderikos V (2015) Optimal Virtualized Resource Slicing for Device-to-Device Communications”, IEEE Global Communications Conference (GLOBECOM)
15.
go back to reference Rost P, Berberana I, Maeder A, Paul H, Suryaprakash V, Valenti M, Wübben D, Dekorsy A, Fettweis G (2015) Benefits and Challenges of Virtualization in 5G Radio Access Networks. IEEE Communications Magazine, pp. 75–82 Rost P, Berberana I, Maeder A, Paul H, Suryaprakash V, Valenti M, Wübben D, Dekorsy A, Fettweis G (2015) Benefits and Challenges of Virtualization in 5G Radio Access Networks. IEEE Communications Magazine, pp. 75–82
16.
go back to reference Costa-Perez X, Swetina J, Guo T, Mahindra R, Rangarajan S (2013) Radio access network virtualization for future mobile carrier networks. IEEE Commun Mag 51(7):27–35CrossRef Costa-Perez X, Swetina J, Guo T, Mahindra R, Rangarajan S (2013) Radio access network virtualization for future mobile carrier networks. IEEE Commun Mag 51(7):27–35CrossRef
17.
go back to reference 3GPP TS 22.951 (2015) Technical Specification Group Services and System Aspects; Service aspects and requirements for network sharing (Release 13) 3GPP TS 22.951 (2015) Technical Specification Group Services and System Aspects; Service aspects and requirements for network sharing (Release 13)
18.
go back to reference 3GPP TR 22.852 (2014) Technical Specification Group Services and System Aspects; Study on Radio Access Network (RAN) sharing enhancements (Release 13) 3GPP TR 22.852 (2014) Technical Specification Group Services and System Aspects; Study on Radio Access Network (RAN) sharing enhancements (Release 13)
19.
go back to reference Moubayed A, Shami A, Lutfiyy H (2015) Wireless Resource Virtualization With Device-to-Device Communication Underlaying LTE Network, IEEE Transactions on Broadcasting, vol. 61, no. 4 Moubayed A, Shami A, Lutfiyy H (2015) Wireless Resource Virtualization With Device-to-Device Communication Underlaying LTE Network, IEEE Transactions on Broadcasting, vol. 61, no. 4
20.
go back to reference Doppler K, Rinne M, Wijting C, Ribeiro C, Hugl K (2009) Device-to-Device Communication as an Underlay to LTE-Advanced Networks. IEEE Commun Mag 47(12):42–49CrossRef Doppler K, Rinne M, Wijting C, Ribeiro C, Hugl K (2009) Device-to-Device Communication as an Underlay to LTE-Advanced Networks. IEEE Commun Mag 47(12):42–49CrossRef
21.
go back to reference Wang B, Chen L, Chen X, Zhang X, Yang D (2011) Resource Allocation Optimization for Device-to-Device Communication Underlaying Cellular Networks, 73 r d Vehicular Technology Conference (VTC Spring) Wang B, Chen L, Chen X, Zhang X, Yang D (2011) Resource Allocation Optimization for Device-to-Device Communication Underlaying Cellular Networks, 73 r d Vehicular Technology Conference (VTC Spring)
22.
go back to reference 3GPP TR 36.814 (2010) Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Further advancements for E-UTRA physical layer aspects 3GPP TR 36.814 (2010) Technical Specification Group Radio Access Network; Evolved Universal Terrestrial Radio Access (E-UTRA); Further advancements for E-UTRA physical layer aspects
23.
go back to reference Pang H, Wang P, Wang X, Liu F, Ngoc Van N (2013) Joint Mode Selection and Resource Allocation Using Evolutionary Algorithm for Device-to-Device Communication Underlaying Cellular Networks. J Commun (JCM) 8 (11):751–757CrossRef Pang H, Wang P, Wang X, Liu F, Ngoc Van N (2013) Joint Mode Selection and Resource Allocation Using Evolutionary Algorithm for Device-to-Device Communication Underlaying Cellular Networks. J Commun (JCM) 8 (11):751–757CrossRef
24.
go back to reference Wang H, Rosa C, Pedersen K (2015) Radio resource management for uplink carrier aggregation in LTE-Advanced, EURASIP Journal on Wireless Communications and Networking Wang H, Rosa C, Pedersen K (2015) Radio resource management for uplink carrier aggregation in LTE-Advanced, EURASIP Journal on Wireless Communications and Networking
Metadata
Title
Optimal Virtualized Inter-Tenant Resource Sharing for Device-to-Device Communications in 5G Networks
Authors
Christoforos Vlachos
Vasilis Friderikos
Mischa Dohler
Publication date
16-02-2017
Publisher
Springer US
Published in
Mobile Networks and Applications / Issue 6/2017
Print ISSN: 1383-469X
Electronic ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-017-0822-0

Other articles of this Issue 6/2017

Mobile Networks and Applications 6/2017 Go to the issue