You are on page 1of 16

Wireless Pers Commun (2017) 93:917–932

DOI 10.1007/s11277-016-3936-y

SPECIAL ISSUE: ICUFN2015

Mathematical Characteristics of Uplink and Downlink


Interference Regions in D2D Communications
Underlaying Cellular Networks

Xujie Li1,2 • Ziya Wang1 • Ying Sun1 • Yan Gu1 •

Jurong Hu1

Published online: 4 January 2017


Ó Springer Science+Business Media New York 2017

Abstract In this paper, mathematical characteristics of uplink and downlink interference


regions in device-to-device (D2D) communications underlaying cellular networks are
analyzed. We consider that one CUE and one pair of D2D user equipments (DUEs) coexist
and share uplink and downlink resources of cellular networks. The DUE pair consists of a
D2D transmitting user equipment and a D2D receiving user equipment. Therefore, addi-
tional interference between the CUE and the DUE pair is introduced. First, uplink and
downlink interference regions are defined and described. Next, mathematical character-
istics of uplink and downlink interference regions are derived. Finally, blocking probability
is formulated based on the mathematical characteristics values. The analysis results show
that uplink resources are more suitable to be shared for the CUE and the DUE pair, but the
difference between uplink and downlink is not significant. Meanwhile, the simulation
results show that theoretical values of blocking probability well match simulation results.
The results can provide a theoretical foundation for resource allocation and optimization of
D2D communications.

Keywords D2D  Mathematical characteristics  Interference  Cellular networks

1 Introduction

In recent years, wireless data traffic has dramatically increased with the emergence of
smart phones and various new applications. Therefore, wireless spectrum resource is
becoming increasingly scarce with the rapid development of wireless communications

& Xujie Li
lixujie@hhu.edu.cn
1
College of Computer and Information Engineering, Hohai University, Nanjing 210098, China
2
Hubei Key Laboratory of Intelligent Wireless Communications, South-Central University for
Nationalities, Wuhan 430074, China

123
918 X. Li et al.

[1, 2]. Device-to-device (D2D) communication can effectively improve resource utiliza-
tion in cellular networks. In D2D communications underlaying cellular networks, a pair of
D2D user equipments (DUEs) can transmit data to each other over a direct link by reusing
cellular resources [3].
Interference is an important issue of D2D communications. There are two kinds of
interferences in D2D communications: DUE to cellular user equipment (CUE) and CUE to
DUE. Currently, many papers focus on how to mitigate the additional interference. In [3], a
method of controlling the maximum transmit power of DUEs is proposed to suppress the
additional interference. In [4], an efficient power control scheme to obtain the upper bound
of D2D transmit power is proposed, but the authors only consider the signal to interference
plus noise ratio (SINR) threshold of CUE and ignore the SINR threshold of the DUE. The
paper [5] proposes a scheme to accommodate multiple D2D pairs in cellular systems. In
this scheme, interference among D2D pairs is well controlled since neighbors are divided
into different groups and the neighbor division is based on interference evaluation. In [6],
an interference-limited area control scheme is proposed in order to achieve the purpose of
mitigating the interference between CUEs and DUEs. In [7], the performance degradation
of the cellular LTE uplink in the presence of interference from in-band (underlay) D2D
communications is evaluated. In [8], a performance investigation of both beamforming and
interference cancellation strategies for D2D communications with an M-antenna base
station is presented and analyzed. In [9], a D2D resource allocation method based on the
reuse of primary uplink resources is proposed to guarantee both a fixed quality of service
(QoS) for D2D communication as well as the assigned QoS for cellular communications.
In most papers, sharing of uplink cellular resources is analyzed. Recently, sharing of
downlink cellular resources with perfect power-control scheme is also studied [10–12].
However, few work focus on the analysis of mathematical characteristics of interference
regions where the UEs are affected by the additional interference so seriously that they
cannot be allowed to access the network. System performance is closed related to math-
ematical characteristics of interference regions which include uplink and downlink inter-
ference regions. Therefore in this paper, we aim to derive mathematical characteristics of
uplink and downlink interference regions, such as probability density function (PDF),
mean and variance. Based on the mathematical characteristics of interference regions,
blocking probability is obtained. This derived evaluation approach can be applied for the
design and optimization of D2D communications.
The rest of this paper is organized as follows. In Sect. 2 we elaborate our system model.
We get mathematical characteristics of uplink and downlink interference regions in
Sect. 3. Simulation results are presented in Sect. 4, and the conclusion is drawn out in
Sect. 5.

2 System Model

2.1 Network Model

In cellular networks such as frequency division duplex long term evolution (FDD-LTE), at
most one CUE can be allocated to a single sub-channel in general. Let us consider a single
cellular network, where one D2D pair shares uplink or downlink resources with one CUE,
as illustrated in Fig. 1. Every DUE pair consists of a D2D transmitting user equipment
(DTUE) and a D2D receiving user equipment (DRUE). Meanwhile, we consider that the

123
Mathematical Characteristics of Uplink and Downlink... 919

DTUE
DRUE DRUE

d r r
l
CUE l CUE
r
DTUE d
r r r

(a) (b)
Fig. 1 System model of D2D communications underlaying cellular networks. a Uplink. b Downlink

CUE and the DTUE follow a uniform distribution in the cell with the radius of R and the
DRUE uniformly locates in the circle with center at the DTUE and radius equal to L (the
allowed maximum communication distance for D2D communications). Next, we assume
that the inter-cell interference control mechanisms is effectively managed [13]. Therefore,
we mainly focus on the interference due to the coexistence of CUE and the DUE pairs.

2.2 Interference Analysis

For tractability, the noise power is usually negligible [14]. Taking uplink interference as an
example, the received SINR for the CUE can be written as
Pt0 =r0a
b ð1Þ
Pt1 =r1a
where Pt0 is the transmitting power of the CUE, Pt1 is the transmitting power of the DTUE,
r0 is the distance between the CUE and the base station (BS), r1 is the distance between the
DTUE and the BS, b is SINR threshold, a is a path loss exponent.
Similarly, the received SINR for the DRUE is given by
Pt1 =la
b ð2Þ
Pt0 =d a
where l is the distance between the DTUE and the DRUE, d is the distance between the
DRUE and the CUE. Similarly, the downlink interference can be easily obtained.

2.3 Definitions of Interference Regions and Blocking Probability

2.3.1 Interference Regions

In D2D communications, we must guarantee normal communication of the CUE firstly.


The DUE pair is allowed to access the network when and only when the CUE and the DUE
pair still can meet their QoS if the DUE pair has been allowed to access the network. In

123
920 X. Li et al.

other words, to guarantee the QoS of the CUE, the DUE pair cannot be allowed to access
the network in some areas where it introduces too much interference. We define the area
where the DUE pair cannot be allowed to access the network as interference regions which
include uplink and downlink interference regions. Uplink and downlink interference
regions are denoted as Uu and Ud respectively. Obviously, the uplink interference region is
a circular area with a center of the CUE and radius Ru , and downlink interference region is
a circular area with a center of the BS and radius Rd , as shown in Fig. 2.

2.3.2 Blocking Probability

In D2D communications, we must guarantee QoS of the CUE and the DUE pair. We define
the probability that the CUE and the DUE pair cannot simultaneously meet their necessary
QoS as blocking probability.

3 Mathematical Characteristics Analysis

In this section, mathematical characteristics of uplink and downlink interference regions


are derived. Next, blocking probability is obtained.
Lemma 1 During uplink period, to guarantee QoSs of the CUE and the DUE pair, there
2
is the relationship Ru r1  ba lr0 .
Proof From formula (1), we have
Pt0 ra
 b 0a ð3Þ
Pt1 r1
From formula (2), we can get

l r r l
Ru
r r Rd
Uu
R r R
r

Ud

(a) (b)
Fig. 2 The interference regions. a Uplink. b Downlink

123
Mathematical Characteristics of Uplink and Downlink... 921

Pt1 la
b a ð4Þ
Pt0 Ru
Rau ra 2
To guarantee the feasible solution, we must have bla  b r0a . Hence Rau r1  ba lr0 .
1
2
ba lr0
From Lemma 1, we have Ru  r1 . Obviously the radius Ru of uplink interference
2
ba lr0
region is equal to r1 .

Lemma 2 During downlink period, to guarantee QoSs of the CUE and the DUE pair,
2
there is the relationship Rd jr1  r0 j  ba lr0 . Here jr1  r0 j is the distance between the CUE
and the DTUE.
Proof From Lemma 1, it is easy to get the result.

3.1 Mathematical Characteristics

3.1.1 Uplink Interference Region


(
 2 lnLk
2

Lemma 3 Let k ¼ lr0


. Then PDF of k is f ðkÞ ¼ 2L2 þ 4L1 2 0  k  L2
r1 L
4k2 k  L2

Proof See Appendix 1.


8
< 2gðln Lln4 Ru þa ln bÞ þ
> 2 2
Ru
4 0  Ru  ba L
Proposition 1 The PDF of Ru is f ðRu Þ ¼ ba L2 2ba L2
> 4
: ba L32 2

2Ru Ru  ba L

Proof From Lemma 3, it is easy to get the result.


2
Corollary 1 The mathematical expectation of Ru is 89 ba L.
2 2
Proof As mentioned above, Ru is equal to b rlr1 0 . Let G ¼ b rlr1 0 . Here l, r0 , r1 are random
a a

variables. Meanwhile, they are independent of each other. So mathematical expectation of


G is obtained as
Z 1 Z ba L
2 Z 1
EðGÞ ¼ gf ðgÞdg ¼ gf ðgÞdg þ 2
gf ðgÞdx
0 0 ba L
Z 2   ! Z 4
ba L 1
2g ln L  ln g þ 2a ln b g ba L2
¼ g 4 þ 4 dg þ g dx
0 b L2 a 2b L2a
2
ba L 2g3
8 2
¼ ba L
9

4
Corollary 2 The mean-square value of Ru is approximately equal to 12 ba L2 ln R.

Proof The mean-square value of Ru is given by

123
922 X. Li et al.

2 !2 3
2
 2 ba lr
0
E Ru ¼ E 4 5 ð5Þ
r1

Meanwhile l, r0 and r1 are independent of each other. Then we have


 
 2 4   
2 2
 1
E Ru ¼ b E l E r0 E 2
a ð6Þ
r1
We have got the PDF of l, r0 and r1 above. However in this case, it is hard to get the
feasible solution of E r12 . In reality, there is some distance between the BS and the UE
1
due to the height of the base station. Therefore, we assume that the UEs locate in the
annulus and follow a uniform distribution. Without loss of generality, we consider that the
inner radius and outer radius are 1 and R (m) respectively. We revise the PDF of r0 , r1 , l as
 2x
2 1xR
fr0 ðxÞ ¼ fr1 ðxÞ ¼ R 1 ð7Þ
0 otherwise
 2x
L2 1 1xL
fl ðxÞ ¼ ð8Þ
0 otherwise
Hence
Z
  R
2x 1 
E r02 ¼ x2 dx ¼ R2 þ 1 ð9Þ
1 R2  1 2
  1 
E l2 ¼ L2 þ 1 ð10Þ
2
 
1 2 lnðRÞ
E 2 ¼ 2 ð11Þ
r1 R 1
Finally we get
   
4     1
2 2 2
E RUC ¼ b E l E r0 E 2
a
r1
4 1  1  2 lnðRÞ ð12Þ
¼ ba  L2 þ 1  R2 þ 1  2
2 2 R 1
1 4a 2
 b L ln R
2

Here L2  1 and R2  1.
4
Corollary 3 The variance of Ru is ba L2 ðln2R  64
81Þ.

Proof The variance of Ru is written as


 
 2 2 4
2 ln R 64
VðRu Þ ¼ E Ru  E ðRu Þ ¼ b L
a  ð13Þ
2 81

123
Mathematical Characteristics of Uplink and Downlink... 923

3.1.2 Downlink Interference Region


2
Proposition 2 Then PDF of Rd is approximate to f ðRd Þ ¼ 4R2a d2r
b L
4 2
a
4 2
a
!
4  b 2L 2  b 2L 2
ba L2
2R2d r2
e 2R r
d þe 2R r
d  1 . Here r2  1:0836.

Proof See Appendix 2.


pffiffiffiffi 2
2pba L
Corollary 4 The mathematical expectation of Rd is 3r (r2  1:0836).

Proof As mentioned above, the radius Rd of downlink interference region is equal to


2
ba lr0
jr1 r0 j. Now let X ¼ r0 , Y ¼ r1 and K ¼ l. Based on the proof of Proposition 2, we let
2 2
K 1
Rd ¼ ba  jXY j=X ¼ b  K  Z . Then we have
a

Z L Z L
2 2 1
EðRd Þ ¼ ba  EðkÞ  Eð1=zÞ ¼ ba kf ðkÞdk f ðzÞdz
0 0 z
pffiffiffiffiffiffi pffiffiffiffiffiffi 2 ð14Þ
2 2L 2p 2pba L
¼b  
a ¼
3 2r 3r

Corollary 5 The mean-square value of Rd is approximately equal to


1 4a 2 1
ðln R þ ln r þ 12 ðln 8  CÞÞ. Here C  0:5772.
2 b L r2

Proof The mean-square value of Rd is given by


2 !2 3
2
 2 b a lr
E Rd ¼ E 4
0 5 ¼ b4a  E2 ðkÞ  E2 ð1=zÞ ð15Þ
jr1  r0 j

Here, k, z are independent of each other. We have got the PDF of k and z above.
However in this case, it is hard to get the feasible solution of E2 ð1z Þ. In reality, there is some
distance between the BS and the UE due to the height of the BS. So is the distance between
the CUE and the DUE pair. Therefore, we assume that the UEs locate in the annulus and
follow a uniform distribution. Without loss of generality, we assume the minimum distance
is 1 (m). Therefore, for variable k, the integral interval approximately shrinks into 1/2 R
and R. Then we can get
Z R
  4 1 4 1
E R2d ¼ ba  E2 ðkÞ  E2 ð1=zÞ ¼ ba L2 f ðzÞdz
2 Z
2 1=2R z
     ð16Þ
1 4 1 1 R2 1 1
¼ ba L2 2 Ei  2  Ei  2 2
2 r 2 2r 2 2r 2R
R x et
Here EiðxÞ ¼ 1 t dt. When x  1, we have EiðxÞ  0. So we can get
  4
E R2d  12 ba L2 r12 ð 12 Eið 2r212R2 ÞÞ.

123
924 X. Li et al.

P
1
xk
Meanwhile, we have EiðxÞ ¼ C þ lnðxÞ þ kk! when x\0. Here, C is the Euler
k¼1
constant (C  0:5772). When jxj 1, we have
EiðxÞ ¼ C þ lnðxÞ þ oðxÞ  C þ lnðxÞ ð17Þ

Finally, we have
  
  1 4 1 1 1
E R2d  ba L2 2  Ei  2 2
2 r 2 2r 2R
  ð18Þ
1 4a 2 1 1
 b L 2 ln R þ ln r þ ðln 8  CÞ
2 r 2
4
ba L2 1
Corollary 6 The variance of Rd is r2 ð2 ln R þ 12 ln r þ 14 ðln 8  CÞ  2p
9 Þ.

  4 2
VðRd Þ ¼ E R2d  E2 ðRd Þ ¼ brL2
a
Proof The variance of Rd is written as
1 1 1 2p

2 ln R þ 2 ln r þ 4 ðln 8  CÞ  9 .

3.2 Blocking Probability


4
25p2
Proposition 3 The blocking probability is approximate to 256 ba ðRLÞ2 .

Proof In D2D communications, the DRUE is denied to access the network if the distance
between the CUE and the DRUE is less than Ru . In Sect. 2.2, we have described the rela-
tionship among d, r1 , l and r0 , as shown in Fig. 1. As long as the relationship is satisfied, the
CUE and the DUE pair can simultaneously meet their QoS. So the blocking probability of the
DRUE also means the probability that the CUE and the DUE pair cannot simultaneously meet
their QoS. In other words, blocking probability is the probability that the DRUE locates in the
interference regions. As mentioned above, the DRUE uniformly locates in the circle with
center at the DTUE and radius equal to L. However, we cannot obtain the closed form solution
of distribution function of the DRUE in the network. Therefore, we consider that the distri-
bution function of the DRUE approximate a uniform distribution. Next, we denote the dis-
tance between any two points in the cell with the radius of R as x. Then we have
R R R R R p pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
r0 2 þ r2 2  2  r0  r2  cosðhÞdhdr0 dr2
x ¼ EðxÞ ¼ 0 0 0 RR RR Rp
0 0 0 dr0 dr2 dh
Z R Z R Z p pffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
1 ð19Þ
¼ 2 r0 2 þ r2 2  2  r0  r2  cosðhÞdhdr0 dr2
pR 0 0 0
128
¼ R
45p
The probability that the DRUE locating in interference regions is given by
 2 2
pE2 ðRu Þ
8 a
b L 2 4  2
P ¼ 2 ¼ 9128 2 ¼ 25p a L
256 b R .
pl ð45pRÞ
Remark 1 Whether uplink or downlink, blocking probability is only related to distance
relations. Because uplink and downlink have the same distance relations, they have same
blocking probability.

123
Mathematical Characteristics of Uplink and Downlink... 925

4 Numerical Results and Discussion

In this section, we discuss some important observations obtained from the simulation results.
In our simulations, we assume that the CUE and the DTUE follow a uniform distribution in
the cell with the radius of R and the DRUE uniformly locates in the circle with center at the
DTUE and radius equal to L. Monte Carlo method is adopted in our simulations. Simulation
parameters are summarized in Table 1. The value of the path loss factor a varies depending on
the environment. In multipath environments, a is generally equal to 4. Next, the PDF of Ru and
Rd with different L are given in Figs. 3 and 4 respectively and blocking probability got by
simulations is compared with its theoretical value in Fig. 5. In Figs. 3 and 4, it can be seen
that the PDF of Ru and Rd are more compact if L is smaller. It means that the influenced area by
the interference is larger when L is bigger. The reason is that the DTUE needs bigger
transmitting power so as to get the necessary QoS. Meanwhile, the CUE or the BS must
increase their transmitting powers to overcome the additional interference from the DTUE.
Therefore, to simultaneously meet the QoS of the CUE and DUE pair, the interference regions
get larger with the increasing of L. Meanwhile, the PDF of Rd has a broader main lobe and
bigger mathematical expectation compared with that of Ru . We can get that uplink resources
are more suitable to be shared for the CUE and the DUE pair, but the difference between
uplink and downlink is not significant.
It can be seen that theoretical values of blocking probability well match the simulation
results from Fig. 5. The reason for the difference is that we assume the distribution

Table 1 Simulation parameters


Parameter Value Parameter Value

Cell radius (R) 500 m SINR threshold (b) 6 dB


Path loss factor (a) 4 Runing time 100,000

0.05
L=20
0.045 L=30
L=50
0.04 L=100

0.035
Probability

0.03

0.025

0.02

0.015

0.01

0.005

0
0 50 100 150
d

Fig. 3 The PDF of Ru

123
926 X. Li et al.

0.07
L=20
0.06 L=30
L=50
probability 0.05 L=100

0.04

0.03

0.02

0.01

0
0 50 100 150
d

Fig. 4 The PDF of Rd

0.16

0.14

0.12
Blocking Probability

0.1

0.08

0.06

0.04

0.02 Simulation Value


Theoretical Value
0
10 20 30 40 50 60 70 80 90 100
L

Fig. 5 The blocking probability versus L

function of the DRUE approximates a uniform distribution in Proposition 3. Meanwhile, it


can be seen that there is an intersection between the two curves. The reason is that the
distribution density of the DRUE is changing with L. The intersection illustrates that
theoretical values of the mathematical characteristics can perfectly match the simulation
results when L is equal to 80 if R is equal to 500.

5 Conclusions

In D2D communications, the introduced additional interference between the CUE and the
DUE pair affects normal communication of the CUE and the DUE pair. To guarantee QoSs
of the CUE and the DUE pair, interference regions are defined and described. Next,

123
Mathematical Characteristics of Uplink and Downlink... 927

mathematical characteristics of uplink and downlink interference regions are analyzed


respectively and blocking probability is formulated. The analysis results show that uplink
resources are more suitable to be shared for the CUE and the DUE pair, but the difference
is not significant. Meanwhile, theoretical values of the blocking probability well match the
simulation results. The results can provide a theoretical foundation for resource allocation
and optimization of D2D communications.

Acknowledgements This work was supported in part by the Project of National Natural Science Foun-
dation of China (61301110), Project of Hubei Key Laboratory of Intelligent Wireless Communications of
South-Central University for Nationalities, the Project funded by the Priority Academic Program Devel-
opment of Jiangsu Higher Education Institutions, and the Project of Jiangsu Overseas Research and Training
Program for University Prominent Young and Middle-Aged Teachers and Presidents.

Appendix 1: Proof of Lemma 3

As mentioned above, the CUE and DTUE follow a uniform distribution in the cell with the
radius of R and the DRUE uniformly locates in the circle with center at the DTUE and
radius equal to L. Let X ¼ ðr0 Þ2 and Y ¼ ðr1 Þ2 . Obviously X and Y are random variables.
Meanwhile, they are independent of each other. The PDF of x and y are written as
1
2 0  x  R2
fX ðxÞ ¼ R ð20Þ
0 otherwise
 1
R2 0  y  R2
fY ðyÞ ¼ ð21Þ
0 otherwise
Let Z ¼ X=Y. Then we have
Z Z
PðZ  zÞ ¼ fX ðxÞfY ðyÞdxdy ð22Þ
x=y\z

The probability of Z is divided into the following two cases:


1. 0z1
Z R2 Z yz
1
PðZ\zÞ ¼ fX ðxÞfY ðyÞdxdy ¼ z ð23Þ
0 0 2
2. z1
Z R2 =z Z yz
PðZ\zÞ ¼ fX ðxÞfY ðyÞdxdy
0 0
Z R2 Z R2
þ fX ðxÞfY ðyÞdxdy ð24Þ
R2 =z 0
1
¼1
2z

Therefore, the PDF of Z can be obtained as

123
928 X. Li et al.

8
> 1
< 0z1
fZ ðzÞ ¼ 2 ð25Þ
> 1
: z1
2z2
Next, we let T ¼ ð1=l1 Þ2 and K ¼ Z=T. Hence, we can get the PDF of T ¼ ð1=l1 Þ2
8
< 1
1=L2  t  1
fT ðtÞ ¼ L2 t2 ð26Þ
:
0 otherwise

Then, we can get the probability of K


Z Z
PðK\kÞ ¼ fZ ðzÞfT ðtÞdzdt ð27Þ
z=t\k

Similarly, the probability of K is divided into the following two cases:


1. 0  k  L2
Z 1=k Z tk
PðK\kÞ ¼ fZ ðzÞfT ðtÞdzdt
1=L2 0
Z 1 Z 1 Z 1 Z tk
þ fZ ðzÞfT ðtÞdzdt þ fZ ðzÞfT ðtÞdzdt
1=k 0 1=k 1
Z 1=k Z tk Z 1 Z 1
1 1 1 1 ð28Þ
¼ dzdt þ dzdt
1=L2 0 2 L2 t2 1=k 0 2 L2 t2
Z 1 Z tk
1 1
þ 2 L2 t2
dzdt
1=k 1 2z
k 3k
¼ 2 ð2 ln L  ln kÞ þ 2
2L 4L
2. k  L2
Z 1 Z 1
PðK\kÞ ¼ fZ ðzÞfT ðtÞdzdt
1=L2 0
Z 1 Z tk
þ fZ ðzÞfT ðtÞdzdt
1=L2 1
Z ð29Þ
1 Z 1 Z 1 Z tk
1 1 1 1
¼ dzdt þ dzdt
1=L2 0 2 L2 t2 1=L2 1 2z2 L2 t2
2
L
¼1
4k
So the cumulative distribution function (CDF) of K is given by
8
>
> k 3k
< 2 ð2 ln L  ln kÞ þ 2 0  k  L2
2L 4L
PðK\kÞ ¼ ð30Þ
>
> L2
:1  k  L2
4k

123
Mathematical Characteristics of Uplink and Downlink... 929

Finally, we get the PDF of K


8
> 2 ln L  ln k 1
< 2
þ 2 0  k  L2
f ðkÞ ¼ 2L 4L ð31Þ
>
: L 2
kL
4k2

Appendix 2: Proof of Proposition 2

As noted above, downlink interference region is related to the positions of CUE, DTUE
2
r0 l
and DRUE, and we have Rd ¼ jbr0 r
a

1j
. Obviously r0 , r1 and l are random variables.
Meanwhile, they are independent of each other. The PDF of r0 , r1 and l are written as
(
2r0
2 0  r0  R
f ðr0 Þ ¼ R ð32Þ
0 otherwise
(
2r1
R2 0  r1  R
f ðr1 Þ ¼ ð33Þ
0 otherwise
 2l
L2 0lL
f ðlÞ ¼ ð34Þ
0 otherwise
Here, jr0  r1 j represents the distance between the CUE and the DTUE, r0 and r1 follow a
uniform distribution in the circle of radius R. So we can use polar coordinates

to rewritten

r0 and r1 as r0 ¼ xejh and r1 ¼ yeju respectively. Let t ¼ jr0  r1 j=r0 ¼


ejh  yx ejðhuÞ
and
2 2 2
xk k k
k ¼ l. Then we can write Rd as Rd ¼ ba  jxy j ¼ b  jxyj=x ¼ b  t . Obviously, to get the
a a

PDF of Rd , we need to get the PDF of t firstly. However, it is very hard to get the close-
form of PDF of t. Actually, due to randomness of x and y, t can be considered as the
envelope of a random variable with random amplitude and phase. Then the distribution of t
is equivalent to Rayleigh distribution. Therefore, the PDF of t can be expressed as
t t2 =2r2
f ðtÞ ¼ e UðtÞ ð35Þ
r2
Here, we need to get the value of r2 . According to the property of Rayleigh distribution, it
follows that
pffiffiffiffiffiffiffiffi
EðtÞ ¼ r p=2 ð36Þ

So we need to get E(t) firstly. Actually, E(t) can be approximately expressed as


jxyjÞ
EðtÞ ¼ EðEðxÞ . Let s ¼ jx  yj, the probability density for the distance s between points in a
circle of radius R is given by [15] as
rffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
4s s 2s2 s2 ð37Þ
pðsÞ ¼ 2 arccos  4 R2 
pR 2R pR 4

123
930 X. Li et al.

128
Then we can get the expected value of s, EðsÞ ¼ 45p R. Next, it can be obtained
128
jxyjÞ R
EðtÞ ¼ EðEðxÞ ¼ 45p
2
R
64
¼ 15p . Then based on formula (36), we can get
3
EðtÞ
r2 ¼ pffiffiffiffiffiffi ¼ 64 ffiffiffiffiffiffi
p  1:0836.
p=2 15p p=2
Finally, we let z ¼ k=t and get
Z 1
f ðzÞ ¼ j yjf ðztÞf ðtÞdt ð38Þ
1

Based on formula (34), we have


 2zt  2zt L
2 0  zt  L L2 0t z
f ðztÞ ¼ L ¼ ð39Þ
0 otherwise 0 otherwise
So, the PDF of Z can be written as
Z L Z L
t t2 =2r2 2zt
z 2z z t3 t2 =2r2
f ðzÞ ¼ e t dt ¼ e dt
0 r2 L2 L2 0 r2
  ð40Þ
4zr2 L2  L22 2  L
2
¼ e 2z r þ e 2z2 r2  1
L2 2z2 r2
2
Due to Rd ¼ ba Z, we have
4 4 2
a
4 2
a
!
4Rd r2 ba L2 2Rb 2Lr2  b 2L 2
f ðRd Þ ¼ 2R r
e d þe d 1 ð41Þ
2
ba L2 2R2d r2

References
1. Xujie, L., Weiwei, X., Qiong, Y., & Lianfeng, S. (2012). Outage probability analysis of 3G/ad hoc
cooperative network. IEICE Transactions on Communications, 95(3), 999–1002.
2. Li, X., & Shen, L. (2012). Interference analysis of 3G/ad hoc integrated network. IET Communications,
6(12), 1795–1803.
3. Doppler, K., Rinne, M., Wijting, C., Ribeiro, C., & Hugl, K. (2009). Device-to-device communication
as an underlay to LTE-advanced networks. IEEE Communications Magazine, 47(12), 42–49.
4. Quang, D., & Oh-Soon, S. (2013). Distance-based interference coordination for device-to-device
communications in cellular networks. In 2013 5th international conference on ubiquitous and future
networks (pp. 776–779). Da Nang.
5. Xu, Y., Liu, Y., Yang, K., Li, D., Labs, B., Luo, Q., et al. (2013). Interference mitigation scheme for
Device-to-Device communication with QoS constraint. In IEEE 24th international symposium on
personal indoor and mobile radio communications (pp. 1784–1788). London.
6. Min, H., Lee, J., Park, S., & Hong, D. (2011). Capacity enhancement using an interference limited area
for device-to-device uplink underlaying cellular networks. IEEE Transactions on Wireless Communi-
cations, 10(12), 3995–4000.
7. Yang, W. B., Souryal, M., & Griffith, D. (2015). LTE uplink performance with interference from in-
band device-to-device (D2D) communications. In 2015 IEEE wireless communications and networking
conference (pp. 669–674). New Orleans.
8. Ni, Y., Jin, S., Xu, W., Wang, Y., Matthaiou, M., & Zhu, H. (2016). Beamforming and interference
cancellation for D2D communication underlaying cellular networks. IEEE Transactions on Commu-
nications, 64(2), 832–846.
9. Chiti, F., Giacomo, D. D., Fantacci, R., & Pierucci, L. (2016). Interference aware approach for D2D
communications. In 2016 IEEE international conference on communications (pp. 1–6). Kuala Lumpur.

123
Mathematical Characteristics of Uplink and Downlink... 931

10. Shen, Y., Jiang, C., Quek, T. Q. S., & Ren, Y. (2016). Device-to-device-assisted communications in
cellular networks: An energy efficient approach in downlink video sharing scenario. IEEE Transactions
on Wireless Communications, 15(2), 1575–1587.
11. Tang, H., & Ding, Z. (2016). Mixed mode transmission and resource allocation for D2D communi-
cation. IEEE Transactions on Wireless Communications, 15(1), 162–175.
12. Gupta, S., Kumar, S., Zhang, R., Kalyani, S., Giridhar, K., & Hanzo, L. (2016). Resource allocation for
D2D links in the FFR and SFR aided cellular downlink. IEEE Transactions on Communications, 64(10),
4434–4448.
13. Holma, H., & Toskala, A. (2009). LTE for UMTS-OFDMA and SC-FDMA based radio access. London:
Wiley.
14. Koutitas, G., Karousos, A., & Tassiulas, L. (2012). Deployment strategies and energy efficiency of
cellular networks. IEEE Transactions on Wireless Communications, 11(7), 2552–2563.
15. Garca-Pelayo, R. (2005). Distribution of distance in the spheroid. Journal of Physics A: Mathematical
and General, 38(16), 3475–3482.

Xujie Li received Ph.D. degree in communication engineering from


National Mobile Communications Research Lab., Southeast University
in 2012. He is working as an Associate Professor in the college of
computer and information engineering in Hohai University now. Now,
he is also a visiting scholar at University of Warwick, UK. Dr. LI
served as a reviewer for many journals and conferences, such as IEEE
JSAC, TCOM, TWC, TSP, IET Com, Globecom, etc. His research
interest includes device-to-device (D2D) communications, energy
efficient wireless communication system design, and small cell
technique.

Ziya Wang received her B.S. degree in Henan University in 2016.


Now she is currently pursuing her M.S. degree at the college of
computer and information engineering in Hohai University, majoring
in signal and information processing. Her current reseach interests
include D2D communication, optimization algorithm resource alloca-
tion and 5G network.

123
932 X. Li et al.

Ying Sun received her B.S. degree in communication engineering


from Hohai Universtiy in 2012. Now she is currently pursuing her M.S.
degree at the college of computer and information engineering in
Hohai University. Her current research interests include resource
allocation, D2D communication and system performance analysis.

Yan Gu received her B.S. degree in automation from Hohai University


in 1997, M.S. degree in control theory and control engineering from
Hohai University in 2002, Ph.D. degree in communication and infor-
mation system from National Mobile Communications Research Lab.,
Southeast University in 2007. She works in the college of computer
and information engineering in Hohai University now. Her current
research interests are in the areas of wireless networks.

Jurong Hu Received the Ph.D degree in Computer application tech-


nology from HoHai University in 2010, the M.S. degree in Commu-
nication and Information System from Nanjing University of
Aeronautics and Astronautic in 2003 and the B.S. degree in Detecting
technology and instrument from Southeast University in 1993. She
works in the college of computer and information engineering in Hohai
University now. Her current research interests include Signal Pro-
cessing for Information System and Simulation modeling for wireless
system.

123

You might also like