Adaptive Mode Selection in D2D Communications Considering the Bursty Traffic Model

Joonki Kim, Seokjung Kim, Jonghyun Bang, Daesik Hong

Research output: Contribution to journalArticlepeer-review

28 Citations (Scopus)

Abstract

This letter proposes a new mode selection scheme to improve the overall packet rates for device-to-device (D2D) communications systems in the bursty traffic model. We consider three types of D2D modes, i.e., dedicated mode, cellular mode, and reuse mode. In the full-buffer traffic model, if all the uplink (UL) channels are occupied by cellular users, the dedicated and cellular modes are not available for D2D user equipments (DUEs) to choose. However, in bursty traffic model, the traffic load is time-varying and DUEs have the option to select the dedicated or cellular modes. To determine the best mode for a DUE in the bursty traffic, we propose a mode selection scheme, which considers the traffic load for the bursty traffic model. Numerical results show that the proposed scheme achieves a remarkable enhancement in average end-to-end delay, dropping probability, and packet rate.

Original languageEnglish
Article number7390167
Pages (from-to)712-715
Number of pages4
JournalIEEE Communications Letters
Volume20
Issue number4
DOIs
Publication statusPublished - 2016 Apr

Bibliographical note

Funding Information:
This work was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (NRF-2015R1A2A1A01006162) and in part by the Institute for Information and Communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (no. R0101-15-244, Development of 5GMobile Communication Technologies for Hyper-connected smart services).

Publisher Copyright:
© 2016 IEEE.

All Science Journal Classification (ASJC) codes

  • Modelling and Simulation
  • Computer Science Applications
  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Adaptive Mode Selection in D2D Communications Considering the Bursty Traffic Model'. Together they form a unique fingerprint.

Cite this