Deployment Model and Performance Analysis of Clustered D2D Caching Networks under Cluster-Centric Caching Strategy

Zhonggui Ma, Nuerxiati Nuermaimaiti, Haijun Zhang, Huan Zhou, Arumugam Nallanathan

Research output: Contribution to journalArticlepeer-review

17 Scopus citations

Abstract

Device-to-Device (D2D) communication has become a promising candidate in future cellular networks to improve spectrum efficiency and energy efficiency, while reducing the latency. As the capacity of D2D user equipments (DUEs) increases, it makes DUEs caching possible, and it can offload traffic from macro base stations, perform computation-intensive and latency-critical tasks. In this paper, in-band communication is considered, and the Poisson cluster process is utilized to model and analyze the clustered D2D networks under cluster-centric caching strategy. Firstly, we use the Thomas cluster process to model cellular user equipments (CUEs) and DUEs, and give a deployment scheme of clustered D2D caching networks. Secondly, the aggregated interference of the typical D2D receiver is analyzed in the clustered D2D networks. Then the Laplace transform of the aggregated interference is analyzed, and the expressions of coverage probability, average achievable rate and cache hit probability of the typical D2D receiver are deduced. The simulation results show that we can adjust the path loss exponent, densities of DUEs and CUEs, transmitting power of CUEs, mean of simultaneously active transmitters in each cluster and Zipf exponent to improve the performance of clustered D2D caching networks.

Original languageEnglish
Article number9085395
Pages (from-to)4933-4945
Number of pages13
JournalIEEE Transactions on Communications
Volume68
Issue number8
DOIs
StatePublished - Aug 2020
Externally publishedYes

Keywords

  • average achievable rate
  • cache hit probability
  • coverage probability
  • D2D
  • Poisson cluster process

Fingerprint

Dive into the research topics of 'Deployment Model and Performance Analysis of Clustered D2D Caching Networks under Cluster-Centric Caching Strategy'. Together they form a unique fingerprint.

Cite this