Segment-based scheduling algorithm in cache-enabled device-to-device wireless networks

Shaoqin Peng*, Bo Chang, Liying Li, Guodong Zhao, Zhi Chen, Qi Wang

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, we study the link scheduling problem in cache-enabled device-to-device (D2D) wireless networks considering the quality-of-service (QoS) requirement of each scheduled D2D link. We propose a segment-based link scheduling method which consists of two phases, user pairing and link scheduling, to maximize the overall system throughput. We designed a segment factor to control interference among the established D2D links in the link scheduling phase. With the proposed method, interference among different scheduled D2D links can be significantly reduced and the QoS of each link can be guaranteed. Simulation results show that the proposed method outperforms the existing ones in terms of overall system throughput and the number of scheduled D2D links.

Original languageEnglish
Title of host publicationAd Hoc Networks - 0th EAI International Conference, ADHOCNETS 2018, Cairns, Australia, September 20-23, 2018, Proceedings
EditorsShiwen Mao, Wei Xiang, Jun Zheng, Feng Yan, Pascal Lorenz
Place of PublicationCham
PublisherSpringer
Pages191-201
Number of pages11
ISBN (Electronic)9783030058883
ISBN (Print)9783030058876
DOIs
Publication statusPublished - 2019
Externally publishedYes
Event10th International Conference on Ad Hoc Networks, ADHOCNETS 2018 - Cairns, Australia
Duration: 20 Sep 201823 Sep 2018

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume258
ISSN (Print)1867-8211

Conference

Conference10th International Conference on Ad Hoc Networks, ADHOCNETS 2018
CountryAustralia
CityCairns
Period20/09/1823/09/18

Fingerprint Dive into the research topics of 'Segment-based scheduling algorithm in cache-enabled device-to-device wireless networks'. Together they form a unique fingerprint.

Cite this