Next Article in Journal
Slip Estimation and Compensation Control of Omnidirectional Wheeled Automated Guided Vehicle
Next Article in Special Issue
Joint Optimization of Energy Efficiency and User Outage Using Multi-Agent Reinforcement Learning in Ultra-Dense Small Cell Networks
Previous Article in Journal
A Case Study of Educational Games in Virtual Reality as a Teaching Method of Lean Management
Previous Article in Special Issue
Performance Analysis of Cooperative Low-Power Wide-Area Network for Energy-Efficient B5G Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Spectrum-Aware Energy Efficiency Analysis in K-tier 5G HetNets

by
Fereidoun H. Panahi
1,*,
Farzad H. Panahi
1,* and
Tomoaki Ohtsuki
2
1
Department of Electrical Engineering, University of Kurdistan, Sanandaj 44001, Iran
2
Department of Information and Computer Science, Keio University, Yokohama 223-8522, Japan
*
Authors to whom correspondence should be addressed.
Electronics 2021, 10(7), 839; https://doi.org/10.3390/electronics10070839
Submission received: 23 February 2021 / Revised: 19 March 2021 / Accepted: 27 March 2021 / Published: 1 April 2021

Abstract

:
In future multi-tier cellular networks, cognitive radio (CR) compatible with device-to-device (D2D) communication can be an aid to enhance system spectral efficiency (SE) and energy efficiency (EE). Users in proximity can establish a direct connection with D2D communication and bypass the base stations (BSs), thereby offloading the network infrastructure and providing EE improvement. We use stochastic geometry to model and analyze cognitive D2D communication underlying a multi-tier/multi-channel cellular network where the D2D transmitters are capable of harvesting RF energy from ambient interference resulting from simultaneous cellular downlink transmissions. For further improvement in EE, small cells (SCs) can be put into a power-saving mode by specifying a load-dependent transmission power coefficient (TPC) for SC BSs. In addition, to consider practical D2D communication scenarios, we propose a wireless video sharing framework where cache-enabled users can store and exchange popular video files through D2D communication. We investigate the potential effects of the TPC and the introduced D2D layer on the network EE and SE. We will also observe that the energy-harvesting CR-based D2D communication network design will not only ease the spectrum shortage problem but will also result in a greener network thanks to its reliance on ambient energies.

1. Introduction

Traditional designs in cellular networks have concentrated on spectral efficiency (SE) or on achieving some quality of service (QoS) criteria rather than enhancing energy efficiency (EE) [1,2]. More recently, however, with the rise in the use of wireless data applications, EE has become one of the key design considerations for next-generation 5G/6G systems to accommodate the ever-increasing demand for traffic with the desired QoS, to mitigate operational costs, and also to limit greenhouse gas (GHG) emissions from wireless cellular networks [2]. Indeed, energy costs and the carbon footprint, together with the exponential rise in mobile subscribers, have led to an emerging research field called “green cellular networks”, which aims to address EE amongst network operators and regulatory organizations. The key objective of developing green cellular networks is therefore to minimize overall energy consumption and hence to reduce GHG emissions without a substantial change in throughput, as opposed to traditional communication systems, where the only consideration is to attain optimum throughput. With the evolution to Long-Term Evolution (LTE) and 5G, the cellular network has developed as a multi-tier network that comprises a conventional cellular network (i.e., macrocell network) with multiple low-power base stations (BSs) (i.e., small cells (SCs)). Massive use of SCs in such heterogeneous networks (HetNets) is one of the promising techniques to cater for the ever-increasing huge demand for future wireless data. Several studies on energy-efficient HetNet topologies with distributed SCs have been conducted to serve small areas with dense data traffic and low energy-consuming BSs, including micro-, pico-, and femtocells (e.g., [3]). However, because of the additional installed BSs, dense deployment of SCs will degrade the EE of the network.
Device-to-device (D2D) communication is a promising concept used to improve user experience and enhance resource utilization in cellular networks, enabling direct communication between two devices in proximity without the BS’s signaling [4]. The proximity of two D2D devices allows for a high data rate, low latency, and low energy consumption. This enhances the battery life of the mobile devices. As a consequence, with D2D communication in cellular networks, a higher EE can be achieved. In addition, D2D communication can offload the traffic from cellular BSs, thus reducing the energy consumption of BSs as the major cellular network energy consumers. In fact, despite the totally huge amount of data traffic suffered by the network, only a small percentage (5–10%) of “popular” data are frequently accessed by the majority of the users [5]. Caching popular contents at terminal devices and sharing them through D2D communication will result in traffic offloading from the cellular network and the decrease in duplicated data transmissions [6].
One attractive solution to solve the energy supply of devices is to adopt energy-harvesting (EH) technology in the D2D communication network, where D2D devices can harvest energy from the surrounding environment. Recently, owing to its convenience in providing energy self-sufficiency for a low-power communication system, the harvesting of energy from ambient radio frequency (RF) signals has gained growing interest [7,8,9]. On the other hand, cognitive radio (CR) is a promising technology which aims to achieve better spectrum utilization. It can serve as a great candidate technology for D2D communications [10]. More specifically, by integrating CR techniques, the D2D devices can borrow idle radio spectrums from primary networks without interrupting communications between the licensed users. In such a way, the capacity of D2D communications in cellular networks can be largely increased by improved spectrum efficiency (SE).

2. Related Work

One way to enhance EE in a HetNet is to turn off or hold the SC BSs in energy-saving mode while retaining the user-experienced QoS. Notice that it is difficult to terminate the operation of a macro-BS (MBS) since the coverage of an MBS is wide, meaning that the effect of switching off would be enormous. In our previous work [11], in a stochastic geometry-based HetNet, we proposed a fuzzy Q-learning-based energy-efficient sleep/wake-up mechanism for BSs. The aim was to save energy by switching off the redundant BSs according to the local traffic profile and based on the required area coverage and cell EE, without compromising the provided QoS. Sleep/wake-up mechanisms were also investigated in [12,13,14] in stochastic geometry-based HetNets. In [12], both random and dynamic (i.e., traffic load-based) sleep policies for MBSs were proposed by the authors. In fact, to develop the optimal sleeping strategy for MBSs, they considered EE maximization. In [13,14], random sleep/wake-up mechanisms were also evaluated for BSs. The optimum probability of switch-off for MBSs was obtained in [13], based on the minimization of BS energy consumption. In [14], the authors suggested the energy-efficient design of a two-tier HetNet by incorporating an activity-conscious sleeping technique in cognitive MBSs and femto-BSs (FBSs). Indeed, with different sleeping strategies for the BSs, they used stochastic geometry to obtain the coverage probability, overall power consumption, and EE of the network. Several multilevel sleep modes were suggested in [15,16,17,18] instead of traditional sleep/wake-up (i.e., OFF/ON) strategies. Two power-saving techniques were proposed by IEEE 802.16 m [15], i.e., sleep mode for user equipment (UE) and low duty operating mode for FBSs. In [16], for a heterogeneous mobile network, active, listening, and sleep schemes were used. Four sleep modes were further proposed in [17], which jointly optimize the power usage and wake-up time in a femtocell network. In [18], in a HetNet where SC BSs have four different power-saving modes, the authors attempted to quantify the trade-off between energy consumption and throughput. BSs (particularly MBSs) cannot be flexibly turned off under the traditional network architecture due to the coverage guarantee requirement. Instead of the traditional sleep/wake-up mechanisms, a continuous power control/adjustment mechanism for SC BSs can be considered to tackle this problem, which is much simpler than switching OFF/ON SC BSs from the perspective of implementation. This can be accomplished by specifying for SC BSs a load-dependent transmission power coefficient (TPC) β ( 0 β 1 ). In fact, a power control/adjustment mechanism can be viewed as a generalization of sleep/wake-up strategies, where BSs may go into sleep and wake-up modes as special cases when β = 0 or β = 1 , respectively.
In the context of D2D communication, D2D has recently received considerable research interest owing to its planned incorporation into future releases of LTE-Advanced (LTE-A) in future 4G and 5G cellular systems. Owing to the spectrum multiplexing in D2D underlying a network [19,20], there is no doubt that network throughput would certainly improve. The effect of D2D on the network energy consumption is, however, still open to study. In this work, it will be seen how D2D communication will affect the network EE. In addition, to consider D2D requirements under the practical application scenarios and relevant business requirements, we use a wireless video sharing framework where users can store popular video files and exchange files through D2D communication. Cache-enabled D2D transmission implies that data can be cached at the terminal devices for content sharing through D2D [21,22,23,24,25].
Few studies have exploited cognition in cache-enabled D2D communications underlying multi-tier cellular networks. In other words, modeling and analyzing the performance of multi-tier/multi-channel cellular networks embedded with the cognitive and cache-enabled D2D communication have not been investigated enough. In [10], the authors exploited cognition for assistance-free communication. Without the aid or supervision of the BS, the D2D transmitter and receiver can create a direct communication link via the PC5 interface, which is specified by the LTE standard. For CR-assisted D2D communications in a cellular network where devices sense the spectrum based on energy detection, a mixed overlay–underlay spectrum sharing approach was proposed in [26]. In [27], considering a constant D2D link distance and single-tier cellular network scenario, the cognitive D2D transmitters can communicate through the cellular channel with the harvesting energy from ambient interference. They investigated two strategies for spectrum access, namely, random and prioritized spectrum access policies. In [28], the authors introduced cognition to femto access points to exploit the idle channels of the MBSs via spectrum sensing, avoiding severe interference. The authors of [29] applied the spectrum trading method to the coexisting cognitive D2D and cellular network system, inspired by game theory and learning algorithms. Note that the majority of these works ignore the imperfections associated with spectrum sensing. It is important to note that, as common to all schemes, errors in the form of false alarms and misdetections occur in spectrum sensing, and such errors can lead to degradation in the performance.
Recently, owing to its simplicity in providing energy self-sufficiency for a low-power communication system [7], the harvesting of energy from ambient RF signals has gained growing interest. With recent advancements in the technology of low-power devices in both industry and academia, the harvesting of energy from RF signals is expected to provide a technically feasible solution for future applications, particularly for networks with low-power devices. However, the research of EH-aided D2D links is in its infancy, despite having a few pioneering studies [27,30]. Specifically, in a traditional single-tier macrocell deployment, Sakr and Hossain [27] proposed beneficial spectrum access policies for RF EH-aided cognitive D2D communication (with constant D2D link distance) underlying the uplink and downlink channels. Liu et al. [30], on the other hand, designed wireless power transfer policies for D2D communication underlying a cognitive cellular network, where wireless energy is harvested from power beacons and secure transmission is carried out using the spectrum of the primary BS. Note that most of these studies analyze the impact of RF EH on the SE, while its impact on the network EE is not considered.
Based on the above discussions, the key contributions in this paper are summarized as follows:
  • We use tools of stochastic geometry to model and analyze D2D communication underlying a multi-tier and multi-channel cellular network where the D2D transmitters are capable of harvesting RF energy from ambient interference arising from concurrent cellular downlink transmissions. Note that we analyze the impact of RF EH on both the SE and EE of the D2D-aided HetNet. In addition, we propose a framework for wireless video sharing to consider D2D requirements under realistic application scenarios and specific business requirements, where users are equipped with cache memory to store popular video files and exchange files through D2D communication.
  • Our analysis is conducted for two D2D spectrum sharing scenarios (will be discussed later): overlay and underlay in-band D2D. In underlay in-band D2D, we consider cognitive D2D communication, where cognition is integrated into the cache-enabled D2D communication underlying the multi-tier/multi-channel cellular network. Specifically, by incorporating CR techniques, the cache-enabled D2D transmitter performs spectrum sensing to provide opportunistic access to a predefined non-exclusive D2D channel. As common to all schemes, errors in the form of false alarms and misdetections occur in spectrum sensing, and such errors can lead to degradation in the performance. Thus, the impact of sensing errors by the D2D transmitters is studied in our work.
  • Considering the described model, we use tools from stochastic geometry to evaluate the performance of the proposed communication system model in terms of SE and EE. In general, we derive simple and closed-form expressions for the coverage probability of cellular and D2D users under the overlay and underlay in-band D2D, and also the probability of harvesting sufficient energy is obtained; finally, the EE expression of the cache-enabled cognitive D2D-aided HetNet with EH is derived. In our derivations, in contrast to previous related studies in which a traditional single-tier macrocell deployment is assumed, we consider a cellular network that consists of K tiers of BSs with distinct and general network parameters in each tier, which enables us to discover further insights into the behavior of the SE and EE in dense HetNets. Furthermore, unlike those works, in our analysis, we consider more general D2D scenarios by randomly modeling the distance between D2D pairs instead of assuming a fixed distance between the pairs.
  • The possible impact of the TPC β (identified for SC BSs) as well as the D2D layer added on the network EE and SE will be studied. Furthermore, we demonstrate that EH can effectively power D2D communications underlying cellular networks. A higher SE under various parameter settings of the proposed system model is also corroborated. Finally, we will observe that cognitive channel access will help to increase the QoS of D2D users under the same network conditions as in the non-cognitive situation. As will be shown in the simulations, the proposed framework brings a considerable advantage in terms of EE and SE. More specifically, the power control/adjustment strategy of SCs, the caching placement, D2D establishment, and cognition and EH capabilities altogether can lead to a considerable improvement in the achieved network EE and SE.

3. System Model

3.1. Network Topology

We assume a stochastic multi-cell network topology (as in [11,31,32,33]) for a K -tier HetNet consisting of a macrocell tier overlaid with an extremely dense tier of SCs with underlying D2D communications. The spatial distribution of BSs of all tiers is assumed to be captured using collocated and independent homogeneous Poisson point processes (HPPPs), i.e., Φ j with intensity λ j ( j K = { 1 , , K } ). Similarly, according to another independent HPPP Φ U with density λ U , users are spread across the area. Users are grouped into two categories: regular UEs, with density λ U E , and cache-enabled D2D UEs, with density λ U D = λ U λ U E . The former do not have the caching ability, whereas the latter are cache-enabled. The transmit power of BSs of tier j and users are also assumed to be P j T and P U T , respectively. Furthermore, we consider an open access network where a user can unrestrictedly connect to the BSs of any tier [34]. In addition, it is assumed that the user connects to the strongest BS, i.e., the one that delivers the highest average received power. Finally, a Rayleigh fading channel is considered for all the communication links in the network with mean μ j ( j K ) for each tier’s desired/interfering links. Thus, channels all are independent and identically distributed (i.i.d.) and follow an exponential distribution with mean μ (usually set to 1). We notice that more general fading/shadowing distributions can be accommodated as in [35] and several subsequent articles, but with a loss of tractability and without much modification to the findings and system design insights. A D2D-enabled two-tier macrocell/femtocell overlaid HetNet is depicted in Figure 1.

3.2. Spectrum Allocation

The main problem is how to share spectrum resources between cellular and D2D communications. D2D can be categorized into two types depending on the spectrum sharing form: in-band and out-of-band D2D [36]. In-band corresponds to D2D using the cellular spectrum, while out-of-band refers to D2D using bands (e.g., 2.4 GHz ISM band) rather than the cellular band. The analogous interpretation of out-of-band D2D is that D2D is given a proportion η of the orthogonal frequency-division multiple access (OFDMA) resource blocks, while cellular uses the remaining resource blocks. In-band D2D can be further classified into two categories: overlay and underlay. Overlay means that cellular and D2D transmitters use orthogonal time/frequency resources, while underlay means that D2D transmitters opportunistically access the time/frequency resources occupied by cellular users. With this approach, our analysis is conducted for two D2D spectrum sharing scenarios: overlay and underlay in-band D2D. In addition, in underlay in-band D2D, we consider cognitive D2D communication. The term “cognitive D2D communication” is used in the sense that spectrum sensing is conducted at each cache-enabled D2D transmitter prior to transmission to ensure that the interference received from any adjacent cellular BS on a predefined non-exclusive D2D channel is less than a predetermined sensing threshold γ ; otherwise, the channel cannot be used by the D2D transmitter. Note that, different from the majority of the related studies, we do not ignore the imperfections associated with spectrum sensing at the D2D sides. Errors in the form of false alarms and misdetections occur in spectrum sensing, and such errors can lead to degradation in the performance.
Furthermore, the total available bandwidth for each macrocell is divided into a set of orthogonal channels, C = { c 1 , c 2 , , c | C | } , where | . | denotes the set of cardinality. Note that a macrocell is composed of one single macro-BS (MBS) and a set of SC BSs. While a cellular user can be served over any channel c i C depending on the channel availability at the serving BS, all D2D transmissions take place on the same channel c d C . As will be discussed later, the c d channel is not exclusive for D2D transmissions and can be used for cellular communication based on the adopted spectrum access policy. It should be mentioned that at every BS, only one channel at most is used to serve each associated cellular user. In addition, there is no intra-cell interference in each tier, assuming that no more than one user is served by each BS in each channel. In each macrocell, the set of orthogonal channels C = { c 1 , c 2 , , c | C | } is randomly allocated to BSs of different tiers (as depicted in Figure 1) in such a way that k = 1 K | C k | = | C | . Note that the number of assigned channels to each tier is considered to be fixed in each macrocell. Moreover, the tier to which the channel c d belongs to (inside that macrocell) will be responsible for performing the adopted spectrum access policy discussed in Section 3.5.

3.3. Multi-Tier EH Model

All D2D transmitters (i.e., cache-enabled D2D UEs) are powered by energy harvested from ambient interference induced by simultaneous network cellular transmissions (i.e., downlink transmissions in this work) [27]. Each D2D transmitter is presumed to be equipped with an EH circuit which harvests RF power from all downlink channels. The total power available for a D2D transmitter located at a generic location y R 2 for harvesting can therefore be expressed as
P E H ( y ) = a c C j K x i Φ j ( c ) P j T g x i | x i y | α
where this term represents the amount of RF power harvested from the concurrent cellular downlink transmissions of all tiers. It is worth noting that P E H does not take into account the amount of power received from other concurrent D2D transmissions at the harvesting unit. Φ j ( c ) is a PPP of j -th tier with intensity q c , j λ j that represents the set of BSs of tier j using channel c C , where q c , j is the probability that a BS in tier j uses this channel. The efficiency of the conversion from RF to DC power is also denoted by 0 < a 1 [27,37]. g x i is the channel between a cellular BS of tier j located at x R 2 and the D2D transmitter, and α is the path loss exponent.

3.4. Spectrum Sensing Model of D2D Users

As mentioned, all cache-enabled D2D transmitters are assumed to be cognitive (in the underlay in-band D2D scenario). In other words, before deciding whether or not to use the c d channel for transmission, each cache-enabled D2D transmitter senses the state of this channel. The key goal of spectrum sensing in this work is to prevent interference arising from the nearby cellular transmissions on channel c d : that is, if the interference received from any neighboring cellular BS on channel c d is greater than a predefined sensing threshold γ , a typical D2D transmitter does not use this channel; otherwise, the channel is available to be used by that D2D transmitter. Note that increasing the sensing threshold raises the probability of accessing the c d channel while also increasing the aggregate interference. On the other hand, lowering the sensing threshold offers more protection for D2D transmission by minimizing the aggregate interference; however, it decreases the possibility of access to the c d channel. In other words, cognition offers a protection area around each D2D transmitter in which, if there is at least one cellular BS using channel c d within this region, the D2D transmitter will not use this channel. In general, the protection region around a generic D2D transmitter (located at position y R 2 ) has a random shape. Indeed, it is straightforward to show that, on average, the radius of the protection region centered around a generic D2D transmitter is given as follows
r p ¯ = max ( r p j ¯ ) , j = 1 , , K
where
r p j ¯ = ( P j T μ j γ ) 1 α Γ ( 1 + 1 α ) , j = 1 , , K
As mentioned earlier, in the underlay in-band D2D, the imperfections associated with the spectrum sensing at the D2D side have to be considered, as errors in the form of false alarms and misdetections occur in spectrum sensing, and such errors can lead to degradation in the performance. The probability of detection p D E is the probability that a typical D2D transmitter will correctly judge the presence of at least one nearby active cellular BS on c d when at least one cellular BS exists. The probability of a false alarm p F A is the probability that a typical D2D transmitter judges the presence of a nearby active cellular BS on c d when no cellular BS exists. Note that the signals received from other possible D2D transmissions (on c d ) are not considered because of their low transmit powers. Therefore, the p F A and p D E can be, respectively, expressed as [38]
p F A = Q ( 2 η i + 1 Q 1 ( P D E ¯ ) + M η i )
p D E = Q ( 1 2 η i + 1 ( Q 1 ( P F A ¯ ) M η i ) )
where η i denotes the sensing SNR of the i -th D2D transmitter on the channel c d , and M = τ f s is defined as the sampling quality where f s is the sampling frequency and τ represents the sensing time. Here, p D E ¯ represents the target p D E and p F A ¯ represents the target p F A . Q ( . ) is the complementary distribution function of the standard Gaussian, i.e.,
Q = 1 2 π x e x p ( t 2 2 ) d t
Thus, in the underlay in-band D2D, depending on the absence and presence of active transmissions on channel c d (inside the D2D protection region), there are four possible cases:
  • The D2D channel c d is used by nearby cellular BSs, and a typical D2D transmitter correctly detects the presence of cellular transmissions. The probability of this situation is ( 1 p f D 2 D ) p D E , where p f D 2 D is the probability that the D2D channel (i.e., c d ) is free, and therefore ( 1 p f D 2 D ) indicates the probability of the presence of nearby cellular transmissions on channel c d . In this case, the typical D2D transmitter cannot utilize the channel to transmit information.
  • The channel c d is in use by nearby cellular BSs, but the typical D2D transmitter misdetects the presence of cellular transmissions. The probability of this situation is ( 1 p f D 2 D ) ( 1 p D E ) . In this case, the typical D2D transmitter attempts to utilize the occupied channel c d for data transmission. However, to avoid any severe interference, the typical D2D transmitter should not be allowed to perform data transmission.
  • The channel c d is not being utilized by nearby cellular BSs, and the typical D2D transmitter falsely detects the presence of cellular transmissions. The probability of this situation is p f D 2 D p F A . Further, in this case, the typical D2D transmitter does not utilize the channel to transmit data.
  • The channel c d is not in use by nearby cellular BSs, and the typical D2D transmitter correctly detects the absence of cellular transmissions. The probability of this situation is p f D 2 D ( 1 p F A ) . In this case, the typical D2D transmitter utilizes c d to transmit information.
It is important to note that for the underlay in-band D2D scenario, we mainly focus on the fourth case, i.e., when the cellular network, inside the D2D protection region, is absent on c d and the typical D2D transmitter correctly detects the absence of cellular transmissions and therefore uses c d for D2D transmission.

3.5. Spectrum Access Model for Cellular Transmissions

In the proposed K -tier HetNet, we consider two policies on spectrum access, namely, random spectrum access (RSA) and prioritized spectrum access (PSA) policies, as set out in [27]. Such policies show how the spectrum is allocated to downlink transmissions to serve cellular users. More precisely, in RSA, in each macrocell, any channel c i C (including the c d channel which is used for D2D transmission) can be assigned independently and randomly, with the same probability, to serve one of the cellular users (users connecting to either an MBS or SC BSs). On the other hand, in PSA, any channel c i C \ { c d } can be assigned independently and randomly to a cellular user as long as the number of cellular users is less than that of available channels | C | . When the number of cellular users in each macrocell is larger than | C | 1 , only then will c d be assigned to a cellular user. As a result, for the RSA policy, it can be shown that the probability that a BS of tier k uses a generic channel c i C k to serve one of its associated cellular users is obtained as
q c , k RSA = [ 1 n = 0 | C k | 1 | C k | n | C k | P { N k = n } ] P { c d C k }
in which, k = 1 K | C k | = | C | , P { c d C k } = | C k | | C | is the probability that c d belongs to the channels allocated to the k -th tier, and P { N k = n } is the probability mass function (pmf) of the number of users served by a generic BS in tier k , which is obtained as follows [28,39]:
P { N k = n } = b b Γ ( b ) Γ ( n + b ) Γ ( n + 1 ) ( N k ) n ( b + N k ) n + b
The above expression is obtained by approximating the area of a Voronoi cell by a Gamma-distributed random variable with a shape parameter b = 3.575 and a scale parameter 1 b λ k [39]. Note that this expression is applicable only when cellular users are considered to be spatially distributed according to an independent PPP and their association with cellular BSs is based on the maximum average received signal power, i.e., each user is associated with its nearest BS. Since we consider single-antenna systems, i.e., spatial multiplexing and multi-user MIMO schemes are not taken into account, each BS will only schedule one user. Moreover, users can only access one BS at a time (the BS is either an MBS or an FBS). Indeed, users’ association with cellular BSs is based on the maximum average received signal power. In addition, N k is the average number of users associated with a BS in tier k , and it is obtained as follows:
N k = λ U λ k + j = 1 , j k K λ j ( P j T P k T ) 2 / α
Proof. 
See Appendix A.1. □
Note that q d RSA = q c RSA because, in each macrocell, any BS of tier k randomly and independently assigns any channel c i C k with the same probability in the RSA policy. We denote by q d the probability that a generic BS assigns the D2D channel c d to serve one of its associated users. For the PSA policy, on the other hand, the probability that a BS of tier k uses a generic channel c i C k \ { c d } to serve one of its associated cellular users is obtained as
q c , k PSA = [ 1 n = 0 | C k | 1 | C k | n 1 | C k | 1 P { N k = n } ] P { c d C k }
while the probability that a BS of tier k has to use c d to serve one of its associated cellular users is as follows:
q d , k PSA = [ 1 n = 0 | C k | 1 P { N k = n } ] P { c d C k }

4. Problem Formulation

4.1. The Load-Dependent TPC

A BS typically consists of different power-consuming components. Components such as the rectifier, microwave link, and air conditioning fall into the first category because their power consumption is independent of the load. The number of users and the services they use in the BS’s cell determine the load on a BS. The greater the number of users and the greater the requirements for the services, the greater the load. These load-independent components’ power consumption is thus constant over time. The equipment that has a load-dependent power consumption, such as the power amplifier, transceiver, and digital signal processing, falls into the second category. The authors of [40] summarized the typical power consumption of the macrocell and SC BS components for the technologies considered (mobile WiMAX, HSPA, and LTE).
As stated, SCs provide a promising and feasible solution to meeting the rising demand for wireless applications with high data rates and the rapid growth of data traffic. With the expected rise in the number of SC deployments, EE is a key parameter of system design that needs consideration. The dense deployment of SC BSs, indeed, inevitably causes a tremendous rise in energy consumption. We therefore consider a continuous power control/adjustment technique for SC BSs, which is much simpler from an implementation perspective than switching OFF/ON SC BSs. This can be achieved by specifying for SC BSs a load-dependent TPC β ( 0 β 1 ). In general, in the proposed K -tier HetNet, the power consumption of a BS in the k -th tier can be expressed as
P k BS = P k const + P k T
where P k const and P k T = β k P k tx are, respectively, the static power consumption and load-dependent transmit power of a BS in the k -th tier. Note that P k tx is the fixed transmit power of a BS in the k -th tier, and β k is a load-dependent TPC, which accounts for power consumption that scales with the traffic load of a k -th tier BS. Since β k is proportional to the traffic load of a BS in the k -th tier, we set β k = N k k = 1 K N k (see Equation (9)). We use tools from stochastic geometry in the following subsections to evaluate the performance of the proposed communication system model in terms of SE and EE. More specifically, we derive simple and closed-form expressions for the coverage probability of downlink cellular and D2D users under the two D2D spectrum sharing scenarios, i.e., overlay and underlay in-band D2D, and then the proposed wireless video sharing framework for the cache-enabled D2D network is analytically evaluated. In addition, the probability of harvesting sufficient energy for a typical cache-enabled D2D transmitter is obtained, and, finally, we derive an analytical expression for the network EE both in the overlay and underlay in-band D2D taking into account the imperfections associated with the spectrum sensing at the D2D transmitters.

4.2. Overlay Mode: Downlink Cellular and D2D Coverage Probabilities

For any typical user in a K -tier HetNet, we now present analytical expressions of the downlink cellular/D2D coverage probability. Notice that we will be paying attention to the special case of two-tier (femto-macro) HetNets in the simulations, as seen in Figure 1. As mentioned, our analysis is conducted for two D2D spectrum sharing scenarios: overlay and underlay in-band D2D. We first begin with the overlay in-band D2D, where cellular and D2D transmitters use orthogonal time/frequency resources, and therefore no interference occurs between cellular and D2D transmissions. In other words, cellular links are not affected by D2D links, and vice versa. Following similar analysis and derivations in [11,33], we present the cellular coverage probability formula, which is defined as the probability that a typical user in the network is in coverage, i.e., the signal-to-interference-plus-noise ratio (SINR) is greater than a threshold value τ k , conditioned on the fact that it is served by a k -th tier BS ( k K , K = { 1 , , K } ) .
Theorem 1.
The per tier downlink cellular coverage probability in overlay mode is expressed as
p k c o v ¯ = 2 π λ k A k 0 r k exp ( π λ k A k r k 2 ) p k c o v ( r k ) d r k
where r k denotes the random distance between the tagged user at the origin and its corresponding k -th tier BS, and A k = λ k P k T ( 2 α ) / j = 1 K λ j P j T ( 2 α ) is the association probability, i.e., the probability that a user associates with the k -th tier using the maximum received power cell association policy [34]. In addition, assuming a Rayleigh fading channel for all the network communication links with mean μ j ( j K ) for each tier’s desired/interfering links, p k c o v ( r k ) = P [ SIN R k > τ k ] = P [ P k T h k r k α σ 2 + I C ( c ) > τ k ] is derived as
p k c o v ( r k ) = e μ k τ k r k α P k T σ 2 j K [ e π ( P j T P k T ) 2 / α r k 2 q c , j λ I j + 2 α π q c , j λ I j ( P j T P k T ) 4 / α r k 2 Γ ( 2 / α ) μ j Ω ( τ k , μ k , μ j ) ]
In the above expression, the intensity of the interfering BSs from the j -th tier is denoted by λ I j . Therefore, q c , j λ I j is the intensity of BSs of tier j that use channel c , where q c , j is the probability that a BS of tier j uses this channel (given in Equations (7) and (10)). Γ ( x ) denotes the standard Gamma function, α is the path loss exponent, σ 2 is the noise power, and
Ω ( τ k , μ k , μ j ) = [ i = 0 Γ ( 1 + i ) ( μ k τ k ) i Γ ( i + 1 2 α ) ( μ j + μ k τ k ) i + 1 ]
Proof. 
For a proof and to check the validity of the presented theoretical expressions, please refer to [11] Appendices A and B. □
Remark 1.
If the tagged user under consideration is served by a k -th tier BS, then the nearest interferer in the j -th tier is at least at a distance of ( P j T / P k T ) 1 / α r k [34]. If the initial density of BSs in tier k is λ k , then in the case that a fraction of them are using channel c , a thinning factor, i.e., q c , k , will affect the original BSs’ density. We note that if each BS in tier k uses channel c with probability q c , k , the thinned process is HPPP. Other thinning processes, nevertheless, are not necessarily HPPP [41], yet we assume the thinned process to be HPPP for tractable analysis in this paper. Notice that h k in P [ P k T h k r k α σ 2 + I C ( c ) > τ k ] is the exponentially distributed channel between the tagged user and its serving BS from the k -th tier. The term I C ( c ) = j K i Φ j ( c ) \ b 0 , k P j T g i R i α is the aggregate interference at the tagged user from all tiers’ interfering BSs that use channel c . We denote by b 0 , k the serving (tagged) BS of tier k . Further, g i is the exponentially distributed channel between the i-th interfering BS in the j-th tier and the tagged user, and R i is the distance of the i -th interferer in the j -th tier (i.e., captured by the point process Φ j ) from the tagged user. Note that Φ j ( c ) represents the point process of BSs (in tier j ) that use channel c .
The expression in Equation (13) can be further simplified, as seen in the special case below.
Corollary 1.
Consider σ 2 0 , i.e., operating in an interference-limited regime, then we have
p k c o v ¯ = λ k / A k λ k A k j K q c , j λ I j ( ( P j T P k T ) 2 / α + 2 α Γ ( 2 / α ) ( P j T P k T ) 4 / α μ j Ω ( τ k , μ k , μ j ) )
In the same way, we have the following analysis for a D2D link:
Theorem 2.
In overlay mode, the D2D coverage probability is expressed as
p D 2 D c o v ¯ = 2 π λ U D 0 d r d exp ( π λ U D r d 2 ) p D 2 D c o v ( r d ) d r d
where for p D 2 D c o v ( r d ) = P [ SIN R D 2 D > τ D 2 D ] = P [ P D 2 D T L r d α σ 2 + I D 2 D > τ D 2 D ] , we have
p D 2 D c o v ( r d ) = e μ D 2 D τ D 2 D r d α P D 2 D T σ 2 [ e π ρ λ U D r d 2 ( τ D 2 D ) 2 α ( 2 π α sin ( 2 π α ) ) ]
in which P D 2 D T is the D2D transmit power. r d is a random variable representing the D2D distance, d is defined as the maximum allowable D2D distance, and ρ λ U D is the portion of the cache-enabled D2D UEs involved in active transmission that interferes with the tagged D2D link, i.e., the one that is being considered. Note that ρ = N D 2 D 1 λ U D | S ´ | , where N D 2 D , which will be presented later in Section 4.4, is the expected number of active D2D links in the network, and | S ´ | represents the area of the cellular system. In addition, we denote by τ D 2 D the predetermined D2D SINR threshold, and L represents the exponentially distributed channel (with mean μ D 2 D ) between the tagged D2D user and its serving D2D transmitter.
Remark 2.
For the D2D network, the aggregate interference (i.e., I D 2 D ) in overlay mode comes only from other D2D transmitters that have sufficient energy to communicate with their corresponding receivers. The interfering D2D transmitters thus no longer constitute a homogeneous point process and interference analytical characterization is not possible. Therefore, the correlation among the locations of the interfering D2D transmitters is neglected for analytical tractability and the point process is approximated by an HPPP with the same intensity of ρ λ U D . Note that the interfering D2D transmitters may be arbitrarily near the tagged D2D. In other words, the nearest D2D interferer can be at a distance of 0 from the tagged D2D connection in the derivation of I D 2 D , and thus the integration limit would be from 0 to when measuring the aggregate interference.
Corollary 2.
Consider σ 2 0 , then we will have
p D 2 D c o v ¯ = λ U D ( 1 e π d 2 λ U D π d 2 ρ λ U D ( τ D 2 D ) 2 α ( 2 π α sin ( 2 π α ) ) ) λ U D + ρ λ U D ( τ D 2 D ) 2 α ( 2 π α sin ( 2 π α ) )

4.3. Underlay Mode: Downlink Cellular and D2D Coverage Probabilities

We now consider the underlay in-band D2D scenario, where the time/frequency resource occupied by cellular users (i.e., the predefined non-exclusive D2D channel c d ) is opportunistically accessed by D2D transmitters with cognition capabilities, and therefore cellular links are affected by D2D links, and vice versa. In fact, interference will occur not only among cellular links and within D2D links but also between cellular and D2D links. Note that we take into account the imperfections associated with the spectrum sensing at the D2D transmitters.
Theorem 3.
The per tier downlink cellular coverage probability in underlay mode is expressed as
p k c o v ( c ) ¯ = 2 π λ k A k 0 r k exp ( π λ k A k r k 2 ) p k c o v ( r k , c ) d r k
where p k c o v ( r k , c ) = P [ SIN R k ( c ) > τ k ] = P [ P k T h k r k α σ 2 + I D 2 D . 1 c = c d + I C ( c ) > τ k ] is obtained as follows:
p k c o v ( r k , c ) = e μ k τ k r k α P k T σ 2 e π ρ λ U D ( P D 2 D T P k T ) 2 α r k 2 ( μ k τ k μ D 2 D ) 2 α ( π 2 α sin ( π 2 α ) ) . 1 c = c d × j K [ e π ( P j T P k T ) 2 α r k 2 q ^ ( c , j ) λ I j + 2 α π q ^ ( c , j ) λ I j ( P j T P k T ) 4 α r k 2 Γ ( 2 α ) μ j Ω ( τ k , μ k , μ j ) ]
in which 1 A is the indicator function, which is equal to 1 only when A is true and 0 otherwise. In the above expression, λ I j represents the intensity of the interfering BSs from the j -th tier. Therefore, q ^ ( c , j ) λ I j is the intensity of BSs of tier j that use channel c , and it is q c , j λ j for c C \ { c d } and q d , j λ j for c = c d .
Proof. 
Similar analysis to that in the proof of Equation (14) can be applied here—please refer to [11] Appendices A and B. Note that, here, each user suffers from two sources of interference, i.e., the cellular network and the D2D network which is a product of two Laplace transforms, whereas in [11], there exists only one source of interference which gives a single Laplace transform. □
Remark 3
In the underlay mode, for the cellular interference, i.e., I C ( c ) , if the tagged user under consideration is served by a k -th tier BS, then the closest interferer in the j -th tier is at least at a distance of ( P j T / P k T ) 1 / α r k . For I D 2 D , the interfering D2D transmitters can be arbitrarily close to the tagged user under consideration and there is no protection region, and thus the integration limit when calculating the aggregate interference I D 2 D will be from 0 to . Moreover, in the underlay mode, I D 2 D results from other D2D transmitters that have sufficient energy (to communicate with their corresponding receivers) and can transmit on c d . Hence, we assume the thinned process to be HPPP for tractable analysis with the same intensity ρ λ U D , where ρ = N D 2 D 1 λ U D | S ´ | . As mentioned, N D 2 D , i.e., the expected number of active D2D links in the network, will be presented in Section 4.4.
Corollary 3.
Consider σ 2 0 , i.e., operating in an interference-limited regime, then we have
p k c o v ( c ) ¯ = λ k / A k λ k A k + X Y
where
X = ρ λ U D ( P D 2 D T P k T ) 2 α ( μ k τ k μ D 2 D ) 2 α ( 2 π α sin ( 2 π α ) ) . 1 c = c d
Y = j K λ I j ( ( P j T P k T ) 2 α q ^ ( c , j ) + 2 α q ^ ( c , j ) ( P j T P k T ) 4 α Γ ( 2 α ) μ j Ω ( τ k , μ k , μ j ) )
and
q ^ ( c , j ) = { q c , j , f o r   c C \ { c d } q d , j , f o r   c = c d
in which q c , j and q d , j are given for both the RSA and PSA policies in Equations (7), (10) and (11). Similarly, we have the following analysis for the D2D link:
Theorem 4.
The D2D coverage probability in underlay mode is expressed as
p D 2 D c o v ¯ = 2 π λ U D 0 d r d exp ( π λ U D r d 2 ) p D 2 D c o v ( r d ) d r d
where p D 2 D c o v ( r d ) = P [ SIN R D 2 D > τ D 2 D ] = P [ P D 2 D T f r d α σ 2 + I D 2 D + I C > τ D 2 D ] is obtained as follows:
p D 2 D c o v ( r d ) = e μ D 2 D τ D 2 D r d α P D 2 D T σ 2 e π ρ λ U D r d 2 ( τ D 2 D ) 2 α ( 2 π α sin ( 2 π α ) ) × j K [ e π B 2 r d 2 q d , j λ I j + 2 π B 2 α q d , j λ I j r d 2 Γ ( 2 α ) μ j Ω ( P j T P D 2 D T B α τ D 2 D , μ D 2 D , μ j ) ]
and
Ω ( τ D 2 D , μ D 2 D , μ j ) = [ i = 0 Γ ( i + 1 ) ( μ D 2 D τ D 2 D ) i Γ ( i + 1 2 α ) ( μ j + μ D 2 D τ D 2 D ) i + 1 ]
Proof. 
Similar statements to that in the proof of Theorem 3 can be reused here. Please also see the following remark. □
Remark 4.
In underlay mode, each D2D receiver suffers from two sources of interference, i.e., the cellular network and the D2D network. For the cellular network, the aggregate interference results from all BSs of different tiers that use channel c d . Thus, q d , j λ I j represents the set of BSs in tier j that use channel c d , where q d , j is given for both the RSA and PSA policies in Equations (7) and (11). For the D2D network, the aggregate interference (i.e., I D 2 D ) results only from other D2D transmitters that have enough energy to communicate with their corresponding receivers and can transmit on c d . Hence, we assume the thinned process to be HPPP for tractable analysis with the same ρ λ U D , where ρ = N D 2 D 1 λ U D | S ´ | . For the cellular interference, i.e., I C , since the D2D transmitters perform spectrum sensing before transmission on c d , then the closest interferer is at least at a distance of r p ¯ (given in Equation (2)) from the tagged D2D receiver. For better analytical tractability, we assume that the closest interferer is at least at a distance of B r d ( r d is the random variable representing the D2D distance), where B = r p ¯ . Therefore, the integration limit when calculating the aggregate interference I C will be from B r d to . Notice that the protection region is basically centered around the receiver rather than the transmitter to protect the D2D transmissions. However, we assume that the protection region is centered around the D2D transmitter for simplicity. For I D 2 D , the interfering D2D transmitters can be arbitrarily close to the tagged D2D receiver under consideration and there is no protection region, and thus the integration limit when calculating the aggregate interference I D 2 D will be from 0 to .
Corollary 4.
Consider σ 2 0 , then we will have
p D 2 D c o v ¯ = π λ U D ( Q ) ( e Q d 2 1 )
where
Q = π λ U D π ρ λ U D ( τ D 2 D ) 2 α ( 2 π α sin ( 2 π α ) ) + j K ( π B 2 q d , j λ I j + 2 π B 2 α q d , j λ I j Γ ( 2 α ) μ j Ω ( P j T P D 2 D T B α τ D 2 D , μ D 2 D , μ j ) )
in which B = r p ¯ and r p ¯ = max ( r p j ¯ ) for j = 1 , , K , as mentioned earlier.

4.4. Cellular and D2D Links Coexistence

In 2022, video traffic is expected to account for more than 82% of the global consumer traffic, with wireless and mobile devices accounting for the majority of this traffic [42]. Therefore, efficient mechanisms for sharing multimedia content in cellular networks are extremely necessary. It has been shown that D2D communication can greatly increase the throughput of multimedia content by optimizing the resource utilization through direct communication of the devices, eliminating the need for assistance from the cellular infrastructure. Since the two devices involved in D2D communication are typically close to each other and have a small interference range, the BS may offer services to other users on the same channel at the same time. Indeed, D2D technology will offer more capacity enhancement than traditional cellular networks between devices that desire to exchange multimedia content.
Mobile devices are nowadays mostly equipped with memory modules of large storage capacity. This allows users to store popular multimedia files on their devices and, upon request, exchange such files with other users, resulting in traffic being offloaded from the cellular network and reducing duplicate data transmission. In our D2D-enabled HetNet, users can request popular content (files) via D2D communication from neighboring users, although they can also request content from the BSs (either SC BSs or MBSs) through traditional cellular communication. Note that a D2D link can be successfully established between a user requesting file i (i.e., D2D receiver) from a set of m files and the user storing file i (i.e., D2D transmitter) only when (1) there exists one D2D transmitter storing file i in the area S ( | S | = π d 2 ) centered around the D2D receiver: note that d is defined as the maximum allowable D2D distance; (2) the D2D transmitter harvests sufficient energy to establish a communication link with the receiver; and (3) the D2D channel is free, i.e., the received interference from any neighboring cellular BS on the channel designated for D2D transmission ( c d ) is smaller than the predefined sensing threshold γ ; otherwise, the user receives the file through the traditional cellular network (i.e., via the BSs). In addition, we denote by p t D 2 D the D2D transmission probability, i.e., the probability that c d is available and the amount of energy harvested is adequate for D2D transmission,
p t D 2 D = ( 1 p F A ) p f D 2 D p s D 2 D
where, from the viewpoint of the cognitive D2D transmitters, p f D 2 D is the probability that there is a channel available for D2D transmission, i.e., the probability that the D2D channel (i.e., c d ) is free, and the probability that a D2D transmitter harvests adequate energy to create a communication link with the receiver is denoted by p s D 2 D . As mentioned previously, in the absence of the cellular network on channel c d (inside the D2D protection region), if the typical D2D transmitter correctly detects the absence of the cellular activities, the probability of this situation is denoted by ( 1 p F A ) p f D 2 D . Obviously, p F A = 0 when the D2D spectrum sharing scenario is considered to be the overlay mode.
i.
Calculation of p f D 2 D : In a K -tier HetNet, for a generic D2D transmitter, the probability that the D2D channel (i.e., c d ) is free inside the D2D protection region is given by
p f D 2 D = k K exp [ θ k q d , k ]
where
θ k = π λ k ( P T k μ k γ ) 2 α Γ ( 1 + 2 α )             k = 1 , , K
and q d , k is the probability that the D2D channel is used by a generic BS of tier k for cellular communication, which is given by Equations (7) and (11) for the RSA and PSA policies, respectively.
Proof. 
For a proof and the detailed derivation, please refer to [27] Appendix B where a single-tier (macro tier) cellular network was studied whose macro-BSs are underlaid with D2D transmitters. □
ii.
Calculation of p s D 2 D : Although the random variable r d ( 0 r d d ) is the distance between each D2D transmitter and its receiver, we consider the worst-case scenario for the calculation of p s D 2 D , where the receiver is at the boundary of the circle (i.e., at a distance d ). Notice that this presumption gives an upper bound on the amount of transmission power needed for the communication link to be established, thus providing a lower bound on the probability of sufficient energy being harvested. Relaxing this presumption, without providing further insights, complicates the derived expressions [43]. We define the probability p s D 2 D that a D2D transmitter harvests sufficient energy as follows:
p s D 2 D = P [ P E H > P E H t h ]
in which P E H (defined in Equation (1)) is the total power available to be harvested by a D2D transmitter from the ambient interference caused by the simultaneous downlink cellular transmission of all tiers, and P E H t h is a predetermined EH threshold. The next theorem provides an expression for p s D 2 D :
Theorem 5.
In a K -tier HetNet, the probability that a typical D2D transmitter harvests sufficient energy for transmission is
p s D 2 D = α 2 π 0 1 u exp [ P E H t h ( u 𝓌 ) α / 2 ] × exp [ u cos ( 2 π α ) ] sin ( u sin ( 2 π α ) ) d u
where
𝓌 = j = 1 K 2 π q c , j λ j ( a P j T ) 2 / α Γ ( 1 2 α ) α i = 1 | C j | Γ ( k 1 + 2 α ) ( k 1 ) !
Proof. 
See Appendix A.2. □
It can be shown that the above expression can be presented in a closed-form expression in the special case when α = 4 . In summary, according to [33,44] and based on the above explanations, the number of successfully activated D2D links for delivering file i can be given as follows:
n i = λ U | S ´ | ( 1 p i ) Q i ( 1 e π d 2 λ U D p i ) p t D 2 D
where p i is the probability that a user stores the file i , Q i denotes the probability that file i is requested by a user, and λ U | S ´ | ( 1 p i ) represents the number of users who may request file i in the network, where | S ´ | is the area of the cellular network.
The expected number of active D2D links for all files is then given by
N D 2 D = i = 1 m λ U | S ´ | ( 1 p i ) Q i ( 1 e π d 2 λ U D p i ) p t D 2 D
If establishing a D2D communication link is a failure, a cellular communication link with the reference user is fixed. In other words, if the reference user is unable to find the corresponding user who stores the desired file within the maximum transmission range of D2D links (i.e., d ), a traditional cellular connection must be established. As a result, the expected number of cellular connections for all files (or the expected number of users receiving their desired files from the cellular network, i.e., from either SC BSs or MBSs) is
N Cellular = i = 1 m λ U | S ´ | ( 1 p i ) Q i ( e π d 2 λ U D p i ) p t C
where p t C is the probability that a typical cellular user is assigned a channel by a BS in tier k , and it is presented as follows:
p t C = k = 1 K A k ( 1 n = 0 | C k | 1 | C k | n | C k | P { N k = n } )
where A k is the association probability.
In Figure 2, we show the probability that the reference user would find its requested files cached within a certain region vs. the maximum allowable D2D distance d . The greater d means that the probability of finding the requested files increases, resulting in further D2D connections being established. It should be stated that the probability of successfully establishing a D2D link remains constant as d increases further. This is because when the maximum allowable D2D distance becomes greater than a particular value, users will locate all of their requested files in the network virtual cache. We set d to 200 m in the other simulations as D2D is a short-distance communication technology. In addition, the effect of the number of network cache files, i.e., m , can be seen in Figure 2 on the probability of finding the requested files. We know that each cache-enabled D2D UE has a cache memory of size z . From our simulations, we can observe that there is a unique optimal number of cache files, namely, m o p t , for a fixed size of cache memory (here z = 10 ) and a constant d . Therefore, we can obtain m o p t , given the system parameters. Obviously, as also seen in the figure, the probability of finding the requested file from the adjacent cache-enabled D2D UEs will increase first with the rise in m and then decrease since the cache-enabled D2D UEs’ cache memory size z has been set to a fixed number (i.e., z = 10 ) and does not increase with the rise in m . In fact, when m becomes greater than a specific value, if the cache memory size z of the cache-enabled D2D UEs remains unchanged, the increase in m not only cannot contribute to a further increase in the probability of finding the requested file in the region but it also decreases the related probability. This is due to the imposed cache memory size constraint of the cache-enabled D2D UEs.

4.5. Cellular and D2D Data Rate Analysis

Our main objective in this subsection is to obtain the average transmission rate for both the cellular and D2D links under the two D2D spectrum sharing scenarios: overlay and underlay in-band D2D.
Overlay Mode: Firstly, if a typical user obtains data via the traditional cellular network, i.e., directly from a BS in the k -th tier, the average achievable rate is given as follows:
R k ¯ = w E [ ln ( 1 + SIN R k ) ]
where an expectation, i.e., E [ · ] operation, is placed on both the spatial PPP and the fading distribution. We assume that any channel c i C (including the c d channel) has the average bandwidth w . Considering an interference-limited regime ( σ 2 0 ), and following the derivation in Appendix A.3, R k ¯ can be written as
R k ¯ = 2 π w λ k A k 0 r k exp ( π λ k A k r k 2 ) 0 L I C ( c ) ( μ k ( e t 1 ) r k α P k T ) d t d r k
where L I C ( c ) ( · ) is the Laplace transform of the random variable I C ( c ) and is characterized as Equation (43). Note that I C ( c ) is the aggregate interference at the tagged user from all tiers’ interfering BSs that use channel c .
L I C ( c ) ( μ k ( e t 1 ) r k α P k T ) = j K [ exp ( π ( P j T P k T ) 2 α r k 2 q c , j λ I j + 2 α π q c , j λ I j ( P j T P k T ) 4 α r k 2 Γ ( 2 α ) μ j Ω ( e t 1 , μ k , μ j ) ) ]
Secondly, the average achievable D2D rate can be derived as a result of a similar analysis as follows:
R D 2 D ¯ = 2 π w λ U D 0 d r d exp ( π λ U D r d 2 ) 0 L I D 2 D ( μ D 2 D ( e t 1 ) r d α P D 2 D T ) d t d r d
where L I D 2 D ( · ) is as follows:
Underlay Mode: Firstly, if a typical user receives data via the traditional cellular network, R k ¯ can be written as follows (considering an interference-limited regime ( σ 2 0 ) and following the derivation in Appendix A.3)
R k ¯ = 2 π w λ k A k 0 r k exp ( π λ k A k r k 2 ) 0 L I D 2 D ( μ k ( e t 1 ) r k α P k T ) L I C ( μ k ( e t 1 ) r k α P k T ) d t d r k
where L I D 2 D ( μ k ( e t 1 ) r k α P k T ) · L I C ( μ k ( e t 1 ) r k α P k T ) is characterized as
L I D 2 D ( μ k ( e t 1 ) r k α P k T ) · L I C ( μ k ( e t 1 ) r k α P k T ) e π ρ λ U D ( P D 2 D T P k T ) 2 α r k 2 ( μ k ( e t 1 ) μ D 2 D ) 2 α ( π 2 α sin ( π 2 α ) ) . 1 c = c d · j K [ e π ( P j T P k T ) 2 α r k 2 q ^ ( c , j ) λ I j + 2 α π q ^ ( c , j ) λ I j ( P j T P k T ) 4 α r k 2 Γ ( 2 α ) μ j Ω ( e t 1 , μ k , μ j ) ]
The average achievable D2D rate can be obtained as follows as a result of the similar analysis:
R D 2 D ¯ = 2 π w λ U D 0 d r d exp ( π λ U D r d 2 ) 0 L I D 2 D ( μ D 2 D ( e t 1 ) r d α P D 2 D T ) L I C ( μ D 2 D ( e t 1 ) r d α P D 2 D T ) d t d r d
where L I D 2 D ( μ D 2 D ( e t 1 ) r d α P D 2 D T ) · L I C ( μ D 2 D ( e t 1 ) r d α P D 2 D T ) is characterized as follows
L I D 2 D ( μ D 2 D ( e t 1 ) r d α P D 2 D T ) · L I C ( μ D 2 D ( e t 1 ) r d α P D 2 D T ) = e π ρ λ U D r d 2 ( e t 1 ) 2 α ( 2 π α sin ( 2 π α ) ) j K [ e π B 2 r d 2 q d , j λ I j + 2 π B 2 α q d , j λ I j r d 2 Γ ( 2 α ) μ j Ω ( P j T P D 2 D T B α ( e t 1 ) , μ D 2 D , μ j ) ]

4.6. Network EE Metric

In most similar studies in the literature, the influence of D2D communications on the overall EE, which can alleviate the traffic load of both macrocells and SCs in densely deployed HetNets, is not discussed through the EE network analyses. The overall network EE for the proposed network model, measured in terms of bit/joule, is defined as the ratio of total achievable HetNet throughput to total HetNet power consumption, i.e.,
E E = R t o t a l P t o t a l c + P t o t a l D 2 D
in which P t o t a l c = k = 1 K λ k | S ´ | P k BS represents the total power consumption of the BSs in the HetNet, and P t o t a l D 2 D = [ i = 1 m λ U | S ´ | ( 1 p i ) Q i ( 1 e π d 2 λ U D p i ) p t D 2 D ] P D 2 D is the total power consumption of the network’s D2D communications. P k BS has been defined earlier in Equation (12). P D 2 D denotes the power consumption of a D2D connection which is denoted as P D 2 D = P D 2 D T + P D 2 D const , where P D 2 D T and P D 2 D const , respectively, denote the D2D transmit power and constant power consumption of a D2D link. R t o t a l denotes the total achievable throughput of the entire HetNet that can be obtained as
R t o t a l = R t o t a l c + R t o t a l D 2 D
where
R t o t a l c = k = 1 K ( i = 1 m λ U | S ´ | ( 1 p i ) Q i ( e π d 2 λ U D p i ) p t C ) p k c o v ¯ R k ¯
and
R t o t a l D 2 D = i = 1 m ( λ U | S ´ | ( 1 p i ) Q i ( 1 e π d 2 λ U D p i ) p t D 2 D ) p D 2 D c o v ¯ R D 2 D ¯ .
where R t o t a l c and R t o t a l D 2 D are, respectively, the total achievable throughput of the cellular and D2D networks. Based on the above discussions, the overall network EE expression is obtained as follows:
E E = k = 1 K ( i = 1 m λ U | S ´ | ( 1 p i ) Q i ( e π d 2 λ U D p i ) p t C ) p k c o v ¯ R k ¯ + i = 1 m ( λ U | S ´ | ( 1 p i ) Q i ( 1 e π d 2 λ U D p i ) p t D 2 D ) p D 2 D c o v ¯ R D 2 D ¯ k = 1 K λ k | S ´ | [ P k const + β k P k tx ] + i = 1 m ( λ U | S ´ | ( 1 p i ) Q i ( 1 e π d 2 λ U D p i ) p t D 2 D ) [ P D 2 D const + P D 2 D T ]
As explained, our analysis is conducted for two D2D spectrum sharing scenarios: overlay and underlay in-band D2D. Accordingly, from the EE expression in Equation (51), the overall network EE expression for both the overlay and underlay in-band D2D can be obtained as follows:
Overlay in-band D2D mode: In Equation (51), p k c o v ¯ and p D 2 D c o v ¯ , i.e., the average cellular and D2D coverage probability expressions, are, respectively, taken from those in Equations (16) and (19). In addition, the R k ¯ and R D 2 D ¯ are, respectively, taken from those in Equations (42) and (44). Moreover, in the N D 2 D expression, p t D 2 D = p s D 2 D .
Underlay in-band D2D mode: In Equation (51), p k c o v ¯ and p D 2 D c o v ¯ expressions are, respectively, taken from those in Equations (22) and (29). In addition, the R k ¯ and R D 2 D ¯ are, respectively, taken from those in Equations (45) and (47). Further, in the N D 2 D expression, p t D 2 D = ( 1 p F A ) p f D 2 D p s D 2 D .

5. Simulation Results

We henceforth consider a two-tier (femto-macro) HetNet (i.e., K = 2 ) for easier exposition and without loss of generality, as seen in Figure 3. Note that such case, i.e., the macrocell being overlaid with femtocells, remains of great importance, and by focusing on it, we still do not lose any generality of the analysis/results. In the presented results, unless stated otherwise, we consider the underlay in-band D2D mode, where the D2D channel c d occupied by cellular users is accessed opportunistically by D2D transmitters with cognition capability, and therefore cellular links are affected by D2D links, and vice versa. Although overlay in-band D2D can usually provide better system performance without co-channel interference (CCI) under dedicated resources, it is not as efficient as underlay in-band D2D in terms of SE. In addition, in what follows, we consider the PSA policy unless explicitly stated otherwise. The simulation parameters are summarized in Table 1.
In Figure 4, we observe the impact of the FBSs’ TPC (i.e., β 2 ) on the q c , k PSA and q d , k PSA in the underlay in-band D2D mode. Note that for the macro tier (i.e., when k = 1 ), β 1 = 1 because no power control is considered for the MBSs. Only for tier k = 2 , i.e., the FBSs, is the power control mechanism considered. As it was expected, with the increase in β 2 , q c , 2 PSA and q d , 2 PSA increase while the q c , 1 PSA and q d , 1 PSA decrease. In fact, β 2 = 1 implies that all FBSs transmit with their maximum allowable transmitting power, raising the probability that a user is associated with the femto tier (according to the definition of association probability in Section 4.2).
In other words, the use of the TPC factor β 2 to modify the transmit power of the FBSs in the association phase will expand the femtocell coverage area, therefore forcing more users to associate with the FBSs and less users with the MBSs, as compared to a fixed femtocell coverage area. Thus, the probability that a BS of tier 2 (the femto tier) uses a generic channel c i C k \ { c d } (i.e., q c , 2 PSA ) or channel c d (i.e., q d , 2 PSA ) to serve one of its associated cellular users will rise. Obviously, q c , 1 PSA and q d , 1 PSA decrease as a result. However, as depicted in the figure, since MBSs always transmit with higher power, they support more users than FBSs; therefore, q c , 1 PSA and q d , 1 PSA are more than q c , 2 PSA and q d , 2 PSA .
In Figure 5, we can see the impact of varying the total number of available channels | C | in each macrocell on the q c , k PSA and q d , k PSA in the underlay in-band D2D mode. It is obvious that increasing | C | will lead to the decrease in q c , k PSA and q d , k PSA in both the macro and femto tiers. This is because the probability that a BS uses a generic channel c i C k to serve one of its associated cellular users will decrease when the total number of channels increases. As mentioned, more users are served by MBSs (as compared to FBSs) due to their high transmission power. Therefore, q c , 1 PSA and q d , 1 PSA are higher than q c , 2 PSA and q d , 2 PSA , as depicted in the figure.
Figure 6 depicts p f D 2 D , i.e., the probability that the D2D channel (i.e., c d ) is free inside the D2D protection region, as a function of the spectrum sensing threshold γ for different scenarios. As explained earlier, for all depicted scenarios in the underlay in-band D2D, increasing the sensing threshold raises the likelihood of accessing the c d channel while, at the same time, increasing the aggregate network interference. This is because the channel c d is available to be used (from the viewpoint of a D2D transmitter) whenever the received interference from the neighboring BSs on this channel is less than the chosen sensing threshold. On the other hand, lowering the sensing threshold provides more protection for D2D transmission by reducing the aggregate interference; however, it decreases the possibility of access to the c d channel. This finding highlights the importance of carefully selecting the threshold of spectrum sensing for D2D transmitters. In addition, it can also be seen that p f D 2 D in the PSA policy is higher than that of the RSA policy for all values of γ . This is because the goal in PSA is to prevent the use of c d as much as possible, as explained in Section 3. Obviously, p f D 2 D is always 1 in the overlay in-band D2D mode, as it is independent of the spectrum sensing threshold γ . The figure also shows a close matching between the analysis and the simulation. Figure 7 shows the effect of varying the density of users (i.e., λ U ) on p f D 2 D when both the PSA and RSA policies are considered. From Equation (32) and its related equations, it can be noticed that q d , k is an increasing function of λ U . As a result, p f D 2 D decreases with the increase in q d , j : that is, increasing the number of users forces the network to schedule more users at the same time slot which in turn increases the probability of the D2D channel c d being occupied for cellular communication. It can also be seen from this figure that the PSA policy always outperforms the RSA policy for any value of λ U . This is intuitive since the PSA policy offers improved performance in terms of p f D 2 D by avoiding the use of c d as much as possible, as described before.
Figure 8 shows the fraction of the D2D links in the network with the desired QoS. In this paper, the QoS is related to the throughput obtained by the D2D receiver. Specifically, the QoS is the proportion of D2D receivers with a throughput greater than the target threshold of 100 Mbps. As explained, raising the sensing threshold γ increases the probability of accessing the channel c d while, at the same time, increasing the aggregate interference, for both the PSA and RSA policies in the underlay in-band D2D. This will result in a decrease in the number of D2D links with the desired QoS in the network. Reducing the sensing threshold, on the other hand, provides further protection for the D2D transmissions by decreasing the aggregate interference on the c d channel. Obviously, this will increase the number of D2D links with the desired QoS. Moreover, for all values of γ , the percentage of D2D links with the desired QoS is always higher when the PSA policy is used. It is worth mentioning that setting the spectrum sensing threshold needlessly very high can be interpreted as a scenario where the network D2D transmitters are all non-cognitive so that they can access the channel c d without caring about the presence of the cellular network. This implies a high probability of interference between cellular and D2D networks. Thus, cognition plays an important role in determining all QoS-related measurements.
In Figure 9, it can be seen that q d , k PSA and q d , k RSA are increasing functions of user density (this can also be observed in Figure 7). It is also seen that in each tier, q d , k RSA always has higher values when compared to q d , k PSA . In other words, the probability of the D2D channel c d being occupied by the cellular network is always lower when the PSA policy is used. This is intuitive because in the PSA policy, the objective is to avoid the use of Cd as much as possible. In addition, for the same reasons mentioned for Figure 4 and Figure 5, the probability of channel Cd being occupied by the macro tier ( q d , 1 PSA and q d , 1 RSA ) is higher for all values of λ U when compared to the femto tier ( q d , 2 PSA and q d , 2 RSA ). Figure 10 depicts the effect of varying the density of users on q c , k PSA . As it can be seen, the probability that a BS of tier k uses a generic channel c i C k \ { c d } to serve one of its associated cellular users is an increasing function of λ U . Similar reasons and arguments to those we had for the previous figures hold here as well.
Figure 11 depicts the effect of varying the density of MBSs ( λ M B S ) on the q c , k PSA and q d , k PSA ( k { 1 , 2 } ) in the underlay in-band D2D mode and when the PSA policy is used. It can be seen that as λ M B S increases, the q c , k PSA and q d , k PSA in both tiers decrease. In other words, for a fixed number of users, the increase in λ M B S will contribute more available channels in the network (as each MBS is assigned a set of orthogonal channels C = { c 1 , c 2 , , c | C | } ) and hence lower the probability that a BS of tier k uses a generic channel c i C k (including c d ) to serve one of its associated cellular users. Furthermore, as seen in the figure, q c , 1 PSA and q d , 1 PSA are higher for all values of λ M B S when compared to the femto tier (i.e., when k = 2 ). Figure 12 provides the average probability that a given SINR target τ on the x-axis can be achieved (see Equations (22) and (29)). As expected, the macro tier (the first tier) provides a higher coverage area over all possible SINR targets.
In Figure 13, we use simulations to show the fraction of D2D links in the network with the desired QoS as a function of the misdetection probability (i.e., p M D = 1 p D E ). As explained earlier, the case when the cognitive D2D transmitters incorrectly detect the channel c d to be idle for transmission is considered to be misdetection. Under this case, the D2D and cellular transmissions may severely interfere with each other (on channel c d ) with a misdetection probability ( 1 p D E ). As a result, the higher the misdetection probability, the lower the percentage of D2D links with the desired QoS will become. In addition, increasing the number of available channels in each macrocell (i.e., | C | ) decreases the probability that c d is being occupied for cellular communications, which in turn reduces the aggregate interference on this channel. Thus, a larger proportion of D2D links in the network can achieve a throughput higher than the target throughput.
To have a full picture of the network metrics and to evaluate the performance of the proposed communication system model, the corresponding three dimensional (3D) simulations are presented from Figure 14.
The effect of the predefined EH threshold P E H t h on the D2D transmission probability is depicted in Figure 14. The larger the value of P E H t h , the lower the D2D transmission probability. This is because the probability that a D2D transmitter harvests sufficient energy (i.e., p s D 2 D ) decreases as P E H t h increases (see Equation (34)), and as a result, we will observe a lower D2D transmission probability (see Equation (31)). We also observe the relationship between p t D 2 D , the predefined sensing threshold γ , and the EH threshold P E H t h in Figure 15. Clearly, a higher D2D transmission probability can be achieved for the larger values of γ and smaller values of P E H t h .
In Figure 16, the total network power consumption (i.e., P t o t a l c + P t o t a l D 2 D ) is depicted vs. the total number of available channels in each macrocell (i.e., | C | ) and the probability of false alarm p F A . An interesting observation is that for large values of p F A and | C | , the total network power consumption reaches high values at approximately 10 kW. The reason is that when p F A is large, the D2D transmission probability and therefore the number of D2D links will decrease. As a result, less traffic can be offloaded from the cellular network, as less D2D transmissions can be set up. In addition, the larger the size of | C | (i.e., the bandwidth), the higher the number of active users that can be supported in the cellular network. The lower number of D2D links and more supported cellular users translate into growth in the overall network power consumption. Further, as it is observed in Figure 17, the total network power consumption will increase at large values of p F A and small values of d . As can be noticed in Equation (38), when d is relatively small, a lower number of D2D links can be set up, and thus less traffic can be offloaded from the cellular BSs, which in turn raises the total power consumed by the network.
As described above, spectral and energy efficiencies (SE and EE) are considered to be key indicators in wireless cellular networks. It is therefore important to research the impact of the network parameters on the trade-off between SE and EE. We use simulations to characterize the sensitivity of SE and EE with respect to variations of the network parameters, as shown in Figure 18. One can notice that choosing the proper values of the network parameters, including | C | , β 2 , P E H t h , γ , p F A , d , λ M B S , λ F B S , λ U , P { c d C k } (for k = 2 ), the cache size z , and p M D , is important in order to achieve a good SE–EE curve. Indeed, we examine the effect of changing one parameter on the network SE and EE while holding the other parameters constant. As shown in the figure, we define a region called the “Green Area” where we can achieve the network EE of at least 2 Mbit/joule and SE values greater than 100 bit/s/Hz. This rectangular region can provide a numerical reference standard for the network operators to choose the appropriate values of the network parameters from the perspective of both the SE and EE. In other words, any value of each parameter that achieves a network SE and EE inside the rectangular region can be considered as an appropriate value for that parameter. However, deriving the optimal value of a parameter can depend on the other network parameters and metrics as well.
In Figure 19, we see the relationship between the achievable sum of D2D rates (i.e., R t o t a l D 2 D ), the maximum allowable D2D distance d , and the total number of available channels in each macrocell (i.e., | C | ). When d is relatively low, with the rise in d , the number of D2D links and hence the achievable D2D sum rate would increase. However, if we keep raising the maximum allowable D2D distance d , due to the increase in distance and the increase in aggregate interference caused by the increments of D2D connections, the achievable amount of D2D rates would decrease. On the other hand, as mentioned before, when the total number of available channels in each macrocell (i.e., | C | ) increases, the probability that c d is being used for cellular communications becomes lower. Indeed, an increase in | C | reduces the probability of cellular users to access the D2D channel; hence, it reduces the number of active cellular interferers on this channel, and, consequently, the achievable sum of D2D rates will rise.
Figure 20 shows the variations of the network SE as the maximum D2D communication distance d and EH threshold P E H t h vary. Clearly, as d grows, users would have more possibilities in the broader region to detect available content providers. As a result, as more D2D transmissions can be set up, more cellular network traffic can be offloaded. Furthermore, since D2D often occurs over shorter distances, it is expected to yield higher data rates for the users than cellular-based communications, leading to a higher network SE. However, the network achievable D2D rate and hence the network SE will decrease when the D2D distance is further increased (see Figure 19 and Figure 20). In fact, within a certain distance, the achievable data rate in the D2D link is higher than the cellular link with the BSs. However, it would lead to worse performance than the cellular network if we continue to increase the maximum distance for D2D communication. This is because users are unable to have the same transmitting power as BSs. It can also be mentioned that the associated users’ costs (e.g., power consumption) can also increase as the D2D communication distance increases. Moreover, from the figure, we can observe that the smaller the value of the EH threshold P E H t h , the higher the network SE becomes. This is because, as P E H t h becomes smaller, the probability of a D2D transmitter harvesting enough energy ( p s D 2 D ) increases. More D2D transmissions will be set up when more energy is harvested at the D2D transmitters, thereby enhancing the network SE. This finding implies that when D2D communications are powered by EH, a higher network SE can be achieved.
In the simulation result shown in Figure 21, we see the relationship between the network SE, the maximum allowable D2D distance d , and the cache size (i.e., z ) of each cache-enabled D2D UE. The impact of d on the network SE is explained in Figure 20. In addition, for a given d , changing the size of the cache memory z will also cause changes in the value of SE. Generally, the probability that requesting users can obtain a file from the cache-enabled D2D UEs increases with larger cache memory sizes. This, in turn, results in more established D2D connections and hence a higher network SE. However, as it is shown in Figure 21, the network SE depends simultaneously on both the maximum allowable D2D distance d and the cache memory size z . This figure represents how the d and z parameters are performing in terms of achieving a good SE. The yellow area indicates a region with the highest network SE. Thus, the appropriate values of these two parameters should be chosen within that area so that the network SE is maximized. In Figure 22, we can observe the impact of varying the FBSs’ TPC (i.e., β 2 ) and P { c d C k } = | C k | | C | on the network SE and EE. As explained in Equations (7), (10) and (11), P { c d C k } is the probability that the D2D channel c d belongs to the channels allocated to the k -th tier, which is equal to P { c d C k } = | C k | | C | . In all previous figures, for the special case of two-tier (femto-macro) HetNets ( k = 1 : macro, k = 2 : femto), we set P { c d C 2 } = | C 2 | | C | = 0.4 and P { c d C 1 } = | C 1 | | C | = 0.6 . In other words, only 40% of the total bandwidth (allocated to each macrocell) is given to the femto tier. However, according to our analysis, to achieve the maximum network SE and EE, the value of P { c d C 2 } = | C 2 | | C | , i.e., the bandwidth allocated to the femto tier, should be higher, particularly for the EE curve (see Figure 22). Note that femtocells can greatly lower power consumption and achieve a higher SINR due to the short transmit–receive distance. These are translated into enhanced EE and higher network SE. Further, it should be noted that the flexibility of sharing the spectrum, enabled through an adaptive resource partitioning, is seen as an effective way to balance the load among different tiers in the network and improve overall trunking efficiency. While the femto tier provides a higher network SE and EE, the macro tier provides coverage in a wide area, and therefore this should be taken into consideration in any adaptive resource partitioning scheme. The impact of varying the FBSs’ TPC (i.e., β 2 ) on the network SE and EE has also been illustrated. As previously stated, the increase in β 2 would expand the femtocell coverage area, thereby forcing more users to associate with the FBSs. This increases the network SE by improving the total achievable throughput (sum rate). Moreover, there is an optimal TPC for the FBSs (i.e., β 2 * ) as shown in the figure, which maximizes the EE network. Indeed, with the growth of β 2 , the network EE curve will first rise and then decrease due to the increase in power consumption caused by the higher transmission power of the FBSs. Notice that, particularly in a network with a low and fixed user density ( λ U ), the increased network power consumption by the FBSs outweighs the increased network sum rate. It is worth noting here that as the density of users in the network grows higher, the β 2 * value increases.
Finally, in Figure 23, we evaluate the impact of the total number of available channels in each macrocell (i.e., | C | ) and the density of users ( λ U ) on the overall network EE. For a fixed value of | C | , the network EE increases with λ U . The reason for this is that with the growing number of users, the network sum rate and, therefore, the EE of the network are increased assuming that the QoS is met for all users. It is interesting to note that for very large values of λ U , the simulation curve is expected to no longer change with the increase in λ U . This is because the bandwidth available to each macrocell is limited, and at one point, the increase in user density can no longer increase the sum rate and EE of the network. Furthermore, as it can be seen, for a low user density, the network EE enhances with the increase in | C | . However, in the case of a high user density, the network EE first increases with | C | , then eventually drops due to increased aggregate interference in the network (this reduces the sum rate) as a result of an increasing number of newly connected users on a large set of available channels.

6. Conclusions and Future Research Directions

We used stochastic geometry tools in this paper to model and analyze D2D communication underlying a multi-tier/multi-channel cellular network where D2D transmitters can harvest RF energy from ambient interference resulting from concurrent cellular downlink transmissions. In addition, we used a framework for wireless video sharing to consider D2D requirements under realistic application scenarios and specific business requirements, where users are equipped with caches to store common video files and exchange files through D2D communication with other nearby users. Our analysis was conducted for two D2D spectrum sharing scenarios, namely, overlay and underlay in-band D2D. We considered cognitive D2D communication in the underlying in-band D2D, where cognition is applied to the cache-enabled D2D communication. Note that the impact of spectrum sensing errors in the form of false alarms and misdetections which can lead to performance degradation was also studied in this paper. For SC BSs, we also considered a continuous power control/adjustment method by specifying a load-dependent power coefficient for transmission. With the aid of the technical tools of stochastic geometry, we evaluated the performance of the proposed system model in terms of SE and EE. As shown in the simulations, the proposed framework offers advantages in terms of EE and SE. More specifically, the power control/adjustment strategy of SCs, the caching placement, D2D establishment, and cognition and EH capabilities altogether can lead to a considerable improvement in the achieved network EE and SE.
As for the specific research directions in the future, apart from what have been discussed and presented in the previous sections, there are a number of other issues that should be thoroughly explored in this research study. One important point is about the ultra-low latency aspects [45]. Delay-sensitive mission-critical-type applications are gaining traction in 5G networks. Remote surgery, autonomous driving, and vehicle transportation, and other mission-critical applications and services, require ultra-reliable low-latency communications [46]. Low latency and low energy consumption at the same time will be difficult to attain. Shannon capacity has been used to assess the system capacity/throughput in traditional wireless networks, and it is regarded as a suitable metric for SE at the physical layer when the constraints on the buffering delay at the upper layers are ignored [47]. However, a high throughput on the physical layer basically means a high upper layer buffering delay as well, making high throughput and low latency seem to be two opposing targets. Therefore, to support mission-critical delay-sensitive applications with a high downlink data rate, very low link latency, and high reduction in network energy usage, effective mechanisms to address these conflicting goals are needed, which can be explored in future studies. It is worth noting that D2D communication will increase spectral utilization and reduce latency by allowing direct communication between nearby mobile devices. It can also help to increase the EE by reducing the communication distance. As a result, D2D communication is well suited for low-power, delay-constrained communications [48,49].
Another issue to consider is related to coordination in terms of power allocation and interference management. The performance gains of HetNet systems are largely due to two aspects, i.e., decreasing the outage probability and increasing the system capacity. The newly installed HetNet transmission nodes (BSs) can, however, increase the amount of CCI. To minimize CCI between transmission nodes in the LTE-A system, the inter-cell interference coordination (ICIC) and the enhanced ICIC (eICIC) schemes are used [50]. These schemes prohibit undesirable scenarios such that adjacent nodes allocate the same time and frequency resources with full radiation power to UEs located near coverage boundaries. As a result, for the management of time, frequency, and power resources, they use static or semi-static coordination among transmission nodes through X2 interface backhaul. Coordinated multipoint transmission (CoMP) is a promising approach for inter-cell CCI mitigation, which has been included in Third Generation Partnership Project (3GPP) Release 11 specifications [50]. On the other hand, power control/allocation can be applied to reduce the interference among concurrent D2D transmissions and consequently improve the total network EE. In addition, it can be utilized to mitigate the cross-tier interference between D2D and cellular users. There are different methods that can be used to perform joint power allocation in HetNets. In [51], the power allocation problem in HetNets was formulated as a Stackelberg game with MBSs as leaders and FBSs as followers. The authors of [52] proposed a power allocation algorithm in HetNets with uncertainty of channel gains. They adopted the framework of a non-cooperative game among FBSs considering constraints on the expected SINR at each macro-user terminal. The authors of [53,54] stressed the power allocation problem of HetNets. The authors of [53] studied the downlink power allocation problem of HetNets consisting of FBSs and MBSs. They formulated the power allocation problem of the FBSs as a non-cooperative game model under the constraint of the outage probability of macro-UEs. In [54], the authors jointly investigated time domain and power domain optimization of a two-tier macro-pico HetNet. The authors of [55] proposed a distributed BS association and power control scheme for HetNets with the aim of maximizing the sum rate across the network.
Finally, the decoupling of user data and the practical control system is an essential design principle for future wireless access. The latter includes the requisite information and procedures for a device to obtain access to the system. The use of a software-defined radio access network (SoftRAN) [56,57,58] can increase efficiency in the management and control of the networks. For the management of ongoing D2D communications in each BS’s coverage area, our proposed approach can use one or more SoftRAN controllers in the cellular infrastructure. Each controller keeps track of users’ registrations and details about their locations, as well as possible establishment of D2D communication. Such information allows the controller to determine the beginning of a D2D communication and send messages to the devices involved, allowing them to begin/establish a direct communication, and allocating network resources. The status of D2D communication is also monitored by the controller. It reconfigures the UE and network entities to return the communication to the cell infrastructure and ensures the sessions’ consistency if the link is lost (for example, due to a change in location).

Author Contributions

Conceptualization, F.H.P. (Fereidoun H. Panahi); Data curation, F.H.P. (Farzad H. Panahi); Formal analysis, F.H.P. (Fereidoun H. Panahi); Funding acquisition, T.O.; Methodology, F.H.P. (Fereidoun H. Panahi); Resources, F.H.P. (Farzad H. Panahi); Software, F.H.P. (Farzad H. Panahi); Supervision, T.O.; Writing—original draft, F.H.P. (Fereidoun H. Panahi); Writing—review & editing, F.H.P. (Farzad H. Panahi) and T.O. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Appendix A.1. Derivation of N k

Denoting | S ´ | , N , N k b , and N k u as the area of the entire network, number of users in the entire network, and average number of k -th tier BSs and k -th tier users, respectively, we obtain N k u = A k λ U | S ´ | and N k b = λ k | S ´ | . As defined earlier, A k = λ k P k T ( 2 α ) / j = 1 K λ j P j T ( 2 α ) is the association probability. From the relations, the number of users per BS in the k -th tier is given by
N k = N k u N k b = λ U λ k + j = 1 , j k K λ j ( P j T P k T ) 2 / α

Appendix A.2. Derivation of p s D 2 D

We begin with obtaining the Laplace transform of the random variable P E H , i.e., the aggregate interference power from the concurrent cellular downlink transmissions of all tiers received at the D2D transmitter located at the origin,
L P E H ( s ) = E P E H [ exp ( s P E H ) ] = E Φ j , g i [ exp ( s a j K i Φ j c C P j T g i R i α ) ] = j K [ E Φ j [ i Φ j [ 1 1 + s a P j T R i α ] | C | ] ]
Using the definition of the Generating functional for the PPP [41], and by translating the point process into polar coordinates, the above expression will become
L P E H ( s ) = j K [ exp { [ 0 ( 1 [ 1 1 + s a P j T R α ] | C | ) q c , j λ I j d R d 1 b d d R ] } ]
in which q c , j λ I j is the set of BSs in tier j that use channel c and b d = π d Γ ( 1 + d 2 ) represents the volume of a unit sphere in R d [31]. For our 2-D PPP (i.e., d = 2 ),
L P E H ( s ) = j K exp [ 2 π q c , j λ I j 0 ( 1 [ 1 1 + s a P j T R α ] | C | ) R d R ]
Utilizing the change in variables u = 1 1 + s a P j T R α ,
L P E H ( s ) = j K exp [ 𝓌 j s 2 / α ]
where
𝓌 j = 2 π q c , j λ j ( a P j T ) 2 / α Γ ( 1 2 α ) α k = 1 | C | Γ ( k 1 + 2 α ) ( k 1 ) !
Then, following the proof in [27,59,60], and according to the definition of p s D 2 D , Equation (35) can be easily verified.

Appendix A.3. Derivation of R k ¯

Overlay mode: From the expression of R k ¯ in Equation (41), we have
R k ¯ = 2 π w λ k A k 0 r k exp ( π λ k A k r k 2 ) E [ ln ( 1 + P k T h k r k α σ 2 + j K i Φ j ( c ) \ b 0 , k P j T g i R i α ) ] d r k
where h k represents the exponentially distributed channel between the tagged user and its serving BS from the k -th tier. We denote by b 0 , k the serving (tagged) BS of tier k . The term j K = I C ( c ) is the aggregate interference from all tiers’ interfering BSs (that use channel c ) at the tagged user. In addition, g i is the exponentially distributed channel between the i -th interfering BS in the j -th tier, and R i is the distance of the i -th interferer in the j -th tier (i.e., captured by the point process Φ j ) from the tagged user. Notice that Φ j ( c ) is the point process of BSs (in tier j ) that use channel c . According to the fact that E [ X ] = 0 P [ X > t ] d t when X > 0 , the above expression is rewritten as follows:
R k ¯ = 2 π w λ k A k 0 r k exp ( π λ k A k r k 2 ) 0 P [ ln ( 1 + P k T h k r k α σ 2 + I C ( c ) ) > t ] d t d r k = 2 π w λ k A k 0 r k exp ( π λ k A k r k 2 ) 0 P [ h k > ( e t 1 ) ( σ 2 + I C ( c ) ) r k α P k T ] d t d r k = 2 π w λ k A k 0 r k exp ( π λ k A k r k 2 ) 0 e μ k ( e t 1 ) r k α P k T σ 2 L I C ( c ) ( μ k ( e t 1 ) r k α P k T ) d t d r k
where L I C ( c ) is the Laplace transform of the random variable I C ( c ) , and it is given in Equation (43) (please refer to [11]: Appendix A, for the detailed derivation of L I C ( c ) ). Finally, having considered an interference-limited regime ( σ 2 0 ) , we obtain the expression in Equation (42).
Underlay mode: Similarly, from the expression of R k ¯ in Equation (41), we have
R k ¯ = 2 π w λ k A k 0 r k exp ( π λ k A k r k 2 ) E [ ln ( 1 + P k T h k r k α σ 2 + I D 2 D . 1 c = c d + I C ( c ) ) ] d r k
Based on the fact that E [ X ] = 0 P [ X > t ] d t when X > 0 , the above expression is finally rewritten as
R k ¯ = 2 π w λ k A k 0 r k exp ( π λ k A k r k 2 ) 0 e μ k ( e t 1 ) r k α P k T σ 2 L I D 2 D ( μ k ( e t 1 ) r k α P k T ) · L I C ( μ k ( e t 1 ) r k α P k T ) d t d r k
where L I D 2 D ( μ k ( e t 1 ) r k α P k T ) · L I C ( μ k ( e t 1 ) r k α P k T ) is given in Equation (46). Finally, considering an interference-limited regime ( σ 2 0 ) , we obtain the expression in Equation (45).

References

  1. Wu, J.; Zhang, Y.; Zukerman, M.; Yung, E.K.N. Energy-Efficient Base-Stations Sleep-Mode Techniques in Green Cellular Networks: A Survey. IEEE Commun. Surv. Tutor. 2015, 17, 803–826. [Google Scholar] [CrossRef]
  2. Oh, E.; Krishnamachari, B.; Liu, X.; Niu, Z. Toward dynamic energy-efficient operation of cellular network infrastructure. IEEE Commun. Mag. 2011, 49, 56–61. [Google Scholar] [CrossRef]
  3. Richter, F.; Fehske, A.J.; Fettweis, G.P. Energy efficiency aspects of base station deployment strategies in cellular networks. In Proceedings of the 2009 IEEE 70th Vehicular Technology Conference Fall, Anchorage, AK, USA, 20–23 September 2009; pp. 1–5. [Google Scholar]
  4. Lin, X.; Andrews, J.G.; Ghosh, A.; Ratasuk, R. An overview of 3GPP device-to-device proximity services. IEEE Commun. Mag. 2014, 52, 40–48. [Google Scholar] [CrossRef] [Green Version]
  5. Cha, M.; Kwak, H.; Rodriguez, P.; Ahn, Y.; Moon, S. I Tube, You Tube, Everybody Tubes: Analyzing the World’s Largest User Generated Content Video System. In Proceedings of the ACM SIGCOMM Internet Measurement Conference, San Diego, CA, USA, 24–26 October 2007. [Google Scholar] [CrossRef]
  6. Liu, H.; Chen, Z.; Tian, X.; Wang, X.; Tao, M. On content-centric wireless delivery networks. IEEE Wireless Commun. 2014, 21, 118–125. [Google Scholar] [CrossRef]
  7. Shinohara, N. Power without wires. IEEE Microw. Mag. 2011, 12, 64–73. [Google Scholar] [CrossRef]
  8. Shang, B.; Zhao, L.; Chen, K.C.; Chu, X. Energy efficient D2D-assisted offloading with wireless power transfer. In Proceedings of the IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar]
  9. Siddiqui, A.M.; Musavian, L.; Aïssa, S.; Ni, Q. Weighted Tradeoff Between Spectral Efficiency and Energy Efficiency in Energy Harvesting Systems. In Proceedings of the 2019 IEEE 30th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), Istanbul, Turkey, 8–11 September 2019; pp. 1–6. [Google Scholar]
  10. Sakr, A.H.; Tabassum, H.; Hossain, E.; Kim, D.I. Cognitive Spectrum Access in Device-to-Device-Enabled Cellular Networks. IEEE Commun. Mag. 2015, 53, 126–133. [Google Scholar] [CrossRef]
  11. Panahi, F.H.; Panahi, F.H.; Hattab, G.; Ohtsuki, T.; Cabric, D. Green Heterogeneous Networks via an Intelligent Sleep/Wake-Up Mechanism and D2D Communications. IEEE Trans. Green Commun. Netw. 2018, 2, 915–931. [Google Scholar] [CrossRef]
  12. Soh, Y.S.; Quek, T.Q.S.; Kountouris, M.; Shin, H. Energy efficient heterogeneous cellular networks. IEEE J. Sel. Areas Commun. 2013, 31, 840–850. [Google Scholar] [CrossRef]
  13. Peng, J.; Hong, P.; Xue, K. Stochastic analysis of optimal base station energy saving in cellular networks with sleep mode. IEEE Commun. Lett. 2014, 18, 612–615. [Google Scholar] [CrossRef]
  14. Wang, Y.; Zhang, Y.; Chen, Y.; Wei, R. Energy-efficient design of two-tier femtocell networks. EURASIP J. Wirel. Commun. Netw. 2015, 40. [Google Scholar] [CrossRef] [Green Version]
  15. IEEE 802.16M. IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Broadband Wireless Access Systems Amendment 3: Advanced Air Interface; IEEE: Piscataway, NJ, USA, 2011; pp. 1–1112. [Google Scholar]
  16. Wu, G.; Feng, G.; Qin, S. Cooperative sleep-mode and performance modeling for heterogeneous mobile network. In Proceedings of the 2013 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), Shanghai, China, 7–10 April 2013; pp. 6–11. [Google Scholar]
  17. Vereecken, W.; Haratcherev, I.; Deruyck, M.; Joseph, W.; Pickavet, M.; Martens, L.; Demeester, P. The effect of variable wake up time on the utilization of sleep modes in femtocell mobile access networks. In Proceedings of the 2012 9th Annual Conference on Wireless On-Demand Network Systems and Services (WONS), Courmayeur, Italy, 9–11 January 2012; pp. 63–66. [Google Scholar]
  18. Liu, C.; Natarajan, B.; Xia, H. Small cell base station sleep strategies for energy efficiency. IEEE Trans. Veh. Technol. 2016, 65, 1652–1661. [Google Scholar] [CrossRef]
  19. Min, H.; Seo, W.; Lee, J.; Park, S.; Hong, D. Reliability improvement using receive mode selection in the device-to-device uplink period underlaying cellular networks. IEEE Trans. Wirel. Commun. 2011, 10, 413–418. [Google Scholar] [CrossRef]
  20. Chen, T.; Charbit, G.; Hakola, S. Time hopping for device-to-device communication in LTE cellular system. In Proceedings of the 2010 IEEE Wireless Communication and Networking Conference, Sydney, NSW, Australia, 18–21 April 2010; pp. 1–6. [Google Scholar]
  21. Bastug, E.; Bennis, M.; Debbah, M. Living on the Edge: The Role of Proactive Caching in 5G Wireless Networks. IEEE Commun. Mag. 2014, 52, 82–89. [Google Scholar] [CrossRef] [Green Version]
  22. Golrezaei, N.; Dimakis, A.; Molisch, A. Scaling Behavior for Deviceto-Device Communications with Distributed Caching. IEEE Trans. Inf. Theory 2014, 60, 4286–4298. [Google Scholar] [CrossRef]
  23. Golrezaei, N.; Mansourifard, P.; Molisch, A.; Dimakis, A. Base-Station Assisted Device-to-Device Communications for HighThroughput Wireless Video Networks. IEEE Trans. Wirel. Commun. 2014, 13, 3665–3676. [Google Scholar] [CrossRef] [Green Version]
  24. Afshang, M.; Dhillon, H.S.; Chong, P.H.J. Fundamentals of Cluster-Centric Content Placement in Cache-Enabled Device-to-Device Networks. Available online: http://arxiv.org/abs/1509.04747 (accessed on 23 February 2021).
  25. Altieri, A.; Piantanida, P.; Vega, L.R.; Galarza, C. On Fundamental Trade-offs of Device-to-Device Communications in Large Wireless Networks. IEEE Trans. Wireless Commun. 2015, 14, 4958–4971. [Google Scholar] [CrossRef] [Green Version]
  26. Khoshkholgh, M.; Zhang, Y.; Chen, K.-C.; Shin, K.; Gjessing, S. Connectivity of Cognitive Device-to-Device Communications Underlying Cellular Networks. IEEE J. Sel. Areas Commun. 2015, 33, 81–99. [Google Scholar] [CrossRef]
  27. Sakr, A.; Hossain, E. Cognitive and EH-Based D2D Communication in Cellular Networks: Stochastic Geometry Modeling and Analysis. IEEE Trans. Commun. 2015, 63, 1867–1880. [Google Scholar] [CrossRef] [Green Version]
  28. ElSawy, H.; Hossain, E. Two-Tier HetNets with Cognitive Femtocells: Downlink Performance Modeling and Analysis in a Multichannel Environment. IEEE Trans. Mob. Comput. 2014, 13, 649–663. [Google Scholar] [CrossRef]
  29. Kebriaei, H.; Maham, B.; Niyato, D. Double sided bandwidth auction game for cognitive device-to-device communication in cellular networks. IEEE Trans. Veh. Technol. 2015, 65, 7476–7487. [Google Scholar] [CrossRef]
  30. Liu, Y.; Wang, L.; Zaidi, S.R.; Elkashlan, M.; Duong, T. Secure D2D Communication in Large-Scale Cognitive Cellular Networks: A Wireless Power Transfer Model. IEEE Trans. Commun. 2016, 64, 329–342. [Google Scholar] [CrossRef]
  31. Panahi, F.H.; Ohtsuki, T. Stochastic geometry modeling and analysis of cognitive heterogeneous cellular networks. EURASIP J. Wirel. Commun. Netw. 2015, 2015, 141. [Google Scholar] [CrossRef] [Green Version]
  32. Panahi, F.H.; Ohtsuki, T. Stochastic geometry based analytical modeling of cognitive heterogeneous cellular networks. In Proceedings of the 2014 IEEE International Conference on Communications (ICC), Sydney, NSW, Australia, 10–14 June 2014; pp. 5281–5286. [Google Scholar]
  33. Panahi, F.H.; Panahi, F.H.; Ohtsuki, T. Energy Efficiency Analysis in Cache-Enabled D2D-Aided Heterogeneous Cellular Networks. IEEE Access 2020, 8, 19540–19554. [Google Scholar] [CrossRef]
  34. Jo, H.; Sang, Y.; Xia, P.; Andrews, J. Heterogeneous cellular networks with flexible cell association: A comprehensive downlink SINR analysis. IEEE Trans. Wirel. Commun. 2012, 11, 3484–3495. [Google Scholar] [CrossRef] [Green Version]
  35. Andrews, J.G.; Baccelli, F.; Ganti, R.K. A Tractable Approach to Coverage and Rate in Cellular Networks. IEEE Trans. Commun. 2011, 59, 3122–3134. [Google Scholar] [CrossRef] [Green Version]
  36. Lin, X.; Andrews, J.G.; Ghosh, A. Spectrum sharing for device-to-device communication in cellular networks. IEEE Trans. Wirel. Commun. 2014, 13, 6727–6740. [Google Scholar] [CrossRef]
  37. Sakr, A.H.; Hossain, E. Analysis of multi-tier uplink cellular networks with EH and flexible cell association. In Proceedings of the 2014 IEEE Global Communications Conference, Austin, TX, USA, 8–12 December 2014; pp. 4712–4717. [Google Scholar]
  38. Liang, Y.; Zeng, Y.; Peh, E.C.Y.; Hoang, A.T. Sensing-Throughput Tradeoff for Cognitive Radio Networks. IEEE Trans. Wirel. Commun. 2008, 7, 1326–1337. [Google Scholar] [CrossRef]
  39. ElSawy, H.; Sultan-Salem, A.; Alouini, M.; Win, M.Z. Modeling and Analysis of Cellular Networks Using Stochastic Geometry: A Tutorial. IEEE Commun. Surv. Tutor. 2017, 19, 167–203. [Google Scholar] [CrossRef] [Green Version]
  40. Deruyck, M.; Joseph, W.; Martens, L. Power consumption model for macrocell and microcell base stations. Trans. Emerg. Telecommun. Technol. 2014, 25, 320–333. [Google Scholar]
  41. Yazdanshenasan, Z.; Dhillon, H.S.; Afshang, M.; Chong, P.H. Poisson hole process: Theory and applications to wireless networks. IEEE Trans. Wirel. Commun. 2016, 15, 7531–7546. [Google Scholar] [CrossRef]
  42. Cisco. Cisco Visual Networking Index: Forecast and Methodology 2017–2022; Cisco White Paper; Cisco: San Jose, CA, USA, 2017. [Google Scholar]
  43. Weber, S.; Andrews, J.; Jindal, N. The effect of fading, channel inversion, and threshold scheduling on ad hoc networks. IEEE Trans. Inf. Theory 2007, 53, 4127–4149. [Google Scholar] [CrossRef] [Green Version]
  44. Malak, D.; Al-Shalash, M.; Andrews, J.G. Spatially correlated content caching for device-to-device communications. IEEE Trans. Wirel. Commun. 2017, 17, 56–70. [Google Scholar] [CrossRef] [Green Version]
  45. Ahmed, N.; Thyagaturu, A.S.; Alharbi, Z.; Wang, C.; Shao, X.; Reisslein, M.; ElBakoury, H. Ultra-low latency (ULL) networks: The IEEE TSN and IETF DetNet standards and related 5G ULL research. IEEE Commun. Surv. Tutor. 2018, 21, 88–145. [Google Scholar]
  46. Chen, H.; Abbas, R.; Cheng, P.; Shirvanimoghaddam, M.; Hardjawana, W.; Bao, W.; Li, Y.; Vucetic, B. Ultra-reliable low latency cellular networks: Use cases, challenges and approaches. IEEE Commun. Mag. 2018, 56, 119–125. [Google Scholar] [CrossRef] [Green Version]
  47. Yu, W.; Musavian, L.; Ni, Q. Tradeoff analysis and joint optimization of link-layer energy efficiency and effective capacity toward green communications. IEEE Trans. Wirel. Commun. 2016, 15, 3339–3353. [Google Scholar] [CrossRef]
  48. Jameel, F.; Hamid, Z.; Jabeen, F.; Zeadally, S.; Javed, M.A. A survey of device-to-device communications: Research issues and challenges. IEEE Commun. Surv. Tuts. 2018, 20, 2133–2168. [Google Scholar] [CrossRef]
  49. Said, A.; Shah, S.W.H.; Farooq, H.; Mian, A.N.; Imran, A.; Crowcroft, J. Proactive Caching at the Edge Leveraging Influential User Detection in Cellular D2D Networks. Future Internet 2018, 10, 93. [Google Scholar] [CrossRef] [Green Version]
  50. Irmer, R.; Droste, H.; Marsch, P.; Griege, M.; Fettweis, G.; Brueck, S.; Mayer, H.; Thiele, L.; Jungnickel, V. Coordinated multipoint: Concepts, performance, and field trial results. IEEE Commun. Mag. 2011, 49, 102–111. [Google Scholar] [CrossRef] [Green Version]
  51. Guruacharya, S.; Niyato, D.; Kim, D.I.; Hossain, E. Hierarchical competition for downlink power allocation in OFDMA femtocell networks. Wirel. Commun. IEEE Trans. 2013, 12, 1543–1553. [Google Scholar] [CrossRef]
  52. Zhu, K.; Hossain, E.; Anpalagan, A. Downlink Power Control in Two-Tier Cellular OFDMA Networks under Uncertainties: A Robust Stackelberg Game. Commun. IEEE Trans. 2015, 63, 520–535. [Google Scholar] [CrossRef]
  53. Ghosh, A.; Cottatellucci, L.; Altman, E. Nash equilibrium for femto-cell power allocation in hetNets with channel uncertainty. In Proceedings of the 2015 IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–7. [Google Scholar]
  54. Zhou, H.; Xia, H.; Guo, C.; Han, R.; Wu, Y. Adaptive ABS configuration scheme with joint power control for macro-pico heterogeneous networks. In Proceedings of the 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall), Vancouver, BC, USA, 14–17 September 2014; pp. 1–5. [Google Scholar]
  55. Ha, V.N.; Le, L.B. Distributed base station association and power control for heterogeneous cellular networks. IEEE Trans. Veh. Technol. 2014, 63, 282–296. [Google Scholar] [CrossRef]
  56. Muthanna, A.; Ateya, A.A.; al Balushi, M.; Kirichek, R. D2D enabled communication system structure based on software defined networking for 5G network. In Proceedings of the 2018 International Symposium on Consumer Technologies (ISCT), St. Petersburg, Russia, 11–12 May 2018; pp. 41–44. [Google Scholar]
  57. Huq, K.M.S.; Mumtaz, S.; Rodriguez, J.; Marques, P.; Okyere, B.; Frascolla, V. Enhanced c-ran using D2D network. IEEE Commun. Mag. 2017, 55, 100–107. [Google Scholar] [CrossRef]
  58. Gedel, I.A.; Nwulu, N.I. Low Latency 5G Distributed Wireless Network Architecture: A Techno-Economic Comparison. Inventions 2021, 6, 11. [Google Scholar] [CrossRef]
  59. University of Manitoba, Information Services and Technology Website. Available online: http://home.cc.umanitoba.ca/~sakra/publications.html (accessed on 23 February 2021).
  60. Cohen, A.M. Numerical Methods for Laplace Transform Inversion; Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
Figure 1. System model: a multi-cell network topology for a D2D-enabled two-tier cellular network composed of a macrocell tier overlaid with a femtocell tier.
Figure 1. System model: a multi-cell network topology for a D2D-enabled two-tier cellular network composed of a macrocell tier overlaid with a femtocell tier.
Electronics 10 00839 g001
Figure 2. The probability of finding a file from the cache-enabled D2D UEs vs. the maximum allowable D2D distance (i.e., d ) and the number of network cache files (i.e., m ). Here, the z value is set to 10.
Figure 2. The probability of finding a file from the cache-enabled D2D UEs vs. the maximum allowable D2D distance (i.e., d ) and the number of network cache files (i.e., m ). Here, the z value is set to 10.
Electronics 10 00839 g002
Figure 3. Coverage simulations for the proposed spectrum-aware D2D-enabled HetNet. The D2D connections are shown by solid black lines. The green and black points, respectively, represent the users connected to the femto base stations (FBSs) and macro base stations (MBSs). The white points are inactive users.
Figure 3. Coverage simulations for the proposed spectrum-aware D2D-enabled HetNet. The D2D connections are shown by solid black lines. The green and black points, respectively, represent the users connected to the femto base stations (FBSs) and macro base stations (MBSs). The white points are inactive users.
Electronics 10 00839 g003
Figure 4. The impact of the FBSs’ TPC (i.e., β 2 ) on the q c , k PSA and q d , k PSA in the underlay in-band D2D mode.
Figure 4. The impact of the FBSs’ TPC (i.e., β 2 ) on the q c , k PSA and q d , k PSA in the underlay in-band D2D mode.
Electronics 10 00839 g004
Figure 5. The q c , k PSA and q d , k PSA in the underlay in-band D2D mode vs. the total number of available channels | C | in each macrocell.
Figure 5. The q c , k PSA and q d , k PSA in the underlay in-band D2D mode vs. the total number of available channels | C | in each macrocell.
Electronics 10 00839 g005
Figure 6. The probability that the D2D channel c d is free inside the D2D protection region (i.e., p f D 2 D ) as a function of the spectrum sensing threshold γ (in dBm).
Figure 6. The probability that the D2D channel c d is free inside the D2D protection region (i.e., p f D 2 D ) as a function of the spectrum sensing threshold γ (in dBm).
Electronics 10 00839 g006
Figure 7. p f D 2 D vs. the density of users for the prioritized spectrum access (PSA) and random spectrum access (RSA) policies in the K -tier HetNet.
Figure 7. p f D 2 D vs. the density of users for the prioritized spectrum access (PSA) and random spectrum access (RSA) policies in the K -tier HetNet.
Electronics 10 00839 g007
Figure 8. The percentage of D2D links with the desired quality of service (QoS) vs. the cognitive radio sensing threshold γ (in dBm) for both the RSA and PSA policies. Higher γ : moving toward the non-cognitive D2D scenario. Lower γ : moving toward the cognitive D2D scenario.
Figure 8. The percentage of D2D links with the desired quality of service (QoS) vs. the cognitive radio sensing threshold γ (in dBm) for both the RSA and PSA policies. Higher γ : moving toward the non-cognitive D2D scenario. Lower γ : moving toward the cognitive D2D scenario.
Electronics 10 00839 g008
Figure 9. The q d , k PSA and q d , k RSA in the underlay in-band D2D mode vs. the intensity of users when both the RSA and PSA policies are used.
Figure 9. The q d , k PSA and q d , k RSA in the underlay in-band D2D mode vs. the intensity of users when both the RSA and PSA policies are used.
Electronics 10 00839 g009
Figure 10. The q c , k PSA in the underlay in-band D2D mode vs. the density of users when the PSA policy is used.
Figure 10. The q c , k PSA in the underlay in-band D2D mode vs. the density of users when the PSA policy is used.
Electronics 10 00839 g010
Figure 11. The q c , k PSA and q d , k PSA in the underlay in-band D2D mode vs. the density of MBSs when the PSA policy is used.
Figure 11. The q c , k PSA and q d , k PSA in the underlay in-band D2D mode vs. the density of MBSs when the PSA policy is used.
Electronics 10 00839 g011
Figure 12. The average downlink cellular/D2D coverage probabilities (i.e., p k c o v ( c ) ¯ and p D 2 D c o v ¯ ) in underlay in-band D2D mode and when the PSA policy is used vs. the corresponding SINR thresholds τ k ( k K ) and τ D 2 D .
Figure 12. The average downlink cellular/D2D coverage probabilities (i.e., p k c o v ( c ) ¯ and p D 2 D c o v ¯ ) in underlay in-band D2D mode and when the PSA policy is used vs. the corresponding SINR thresholds τ k ( k K ) and τ D 2 D .
Electronics 10 00839 g012
Figure 13. The percentage of D2D links with the desired quality of service (QoS) vs. the misdetection probability (i.e., p M D ) for different sizes of | C | .
Figure 13. The percentage of D2D links with the desired quality of service (QoS) vs. the misdetection probability (i.e., p M D ) for different sizes of | C | .
Electronics 10 00839 g013
Figure 14. The D2D transmission probability ( p t D 2 D ) vs. the probability of false alarm (i.e., p F A ) and the predetermined energy harvesting (EH) threshold (i.e., P E H t h ) of the cognitive D2D transmitters.
Figure 14. The D2D transmission probability ( p t D 2 D ) vs. the probability of false alarm (i.e., p F A ) and the predetermined energy harvesting (EH) threshold (i.e., P E H t h ) of the cognitive D2D transmitters.
Electronics 10 00839 g014
Figure 15. The D2D transmission probability ( p t D 2 D ) vs. the predetermined EH threshold (i.e., P E H t h ) and the predefined sensing threshold (i.e., γ ) of the cognitive D2D transmitters.
Figure 15. The D2D transmission probability ( p t D 2 D ) vs. the predetermined EH threshold (i.e., P E H t h ) and the predefined sensing threshold (i.e., γ ) of the cognitive D2D transmitters.
Electronics 10 00839 g015
Figure 16. The total network power consumption vs. the total number of available channels in each macrocell (i.e., | C | ) and the probability of false alarm p F A .
Figure 16. The total network power consumption vs. the total number of available channels in each macrocell (i.e., | C | ) and the probability of false alarm p F A .
Electronics 10 00839 g016
Figure 17. The total network power consumption vs. the maximum allowable D2D distance d and the probability of false alarm p F A .
Figure 17. The total network power consumption vs. the maximum allowable D2D distance d and the probability of false alarm p F A .
Electronics 10 00839 g017
Figure 18. The sensitivity of the spectral efficiency (SE) and energy efficiency (EE) with respect to variations of the network parameters.
Figure 18. The sensitivity of the spectral efficiency (SE) and energy efficiency (EE) with respect to variations of the network parameters.
Electronics 10 00839 g018
Figure 19. The impact of varying the maximum allowable D2D distance (i.e., d ) and the total number of available channels in each macrocell (i.e., | C | ) on the achievable sum of D2D rates (i.e., R t o t a l D 2 D ).
Figure 19. The impact of varying the maximum allowable D2D distance (i.e., d ) and the total number of available channels in each macrocell (i.e., | C | ) on the achievable sum of D2D rates (i.e., R t o t a l D 2 D ).
Electronics 10 00839 g019
Figure 20. The relationship between the network SE, the maximum allowable D2D distance d , and the predetermined EH threshold (i.e., P E H t h ). Higher P E H t h : moving toward non-EH-based D2D communications. Lower P E H t h : moving toward EH-based D2D communications.
Figure 20. The relationship between the network SE, the maximum allowable D2D distance d , and the predetermined EH threshold (i.e., P E H t h ). Higher P E H t h : moving toward non-EH-based D2D communications. Lower P E H t h : moving toward EH-based D2D communications.
Electronics 10 00839 g020
Figure 21. The relationship between the network SE, the maximum allowable D2D distance d , and the cache size (i.e., z ) of each cache-enabled D2D UE; (b) shows a high-angle view of (a). m is set to be 100 here.
Figure 21. The relationship between the network SE, the maximum allowable D2D distance d , and the cache size (i.e., z ) of each cache-enabled D2D UE; (b) shows a high-angle view of (a). m is set to be 100 here.
Electronics 10 00839 g021
Figure 22. The relationship between the network SE (a)/EE (b), the FBSs’ TPC (i.e., β 2 ), and P { c d C k } = | C k | | C | (in this figure, k is set to 2, i.e., the femto tier). Note that P { c d C k } is the probability that the D2D channel c d belongs to the channels allocated to the k -th tier.
Figure 22. The relationship between the network SE (a)/EE (b), the FBSs’ TPC (i.e., β 2 ), and P { c d C k } = | C k | | C | (in this figure, k is set to 2, i.e., the femto tier). Note that P { c d C k } is the probability that the D2D channel c d belongs to the channels allocated to the k -th tier.
Electronics 10 00839 g022aElectronics 10 00839 g022b
Figure 23. The impact of the total number of available channels in each macrocell (i.e., | C | ) and the density of users ( λ U ) on the network EE.
Figure 23. The impact of the total number of available channels in each macrocell (i.e., | C | ) and the density of users ( λ U ) on the network EE.
Electronics 10 00839 g023
Table 1. Major simulation parameters.
Table 1. Major simulation parameters.
SymbolValueDescription
P M B S T 37 dBmMBS transmit power
P F B S T 23 dBmFBS transmit power
P U T = P D 2 D T 20 dBmUser transmit power
λ M B S 1 × 10 7 m 2 MBS initial density
λ F B S 3 λ M FBS initial density
λ U 4 × 10 5 m 2 User initial density
λ U D 50 % λ U Cache-enabled D2D UEs density
μ M B S = μ F B S = μ D 2 D 1Rayleigh fading parameter
d 200 mMaximum allowable D2D distance
| C | 200Macrocell bandwidth
γ 80 dBmD2D sensing threshold
P E H t h 90 dBmEH threshold
τ F B S = τ M B S 0 dBCellular SINR threshold
τ D 2 D 0 dBD2D SINR threshold
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Panahi, F.H.; Panahi, F.H.; Ohtsuki, T. Spectrum-Aware Energy Efficiency Analysis in K-tier 5G HetNets. Electronics 2021, 10, 839. https://doi.org/10.3390/electronics10070839

AMA Style

Panahi FH, Panahi FH, Ohtsuki T. Spectrum-Aware Energy Efficiency Analysis in K-tier 5G HetNets. Electronics. 2021; 10(7):839. https://doi.org/10.3390/electronics10070839

Chicago/Turabian Style

Panahi, Fereidoun H., Farzad H. Panahi, and Tomoaki Ohtsuki. 2021. "Spectrum-Aware Energy Efficiency Analysis in K-tier 5G HetNets" Electronics 10, no. 7: 839. https://doi.org/10.3390/electronics10070839

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop