Next Article in Journal
Online Frequency Response Analysis of Electric Machinery through an Active Coupling System Based on Power Electronics
Next Article in Special Issue
Precoder and Decoder Co-Designs for Radar and Communication Spectrum Sharing
Previous Article in Journal
Colorimetric Detection of Organophosphate Pesticides Based on Acetylcholinesterase and Cysteamine Capped Gold Nanoparticles as Nanozyme
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Joint Power and Subchannel Allocation for Distributed Storage in Cellular-D2D Underlays

1
School of Software Engineering, Tongji University, Shanghai 201804, China
2
School of Electronic and Information Engineering, Nanjing University of Information Science and Technology, Nanjing 210044, China
3
National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China
4
College of Artifcial Intelligence, Nanjing University of Information Science and Technology, Nanjing 210044, China
*
Author to whom correspondence should be addressed.
Sensors 2021, 21(23), 8059; https://doi.org/10.3390/s21238059
Submission received: 2 November 2021 / Revised: 19 November 2021 / Accepted: 30 November 2021 / Published: 2 December 2021
(This article belongs to the Special Issue Artificial Intelligence (AI)-Enabled 6G Communications)

Abstract

:
Wireless distributed storage is beneficial in the provision of reliable content storage and offloading of cellular traffic. In this paper, we consider a cellular device-to-device (D2D) underlay-based wireless distributed storage system, in which the minimum storage regenerating (MSR) coding combined with the partial downloading scheme is employed. To alleviate burdens on insufficient cellular resources and improve spectral efficiency in densely deployed networks, multiple storage devices can simultaneously use the same uplink cellular subchannel under the non-orthogonal multiple access (NOMA) protocol. Our objective is to minimize the total transmission power for content reconstruction, while guaranteeing the signal-to-interference-plus-noise ratio (SINR) constraints for cellular users by jointly optimizing power and subchannel allocation. To tackle the non-convex combinational program, we decouple the original problem into two subproblems and propose two low-complexity algorithms to efficiently solve them, followed by a joint optimization, implemented by alternately updating the solutions to each subproblem. The numerical results illustrate that our proposed algorithms are capable of performing an exhaustive search with lower computation complexity, and the NOMA-enhanced scheme provides more transmission opportunities for neighbor storage devices, thus significantly reducing the total power consumption.

1. Introduction

The explosively growing mobile data traffic has dramatically burdened current wireless networks and posed a great challenge to the future 6G communications. To alleviate the limited wireless bottlenecks, distributed storage over wireless links has been introduced as a promising technique for offloading the ever-increasing cellular traffic [1,2,3]. For a distributed storage system, the popular content files can be pre-stored across multiple distributed storage devices (called content helpers). Users requiring the stored content (content requesters) can directly download them from neighboring content helpers (CHs) instead of from the serving BS, resulting in lower power consumption and content delivery delay [4,5,6].
In practical communication scenarios, storage devices may be individually unreliable when some storage device fails or leaves the network, and thus loses its stored content. To maintain high reliability, there has been a large body of related work [7,8,9,10] researching storage coding schemes to facilitate a reconstruction of the original content, as well as repairing the lost data. Among them, the minimum storage regenerating (MSR) codes invoked in [7] could achieve the optimal tradeoff between repair bandwidth and storage efficiency. However, in most applications of MSR codes, the content requesters (CRs) tend to download all the data stored in specific CHs to reconstruct its desired content [11,12,13]. Considering the limited bandwidth of wireless links between CHs and CRs, it could be more advantageous to allow CRs to download only a small part of the stored symbols from any CH. As proved in [14], a partial downloading scheme could provide more freedom in terms of downloading choices, and consequently consume less power for content reconstruction. Inspired by these ideas, the MSR coding scheme, combined with the partial downloading scheme, will be employed in our proposed wireless distributed storage system.
For more efficient content delivery without additional infrastructure costs, device-to-device (D2D) communications have emerged as a potential candidate for direct transmission between CHs and CRs. For example, our previous work [15] investigated a D2D-assisted wireless distributed storage system to provide power-efficient content delivery while meeting the reliability requirements. Work [16] addressed the repair problem when a D2D device storing data failed and derived the analytical expression for power consumption of data repair, which was verified to be significantly lower compared with the traditional, cellular-only communications. On the other hand, to avoid the incompatibility issues with unlicensed spectrum, reusing the licensed spectrum (i.e., cellular resources) for D2D transmission provides much better spectral efficiency through careful interference coordination. Towards this end, leveraging the cellular-D2D underlay mode for distributed storage systems has attracted increasing interest in the recent literature [17,18,19,20]. Based on graph theory, the optimization of spectrum resource allocation among CHs and cellular users (CUs) has been analyzed in [17,18], targeting the minimization of content reconstruction costs. Considering the mobility and different interests of CHs, the authors in [19,20] focused on socially enabled D2D communications over cellular links. To search for and assign qualified D2D links for content reconstruction, they evaluated the success rate for content delivery based on the statistic social interaction information, as well as the D2D transmission effects on cellular communications. Unfortunately, all the aforementioned work adopted the full downloading scheme to reconstruct the desired content and assumed that different D2D links are orthogonal with each other for mathematical tractability, in which the disadvantages stem from the scarcity of spectrum resources, limiting the number of feasible CHs, and thus may not be applicable in cellular-D2D underlays with densely deployed storage devices.
Differing from the orthogonal multiple access (OMA) technique, non-orthogonal multiple access (NOMA) is able to address both the massive connectivity and spectral efficiency enhancement issue by allowing multiple users to share the same resources simultaneously. Recently, several approaches have been proposed to apply the NOMA technique in D2D-enabled cellular networks for an enhanced system performance. For instance, the work [21,22] considered the non-orthogonal resource-sharing between cellular users and D2D pairs, for which the fractional frequency reuse technique and a cell sectorization method were proposed to mitigate the uplink interference, and both the overall throughput and spectral efficiency were demonstrated to be greatly improved. By delicately designing algorithms for resource allocation under the NOMA protocol, the system sum-rate achieved in [23,24,25,26] greatly outperformed the conventional OMA scheme. The potential benefits of NOMA technology motivated us to reconsider the pattern of spectrum utilization in wireless distributed storage systems, especially when we employ the partial downloading scheme and the available cellular resources are not affordable when solely occupied by each CH. However, to the best of the authors’ knowledge, none of the existing work has been devoted to problems regarding NOMA-enhanced distributed storage in cellular-D2D underlays.
Against this background, we will consider the setting of a wireless distributed storage system in cellular-D2D underlays, where multiple storage devices are allowed to simultaneously reuse the same uplink cellular resources in this paper. To mitigate the uplink interference, a joint optimization on power and subchannel allocation is formulated to minimize the total transmission power while guaranteeing both the SINR constraints at CUs and successful content reconstruction at the CR. Specifically, the original combinational optimization is proposed to be solved by taking the alternative minimization approach, for which a low-complexity greedy-heuristic algorithm and a matching-based algorithm are employed to efficiently deal with each subproblem. In summary, the contributions in this paper are as follows:
  • A practical framework for distributed storage in cellular-D2D underlays with the NOMA protocol is proposed, where the MSR coding and partial downloading scheme are combined for more power-efficient choices. The joint optimization of power and subchannel allocation is formulated, which aims to minimize the total transmission power for content reconstruction while guaranteeing the SINR requirements for CUs.
  • Given fixed subchannel allocation, a low-complexity power allocation algorithm modified from the greedy-heuristic approach is developed. In particular, a new sorting coefficient is introduced, which considers the interference effects from the CHs to CUs. The simulation results show that our proposed algorithm will closely approach the performance of the exhaustive method, and the newly introduced coefficient will bring a higher transmission rate from CHs rather than from the serving BS, which contributes to the lower power consumption.
  • Based on the fixed power allocation, the matching game with externalities is applied to model resource pairing between CHs and CUs, and a low-complexity subchannel allocation algorithm is proposed. Then, the joint optimization can be performed by alternatively updating power and subchannel allocation. Simulation results verify the convergence and near-optimal property of the proposed algorithm, and demonstrate that the NOMA-enhanced transmission scheme and partial downloading can significantly improve the performance gain over the conventional OMA and full downloading scheme.
The remainder of this paper is organized as follows. Section 2 presents the system model for distributed storage in cellular-D2D underlay, and formulates the problem of joint power and subchannel allocation. In Section 3 and Section 4, the original problem is decoupled into two subproblems and then solved. Simulation results are reported in Section 5 to evaluate the performance of our proposed algorithms and investigate the superiority of the NOMA technique as well as the partial downloading scheme. Finally, conclusions are given in Section 6.

2. System Model and Problem Formulation

2.1. System Description

To offload traffic of cellular network and avoid unreliable individual storage devices, we investigated a wireless distributed storage mechanism in cellular-D2D underlays, where a specific content requester (CR) can directly reconstruct its desired content files from multiple adjacent content helpers (CHs) that have pre-stored the content instead of downloading it from the serving BS, as shown in Figure 1. In more detail, we assume that there exist N cellular users (CUs), denoted as CU = { C U 1 ,   C U 2 ,   ,   C U N } , communicating with the BS in traditional cellular links, and assume M CHs, denoted as CH = { C H 1 ,   C H 2 ,   ,   C H M } , attempt to communicate with the CR via D2D links by reusing the uplink cellular subchannels (SCs) occupied by CUs. By further assuming a fully loaded cellular network with available cellular resources denoted by SC = { S C 1 ,   S C 2 ,   ,   S C N } , each C U j CU for j N = { 1 ,   2 ,   ,   N } is allocated to S C j SC and all SCs are orthogonal. Note that when uplink cellular resources are not sufficient for exclusive assignment, i.e., N M , more than one CH may share the same SC to communicate with the CR based on non-orthogonal multiple access (NOMA) protocols.
For i M = { 1 ,   2 ,   ,   M } , let g i ( C R ) and g i ( B ) denote the signal channel gain from C H i to C R and the interference gain from C H i to the BS, respectively. Similarly, let h j ( B ) and h j ( C R ) denote the signal channel gain from C U j to the BS and the interference gain from C U j to C R , respectively. In addition, let β i , j represent the resource reuse indicator for C H i CH and S C j SC , where β i , j = 1 when C H i reuses the resource of C U j ; otherwise, β i , j = 0 . It is assumed that the perfect CSI is available at the serving BS and the considered CR. Then, the received signal-to-interference-plus-noise ratio (SINR) at the BS corresponding to C U j can be expressed as
Γ j = Q j | h j ( B ) | 2 i = 1 M β i , j P i | g i ( B ) | 2 + σ 2 , j N ,
where σ 2 is the noise variance and i = 1 M β i , j P i | g i ( B ) | 2 is the interference from the CHs sharing the subchannel S C j with C U j . Let Q j and P i be the transmission power of C U j and C H i , respectively. In this paper, we assume that all involved CUs have fixed transmission power and our objective is to minimize the total transmission power of CHs, i.e., i = 1 M P i , while guaranteeing successful content reconstruction at the CR as well as acceptable communication rates for CUs.
Inspired by the principle of NOMA, for the case in which multiple CHs tend to reuse the same SC to transmit content simultaneously, the technique of successive interference cancellation (SIC) could be employed at the CR to mitigate the inter-user interference. Based on SIC, the messages from stronger communication links will be successively decoded while the other messages from co-channel interferers are all treated as noise. Without a loss of generality, we assume that CUs are geographically closer to the BS and generate less interference to the CR than CHs. Let M j = { i M | β i , j = 1 } denote the index set of CHs using S C j with size t j = | M j | , and denote π j ( t ) with t T j = { 1 ,   2 ,   ,   t j } as a sort function, indicating the decreasing order of channel coefficients in M j , i.e., | g π j ( 1 ) ( C R ) | 2 | g π j ( 2 ) ( C R ) | 2 | g π j ( t j ) ( C R ) | 2 . Then, the received SINR at the CR from each CH can be obtained, following
γ π j ( 1 ) = P π j ( 1 ) | g π j ( 1 ) ( C R ) | 2 t = 2 t j P π j ( t ) | g π j ( t ) ( C R ) | 2 + Q j | h j ( C R ) | 2 + σ 2 , γ π j ( 2 ) = P π j ( 2 ) | g π j ( 2 ) ( C R ) | 2 t = 3 t j P π j ( t ) | g π j ( t ) ( C R ) | 2 + Q j | h j ( C R ) | 2 + σ 2 , γ π j ( t j ) = P π j ( t j ) | g π j ( t j ) ( C R ) | 2 Q j | h j ( C R ) | 2 + σ 2 ,
where Q j | h j ( C R ) | 2 is the interference from the C U j occupying the subchannel resource S C j .
By further assuming the minimum transmission unit from each CH to the CR is a symbol containing B bits, and setting each subchannel with bandwidth W and duration T, the number of symbols that can be downloaded from C H π j ( t ) is equivalent to
μ π j ( t ) = W T B log 2 ( 1 + γ π j ( t ) ) .

2.2. Partial Downloading Scheme

For reliability and efficiency, the desired content of CR is supposed to be encoded and stored in CHs using the minimum storage regenerating (MSR) coding scheme in this paper. Note that, for analytical simplicity, we only focus on the storage and downloading process for each specific content and assume the requested content can always be found in CHs; the content popularity distribution is beyond our scope.
By referring to the MSR coding scheme invoked in [7], the desired content file consisted of L symbols, denoted as s = [ s 1 ,   s 2 ,     s L ] T , will be stored across M distributed CHs. Each C H i for i M stores α symbols, denoted as c i = [ c i 1 ,   c i 2 ,     c i α ] T = E i T s , where E i is an L × α encoding matrix for C H i . If the desired content has already been encoded and stored in M CHs following the standard MSR procedure, according to the conventional full downloading scheme [12], the CR can reconstruct the content by downloading all α stored symbols from K ( K M ) CHs with
K = L / α .
However, due to the channel fading and bandwidth constraints of wireless links in practical scenarios, the CR may not be able to download all the stored symbols from each CH. Considering the exponential nature of the transmission power as a function of the number of downloaded symbols, we propose using the power-efficient partial downloading scheme invented in [14] for distributed storage in cellular-D2D underlays, for which the CR can download only a small portion of the stored symbols from more than K CHs when the following condition is satisfied:
j N i M μ i , j L ,
where μ i , j is the number of symbols to be downloaded from C H i over S C j . After determining the number of downloading symbols μ i , j , the CR can further decide which specific symbols t download by using the symbol selection scheme proposed in [14]. Simulation results in Section 5 will verify the superiority of the partial downloading scheme over the conventional full downloading scheme in reducing power consumption.

2.3. Problem Formulation

In this paper, we will investigate the joint optimization of power and subchannel assignment for distributed storage devices in cellular-D2D underlays, which aims to minimize the total transmission power for content reconstruction at the CR while guaranteeing the SINR constraints at CUs. For the acquisition of CSI information, suppose each CU and CH will first send some pilots to the BS and the CR for channel estimation before downloading the desired content. Then, after estimating the channel gains, the CR and the BS will perform the joint optimization and coordinate with each other to ensure the SINR constraints. Finally, the corresponding solutions will be fed back to the CHs to determine the transmission power and subchannel.
Specifically, let μ π j ( t ) denote the number of symbols to be downloaded from C H π j ( t ) over S C j . Then, from (2) and (3), we can obtain the following expressions:
κ γ π j ( t j ) = log 2 1 + P π j ( t j ) | g π j ( t j ) ( C R ) | 2 Q j | h j ( C R ) | 2 + σ 2 , κ γ π j ( t j 1 ) = log 2 1 + P π j ( t j 1 ) | g π j ( t j 1 ) ( C R ) | 2 P π j ( t j ) | g π j ( t j ) ( C R ) | 2 + Q j | h j ( C R ) | 2 + σ 2 , κ μ π j ( 1 ) = log 2 1 + P π j ( 1 ) | g π j ( 1 ) ( C R ) | 2 t = 2 t j P π j ( t ) | g π j ( t ) ( C R ) | 2 + Q j | h j ( C R ) | 2 + σ 2 ,
where κ = B W T . After solving the requested transmission power P π j ( t j ) ,   P π j ( t j 1 ) ,   ,   P π j ( 1 ) from (6) one by one, the transmission power for transmitting μ π j ( t ) symbols from C H π j ( t ) can generally be expressed as
P π j ( t ) = ( Q j | h j ( C R ) | 2 + σ 2 ) · ( 2 κ μ π j ( t ) 1 ) · 2 κ t = t + 1 t j μ π j ( t ) | g π j ( t ) ( C R ) | 2 .
Then, the total transmission power over S C j is given by
P j = t = 1 t j P π j ( t ) , j N .
Note that the power allocation for CHs should also be delicately designed, without causing severe interference to CUs, which means that the content downloading should be performed with the minimum SINR requirements of CUs guaranteed. Therefore, the joint resource allocation problem can be formulated as follows:
min { β i , j , μ i , j } i M , j N j = 1 N P j
s . t . Q j | h j ( B ) | 2 i = 1 M β i , j P i | g i ( B ) | 2 + σ 2 Γ min , j N ,
β i , j { 0 , 1 } , i M , j N ,
j = 1 N β i , j 1 , i = 1 M β i , j q max , i M , j N ,
μ i , j { 0 ,   1 ,   α } , i M ,
j N i M μ i , j = L ,
where Γ min denotes the SINR thresholds for CUs. Constraint (10) restricts the interference received at cellular links from the D2D links. Constraint (11) and (12) dictate that, at most, one SC can be allocated to each CH and, at most, q m a x CHs can share the same SC. Constraint (13) and (14) guarantee the successful content reconstruction at the CR. The above formulation is an integer program. According to (7), we find that the variables β i , j and μ i , j are coupled with each other in P i , which leads to the non-convexity of constraint (10). To this end, to deal with the combinational problem, in the following, we will decouple the original problem into two subproblems and provide the solutions for (1) power allocation among all CHs; (2) subchannel allocation over all the available SCs. After dealing with each subproblem, a joint algorithm can be then implemented, in which the subchannel and power allocation are performed alternatively until an acceptable suboptimal solution is obtained.

3. Power Allocation for Content Reconstruction

In this section, supposing the subchannel allocation is settled, we solve the subproblem of power allocation among all CHs, such that the total transmission power for content reconstruction is minimized. Due to the non-linear constraints in problem (9), the decoupled subproblem of power allocation is still intricate. Therefore, we first consider dropping some of the constraints that complicate the power allocation and provide a greedy-heuristic approach, which has been proven to achieve the optimal solutions to the relaxed problem. After modifying some of the selecting steps, we further propose a suboptimal algorithm with lower computational complexity, which is capable of recovering the originally dropped constraints. Simulation results will show that our proposed power allocation algorithm is almost close to the performance of the exhaustive method.

3.1. Optimal Power Allocation for the Relaxed Problem

By fixing the channel allocation variables { β i , j } i M , j N and dropping the constraints (10) and (13), the relaxed subproblem of power allocation can be reformulated as
min { μ π j ( t ) } t T j , j N j = 1 N P j
s . t . μ π j ( t ) Z + { 0 } , j N , t T j ,
j = 1 N t = 1 t j μ π j ( t ) = L .
Assume that the number of downloaded symbols from CHs that reuse the cellular channel S C j is defined as [ μ π j ( 1 ) ,   μ π j ( 2 ) ,   ,   μ π j ( t j ) ] ; the total transmission power over S C j is then given by
P j [ μ π j ( 1 ) ,   μ π j ( 2 ) ,   . . . ,   μ π j ( t j ) ] = t = 1 t j P π j ( t ) ,
where the specific value for P π j ( t ) can be referred to (7). Before presenting the optimal solutions to the relaxed problem (15), we obtain the following theorem about the optimal choice over each S C j .
Theorem 1.
The minimized sum power among CHs over each SC is achieved by downloading all the potential symbols from the CH with the strongest D2D link coefficient, i.e.,
P j [ μ π j ( 1 ) ,   μ π j ( 2 ) ,   . . . ,   μ π j ( t j ) ]     P j [ μ π j ( 1 ) ,   0 ,   . . . ,   0 ,   0 ] , where μ π j ( 1 ) = t = 1 t j μ π j ( t ) .
Proof. 
Based on (18), we have the following comparison
P j [ μ π j ( 1 ) ,   μ π j ( 2 ) ,   ,   μ π j ( t j ) ] P j [ μ π j ( 1 ) ,   0 ,   ,   0 ,   0 ] = ( Q j | h j ( C R ) | 2 + σ 2 ) × t = 1 t j ( 2 κ μ π j ( t ) 1 ) · 2 κ t = t + 1 t j μ π j ( t ) | g π j ( t ) ( C R ) | 2 2 κ t = 1 t j μ π j ( t ) 1 | g π j ( 1 ) ( C R ) | 2 2 κ t = 1 t j μ π j ( t ) | g π j ( 1 ) ( C R ) | 2 2 κ t = 2 t j μ π j ( t ) | g π j ( 1 ) ( C R ) | 2 + + 2 κ μ π j ( t j ) | g π j ( t j ) ( C R ) | 2 1 | g π j ( t j ) ( C R ) | 2 2 κ t = 1 t j μ π j ( t ) | g π j ( 1 ) ( C R ) | 2 + 1 | g π j ( 1 ) ( C R ) | 2 { 1 | g π j ( 1 ) ( C R ) | 2 + 1 | g π j ( 2 ) ( C R ) | 2 1 | g π j ( 1 ) ( C R ) | 2 · 2 κ t = 2 t j μ π j ( t ) + + 1 | g π j ( t j ) ( C R ) | 2 1 | g π j ( t j 1 ) ( C R ) | 2 · 2 κ μ π j ( t j ) 1 | g π j ( t j ) ( C R ) | 2 } 1 | g π j ( 1 ) ( C R ) | 2 + 1 | g π j ( 2 ) ( C R ) | 2 1 | g π j ( 1 ) ( C R ) | 2 + + 1 | g π j ( t j ) ( C R ) | 2 1 | g π j ( t j 1 ) ( C R ) | 2 1 | g π j ( t j ) ( C R ) | 2 0
Hence, we prove Theorem 1. □
According to Theorem 1, the total power across all available SCs can be minimized by simply downloading symbols from the CHs with the strongest D2D link coefficient over each SC. Subsequently, we present the following result regarding the optimal solution to problem (15).
Theorem 2.
The greedy-heuristic approach shown in Algorithm 1 provides an optimal solution to power allocation to the relaxed problem (15).
Proof. 
According to Theorem 1, since the symbol allocation [ μ π j ( 1 ) ,   μ π j ( 2 ) ,   ,   μ π j ( t j ) ] can always be written in the form of [ μ π j ( 1 ) ,   0 ,   ,   0 ,   0 ] to minimize the total power over S C j , we simplify the notation of transmit power P j [ μ π j ( 1 ) ,   0 ,   ,   0 ,   0 ] as P j ( μ ) . Let P j ( μ ) = P j ( μ + 1 ) P j ( μ ) denote the power increment for C H π j ( 1 ) transmitting μ + 1 symbols compared to transmitting μ symbols. By assuming the ultimate number of symbols transmitted over S C j is μ j , the total power across all SCs is given by
P t o t a l = j N P j = j N μ = 0 μ j 1 P j ( μ ) ,
where P t o t a l is equivalent to the sum of L power increment components. Based on the above definitions, the total power can be minimized by finding L smallest power increments among all the candidates { P j ( μ ) } j N , 0 μ < L . In the following, we prove by induction that the greedy-heuristic approach will select the L smallest power increments. Specifically, by computing
P j ( μ + 1 ) P j ( μ ) = P j ( μ + 2 ) P j ( μ + 1 ) P j ( μ + 1 ) P j ( μ ) = ( Q j | h j ( C R ) | 2 + σ 2 ) | g π j ( 1 ) ( C R ) | 2 × ( 2 κ ( μ + 2 ) 1 ) 2 ( 2 κ ( μ + 1 ) 1 ) + ( 2 κ μ 1 ) = ( Q j | h j ( C R ) | 2 + σ 2 ) | g π j ( 1 ) ( C R ) | 2 · 2 κ μ · 2 2 κ 2 κ + 1 + 1 = ( Q j | h j ( C R ) | 2 + σ 2 ) | g π j ( 1 ) ( C R ) | 2 · 2 κ μ · 2 κ 1 2 > 0 ,
we verify that the power increment P j ( μ ) is an increasing function of μ , based on which we can obtain the smallest power increment as
min j N , 0 μ L P j ( μ ) = min j N min 0 μ L P j ( μ ) = min j N P j ( 0 ) .
Suppose we have finished the selection of L ( L < L ) smallest power increments and included all of them in a set P L . For j N , let μ j c = max { μ : P j ( μ ) P L } represent the latest update after L selection. Due to the increasing property of P j ( μ ) with μ , we have P j ( μ ) P L for μ μ j c . Therefore, the L + 1 smallest power increment should be illustrated as
min j N min μ > μ j c P j ( μ ) = min j N P j ( μ j c + 1 ) ,
which is exactly the selection that Algorithm 1 makes. This process will continue to proceed until all the L smallest power increment components are observed and, as a consequence, we obtain the optimal solutions to problem (15). □
To illustrate the convergence of Algorithm 1, we observe that the iterations will terminate when j N μ π j ( 1 ) = L . Since, for each greedy-heuristic search, the value of j N μ π j ( 1 ) = L will always be increased by 1, the termination conditions can be satisfied soon after L iterations. Besides, given the fact that the desired content size L is usually finite, Algorithm 1 will converge to the optimal solutions after L iterations.
Algorithm 1 Greedy-heuristic approach to optimally solve the relaxed problem (15)
1:
Initialize μ π j ( t ) = 0 for t T j , j N .
2:
while  j N μ π j ( 1 ) < L  do
3:
   for  j N  do
4:
      Compute P j = P j [ μ π j ( 1 ) + 1 ,   0 ,   . . . ,   0 ] P j [ μ π j ( 1 ) ,   0 ,   . . . ,   0 ]
5:
   end for
6:
   Find j * = arg min j N P j .
7:
   Update μ π j * ( 1 ) = μ π j * ( 1 ) + 1 .
8:
end while
9:
Output μ π j ( t ) for t T j , j N .

3.2. Suboptimal Algorithm for Power Allocation

In the previous subsection, we offer Algorithm 1 to optimize the relaxed power allocation problem (15), which has dropped the original constraints (10) and (13). To proceed with the provision of an algorithm considering both the MSR coding constraints and the SINR constraints for CUs, we need to make some adjustments to Algorithm 1.

3.2.1. Constraints for MSR Coding Scheme

As stated in Section 2.2, by employing the MSR coding scheme for distributed storage, each CH only stores α symbols obtained from a linear combination of desired content, thus leading to the constraint for the maximum number of symbols downloaded from each CH, i.e., μ i , j α for i M and j N . However, the outputs of Algorithm 1 tend to violate such constraints due to the assumption that only the CH with the strongest link coefficient would transmit symbols. Therefore, at each iteration, we need to check whether the updated allocation satisfies the MSR constraint. To be specific, let U j = { μ i , j } i M j denote the current allocation over S C j ; the eligible set under the MSR constraint should conform to
C M S R = { U j | μ i , j Z + { 0 } , μ i , j α , i M j }

3.2.2. Constrains for SINR Requirements

Except for the MSR constraint, before the gradual increase in the number of downloaded symbols, we should also check whether the SINR requirements for all CUs are fulfilled. According to (1), the feasible set of symbol allocations that meets the SINR thresholds can be expressed as
C S I N R = { U j | i M j P i , j | g i ( B ) | 2 Q j | h j ( B ) | 2 Γ m i n σ 2 } .
In addition, for the case violating the SINR constraint, we make the following remark:
Remark 1.
If the SINR conditions are not met, regardless of how the power allocation is assigned, the desired content of CR will be downloaded from the serving BS.
Since transmitting symbols from the BS may cause more power consumption as well as waste the available cellular links, to maintain the stability of the cellular-D2D underlay and minimize the total transmission power for content reconstruction, we should try to reduce the interference from CHs to CUs as much as possible.

3.2.3. Low-Complexity Power Allocation Algorithm

In this subsection, we will propose a low-complexity power allocation algorithm which is capable of including both MSR and SINR constraints while reaching near-optimal solutions. To achieve a better trade-off between the power consumption for content reconstruction and the interference effects on CUs caused by CHs, we introduce a new sort function ω j ( · ) , which specifies the priority of CH selection over S C j and defines a relative coefficient η ω j ( t ) = | g ω j ( t ) ( C R ) | 2 / | g ω j ( t ) ( B ) | 2 such that η ω j ( 1 ) η ω j ( 2 ) η ω j ( t j ) . Simulations in Section 5 will demonstrate the rationality and superiority for a selection of ω j ( · ) instead of π j ( · ) . We denote k = [ k 1 ,   k 2 ,   ,   k N ] as an index set indicating the current selection order of C H ω j ( k j ) over S C j . Given these definitions, our proposed low-complexity power allocation approach is shown in Algorithm 2.
Algorithm 2 Low-complexity Power Allocation
1:
Initialize U j = 0 for j N , k = 1 N and I n d = 1 .
2:
while  j N t T j μ ω j ( t ) < L  do
3:
     Set P j = I n f for j N
4:
     for  j N  do
5:
           if  μ ω j ( k j ) = α  Then
6:
                   k j = k j + 1
7:
           end if
8:
           Get U j by modifying μ ω j ( k j ) U j to μ ω j ( k j ) + 1
9:
           if  U j C S I N R and U j C M S R  then
10:
                  Compute P j = P j ( U j ) P j ( U j )
11:
           end if
12:
     end for
13:
     if  min j N P j > 10 6  then
14:
            I n d 0 and P t o t a l P B S
15:
           break;
16:
     else
17:
           Find j * = arg min j N P j
18:
           Update U j * U j *
19:
     end if
20:
end while
21:
if  I n d = 1   then
22:
      P t o t a l j = 1 N P j
23:
end if
In Algorithm 2, we extend the idea of Algorithm 1, which gradually increases the number of symbols downloaded from the last selected CH until the total number of symbols meets the demand for reconstructing the desired content, i.e., j N | U j | = L . However, different from Algorithm 1, which only takes the minimized power increment as the measure for the optimal choice at each iteration, Algorithm 2 will check whether the potential variation, denoted by U j , satisfies the constraints of C M S R and C S I N R . If there no feasible solution exists, i.e., I n d = 0 , the CR will download its desired content from the serving BS.
Moreover, to guarantee the superior performance in terms of sum power minimization and avoid high computation complexity, as exhibited in an exhaustive search, which attempts to traverse all the feasible CHs in each iteration, we developed an index set k and limited each selection of CH over S C j to C H ω j ( k j ) . To this end, we only need to compute one power increment for each S C j and find the smallest power increment among S C j S C , rather than compute the power increment of all potential CHs. In this case, the following remark is clear:
Remark 2.
By specifying the selection order and limiting the selection set, Algorithm 2 will significantly reduce the computation complexity, especially when M N .
Proof. 
Note that the total number of iterations for Algorithm 2 is related to the content size L, the complexity is mainly dependent on the calculation of power increment. For the conventional greedy search, this calculation will be performed M times for all candidate CHs at each iteration. For Algorithm 2, since the CHs are presupposed to be allocated/grouped into N SCs, and only the power increments concerning { C H ω j ( k j ) } j N need to be calculated at each iteration, the proposed Algorithm 2 only induces a linear complexity of O ( L N ) . □

4. Subchannel Allocation Based on Matching Theory

In this section, by assuming that the power allocation of each CH has been addressed, we formulate the subproblem of subchannel allocation to minimize the total transmission power as the following:
min { β i , j } i M , j N i = 1 M P i
s . t . Q j | h j ( B ) | 2 i = 1 M β i , j P i | g i ( B ) | 2 + σ 2 Γ min , j N ,
β i , j { 0 , 1 } , i M , j N ,
j = 1 N β i , j 1 , i = 1 M β i , j q m a x , i M , j N .
Constraint (27) guarantees the SINR requirements for CUs. Constraint (28) shows that the value of β i , j should be either 0 or 1. Constraint (29) indicates that each CH can be assigned, at most, one SC, while each SC can be allocated to no more than q m a x CHs. The above-formulated subproblem is still a combinational problem and the complexity of the exhaustive method will exponentially increase with the number of CHs and SCs. Therefore, we consider employing the many-to-one two-sided matching theory [27] to efficiently solve the above problem. In the following, we will first introduce some definitions and notations for the proposed matching model and then develop a low-complexity algorithm to obtain solutions to the subchannel allocation problem.

4.1. Many-to-One Matching Model and Notations

We first define the proposed matching model between two disjointed sets CH and SC . Specifically, if S C j is allocated to C H i , we say S C j and C H i are matched with each other and form a matching pair ( C H i , S C j ) . Then, a complete matching is defined as the set of all the matching pairs of SC allocated to CH , and formally presented as the following:
Definition 1.
Given two disjoint sets SC and CH , a many-to-one matching Ψ is a function from the set SC CH into the set of all subsets of SC CH such that, for every C H i CH and S C j SC :
1. 
Ψ ( C H i ) SC with size | Ψ ( C H i ) | 1 ;
2. 
Ψ ( S C j ) CH with size | Ψ ( S C j ) | q m a x ;
3. 
S C j Ψ ( C H i ) C H i Ψ ( S C j ) .
Based on the Definition 1, our objective is to determine the optimal matching function that minimizes the total transmission power among all CHs, as shown in (26). Thus, the decision process of each optimal matching pair should depend on the resulted power consumption. By observing the relationship between the value of P i and the value of variable β i , j , we found that the power consumption of each CH is not only dependent on its matched SC, but also related to the set of other CHs sharing the same SC, which leads to the following remark:
Remark 3.
The matching model formulated between C H and C R is a many-to-one matching game with externalities, also known as the peer effects [28].
Influenced by peer effects, the transmission power P i for i M relies on the current choice of matching function or termed as matching status, and the outcome may be changed according to their co-channel peers under different matching statuses. To deal with such peer effects, we introduce the concept of swap matching to adjust the matching status, as shown below:
Definition 2.
Given a matching function Ψ including pairs ( C H i , S C j ) and ( C H p , S C n ) , a swap matching is defined by the function Ψ = Ψ \ { ( C H i , S C j ) , ( C H p , S C n ) } { ( C H i , S C n ) , ( C H p , S C j ) } .
Based on Definition 2, a swap matching Ψ is directly generated by exchanging two allocated SCs of Ψ , while keeping all the other matching pairs the same. Note that one of the CHs involved in the swap can be a “hole” (denoted by C H p = O ), thus allowing for a single C H i matched with S C n when | Ψ ( S C n ) | < q m a x and leaving an open spot for S C j = Ψ ( C H i ) . Similarly, one of the SCs involved in the swap can also be a “hole” when Ψ ( C H i ) = , thus allowing for unmatched C H i to be active.
However, not all the swap operations are beneficial compared to the original matching status. To indicate whether a specific swap operation is necessary and approved, we further introduce the concept of swap-blocking pair as follows:
Definition 3.
Given a matching function Ψ with ( C H i , S C j ) and ( C H p , S C n ) , a pair ( C H i , C H p ) is defined as a swap-blocking pair if, and only if, it satisfies
1. 
k { C H i , C H p , S C j , S C n } , U k ( Ψ ) U k ( Ψ ) ;
2. 
k { C H i , C H p , S C j , S C n } , U k ( Ψ ) > U k ( Ψ ) ,
where U k ( Ψ ) represents the utility of CHs or SCs under matching Ψ and, in our paper, has the following definitions:
1. 
For each C H i CH , the utility is defined as the negative power consumption of C H i when it occupies S C j with S C j = Ψ ( C H i ) , which can be expressed as
U C H i ( Ψ ) = P C H i ;
2. 
For each S C j SC , the utility is defined as the negative sum power of all the CHs sharing S C j , given by
U S C j ( Ψ ) = P S C j = C H t Ψ ( S C j ) P C H t .
As proved in [29], a two-sided exchange-stable (2ES) matching always exists in the proposed matching model with peer effects. To reach such 2ES matching, swap operations should be kept approved between the swap-blocking pairs until there is no swap-blocking pair. Through multiple swap matchings, the peer effects can be handled and we can obtain a final stable matching status.

4.2. Low-Complexity Subchannel Allocation Algorithm

In this subsection, we propose a low-complexity algorithm to efficiently solve the subchannel allocation, as shown in Algorithm 3, which is equivalent to the process of finding a 2ES matching Ψ * between two disjoint sets CH and SC .
Algorithm 3 Low-complexity Subchannel Allocation
1:
Initialize a random matching function Ψ = Ψ 0 between SC and CH , and set f l a g = 1 .
2:
while  f l a g = 1   do
3:
    Set f l a g 0
4:
        for  S C j SC and S C n SC \ S C j  do
5:
            for  C H i Ψ ( S C j ) O and C H p Ψ ( S C n ) O with O representing the open spot do
6:
                if  ( C H i , C H p ) is a swap-blocking pair and (27) is satisfied then
7:
                    Perform swap matching between ( C H i , C H p ) and update Ψ Ψ .
8:
                    Change f l a g 1
9:
                    goto step 4)
10:
                end if
11:
            end for
12:
        end for
13:
end while
14:
Output the 2ES matching Ψ * .
The key idea of Algorithm 3 is to keep executing swap operations until there no swap-blocking pair is recorded by the indicator f l a g . Moreover, to satisfy the SINR constraints in (27), each time before approving the swap matching, we should also check whether the SINR conditions for all CUs are violated. Through Algorithm 3, we can finally obtain a 2ES matching Ψ * , which also constitutes the suboptimal solution to the problem (26). Simulation results in Section 5 will show that the subchannel allocation solutions obtained from Algorithm 3 can approach the optimal solutions obtained by an exhaustive search.
Note that the output Ψ * of Algorithm 3 is not guaranteed to be the global optimal matching. For example, given a matching Ψ with Ψ ( C H i ) = S C j and Ψ ( C H p ) = S C n , if a swap matching Ψ satisfies U C H i ( Ψ ) < U C H i ( Ψ ) , U S C j ( Ψ ) > U S C j ( Ψ ) and U S C n ( Ψ ) > U S C n ( Ψ ) , the sum power will be further reduced after swap operation, but this swap matching is not approved in Algorithm 3 according to Definition 3. In this case, forcing the swap operation to happen may lead to a one-sided exchange matching with weaker stability.
To illustrate the convergence of Algorithm 3, we find that there are, at most, N ( N 1 ) 2 q max 2 swap-blocking pairs to be checked during each iteration, and each swap matching operation will further reduce the sum power. In this way, given the finite number of N and since the sum power has a lower bound, the proposed Algorithm 3 will finally converge to a stable matching status after limited iterations. Moreover, suppose the total number of iterations is given by I, then the computation complexity of Algorithm 3 is O ( I N ( N 1 ) q max 2 ) .

4.3. Joint Power and Subchannel Allocation Algorithm

Based on the previously proposed Algorithms 2 and 3, the joint power and subchannel allocation algorithm can be presented as shown in Algorithm 4. In the initialization phase, a random subchannel matching is given. Then, the power allocation and subchannel allocation are performed under the constraint of the maximum number of iterations l max .
Algorithm 4 Low-complexity Subchannel Allocation
1:
Initialize a random subchannel matching function Ψ = Ψ ( 0 ) between SC and CH .
2:
Initialize the iteration index l = 1 .
3:
while  l < l max   do
4:
    Update the power allocation P i and U j for i M , j N with fixed Ψ ( l 1 ) using Algorithm 2.
5:
    Update the subchannel matching function Ψ ( l ) under current power status using Algorithm 3.
6:
    Update l l + 1
7:
end while

5. Numerical Results

We consider a wireless distributed storage system in cellular-D2D underlays, for which a specific CR intends to download and reconstruct the desired content from M = 8 CHs underlaid with N = 4 CUs. Each CH has a storage capacity of α = 3 and the original content size is set as L = 12 . Assume that the distance between the CR and any CH is d 1 = 0.5 ; the distance between the serving BS and any CH is d 2 = 1.5 , the distance between the CR and any CU is d 3 = 1 ; and the distance between BS and any CU is d 4 = 1.2 . Then, the channel gain can be modeled as the complex Gaussian random variable N C ( 0 , d 2 ) . We further assume that the transmit power for each CU is fixed with Q j = 3 for j N , and the minimum SINR threshold for CUs is set as 0.5 . In addition, the transmit power from BS is set to be 100, the system coefficient and the noise power are set as κ = 1 and σ 2 = 0.5 , respectively.
In this section, we will first evaluate the performance of our proposed algorithms through simulations, i.e., Algorithm 2 for the subproblem of power allocation and Algorithm 3 for the subproblem of channel allocation. Then, by using Algorithm 4 to jointly perform the power and subchannel allocation, we will further investigate the superiority of the partial downloading scheme as well as the NOMA-enhanced transmission scheme in our proposed cellular-D2D underlay.

5.1. Property of the Proposed Algorithms

By randomly fixing a subchannel allocation status, we firstly demonstrate the near-optimal performance of Algorithm 2 for power allocation. Figure 2 plots the total transmission power obtained from our proposed Algorithm 2 for 100 channel realizations. The exhaustive search is also provided as a benchmark for comparison. It can be observed that most of the solutions of Algorithm 2 nearly attain the performance upper bound, i.e., the optimal solutions for power allocation. Figure 3 further shows the statistic histogram of the power gap between Algorithm 2 and the exhaustive search for 1000 channel realizations. As can be observed, around ninety-eight percent of the results obtained from Algorithm 2 are close to the optimal results.
Then, we verify the rationality and effectiveness to introduce the newly relative coefficient η i = | g i ( C R ) | 2 / | g i ( B ) | 2 (denoted by “ η ”) to specify the selecting order at each iteration in Algorithm 2, instead of using the channel coefficient | g i ( C R ) | 2 (“denoted by g”), which is usually chosen for the D2D case, as in the work [15]. Figure 4 illustrates the proportion out of all 10 , 000 desired contents that need to be downloaded from the serving BS due to SINR constraints (denote by “BS Serving Proportion”). From Figure 4, we find out that using the relative coefficient η could guarantee that more content files are downloaded from neighbor CHs rather than from the BS, especially with larger κ , which means that the available bandwidth W is limited. Since the BS transmission power is usually much higher, the reduced BS serving proportion would imply a reduced total power consumption for content reconstruction, as can be verified in Figure 5. This makes sense, since the interference effects from CHs to CUs are considered when we select CHs following the order indicated by η , while the original coefficient g omits the co-channel interference from CHs to CUs, and thus may violate the SINR constraints.
Next, given the fixed power allocation among all CHs, we evaluate the convergence and optimality of Algorithm 3 for subchannel allocation, in which we assume that no more than q m a x = 3 CHs are allowed to share the same SC. Figure 6 shows the cumulative distribution function (CDF) of the requested number of swap operations for Algorithm 3 to converge. We observe that Algorithm 3 can always converge within a small number of iterations and the convergence speed will become faster with a decreased number of CHs. Figure 7 plots the total transmission power obtained from Algorithm 3 for 100 channel realizations. The performances of the exhaustive search and the random pairing between CHs and SCs (denoted by “random matching”) are also plotted. It can be seen that the proposed Algorithm 3 brings a greater performance gain over the random matching. Meanwhile, Algorithm 3 is shown to be capable of approximately reaching the optimal results obtained by an exhaustive search in most cases, which, nevertheless, requires lower computational complexity.

5.2. Superiority of the Proposed Transmission Schemes

Before demonstrating the superiority of the partial downloading scheme and the NOMA-enhanced transmission scheme for our considered distributed storage systems, we first verify the convergence of the joint power and subchannel allocation optimization, i.e., Algorithm 4, which alternatively implements Algorithms 2 and 3 under the maximum number of iterations l max = 10 . Figure 8 describes the convergence behavior of Algorithm 4 as the iterative procedure executes, from which we can see that Algorithm 4 will converge after a limited number of iterations.
Then, we exploit the potential benefits of the partial downloading scheme over the conventional full downloading scheme [16]. Figure 9 compares the total transmission power for content reconstruction by using the partial downloading scheme with the full downloading scheme, where the full downloading scheme is achieved by exhaustively searching the optimal L / α CHs and downloading all their stored symbols. As can be observed in Figure 9, the proposed partial downloading scheme can significantly reduce the total transmission power, especially with an increased number of stored symbols α and restricted channel condition κ , in which case the partial downloading scheme provides more freedom of downloading choices and consequently alleviates the exponential increment of transmission power with the number of downloaded symbols.
Finally, Figure 10 shows the total power consumption by using the NOMA-enhanced transmission scheme versus the conventional OMA-based transmission scheme for distributed storage in cellular-D2D underlays. It can be seen that the performance of the NOMA transmission scheme outperforms the OMA scheme with all possible κ values. This is reasonable because, differently from the OMA scheme, for which each SC is only allocated to one CH, applying the NOMA protocol allows subchannel sharing by multiple CHs, and thus improves the resource utilization.

6. Conclusions

In this paper, we studied the joint optimization of power and subchannel allocation for wireless distributed storage in cellular-D2D underlays, where the MSR coding and the power-saving partial downloading scheme are employed for content reconstruction. Since the formulated problem was a non-convex combinational optimization, we have decoupled it into two subproblems, i.e., power allocation and subchannel allocation problems. Given a fixed subchannel allocation, a low-complexity, greedy-heuristic algorithm was proposed to solve the power allocation problem. Based on the power allocation results, a matching model with externalities was introduced and a corresponding swap matching algorithm was offered to deal with the subchannel allocation problem. Then, we alternatively performed power and subchannel allocation to obtain the joint optimization. The simulation results verified the convergence as well as the near-optimal property of our proposed algorithms. In addition, it was also shown that the partial-downloading approach outperformed the conventional full-downloading approach, and the NOMA-enhanced distributed storage achieved a larger performance gain.

Author Contributions

Conceptualization, F.H.; methodology, F.H., H.D., J.S. and H.J.; investigation, H.D.; supervision, H.D.; validation, H.D.; writing—original draft preparation, F.H.; writing—review and editing, F.H., H.D., J.S. and H.J. All authors have read and agreed to the submitted version of the manuscript, and assumed responsibility for all aspects of the research.

Funding

This research was funded by Shanghai Sailing Program with 21YF1450100, the Fundamental Research Funds for the Central Universities 22120210544, and the Fundamental Research Funds for the Central Universities 22120210543.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Hu, P.; Sung, C.W.; Chan, T.H. Capacity of Wireless Distributed Storage Systems with Broadcast Repair. IEEE Trans. Commun. 2019, 67, 1004–1017. [Google Scholar] [CrossRef]
  2. Hong, B.; Choi, W. Optimal Storage Allocation for Wireless Cloud Caching Systems with a Limited Sum Storage Capacity. IEEE Trans. Wirel. Commun. 2016, 15, 6010–6021. [Google Scholar] [CrossRef] [Green Version]
  3. Bioglio, V.; Gabry, F.; Land, I. Optimizing MDS Codes for Caching at the Edge. In Proceedings of the IEEE Global Communication Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar]
  4. Joshi, G.; Liu, Y.; Soljanin, E. On the Delay-Storage Trade-off in Content Download from Coded Distributed Storage Systems. IEEE J. Sel. Areas Commun. 2014, 32, 989–997. [Google Scholar] [CrossRef] [Green Version]
  5. Sohn, J.; Choi, B.; Yoon, S.W.; Moon, J. Capacity of Clustered Distributed Storage. IEEE Trans. Inf. Theory 2019, 65, 81–107. [Google Scholar] [CrossRef] [Green Version]
  6. Li, J.; Song, R. A Distributed Storage Method for High Speed Data Transmission System. In Proceedings of the 2020 Cross Strait Radio Science & Wireless Technology Conference (CSRSWTC), Fuzhou, China, 11–14 October 2020; pp. 1–3. [Google Scholar]
  7. Dimakis, A.G.; Godfrey, P.B.; Wu, Y.; Wainwright, M.J.; Ramchandran, K. Network Coding for Distributed Storage Systems. IEEE Trans. Inf. Theory 2010, 56, 4539–4551. [Google Scholar] [CrossRef] [Green Version]
  8. Gu, S.; Li, J.; Wang, Y.; Wang, N.; Zhang, Q. DR-MDS: An Energy-Efficient Coding Scheme in D2D Distributed Storage Network for the Internet of Things. IEEE Access 2019, 7, 24179–24191. [Google Scholar] [CrossRef]
  9. Hu, Y.; Lee, P.P.C.; Shum, K.W.; Zhou, P. Proxy-assisted Regenerating Codes with Uncoded Repair for Distributed Storage Systems. IEEE Trans. Inf. Theory 2018, 64, 2512–2528. [Google Scholar] [CrossRef]
  10. Rashmi, K.V.; Shah, N.B.; Ramchandran, K. A Piggybacking Design Framework for Read-and Download-Efficient Distributed Storage Codes. IEEE Trans. Inf. Theory 2017, 63, 5802–5820. [Google Scholar] [CrossRef] [Green Version]
  11. Wang, J.; Luo, W.; Liang, W.; Liu, X.; Dong, X. Locally Minimum Storage Regenerating Codes in Distributed Cloud Storage Systems. China Commun. 2017, 14, 82–91. [Google Scholar] [CrossRef]
  12. Goparaju, S.; Fazeli, A.; Vardy, A. Minimum Storage Regenerating Codes for all Parameters. IEEE Trans. Inf. Theory 2017, 63, 6318–6328. [Google Scholar] [CrossRef]
  13. Tang, X.; Yang, B.; Li, J.; Hollmann, H.D.L. A New Repair Strategy for the Hadamard Minimum Storage Regenerating Codes for Distributed Storage Systems. IEEE Trans. Inf. Theory 2015, 61, 5271–5279. [Google Scholar] [CrossRef]
  14. Gong, C.; Wang, X. On Partial Downloading for Wireless Distributed Storage Networks. IEEE Trans. Signal Process. 2012, 60, 3278–3288. [Google Scholar] [CrossRef]
  15. Han, F.; Wang, X.; Zhao, S. Channel-Aware D2D-Assisted Wireless Distributed Storage Systems. IEEE Internet Things J. 2019, 6, 10305–10317. [Google Scholar] [CrossRef]
  16. Pedersen, J.; Amat, A.G.I.; Andriyanova, I.; Brännström, F. Distributed Storage in Mobile Wireless Networks with Device-to-Device Communication. IEEE Trans. Commun. 2016, 64, 4862–4978. [Google Scholar] [CrossRef] [Green Version]
  17. Wang, L.; Wu, H.; Ding, Y.; Chen, W.; Poor, H.V. Hypergraph-Based Wireless Distributed Storage Optimization for Cellular D2D Underlays. IEEE J. Sel. Areas Commun. 2016, 34, 2650–2666. [Google Scholar] [CrossRef]
  18. Wang, L.; Wu, H.; Ding, Y.; Chen, W.; Poor, H.V. Hypergraph Based Three-Dimensional Matching in Wireless Distributed Storage over D2D Links. In Proceedings of the 2016 IEEE International Conference on Digital Signal Procesing (DSP), Beijing, China, 12–18 October 2016; pp. 1–5. [Google Scholar]
  19. Wang, L.; Wu, H.; Han, Z. Wireless Distributed Storage in Socially Enabled D2D Communications. IEEE Access 2016, 4, 1971–1984. [Google Scholar] [CrossRef]
  20. Ding, Y.; Wang, L.; Wu, H.; Ma, S.; Jaaski, A.Y. Performance Analysis for Wireless Distributed Storage via D2D Links. In Proceedings of the IEEE Vehicular Technology Conference (VTC-Fall), Montreal, QC, Canada, 18–21 September 2016; pp. 1–5. [Google Scholar]
  21. Ningombam, D.D.; Shin, S. Non-orthogonal Resource Sharing optimization for D2D Communication in LTE-A Cellular Networks: A Fractional Frequency Reuse-Based Approach. Electronics 2018, 7, 238. [Google Scholar] [CrossRef] [Green Version]
  22. Ningombam, D.D.; Shin, S. Optimal Resource Management and Binary Power Control in Network-Assisted D2D Communications for Higher Frequency Reuse Factor. Sensors 2019, 19, 251. [Google Scholar] [CrossRef] [Green Version]
  23. Dai, Y.; Sheng, M.; Liu, J.; Cheng, N.; Shen, X.; Yang, Q. Joint Mode Selection and Resource Allocation for D2D-Enabled NOMA Cellular Networks. IEEE Trans. Veh. Technol. 2019, 68, 6721–6733. [Google Scholar] [CrossRef]
  24. Jiang, Y.; Wang, L.; Zhao, H.; Chen, H.-H. Covert Communications in D2D Underlaying Cellular Networks With Power Domain NOMA. IEEE Syst. J. 2020, 14, 3717–3728. [Google Scholar] [CrossRef]
  25. Wang, Y.; Zhai, D.; Zhang, R.; Zhang, Z. Sum-Rate Maximization for D2D and Cellular Hybrid Networks Enhanced by NOMA. In Proceedings of the 2019 IEEE 20th International Conference on High Performance Switching and Routing (HPSR), Xi’an, China, 26–29 May 2019; pp. 1–5. [Google Scholar]
  26. Pan, Y.; Pan, C.; Yang, Z.; Chen, M. Resource Allocation for D2D Communications Underlaying a NOMA-Based Cellular Network. IEEE Wirel. Commun. Lett. 2018, 7, 130–133. [Google Scholar] [CrossRef] [Green Version]
  27. Zhao, J.; Liu, Y.; Chai, K.K.; Chen, Y.; Elkashlan, M. Joint Subchannel and Power Allocation for NOMA Enhanced D2D Communications. IEEE Trans. Commun. 2017, 65, 5081–5094. [Google Scholar] [CrossRef]
  28. Gu, Y.; Saad, W.; Bennis, M.; Debbah, M.; Han, Z. Matching Theory for Future Wireless Networks: Fundamentals and Applications. IEEE Commun. Mag. 2015, 53, 52–59. [Google Scholar] [CrossRef] [Green Version]
  29. Baron, E.B.; Lee, C.; Chong, A.; Hassibi, B.; Wierman, A. Peer Effects and Stability in Matching Markets. In Algorithmic Game Theory; Springer: Berlin/Heidelberg, Germany, 2011; pp. 117–129. [Google Scholar]
Figure 1. System model for distributed storage in cellular-D2D underlay.
Figure 1. System model for distributed storage in cellular-D2D underlay.
Sensors 21 08059 g001
Figure 2. Total transmission power obtained from Algorithm 2 and the exhaustive search.
Figure 2. Total transmission power obtained from Algorithm 2 and the exhaustive search.
Sensors 21 08059 g002
Figure 3. Statistic histogram of the power gap between Algorithm 2 and the exhaustive search.
Figure 3. Statistic histogram of the power gap between Algorithm 2 and the exhaustive search.
Sensors 21 08059 g003
Figure 4. BS serving proportion by using different channel coefficient with SNR = 2 dB.
Figure 4. BS serving proportion by using different channel coefficient with SNR = 2 dB.
Sensors 21 08059 g004
Figure 5. Total transmission power by using different channel coefficient.
Figure 5. Total transmission power by using different channel coefficient.
Sensors 21 08059 g005
Figure 6. CDF of the number of swap operations in Algorithm 3.
Figure 6. CDF of the number of swap operations in Algorithm 3.
Sensors 21 08059 g006
Figure 7. Total transmission power obtained from Algorithm 3 versus the random matching and exhaustive search.
Figure 7. Total transmission power obtained from Algorithm 3 versus the random matching and exhaustive search.
Sensors 21 08059 g007
Figure 8. The convergence behaviour of Algorithm 4.
Figure 8. The convergence behaviour of Algorithm 4.
Sensors 21 08059 g008
Figure 9. Total transmission power by using the partial downloading versus full downloading.
Figure 9. Total transmission power by using the partial downloading versus full downloading.
Sensors 21 08059 g009
Figure 10. Total transmission power under the NOMA-enhanced scheme versus the OMA scheme.
Figure 10. Total transmission power under the NOMA-enhanced scheme versus the OMA scheme.
Sensors 21 08059 g010
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Han, F.; Deng, H.; Shi, J.; Jiang, H. Joint Power and Subchannel Allocation for Distributed Storage in Cellular-D2D Underlays. Sensors 2021, 21, 8059. https://doi.org/10.3390/s21238059

AMA Style

Han F, Deng H, Shi J, Jiang H. Joint Power and Subchannel Allocation for Distributed Storage in Cellular-D2D Underlays. Sensors. 2021; 21(23):8059. https://doi.org/10.3390/s21238059

Chicago/Turabian Style

Han, Fengxia, Hao Deng, Jianfeng Shi, and Hao Jiang. 2021. "Joint Power and Subchannel Allocation for Distributed Storage in Cellular-D2D Underlays" Sensors 21, no. 23: 8059. https://doi.org/10.3390/s21238059

APA Style

Han, F., Deng, H., Shi, J., & Jiang, H. (2021). Joint Power and Subchannel Allocation for Distributed Storage in Cellular-D2D Underlays. Sensors, 21(23), 8059. https://doi.org/10.3390/s21238059

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop