-
Advanced Search

Citation: Lun TANG, Runlin MA, Yunlong LIU, Yaowei WANG, Qianbin CHEN. Joint Admission Control and Resource Allocation Algorithm for Access and Backhaul Integrated Small Base Station[J]. Journal of Electronics and Information Technology, ;2019, 41(6): 1389-1396. doi: 10.11999/JEIT180357 shu

Joint Admission Control and Resource Allocation Algorithm for Access and Backhaul Integrated Small Base Station

  • Corresponding author: Runlin MA, 357135128@qq.com
  • Received Date: 2018-04-18
    Accepted Date: 2019-02-16
    Available Online: 2019-06-01

Figures(7) / Tables(5)

  • To maximize the long-term spectral efficiency and energy efficiency of a full duplex wireless access and backhaul integrated small base station scene, approximate dynamic programming based joint admission control and resource allocation optimization algorithm is proposed. The algorithm firstly considers the resource usage and power configuration of the current base station, the dynamic demand of user, the constraints of average delay as well as backhaul rate and transmission power. The corresponding multi-objective optimization model of maximum spectrum efficiency and minimizes power consumption is established by using the Constrained Markov Decision Process(CMDP). Then, the Chebyshev theory is used to transform the multi-objective into a single-objective optimization, and the Lagrange dual decomposition method is then used to convert the single-objective problem into unrestricted Markov decision process problem. Finally, To solve the " dimension disaster” explosion that generated when solving this unrestricted Markov Decision Process(MDP) problem, a dynamic resource allocation algorithms based on approximate dynamic programming is presented, and the access and resource allocation strategy is obtained during this process. The simulation results show that the algorithm can maximize the long-term average spectrum efficiency and energy efficiency, within the constraints of the average delay, backhaul rate and transmission power, under the scenario of integrated access and backhaul small base station.
  • 加载中
    1. [1]

      BENCHAABENE Y, BOUJNAH N, and ZARAI F. 5G cellular: Survey on some challenging techniques[C]. Proceedings of the 18th International Conference on Parallel and Distributed Computing, Applications and Technologies, Taipei, China, 2017: 348–353.

    2. [2]

      MESODIAKAKI A, ADELANTADO F, ALONSO L, et al. Energy- and spectrum-efficient user association in millimeter-wave backhaul small-cell networks[J]. IEEE Transactions on Vehicular Technology, 2017, 66(2): 1810–1821. doi: 10.1109/TVT.2016.2565539

    3. [3]

      OGAWA H, TRAN G K, SAKAGUCHI K, et al. Traffic adaptive formation of mmWave meshed backhaul networks[C]. Proceedings of 2017 IEEE International Conference on Communications Workshops, Paris, France, 2017: 185–191.

    4. [4]

      LI Yuzhou, SHI Yan, SHENG Min, et al. Energy-efficient transmission in heterogeneous wireless networks: A delay-aware approach[J]. IEEE Transactions on Vehicular Technology, 2016, 65(9): 7488–7500. doi: 10.1109/TVT.2015.2472578

    5. [5]

      LIU Yanping and FANG Xuming. Joint user association and resource allocation for self-backhaul ultra-dense networks[J]. China Communications, 2016, 13(2): 1–10. doi: 10.1109/CC.2016.7405718

    6. [6]

      YANG H H, GERACI G, and QUEK T Q S. Energy-efficient design of MIMO heterogeneous networks with wireless backhaul[J]. IEEE Transactions on Wireless Communications, 2016, 15(17): 4914–4927. doi: 10.1109/TWC.2016.2549529

    7. [7]

      MASOUDI M, ZAEFARANI H, MOHAMMADI A, et al. Energy and spectrum efficient resource allocation in two-tier networks: A multiobjective approach[C]. Proceedings of 2017 IEEE Wireless Communications and Networking Conference, San Francisco, USA, 2017: 1–6.

    8. [8]

      LI Yi, FAN Pingzhi, LIU Lingjia, et al. Distributed MIMO precoding for in-band full-duplex wireless backhaul in heterogeneous networks[J]. IEEE Transactions on Vehicular Technology, 2018, 67(3): 2064–2076. doi: 10.1109/TVT.2017.2713413

    9. [9]

      TANG Lun, WEI Yannan, CHEN Wan, et al. Delay-aware dynamic resource allocation and ABS configuration algorithm in HetNets based on Lyapunov optimization[J]. IEEE Access, 2017, 5: 23764–23775. doi: 10.1109/ACCESS.2017.2761863

    10. [10]

      ZORDAN D, MELODIA T, and ROSSI M. On the design of temporal compression strategies for energy harvesting sensor networks[J]. IEEE Transactions on Wireless Communications, 2016, 15(2): 1336–1352. doi: 10.1109/TWC.2015.2489200

    11. [11]

      DEVRAJ A M and MEYN S P. Differential TD learning for value function approximation[C]. Proceedings of 2016 IEEE 55th Conference on Decision and Control, Las Vegas, USA, 2016: 6347–6354.

    12. [12]

      XIANG Lin, NG D W K, SCHOBER R, et al. Secure video streaming in heterogeneous small cell networks with untrusted cache helpers[J]. IEEE Transactions on Wireless Communications, 2018, 17(4): 2645–2661. doi: 10.1109/TWC.2018.2800005

    13. [13]

      MI Xiang, ZHAO Ming, XIAO Limin, et al. Delay-aware resource allocation and power control for device-to-device communications[C]. Proceedings of 2015 IEEE Wireless Communications and Networking Conference Workshops, New Orleans, USA, 2015: 115–122.

  • 加载中
    1. [1]

      Gongguo XUGanlin SHANXiusheng DUANChenglin QIAOHaotian WANG . Scheduling Method Based on Markov Decision Process for Multi-sensor Cooperative Detection and Tracking. Journal of Electronics and Information Technology, 2019, 41(9): 2201-2208. doi: 10.11999/JEIT181129

    2. [2]

      Ruyan WANGHongjuan LIDapeng WUHongxia LI . Semi-Markov Decision Process-based Resource Allocation Strategy for Virtual Sensor Network. Journal of Electronics and Information Technology, 2019, 41(0): 1-8. doi: 10.11999/JEIT190016

    3. [3]

      Jiangyi LIUChunping WANG . Cardinalized Probability Hypothesis Density Filter Based on Pairwise Markov Chains. Journal of Electronics and Information Technology, 2019, 41(2): 492-497. doi: 10.11999/JEIT180352

    4. [4]

      Deke TANGFeng WANGHongqi WANG . Single-polarization SAR Data Flood Water Detection Method Based on Markov Segmentation. Journal of Electronics and Information Technology, 2019, 41(3): 619-625. doi: 10.11999/JEIT180420

    5. [5]

      Bo XIAOKai HUOYongxiang LIU . Development and Prospect of Radar and Communication Integration. Journal of Electronics and Information Technology, 2019, 41(3): 739-750. doi: 10.11999/JEIT180515

    6. [6]

      Wenzhe YANGHonglei YANGXueyun WANGShengkang ZHANGHuan ZHAOJun YANGKeming FENG . High Precision Time and Frequency Integration Transfer via Optical Fiber. Journal of Electronics and Information Technology, 2019, 41(7): 1579-1586. doi: 10.11999/JEIT180807

    7. [7]

      Hongtao YUYuehang DINGShuxin LIURuiyang HUANGYunjie GU . Eliminating Structural Redundancy Based on Super-node Theory. Journal of Electronics and Information Technology, 2019, 41(7): 1633-1640. doi: 10.11999/JEIT180793

    8. [8]

      Bin ZHAOChuangbai XIAOWenyin ZHANGXue GU . Incentive and Restraint Mechanism of Rewards and Punishment in Access Control Based on Game Theory. Journal of Electronics and Information Technology, 2019, 41(4): 1002-1009. doi: 10.11999/JEIT180406

    9. [9]

      Lun TANGYu ZHOUYouchao YANGGuofan ZHAOQianbin CHEN . Virtual Network Function Dynamic Deployment Algorithm Based on Prediction for 5G Network Slicing. Journal of Electronics and Information Technology, 2019, 41(9): 2071-2078. doi: 10.11999/JEIT180894

    10. [10]

      Lun TANGYannan WEIRunlin MAXiaoyu HEQianbin CHEN . Online Learning-based Virtual Resource Allocation for Network Slicing in Virtualized Cloud Radio Access Network. Journal of Electronics and Information Technology, 2019, 41(7): 1533-1539. doi: 10.11999/JEIT180771

    11. [11]

      Yingjie YANGQiang LENGRuixuan PANHao HU . Research on Dynamic Threat Tracking and Quantitative Analysis Technology Based on Attribute Attack Graph. Journal of Electronics and Information Technology, 2019, 41(9): 2172-2179. doi: 10.11999/JEIT181117

    12. [12]

      Xinsheng JIShuiling XUWenyan LIUQing TONGLingshu LI . A Security-oriented Dynamic and Heterogeneous Scheduling Method for Virtual Network Function. Journal of Electronics and Information Technology, 2019, 41(10): 2435-2441. doi: 10.11999/JEIT181130

    13. [13]

      Shiqi LÜJun GAOXiangyu CAOJunxiang LANSijia LIGuowen ZHANG . A Design of Ultra-broad-band Miniaturized Matematerial Absorber Based on Loading Lumped Resistances. Journal of Electronics and Information Technology, 2019, 41(6): 1330-1335. doi: 10.11999/JEIT180648

    14. [14]

      Cunqian YULi ZHANGRongxi HE . Dynamic Routing and Spectrum Assignment Algorithm Based on Differentiated Degraded-service and Adaptive Modulation in Elastic Optical Networks. Journal of Electronics and Information Technology, 2019, 41(1): 38-45. doi: 10.11999/JEIT180075

    15. [15]

      Jinfu XUJin WU . Frequency Sorting Algorithm Based on Dynamic Ring Oscillator Physical Unclonable Function Statistical Model. Journal of Electronics and Information Technology, 2019, 41(3): 717-724. doi: 10.11999/JEIT180405

    16. [16]

      Lun TANGRunlin MAHeng YANGQianbin CHEN . Joint User Association and Power Allocation Algorithm for Network Slicing Based on NOMA. Journal of Electronics and Information Technology, 2019, 41(9): 2039-2046. doi: 10.11999/JEIT180770

    17. [17]

      Zhijun WUChangliang LIRong LI . A Speech Information Hiding Method Based on Pitch Prediction Process. Journal of Electronics and Information Technology, 2019, 41(0): 1-9. doi: 10.11999/JEIT181163

    18. [18]

      Hongchang CHENTuosiyu MINGShuxin LIUChao GAO . Semantic Summarization of Reconstructed Abstract Meaning Representation Graph Structure Based on Integer Linear Pragramming. Journal of Electronics and Information Technology, 2019, 41(7): 1674-1681. doi: 10.11999/JEIT180720

    19. [19]

      Yifeng SUNJiang WUYanyan HUANGGuangming TANG . A Small Moving Object Detection Algorithm Based on Track in Video Surveillance. Journal of Electronics and Information Technology, 2019, 41(0): 1-8. doi: 10.11999/JEIT181110

    20. [20]

      Yingjie YANGQiang LENGDexian CHANGRuixuan PANHao HU . Research on Network Dynamic Threat Analysis Technology Based on Attribute Attack Graph. Journal of Electronics and Information Technology, 2019, 41(8): 1838-1846. doi: 10.11999/JEIT181025

Metrics
  • PDF Downloads(23)
  • Abstract views(340)
  • HTML views(171)
  • Cited By(0)

通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

/

DownLoad:  Full-Size Img  PowerPoint
Return