Analysis of effective capacity and throughput of polling-based device-to-device networks

Bushra Ismaiel, Mehran Abolhasan, Wei Ni, David Smith, Daniel Franklin, Abbas Jamalipour

Research output: Contribution to journalArticlepeer-review

12 Citations (Scopus)


Next-generation wireless networks will give rise to heterogeneous networks by integrating multiple wireless access technologies to provide seamless mobility to mobile users with high-speed wireless connectivity. Device-to-device (D2D) communication has proven to be a promising technology that can increase the capacity and coverage of wireless networks. The D2D communication was first introduced in long-term evolution advanced (LTE-A) and has gained immense popularity for the offloading traffic using the licensed and unlicensed band. Challenges arise from resource allocation, provision of quality-of-service (QoS), and the quantification of capacity in an unlicensed band due to the distributed nature of Wi-Fi. In this paper, we propose an analytical performance model for the scalable MAC protocol (SC-MP) in which a resource allocation mechanism is based on the IEEE 802.11 point coordinated function to access the Wi-Fi channel for voice and video/multimedia traffic. In the SC-MP, D2D communication is applied to further offload the video/multimedia traffic. In particular, this paper establishes a three-state semi-Markovian model to derive a closed-form expression of effective capacity in terms of transmission rate and quality-of-service. Further, the SC-MP is analytically modeled using the four-state traditional Markov model to derive the saturation throughput. The analytical results are validated through simulations, hence, proving the appropriateness of the model.

Original languageEnglish
Article number8365829
Pages (from-to)8656-8666
Number of pages11
JournalIEEE Transactions on Vehicular Technology
Issue number9
Publication statusPublished - 1 Sept 2018
Externally publishedYes


Dive into the research topics of 'Analysis of effective capacity and throughput of polling-based device-to-device networks'. Together they form a unique fingerprint.

Cite this