CN105611574A - Method for combining dynamic access and subcarrier allocation under cache-based ultra-dense network - Google Patents
Method for combining dynamic access and subcarrier allocation under cache-based ultra-dense network Download PDFInfo
- Publication number
- CN105611574A CN105611574A CN201510994459.2A CN201510994459A CN105611574A CN 105611574 A CN105611574 A CN 105611574A CN 201510994459 A CN201510994459 A CN 201510994459A CN 105611574 A CN105611574 A CN 105611574A
- Authority
- CN
- China
- Prior art keywords
- prime
- user
- access point
- subcarrier
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W28/00—Network traffic management; Network resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/08—Load balancing or load distribution
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
- H04W48/10—Access restriction or access information delivery, e.g. discovery data delivery using broadcasted information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/20—Selecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W72/00—Local resource management
- H04W72/04—Wireless resource allocation
- H04W72/044—Wireless resource allocation based on the type of the allocated resource
- H04W72/0453—Resources in frequency domain, e.g. a carrier in FDMA
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method for combining dynamic access and subcarrier allocation under a cache-based ultra-dense network. The method comprises the following specific steps that firstly, multiple users simultaneously send request information to all access points to search a caching content; secondly, each access point judges whether a caching content requested by the current user K exists, all access points meeting the user K transmit respective property parameters to local control, and the local control allocates the optimal access point to the user K, otherwise the user K directly sends a request to a remote server to obtain the content; thirdly, the remote server utilizes popularity analysis to complete cache updating according to the user request information; and lastly, after each user is matched with the respective access point, subcarrier allocation is carried out, so that each user is communicated with the respective access point. The method has the following advantages that multiple factors are synthesized to complete access selection, and promotion of the resource management efficiency and dynamic allocation of the subcarrier are realized, so that the spectral efficiency is remarkably improved.
Description
Technical field
The invention belongs to networking and resource allocation techniques field, specifically refer to a kind of super-intensive network second line of a couplet based on buffer memoryClose the method that dynamic access and subcarrier distribute.
Background technology
Super-intensive network is the strong candidate technologies of 5G, and super-intensive networking technology, can by increasing base station deployment densityRealize the tremendous increase of channeling efficiency, greatly improve power system capacity, meet thousand times of capacity increase demands of 5G.But more intensive network design makes network topology more complicated, existing content distribution mechanism realize picture,When the magnanimity information such as audio frequency, video transmits, exist a large amount of contents to repeat transmission, frequency spectrum resource etc. has been causedGreatly waste. For this problem, caching technology is introduced to super-intensive network, by access point or core netCarry out content caching, can reduce redundant data transmissions, effectively reduce back haul link consumption and network delay, thereby carryHigh spectrum utilization efficiency and efficiency utilization rate.
Under the dense network based on buffer memory, document 1: in the limited intensive wireless network of back haul link based on physicsThe throughput gain optimization method of layer buffer memory, has proposed a kind of based on the limited novel buffer memory wireless network frame of back haul linkStructure, and physical layer buffering scheme has been proposed under this framework to improve throughput of system, but this scheme is only considered backThe factors such as journey link, and show that result is relevant to base station buffer memory capacity size.
Document 2: the method that joint route and content caching are optimized in heterogeneous network, adopts joint route to select gentleDeposit the scheme of distribution and carry out resource allocation optimization, the problem of considering under this scheme is single, does not consider effect, efficiency frequentlyEtc. resource utilization problem.
Under the scene of super-intensive, prior art is not considered the load balancing of access point, carries out the dynamic choosing of access pointSelect. In addition, do not consider the optimization of spectrum efficiency, the resources such as subcarrier are carried out to allocation optimized.
Summary of the invention
The present invention is directed to the storage resources that can not utilize efficiently access point in prior art and provide service, frequency spectrum for userCan not realize maximization with efficiency utilization of resources rate, propose to combine under a kind of super-intensive network based on buffer memory movingThe method that state access and subcarrier distribute,
Concrete steps are as follows:
Step 1, multiple user send request information to all access points with broadcast mode, find cache contents;
Solicited message refers to cache contents; Number of users is O;
Step 2, using user K as active user, each access point judges whether the buffer memory that exists active user to askContent, if certain access point is idle and have this cache contents, this access point feedback 1 is given user K, enters stepThree; Otherwise feedback 0; Enter step 4;
1≤K≤O;
Step 3, all access points that meet user K send attribute parameter separately to local control, local controlBest access point is distributed to user K;
The all access points that meet user K are m; The attribute parameter of each access point include buffer memory capacity, timeProlong with signal to noise ratio etc., altogether n attribute;
Concrete steps are as follows:
Step 301, according to the solicited message of user K, for each candidate's access point, local control n attributeRelative importance in parameter between every two attribute parameters compares one by one, obtains decision matrix M:
Local control compares the relative importance between each attribute parameter of each candidate's access point, obtains thisThe decision matrix M of candidate's access point:
Wherein aijRepresent the relative importance fiducial value of attribute parameter i and attribute parameter j in access point;
Step 302, decision-making matrix M is normalized, obtains the decision matrix B after standardization:
Wherein bijRepresent in access point fiducial value aijValue after normalization;
Step 303, the uniformity of decision-making matrix B is carried out to verification, judge that whether decision matrix is effective, if effectively,Carry out step 304, otherwise return to step 302;
Consistency Ratio CR is defined as follows:
Wherein, CI represents inconsistency index:λmaxThe eigenvalue of maximum of decision matrix B,N is the number of attribute parameter in decision matrix B, and RI is known mean random coincident indicator;
In the time of CR < 0.1, think that decision matrix B has acceptable uniformity, otherwise re-construct decision matrixB。
Step 304, obtain in decision matrix B n attribute parameter comprehensive produce weight vectors ω;
ω=(ω1,ω2,...ωj,...,ωn)
ωjIt is the weight of j attribute parameter;
Step 305, for m candidate's access point, generate the state matrix S of all properties parameter;
State matrix S is the capable n row of m, and every a line represents n attribute parameter of each access point;
Wherein, smnRepresent the value of corresponding n the attribute parameter of m access point.
Step 306, weight vectors ω and state matrix S are multiplied each other and obtain weighting decision matrix Q:
Step 307, according to weighting decision matrix Q, determine best access scheme QbestThe poorest access scheme Qworst,
Qbest=(ω1·s1best,ω2·s2best,...ωj·sjbest,...,ωn·snbest)
Qworst=(ω1·s1worst,ω2·s2worst,...ωj·sjworst,...,ωn·snworst)
sjbestRepresent optimum value in j attribute parameter of all m access point; sjworstRepresent all m access pointJ attribute parameter in worst-case value;
Step 308, for certain access point l, respectively calculated candidate access scheme xljWith best access scheme QbestEuropeFamily name's distance, and candidate's access scheme xljWith the poorest access scheme QworstEuclidean distance;
Candidate's access scheme xljWith best access scheme QbestEuclidean distance be Qlbest, specifically refer to the candidate side of accessCase xljEach attribute parameter and this attribute optimal value sjbestEuclidean distance, as follows:
Candidate's access scheme xljWith the poorest access scheme QworstEuclidean distance be Qlworst, specifically refer to that candidate accessesScheme xljEach attribute parameter and this attribute worst-case value sjworstEuclidean distance, as follows:
Step 309, for certain access point l, calculated candidate scheme xljAnd the preference value P between preferred planl。
Formula is as follows:
Wherein PlWhat represent is the preference value of user K for l access point.
Step 310, calculate all users respectively for the preference value of each access point, and arranged in sequence, user generatedSelection matrix R;
As follows:
Wherein, PmORepresent that O user selects the preference value of m access point. All O use of every a line representativeThe preference value of each identical access point is selected at family; The list of user's selection matrix R shows that each user selects each difference to connectEnter preference value a little;
Step 311, for each user, access point corresponding maximum preference value is distributed to this user by local control,And delete the access point of this user and coupling, distribute successively, until all users complete network insertion.
Step 4, user K do not obtain the response of any access point, and user K directly sends to far-end serverRequest, obtains content; Far-end server, according to user request information, utilizes popularity analysis, completes buffer update;
Step 5, each user carry out subcarrier distribution after mating with access point separately, make user and access point itBetween communicate.
Step 501, initialization subcarrier set and user's set;
Subcarrier set is N={n'|n'=1,2 ..., N}, user gathers I={i'|i'=1, and 2 ..., I}, distributes to userThe sub-carrier indices X of i'i'=φ。
Step 502, according to water-filling algorithm calculate each user the transmitting power of corresponding each subcarrier and channel holdAmount.
Transmitting power pi',n':
pi',n'Represent the power to user i' allocation of subcarriers n', PtotRepresent maximum transmission power; γi',n'Represent userThe signal to noise ratio of i' allocation of subcarriers n'.
Channel capacity Ci',n':
B represents this overall system bandwidth;
Step 503, for subcarrier n', calculate respectively the channel capacity of this subcarrier under each user, and fallOrder is arranged and is selected maximum
Subcarrier n' initial value is 1;
Be expressed as:
Step 504, subcarrier n' is distributed to maximum channel capacity valueCorresponding user, and by subcarrier n' fromIn subcarrier set N, remove, return to step 503 and continue to choose according to the order of sequence next subcarrier, until all sons are carriedRipple distributes.
Step 505, to distribute after subcarrier carry out water filling, according to the transmitting power p of subcarrieri',n'Computing system frequentlySpectrum utilization ratio;
It is as follows that system spectrum utilization ratio maximizes object function:
Condition that will be satisfied is:
{ai',n'Represent that subcarrier distributes set, and value is that subcarrier n' is distributed to user i' by 0 or 1,1 expression, 0 representsSubcarrier n' does not distribute to user i';
First constraints represents the restrictive condition of general power, wherein PtotRepresent maximum transmission power; Second approximatelyBundle condition represents that the power of user i' allocation of subcarriers n' is more than or equal to 0; Last constraints represents each heightCarrier wave can only distribute once.
The invention has the advantages that:
1), combine the method that dynamic access and subcarrier distribute under a kind of super-intensive network based on buffer memory, according to emulationResult can find out, the method has improved spectrum utilization efficiency effectively, and this result has proved that this mechanism is intensiveUnder scene, meet feasibility and the applicability of multiple business demand.
2), combine the method that dynamic access and subcarrier distribute under a kind of super-intensive network based on buffer memory, can be comprehensiveMultiple factors complete access and select, and realize the lifting of resource management efficiency.
3), combine the method that dynamic access and subcarrier distribute under a kind of super-intensive network based on buffer memory, can realizeThe dynamic assignment of subcarrier, significantly promotes spectrum utilization efficiency. .
Brief description of the drawings
Fig. 1 is system model schematic diagram of the present invention;
Fig. 2 is system model block architecture diagram of the present invention;
Fig. 3 the present invention is based under the super-intensive network of buffer memory, to combine the method flow that dynamic access and subcarrier distributeFigure;
Fig. 3 a is the local flow chart of best access point being distributed to user of controlling of the present invention;
Fig. 3 b is the flow chart that the each user of the present invention and access point separately carry out subcarrier distribution;
Fig. 4 is lower 4 users' of multiple attribute decision making (MADM) algorithm of the present invention weight factor emulation schematic diagram;
Fig. 5 is that ordering of optimization preference emulation schematic diagram is selected in network insertion of the present invention;
Fig. 6 is spectrum utilization efficiency of the present invention and user's number graph of a relation;
Fig. 7 is system spectral efficiency of the present invention and Between Signal To Noise Ratio figure;
Detailed description of the invention
Below in conjunction with accompanying drawing, the present invention is described in further detail.
As shown in Figure 1, in super-intensive network, adopt far-end server as core net, connect multiple access points, accessPoint is analyzed buffer memory part content according to content popularit, and each user connects respectively an access point, as shown in Figure 2,Access point sends attribute parameter separately to local control, local control according to user request information and the access of receivingPoint attribute parameter, utilizes multiple attribute decision making (MADM) matrix for user's Dynamic Selection access point, in selection course, need to comprehensively examineConsider each attribute of access point, carry out multiattribute access as buffer memory capacity, time delay, signal to noise ratio etc. and select. Complete movingAfter state access procedure, on the basis of greedy algorithm, complete subcarrier and distribute, based on transmitted power, spectral bandwidth andCache size restriction is chosen AP and subcarrier, taking maximum spectral efficiency as target, completes subcarrier and distributes.
The present invention is first according to user request information, adopts broadcast mode to find cache contents, and feedback result represents with S,If certain access point is idle and have this cache contents, is designated as S=1, otherwise is designated as S=0. Access point by oneselfAttribute information, as buffer memory capacity, time delay, signal to noise ratio etc., sends local control to. If user does not obtain any accessThe response of point, directly sends request to server end, obtains content, and server end is according to user request information, profitUse popularity analysis, complete buffer update; If user obtains access point response, according to user's content and type of serviceRequest, carries out level analysis, selects best access point, is controlled and is notified selecteed access point that clothes are provided by this localityBusiness, completes access and selects, and upgrades access and selects set Q.
According to access selection result, under the prerequisite of known channel state information, calculate each user by water-filling algorithmThe channel capacity of corresponding subcarrier, on the basis of the channel capacity calculating, carries the son with optimum channel capacityRipple priority allocation, then carries out interative computation, finally completes subcarrier and distributes.
Under super-intensive network based on buffer memory, combine the method that dynamic access and subcarrier distribute, as shown in Figure 3,Concrete steps are as follows:
Step 1, multiple user send request information to all access points with broadcast mode simultaneously, find cache contents;
Solicited message comprises: cache contents; Number of users is O;
Step 2, using user K as active user, according to the solicited message of user K, each access point judges whetherThe cache contents that exists active user to ask, if certain access point is idle and have this cache contents, this access point is anti-User K is given in feedback 1, enters step 3; Otherwise feedback 0; Enter step 4;
1≤K≤O;
Step 3, all access points that meet user K send attribute parameter separately to local control, local controlBest access point is distributed to user K;
The all access points that meet user K are m; The attribute parameter of each access point include buffer memory capacity, timeProlong with signal to noise ratio etc., altogether n attribute;
Local control according to user's request content and type of service, carries out level analysis, selects best access point,Notify selecteed access point that service is provided, complete access and select, then upgrade access and select set Q.
As shown in Figure 3 a, concrete steps are as follows:
Step 301, according to the solicited message of user K, for n attribute parameter of each candidate's access point, this localityControl the relative importance between every two attribute parameters compared one by one, obtain decision matrix M:
Cache contents difference, the attribute specification difference of selecting for access point, structure judgement matrix represents each candidateImportance relation between each attribute parameter of access point, by comparing between two the importance between different attribute, withDetermine the significance level of certain attribute, conventionally in 1~9 ratio scale, importance degree is carried out to assignment, in table 1, giveGo out the implication of 1~9 scale:
Table 1
Local control compares the relative importance between each attribute parameter of each candidate's access point, obtains thisThe decision matrix M of candidate's access point:
Wherein aijRepresent parameter i and parameter j in access point relative importance fiducial value;
Step 302, decision-making matrix M is normalized, obtains the decision matrix B after standardization:
Wherein bijRepresent in access point fiducial value aijValue after normalization;
Step 303, the decision matrix B after standardization is carried out to consistency desired result; Judge that whether decision matrix is effective,If effectively, carry out step 304, otherwise returns to step 302;
Before calculating each attribute weights, need to carry out consistency desired result to decision matrix. Because if decision matrixToo depart from uniformity, the weight vectors calculating will not had a credibility, is therefore necessary decision-making matrix BUniformity is carried out verification. Be defined as follows:
bik×bkj=bij,i,j,k=1,2,…,n(3)
bikFor parameter i in access point after standardization and parameter k relative importance fiducial value;
If equation is set up, represent that judgment matrix has uniformity. Represent that policymaker is carrying out attributeWhile comparing between two, thinking has uniformity. But because people's thinking has certain subjectivity, be difficult to keep absolutelyRight uniformity, so in order to weigh the uniformity of matrix, introduce inconsistency index CI, Consistency Ratio CREtc. concept:
Wherein, λmaxBe the eigenvalue of maximum of decision matrix B, n is the number of attribute parameter in decision matrix B,RI is known mean random coincident indicator, as shown in the table:
Table 2
n | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 |
RI | 0 | 0 | 0.58 | 0.90 | 1.12 | 1.24 | 1.32 | 1.41 | 1.45 |
In the time of CR < 0.1, think that decision matrix B has acceptable uniformity, otherwise re-construct decision matrixB。
Step 304, calculate n the comprehensive generation of attribute parameter in decision matrix B weight vectors ω;
ω=(ω1,ω2,...ωj,...,ωn)
ωjIt is the weight of j attribute parameter; The present invention adopts the characteristic vector after normalization to select as network insertionWeight vectors.
The state matrix S of all properties parameter of step 305, m candidate's access node of generation;
State matrix S is the capable n row of m, and every a line represents n attribute parameter of each access point;
Wherein, smnRepresent the value of corresponding n the attribute parameter of m access point.
Step 306, weight vectors ω and state matrix S are multiplied each other and obtain weighting decision matrix Q:
Step 307, according to weighting decision matrix Q, determine best access scheme QbestThe poorest access scheme Qworst。
Best access scheme is the best situation of selecting each parameter, such as for buffer memory capacity,Just select maximum, for power consumption, just select minimum of a value. The poorest access scheme in contrast, calculatesMode is as follows:
Qbest=(ω1·s1best,ω2·s2best,...ωj·sjbest,...,ωn·snbest)(8)
Qworst=(ω1·s1worst,ω2·s2worst,...ωj·sjworst,...,ωn·snworst)(9)
sjbestRepresent optimum value in j attribute parameter of all m access point; sjworstRepresent all m access pointJ attribute parameter in worst-case value;
Step 308, for certain access point l, respectively calculated candidate access scheme xljWith best access scheme QbestEuropeFamily name's distance, and candidate's access scheme xljWith the poorest access scheme QworstEuclidean distance;
Candidate's access scheme xljWith best access scheme QbestEuclidean distance be Qlbest, specifically refer to the candidate side of accessCase xljEach attribute parameter and this attribute optimal value sjbestEuclidean distance, as follows:
Candidate's access scheme xljWith the poorest access scheme QworstEuclidean distance be Qlworst, specifically refer to candidateAccess scheme xljEach attribute parameter and this attribute worst-case value sjworstEuclidean distance, as follows:
Step 309, for certain access point l, calculated candidate scheme xljAnd the preference value P between preferred planl。
By calculating preference value, draw the ratio of distance between candidate network and optimal network and the poorest network. CalculateFormula as follows:
Wherein PlWhat represent is the preference value of user K for l access point.
The maximum preference value of user K to each access point: Pk=(P1k,P2k,...Plk,...Pmk);
Step 310, calculate all users respectively for the preference value of each access point, and arranged in sequence, user generatedSelection matrix R; As follows:
Wherein, PmORepresent that O user selects the preference value of m access point. O user's choosing of every a line representativeSelect the preference value of each access point;
Step 311, for each user, access point corresponding maximum preference value is distributed to this user by local control,And delete the access point of this user and coupling, distribute successively, until all users complete network insertion.
Local control according to the row of user's selection matrix R, selects maximum preference value, by access corresponding this preference valuePoint is distributed to respective user, deletes user and the access point of coupling after distributing, and continues to distribute successively, until institute is usefulFamily all completes network insertion.
Each list of user's selection matrix R is shown, the preference value of each user to m access point;
The simulation parameter of table 3 access point
Signal to noise ratio (/dBm) | Time delay (/ms) | Covering radius (km) | Buffer memory capacity (TB) | Power consumption (W) | |
Access point 1 | 70 | 25 | 50 | 100 | 1/100 |
Access point 2 | 60 | 50 | 40 | 200 | 1/100 |
Access point 3 | 73 | 80 | 70 | 400 | 1/50 |
Access point 4 | 50 | 30 | 30 | 200 | 1/70 |
According to content popularit analytic approach, content hit rate is relevant with Zipf index. In this emulation, set ZipfParameter is 0.8, and cache hit rate is 0.7, and without loss of generality, user's number that setting obtains access point response is 4,All the other 2 users need to obtain content from back-end server. These 4 users, in different regions, have differentBusiness. User 1 belongs to central user, request network browsing business; User 2 belongs to central user, request Streaming MediaBusiness; User 3 belongs to edge customer, request streaming media service; User 4 belongs to edge customer, request network browsingBusiness. The multiple attribute decision making (MADM) algorithm proposing according to this section, as shown in Figure 4, abscissa has represented 5 ginsengs to simulation resultAmount: signal to noise ratio, time delay, covering radius, buffer memory capacity, power consumption. Ordinate represents the weight of corresponding each parameterValue, can find out that weight factor has very big-difference for different user's requests. Come for streaming media serviceSaying, is mainly one-way transmission, does not need two-way real-time Communication for Power, less demanding in time delay, but file is generalLarger, need higher buffer memory capacity, user 2 and user 3 are request streaming media service, so time delay factor powerHeavy lower, buffer memory capacity factor weight is higher. For network browsing business, buffer memory capacity is also low, but needsHigher service quality and lower time delay, thus signal to noise ratio is had relatively high expectations, as user 1 and user 4 ask networkBrowse service, the weight of time delay factor is higher, and the weight of the buffer memory capacity factor is lower. Central user is to covering radiusRequire lower, so the weight of user 1 and user's 2 the covering radius factor is lower; And user 3 and user 4 cover halfThe weight of the footpath factor is higher.
According to the attribute information of weight factor and each access point, obtain each user inclined to one side for the selection of access pointGood value, simulation result as shown in Figure 5:
As seen from Figure 5, for same access point, its parameter information is constant, but different userThe preference value calculating is but different, illustrates that method in this paper has taken into full account user's demand information,For same user, its network demand is also constant, and what still under different access points, calculate is inclined to one sideGood value is also different, illustrates that algorithm has also taken into full account the parameter information of access point. Thereby, net in this paperNetwork access selection algorithm is taken into account user's request and access point performance simultaneously, is the basis of effectively carrying out subcarrier distribution.End user's network insertion selection result is as shown in table 4:
Table 4 user accesses selection result
User | Access point back-end server |
User 1 | Access point 3 |
User 2 | Access point 2 |
User 3 | Access point 1 |
User 4 | Access point 4 |
User 5 | Back-end server |
User 6 | Back-end server |
Step 4, user K do not obtain the response of any access point, and user K directly sends to far-end serverRequest, obtains content; Far-end server, according to user request information, utilizes popularity analysis, completes buffer update;
Step 5, each user carry out subcarrier distribution after mating with access point separately, make user and access point itBetween communicate.
According to access selection result, under the prerequisite of known channel state information, calculate each user by water-filling algorithmThe channel capacity of corresponding subcarrier, on the basis of the channel capacity calculating, carries the son with optimum channel capacityRipple priority allocation, then carries out interative computation, finally completes subcarrier and distributes.
After completing user access is selected, on the basis of greedy algorithm, propose a kind of based on power system capacity maximumBeggar's carrier wave priority allocation algorithm. Under the prerequisite of known channel state information, calculate each use by water-filling algorithmThe channel capacity of the corresponding subcarrier in family, then on the basis of the channel capacity of calculating, to having optimum channel capacitySubcarrier priority allocation.
As shown in Figure 3 b, concrete steps are as follows:
Step 501, initialization subcarrier set and user's set;
Subcarrier set is N={n'|n'=1,2 ..., N}, user gathers I={i'|i'=1, and 2 ..., I}, distributes to userThe sub-carrier indices X of i'i'=φ。
Step 502, according to water-filling algorithm calculate each user the transmitting power of corresponding each subcarrier and channel holdAmount.
Transmitting power pi',n':
pi',n'Represent the power to user i' allocation of subcarriers n', PtotRepresent maximum transmission power; γi',n'Represent userThe signal to noise ratio of i' allocation of subcarriers n'.
Channel capacity Ci',n':
B represents the bandwidth of total system framework model;
Step 503, for subcarrier n', calculate respectively the channel capacity of this subcarrier under each user, and fallOrder is arranged and is selected maximum
Subcarrier n' initial value is 1;
Be expressed as:
As sub-carrier channels capacity by descending is:
Step 504, subcarrier n' is distributed to maximum channel capacity valueCorresponding user, and by subcarrier n' fromIn subcarrier set N, remove, return to step 503 and continue to choose according to the order of sequence next subcarrier, until all sons are carriedRipple distributes.
Step 505, to distribute after subcarrier carry out water filling, according to the transmitting power p of subcarrieri',n'Computing system frequentlySpectrum utilization ratio;
It is as follows that system spectrum utilization ratio maximizes object function:
Condition that will be satisfied is:
B represents the bandwidth of total system framework model, { ai',n'Representing that subcarrier distributes set, value is that 0 or 1,1 expression willSubcarrier n' distributes to user i', and 0 represents that subcarrier n' does not distribute to user i';
First constraints represents the restrictive condition of general power, wherein PtotRepresent maximum transmission power; Second approximatelyBundle condition represents that the power of user i' allocation of subcarriers n' is more than or equal to 0; Last constraints represents each heightCarrier wave can only distribute once.
In the present embodiment, emulation adopts rayleigh fading channel model, and sub-carrier number is 64, and number of users is 16, totalPower PtotFor 1W, noise power spectral density N0For 10e-8W/Hz, total bandwidth B is 1MHz. And hold with minimumMeasure these two kinds of classical sub-carrier wave distribution methods of maximum method (MAX-MIN) and fair rule of three (FPS) and compare, emulationResult is as shown in Figure 6 and Figure 7:
As seen from Figure 6, in the situation that user's number is identical, the frequency spectrum profit that the algorithm that the present invention proposes obtainsBe much higher than equitable proportion algorithm and minimum capacity by efficiency and maximize method, because algorithm of the present invention entirety is considered systemSystem capacity, comes allocation of subcarriers and power according to channel condition information, thereby has greatly improved the utilization of resources of systemRate. The availability of frequency spectrum of equitable proportion algorithm maximizes method a little more than minimum capacity simultaneously, although because all consideredFairness, but equitable proportion algorithm has been considered power system capacity maximization simultaneously, and minimum capacity maximization method is only consideredThe distribution of subcarrier between user, do not consider that the self adaptation of power between subcarrier distribute, thus frequency spectrumUtilization ratio rate is lower.
Fig. 7 is the curve that spectrum utilization efficiency changes with signal to noise ratio, can find out the in the situation that of identical signal to noise ratio, thisThe spectrum utilization efficiency that the algorithm that literary composition proposes obtains is much higher than equitable proportion algorithm and minimum capacity maximizes method,This is because this algorithm carrys out allocation of subcarriers by constantly carrying out iteration water filling calculating channel capacity, can keep away betterExempt from the subcarrier with poor channel quality to distribute to user, thereby can improve system spectrum utilization ratio.
Claims (3)
1. under the super-intensive network based on buffer memory, combine the method that dynamic access and subcarrier distribute, its feature existsIn, comprise the following steps:
Step 1, multiple user send request information to all access points with broadcast mode, find cache contents;
Number of users is O;
Step 2, using user K as active user, each access point judges whether the buffer memory that exists active user to askContent, if certain access point is idle and have this cache contents, this access point feedback 1 is given user K, enters stepThree; Otherwise feedback 0; Enter step 4;
Step 3, all access points that meet user K send attribute parameter separately to local control, local controlBest access point is distributed to user K;
The all access points that meet user K are m;
Step 4, user K do not obtain the response of any access point, and user K directly sends to far-end serverRequest, obtains content; Far-end server, according to user request information, utilizes popularity analysis, completes buffer update;
Step 5, each user carry out subcarrier distribution after mating with access point separately, make user and access point itBetween communicate;
Specifically comprise:
Step 501, initialization subcarrier set and user's set;
Subcarrier set is N={n'|n'=1,2 ..., N}, user gathers I={i'|i'=1, and 2 ..., I}, distributes to userThe sub-carrier indices X of i'i'=φ;
Step 502, according to water-filling algorithm calculate each user transmitting power and the channel capacity of corresponding each subcarrier;
Transmitting power pi',n':
pi',n'Represent the power to user i' allocation of subcarriers n', PtotRepresent maximum transmission power; γi',n'Represent userThe signal to noise ratio of i' allocation of subcarriers n';
Channel capacity Ci',n':
B represents this overall system bandwidth;
Step 503, for subcarrier n', calculate respectively the channel capacity of this subcarrier under each user, and fallOrder is arranged and is selected maximum
Subcarrier n' initial value is 1;
Step 504, subcarrier n' is distributed to maximum channel capacity valueCorresponding user, and by subcarrier n' fromIn subcarrier set N, remove, return to step 503 and continue to choose according to the order of sequence next subcarrier, until all sons are carriedRipple distributes;
Step 505, to distribute after subcarrier carry out water filling, according to the transmitting power p of subcarrieri',n'Computing system frequentlySpectrum utilization ratio;
It is as follows that system spectrum utilization ratio maximizes object function:
Condition that will be satisfied is:
{ai',n'Represent that subcarrier distributes set, and value is that subcarrier n' is distributed to user i' by 0 or 1,1 expression, 0 representsSubcarrier n' does not distribute to user i';
First constraints represents the restrictive condition of general power, wherein PtotRepresent maximum transmission power; Second approximatelyBundle condition represents that the power of user i' allocation of subcarriers n' is more than or equal to 0; Last constraints represents each heightCarrier wave can only distribute once.
2. under a kind of super-intensive network based on buffer memory as claimed in claim 1, combine dynamic access and subcarrier dividesThe method of joining, is characterized in that, the attribute parameter of described each access point includes buffer memory capacity, time delay and signal to noise ratioDeng, n attribute altogether.
3. under a kind of super-intensive network based on buffer memory as claimed in claim 1, combine dynamic access and subcarrier dividesThe method of joining, is characterized in that, described step 3 is specially:
Step 301, according to the solicited message of user K, for each candidate's access point, local control joined n attributeRelative importance in amount between every two attribute parameters compares one by one, obtains decision matrix M:
aijRepresent the relative importance fiducial value of attribute parameter i and attribute parameter j in access point;aii=1;
Step 302, decision-making matrix M is normalized, obtains the decision matrix B after standardization:
Wherein bijRepresent in access point fiducial value aijValue after normalization;
Step 303, the uniformity of decision-making matrix B is carried out to verification, judge that whether decision matrix is effective, if hadEffect, carry out step 304, otherwise returns to step 302;
Consistency Ratio CR is defined as follows:
Wherein, CI represents inconsistency index:λmaxThe eigenvalue of maximum of decision matrix B,N is the number of attribute parameter in decision matrix B, and RI is known mean random coincident indicator;
In the time of CR < 0.1, think that decision matrix B has acceptable uniformity, otherwise re-construct decision matrixB;
Step 304, obtain in decision matrix B n attribute parameter comprehensive produce weight vectors ω;
ω=(ω1,ω2,...ωj,...,ωn)
ωjIt is the weight of j attribute parameter;
Step 305, for m candidate's access point, generate the state matrix S of all properties parameter;
State matrix S is the capable n row of m, and every a line represents n attribute parameter of each access point;
Wherein, smnRepresent the value of corresponding n the attribute parameter of m access point;
Step 306, weight vectors ω and state matrix S are multiplied each other and obtain weighting decision matrix Q:
Step 307, according to weighting decision matrix Q, determine best access scheme QbestThe poorest access scheme Qworst,
Qbest=(ω1·s1best,ω2·s2best,...ωj·sjbest,...,ωn·snbest)
Qworst=(ω1·s1worst,ω2·s2worst,...ωj·sjworst,...,ωn·snworst)
sjbestRepresent optimum value in j attribute parameter of all m access point; sjworstRepresent all m access pointJ attribute parameter in worst-case value;
Step 308, for certain access point l, respectively calculated candidate access scheme xljWith best access scheme QbestEuropeFamily name's distance, and candidate's access scheme xljWith the poorest access scheme QworstEuclidean distance;
Candidate's access scheme xljWith best access scheme QbestEuclidean distance be Qlbest, specifically refer to the candidate side of accessCase xljEach attribute parameter and this attribute optimal value sjbestEuclidean distance, as follows:
Candidate's access scheme xljWith the poorest access scheme QworstEuclidean distance be Qlworst, specifically refer to that candidate accessesScheme xljEach attribute parameter and this attribute worst-case value sjworstEuclidean distance, as follows:
Step 309, for certain access point l, calculated candidate scheme xljAnd the preference value P between preferred planl;
Formula is as follows:
Wherein PlWhat represent is the preference value of user K for l access point;
Step 310, calculate all users respectively for the preference value of each access point, and arranged in sequence, user generatedSelection matrix R;
Wherein, PmORepresent that O user selects the preference value of m access point; All O use of every a line representativeThe preference value of each identical access point is selected at family; The list of user's selection matrix R shows that each user selects each difference to connectEnter preference value a little;
Step 311, for each user, access point corresponding maximum preference value is distributed to this user by local control,And delete the access point of this user and coupling, distribute successively, until all users complete network insertion.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510994459.2A CN105611574B (en) | 2015-12-25 | 2015-12-25 | A method of combining dynamic access and subcarrier distribution under the super-intensive network based on caching |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510994459.2A CN105611574B (en) | 2015-12-25 | 2015-12-25 | A method of combining dynamic access and subcarrier distribution under the super-intensive network based on caching |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105611574A true CN105611574A (en) | 2016-05-25 |
CN105611574B CN105611574B (en) | 2019-02-01 |
Family
ID=55991041
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510994459.2A Active CN105611574B (en) | 2015-12-25 | 2015-12-25 | A method of combining dynamic access and subcarrier distribution under the super-intensive network based on caching |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105611574B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105898807A (en) * | 2016-06-08 | 2016-08-24 | 北京邮电大学 | Access point selection and resource distribution combined self-healing method in ultra-dense network |
CN106304307A (en) * | 2016-08-16 | 2017-01-04 | 上海交通大学 | A kind of resource allocation methods under heterogeneous network converged |
CN106900019A (en) * | 2016-06-07 | 2017-06-27 | 中国移动通信有限公司研究院 | A kind of multi-access point system of selection and device |
CN106912079A (en) * | 2017-02-20 | 2017-06-30 | 北京邮电大学 | Federated user accesses selection and resource allocation methods in one kind caching heterogeneous network |
CN107172667A (en) * | 2017-05-19 | 2017-09-15 | 北京邮电大学 | Management method, system, electronic equipment and the mobile terminal of access point cluster |
CN107567053A (en) * | 2016-06-30 | 2018-01-09 | 华为技术有限公司 | A kind of method of data transfer, equipment and system |
CN107613565A (en) * | 2017-08-30 | 2018-01-19 | 东莞理工学院 | A kind of radio resource management method in full duplex super-intensive network |
CN108738103A (en) * | 2017-04-13 | 2018-11-02 | 电信科学技术研究院 | A kind of resource allocation methods and device |
CN107466099B (en) * | 2017-07-31 | 2020-01-10 | 北京邮电大学 | Interference management self-optimization method based on non-orthogonal multiple access |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070161150A1 (en) * | 2005-12-28 | 2007-07-12 | Intel Corporation | Forming ultra dense 3-D interconnect structures |
CN103096335A (en) * | 2012-12-26 | 2013-05-08 | 陈宏滨 | Optimization method of spectrum efficiency and energy efficiency of wireless communication system |
CN103281786A (en) * | 2013-06-04 | 2013-09-04 | 北京邮电大学 | Method for optimizing resources of family base station double-layer network based on energy efficiency |
CN104066096A (en) * | 2014-07-03 | 2014-09-24 | 东南大学 | Super-dense heterogeneous-network optimal power coordination method based on improved particle swarm |
CN105188089A (en) * | 2015-08-05 | 2015-12-23 | 东南大学 | Load balancing method based on integral optimization of user connection and interference management in ultra-dense heterogeneous network |
-
2015
- 2015-12-25 CN CN201510994459.2A patent/CN105611574B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070161150A1 (en) * | 2005-12-28 | 2007-07-12 | Intel Corporation | Forming ultra dense 3-D interconnect structures |
CN103096335A (en) * | 2012-12-26 | 2013-05-08 | 陈宏滨 | Optimization method of spectrum efficiency and energy efficiency of wireless communication system |
CN103281786A (en) * | 2013-06-04 | 2013-09-04 | 北京邮电大学 | Method for optimizing resources of family base station double-layer network based on energy efficiency |
CN104066096A (en) * | 2014-07-03 | 2014-09-24 | 东南大学 | Super-dense heterogeneous-network optimal power coordination method based on improved particle swarm |
CN105188089A (en) * | 2015-08-05 | 2015-12-23 | 东南大学 | Load balancing method based on integral optimization of user connection and interference management in ultra-dense heterogeneous network |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106900019A (en) * | 2016-06-07 | 2017-06-27 | 中国移动通信有限公司研究院 | A kind of multi-access point system of selection and device |
CN106900019B (en) * | 2016-06-07 | 2019-04-30 | 中国移动通信有限公司研究院 | A kind of multi-access point selection method and device |
CN105898807A (en) * | 2016-06-08 | 2016-08-24 | 北京邮电大学 | Access point selection and resource distribution combined self-healing method in ultra-dense network |
CN105898807B (en) * | 2016-06-08 | 2019-04-23 | 北京邮电大学 | A kind of selection of joint access point and resource allocation under super-intensive network from cure method |
CN107567053A (en) * | 2016-06-30 | 2018-01-09 | 华为技术有限公司 | A kind of method of data transfer, equipment and system |
CN107567053B (en) * | 2016-06-30 | 2020-06-26 | 华为技术有限公司 | Data transmission method, equipment and system |
CN106304307B (en) * | 2016-08-16 | 2019-11-12 | 上海交通大学 | A kind of resource allocation methods under heterogeneous network converged |
CN106304307A (en) * | 2016-08-16 | 2017-01-04 | 上海交通大学 | A kind of resource allocation methods under heterogeneous network converged |
CN106912079A (en) * | 2017-02-20 | 2017-06-30 | 北京邮电大学 | Federated user accesses selection and resource allocation methods in one kind caching heterogeneous network |
CN106912079B (en) * | 2017-02-20 | 2020-04-03 | 北京邮电大学 | Combined user access selection and resource allocation method in cache heterogeneous network |
CN108738103A (en) * | 2017-04-13 | 2018-11-02 | 电信科学技术研究院 | A kind of resource allocation methods and device |
CN107172667A (en) * | 2017-05-19 | 2017-09-15 | 北京邮电大学 | Management method, system, electronic equipment and the mobile terminal of access point cluster |
CN107172667B (en) * | 2017-05-19 | 2019-10-15 | 北京邮电大学 | Management method, system, electronic equipment and the mobile terminal of access point cluster |
CN107466099B (en) * | 2017-07-31 | 2020-01-10 | 北京邮电大学 | Interference management self-optimization method based on non-orthogonal multiple access |
CN107613565A (en) * | 2017-08-30 | 2018-01-19 | 东莞理工学院 | A kind of radio resource management method in full duplex super-intensive network |
CN107613565B (en) * | 2017-08-30 | 2020-09-04 | 东莞理工学院 | Wireless resource management method in full-duplex ultra-dense network |
Also Published As
Publication number | Publication date |
---|---|
CN105611574B (en) | 2019-02-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105611574A (en) | Method for combining dynamic access and subcarrier allocation under cache-based ultra-dense network | |
Liu et al. | Economically optimal MS association for multimedia content delivery in cache-enabled heterogeneous cloud radio access networks | |
CN111314889B (en) | Task unloading and resource allocation method based on mobile edge calculation in Internet of vehicles | |
Pham et al. | Partial computation offloading in parked vehicle-assisted multi-access edge computing: A game-theoretic approach | |
Khreishah et al. | Joint caching, routing, and channel assignment for collaborative small-cell cellular networks | |
CN111010684B (en) | Internet of vehicles resource allocation method based on MEC cache service | |
He et al. | Resource allocation based on graph neural networks in vehicular communications | |
CN101207601B (en) | Method and system of OFDM bit power distribution based on game theory | |
CN108495340B (en) | Network resource allocation method and device based on heterogeneous hybrid cache | |
CN110417847A (en) | The method and device of Communication Network for UAVS user access and content caching | |
CN110602722B (en) | Design method for joint content pushing and transmission based on NOMA | |
CN107302801B (en) | QoE-oriented double-layer matching game method in 5G mixed scene | |
CN111193615A (en) | Edge computing node selection method in mobile edge computing network | |
CN112203308A (en) | Satellite ground fusion network data transmission method | |
CN105682231A (en) | Method for joint distribution of power and time for cooperative communication of cognitive radio network | |
CN111526526B (en) | Task unloading method in mobile edge calculation based on service mashup | |
CN113473422A (en) | B5G-oriented wireless energy-carrying D2D network efficient resource allocation method | |
Zeng et al. | Caching and 3D deployment strategy for scalable videos in cache-enabled multi-UAV networks | |
Le et al. | Joint cache allocation with incentive and user association in cloud radio access networks using hierarchical game | |
CN105376844B (en) | A kind of Poewr control method based on monotonicity optimization and simulated annealing in cognition wireless network | |
Ren et al. | Joint spectrum allocation and power control in vehicular communications based on dueling double DQN | |
Zhang et al. | Joint design of multicast transmission and in-network caching for green Internet of Things | |
CN109831759B (en) | Three-dimensional D2D matching algorithm based on software defined wireless network | |
Rahimi et al. | Social-aware clustering for D2D multicast content sharing in 5G networks | |
Sanguanpuak et al. | Edge caching in delay-constrained virtualized cellular networks: Analysis and market |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |