Next Article in Journal
A High-Accuracy Mathematical Morphology and Multilayer Perceptron-Based Approach for Melanoma Detection
Next Article in Special Issue
Social-Aware-Based Resource Allocation for NOMA-Enhanced D2D Communications
Previous Article in Journal
Analyzing the Association between Candida Prevalence, Species Specificity, and Oral Squamous Cell Carcinoma: A Systematic Review and Meta-Analysis— Candida and OSCC
Previous Article in Special Issue
Multi-Objective Optimization of Massive MIMO 5G Wireless Networks towards Power Consumption, Uplink and Downlink Exposure
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Performance Analysis of D2D Communication with Retransmission Mechanism in Cellular Networks

1
College of Telecommunications and Information Engineering, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
2
Electrical Engineering School, Anhui Polytechnic University, Wuhu 241000, China
3
Department of Computer Information and Network Security, Jiangsu Police Institute, Nanjing 210031, China
4
Jiangsu University of Technology, Changzhou 213001, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2020, 10(3), 1097; https://doi.org/10.3390/app10031097
Submission received: 27 December 2019 / Revised: 29 January 2020 / Accepted: 31 January 2020 / Published: 6 February 2020

Abstract

:
In this paper, we focus on the performance analysis of device-to-device (D2D) underlay communication in cellular networks. First, we develop a spatiotemporal traffic model to model a retransmission mechanism for D2D underlay communication. The D2D users in backlogged statuses are modeled as a thinned Poisson point process (PPP). To capture the characteristics of sporadic wireless data generation and limited buffer, we adopt queuing theory to analyze the performance of dynamic traffic. Furthermore, a feedback queuing model is adopted to analyze the performance with retransmission strategy. With the consideration of interference and channel fading, the service probability of the queue departure process is determined by the received signal-to-interference-plus-noise ratio (SINR). Then, the embedded Markov chain is employed to depict the queuing status in the D2D user buffer. We compute its steady-state distribution and derive the closed-form expressions of performance metrics, namely the average queue length, average throughput, average delay, and dropping probability. Simulation results show the validity and rationality of the theoretical analysis with different channel parameters and D2D densities. In addition, the simulation explores the dropping probability of a D2D user with and without the retransmission strategy for different D2D links in the system. When the arrival rate is comparatively high, the optimal throughput is reached after fewer retransmission attempts as a result of the limited buffer.

1. Introduction

With the rapid growth of wireless multimedia traffic, there is an urgent need to develop new techniques that transmit diverse data types to realize information exchange among various types of devices. Device-to-device (D2D) communication permits mobile terminals to communicate directly with each other in a licensed spectrum under the control of evolved Node B (eNB) [1,2]. In the last few years, D2D communication has been regarded as a key technology in 5G cellular networks, which could provide higher data rates and quality of service (QoS) provisioning [3,4]. Furthermore, D2D communication has been extensively studied in sensor networks [5,6], ad-hoc networks [7], and mobile health systems [8]. D2D communication in cellular networks can significantly strengthen the network architecture and the reliability of transmission among devices. However, the advantages of D2D communication are based on several challenges, including device discovery, mode selection, interference management, and so on. In contrast to traditional cellular networks, D2D heterogeneous networks have overlay and underlay scenarios. In overlay D2D communications, there is no interference between D2D and cellular users (CUs) because parts of the cellular channel spectrum are dedicated to D2D users. In D2D underlay cellular networks, more complex interferences are introduced by D2D links reusing cellular spectrum resources. Thus, addressing the co-channel interference issue by developing a reasonable interference management scheme is crucial for maintaining the QoS of D2D underlay cellular networks.
Stochastic geometry has been proven to be a powerful mathematical tool to model randomly distributed devices and numerically analyze the network performances [9]. It was used to solve various problems for D2D networks in [10,11,12,13]. The common point of these works is that D2D transmitters (DTs) are modeled as a Poisson point process (PPP). However, these works were not concerned with random data generation and the queuing behavior of users. In that way, some substantive performance parameters were ignored, such as the overflow dropping caused by a saturated buffer and delays caused by an empty buffer.
Several studies on performance analysis of D2D communications using the queuing model have been reported in the literature [14,15,16]. Existing works have also built the spatiotemporal model simultaneously based on the queuing theory and stochastic geometry (e.g., [17,18,19]). However, in these works, the transmitter sends packet in order; if the packet is not correctly received due to interference and an intrinsically unreliable channel, it is dropped. The dropping probability would rise significantly in a severe interference scenario. The authors did not consider retransmission schemes to improve the transmission reliability and lower the dropping probability.
As we all know, when digital data need to be transmitted from a transmitter to a receiver, some packets may be corrupted or even lost entirely because of the time-varying characteristics of the channel and the indeterminacy of the communication distance. Automatic repeat request (ARQ) is a well-known protocol used to cope with this problem, which has been extensively employed in next-generation wireless packet data networks to provide reliable communication [20]. Stop-and-wait (SW-ARQ) is one of the classic ARQ schemes [21]. In SW-ARQ, the transmitter waits for feedback acknowledgment after it sends a data packet to the corresponding receiver. According to the error detection results, if the packet is received correctly (ACK), the transmitter sends the next packet in the queue. Otherwise, the transmitter receives a negative acknowledgment (NACK), and the same packet is scheduled and retransmitted immediately. This process continues until the packet is positively acknowledged. SW-ARQ is easily implemented and ensures that packets are received in the same order, so no resequencing is needed. Furthermore, in several works addressing the queuing model for D2D communications with retransmission schemes [22,23], the authors did not describe the packet retransmission process by the feedback queuing model.
In this paper, we construct a spatiotemporal traffic model with a retransmission strategy to evaluate the performance of D2D underlay cellular networks, where the data packets’ arrival is initiated randomly and the departure is governed by the received signal-to-interference-plus-noise ratio (SINR). The main contributions of this paper include three parts: Firstly, from the perspective of spatial distribution, we employ the tools of stochastic geometry to derive the coverage probability of D2D user. Secondly, from the temporal domain perspective, the exact queueing behavior of D2D users with the retransmission mechanism in D2D underlay cellular networks is developed by queuing theory, in which sporadic data generation instead of saturated traffic affect the interference state and further network QoS performance evaluation. Third, an embedded Markov chain is used to model the queue length state transition. The steady-state probability distribution is computed using an iterative solution, and the expressions of performance metrics are obtained.
The main contributions and outcomes of this paper are as follows:
  • We develop a stochastic traffic model to model a retransmission mechanism for D2D underlay communication. By using the stochastic geometry model for a user’s position, interference levels experienced by D2D users are also quantified, and simple formulas of coverage probability are derived. A queuing model with feedback is adopted to analyze the performance of dynamic traffic for a D2D underlay cellular network.
  • The retransmission strategy is modeled as feedback queuing to explore the effects of the number of retransmission attempts on key system parameters. In order to analyze the queuing behavior in the buffer, we formulate it as an embedded Markov chain and compute its steady-state distribution by the iterative solution. The closed-form expressions of performance metrics, namely the average queue length, mean throughput, average packet delay, and packet dropping probability, are obtained.
  • Simulation results indicate that the dropping probability and average throughput are affected by setting an appropriate number of retransmission attempts. The dropping probability gradually decreases as the retransmission attempts increase. However, when the arrival rate is comparatively high, the optimal throughput is reached after fewer retransmission attempts because of the limited buffer. Simulation results show the validity and rationality of the theoretical analysis.
The remainder of this paper is structured as follows. Section 2 reviews related works, and Section 3 describes the system model. Section 4 gives the details and transmission strategy of the feedback queuing model applied to D2D communication and the transition probability matrix of the embedded Markov chain. Section 5 introduces the solving process of the steady-state probability distribution in detail. Expressions of the performance metrics, namely average queue length, average throughput, average packet delay, and packet dropping probability, are derived. In Section 6, the simulation results are reported, and they demonstrate the validity and rationality of the theoretical analysis. Finally, a brief conclusion and possible future work are presented in Section 7.

2. Related Work

D2D underlay cellular networks can be subject to interference among cellular users and D2D users because of the spectrum-sharing mechanism. A proper interference management scheme is crucial for maintaining the QoS of D2D and cellular links. The authors in [24] proposed centralized and distributed power control algorithms to improve the coverage probability of cellular users and maximize the sum rate of D2D links in D2D underlay cellular networks. In [25], joint power control and radio resource allocation techniques were adopted to maximize the number of D2D users allowed in the network. The authors in [26] specified accessible regions for D2D users and reusable regions for cellular users. In their approach, once the cellular users entered the reusable region, D2D users in the accessible region were capable of reusing the radio resource. The results showed that both cellular and D2D users could achieve a higher SINR compared with the result in [27]. A resource management and power control scheme was proposed in [28] to mitigate the co-channel interference from D2D users to cellular users.
It is well known that mathematical methods play a significant role in system modeling and optimization analysis [29,30,31]. To get the probability that a typical mobile user is able to achieve some threshold SINR, the random spatial positions of mobile users need to be modeled by stochastic geometry rather than Monte Carlo methods. In [29], the authors introduced the service success probability to capture the mobility of users and the activeness of communication links in a cache-enabled D2D cellular network. Simulation results revealed the influence of file size distributions on performance metrics. The authors in [30] analyzed the performance of network-assisted D2D discovery in random spatial networks and derived useful guidelines. The Poisson point process was used to model the base station (BS) position, and approximate expressions for the distribution of the distance between two D2D users were derived. The study in [31] focused on a distributed caching device-to-device network in which the contents were cached as several portions in the buffer of other devices. By using the stochastic geometry model, the mobility patterns of D2D users were evaluated. The results demonstrated that user mobility improved the coverage probability.
The system models in the aforementioned works were developed for saturated traffic with infinite wireless data generation, which affected the interference state and further network QoS performance evaluation. It is important to establish a dynamic traffic model to describe sporadic wireless data generation instead of saturated traffic. There are some literature works related to performance analysis on D2D communications using the queuing model [15,32,33]. In [15], the authors investigated the performance of resource allocation schemes in D2D communications by formulating a queuing model with a resource allocation strategy. In [32], the authors investigated the stability region for overlay D2D communication in which a user-to-user communication and user-to-BS communication coexisted. A new transmission strategy was proposed in [33], which modeled the characteristics of dynamic interference and system behavior as an M/G/1queuing model.
In the existing works, the authors considered both the spatial distribution and unsaturated traffic model by combining the tools from stochastic geometry and queueing theory, such as [17,18]. The analysis in these works considered the traffic generated at random spatial regions. However, packet retransmissions on each link were not taken into account. For example, in the work in [17], the authors investigated a distributed D2D power allocation framework, in which D2D pairs reused the channel of interior cellular users. By using stochastic geometry, an individual interference budget that each D2D pair may not exceed toward the CUs was derived. D2D queueing stability was one of the constraint conditions of the proposed distributed flow control and power allocation strategies. In [18], the notion of delay outage was proposed to evaluate the effect of different scheduling policies in multi-point-to-multi-point communications.
However, in some literature works about D2D communications with retransmission schemes [22,23], they did not construct the spatiotemporal arrival of the traffic model. For example, the work of [22] addressed the impact of retransmission protocols on the total energy efficiency of the D2D system. The goal was to minimize the average total transmission power, but it did not consider the impact of unsaturated traffic to some substantive performance parameters. Furthermore, the authors of [23] considered the end-to-end queuing model for relay-assisted D2D communications, in which each user maintained a fixed-size buffer for storing the arrived packets. A relay selection scheme was proposed.
As for the works in [34,35], the authors built a queuing model to describe the influence of retransmission schemes on D2D users. They discussed the influence of channel time-variant characteristic on the probability of an erroneous transmission, but they assumed an error-prone channel model without interference. The assumption was quite unpractical in an actual communication network. We try to further take into account the impact of interference caused by other active users sharing the same frequency spectrum.

3. System Model and Assumptions

In this section, we give the system model and some key network assumptions. As shown in Figure 1, we studied a D2D underlying cellular network, in which uplink spectrum resources were orthogonally assigned to different cellular users and reused by D2D links within a cell. The coverage region of a BS was assumed to be a disk A with radius R = 1 π λ B [36], in which λ B is the BS density per unit area. BS is at the center of a cell. The distance from the CU to its serving base station is defined as r , r 0 , R . The probability density function (PDF) of r is 2 r R 2 .
Cellular users formed a PPP Φ C with intensity λ C and were uniformly distributed in one cell. The locations of D2D transmitters were assumed to follow a 2D homogeneous PPP distribution Φ D with density λ D . The distance from a D2D transmitter to its corresponding receiver was fixed [36]. Further, each D2D transmitter was assumed to be equipped with finite buffers for storing the sporadic arriving packets, in which only the non-empty queues caused interferences with other links. As for D2D users with data to be transmitted, they formed a thinned PPP ρ Φ D with intensity ρ λ D , in which ρ indicates the probability of non-empty queue status.
Based on the above-mentioned assumptions, the SINR at D2D receiver m can be written as:
S I N R m = P D g m , m d m , m α I D + I C + σ N 2
where I C represents the interference from cellular users and I D is the interference from the D2D transmitters with non-empty data queues. The expressions of I C and I D are I C = l Φ C P C U g m , l d l , m α , I D = n ρ Φ D \ m P D g m , n d m , n α . P D and P C U represent the D2D user and CU transmission power. g m , n and g m , l represent small-scale fading from D2D transmitter m to D2D receiver n and from D2D transmitter m to cellular user l, respectively. We assumed the distance-dependent path-loss model, i.e., d m , n α and d l , m α , in which d m , n and d l , m are the distance between D2D transmitter m and D2D receiver n and cellular user l, respectively. α C and α D are denoted as the path loss attenuation factor of the cellular link and the D2D link, respectively. σ N 2 denotes the power of the additive white Gaussian noise.

4. Queuing Model and Feedback Strategy

In this section, with consideration of sporadic wireless data generation and a limited buffer, we adopted the feedback queuing model to capture the characteristic of the retransmission mechanism. This paper adopted the feedback priority strategy and gave precedence to the feedback data. This was suitable to model the behavior of data transmission under the SW-ARQ protocol. Then, the SW-ARQ protocol avoided the reorder operation in the receiver buffer. Modeling SW-ARQ by using feedback queuing theory provided fundamental research of further dynamic modeling for the complex ARQ protocol. In the derivation, the embedded Markov chain was used to obtain the key parameters of D2D underlay cellular networks. The general queuing model with feedback is described in detail in this section.

4.1. Analysis Model of the Feedback Queuing Model

To show the impact of buffering at the D2D transmitter, queuing theory was modeled to approximate the traffic state of the D2D data-link. We modeled the packet arrival by a Bernoulli process with probability q, while modeling the server system as a queuing model with feedback [37]. Let p s u c be the transmission success probability of data packets, which depends on the received SINR of the D2D user across time slots.
With the SAW-ARQ protocol, the transmitter received a status report from the receiver after the transmission and then started the next transmission round. We defined one slot as the duration time, which included the time to send the preceding packet at the front of the queue, the arrival of one new packet, and the acknowledgment of the feedback delay. As a matter of fact, some existing studies [37,38] assumed that error detection and the transmission of acknowledgment packets used no time at the receiver.
In this study, both were completed at the end of the slot, and the transmission was scheduled for the next time slot. If packet transmission was successful, the next packets were sent; otherwise, the packet for retransmission had a preemptive priority and occupied the front of the queue. That means that the feedback packet was sent first at the beginning of the next round of transmission. We set the D2D transmitter (D2D-TX) to be equipped with a finite buffer of L m a x packets, which was the same assumption as that applied in [39,40]. If the queue length reached the buffer capacity, subsequent arriving packets were dropped; this approximation was also used in previous research [41]. Without loss of generality, Figure 2 shows the feedback queuing model.
Furthermore, considering the timeliness of data transmission, we set the maximum number of retransmission attempts at K, after which the failed packets were dropped. In other words, a packet had k chances to be successfully sent, where k 1 , 2 , K . The packet transmission failure had a probability of 1 p s u c , in which case it returned to the head of the queue for retransmission during the next time slot t + 1 . A retransmission attempt counted only if the packet was successfully sent. It was sent again if a sending failure occurred, and that cycle repeated until the packet was retransmitted K times. It was necessary to account for the queuing length in the buffer when checking the state of the sent packet. We defined the probability set of the packet transmission state as P s t a t e = p s t a t e k k = 1 , 2 , , K .
As mentioned above, when k = 1 , the current processing packet was in its first sending state in two cases:
Case 1: The previous packet was sent successfully, provided it was in any state j, j 1 , K 1 .
Case 2: When the previous packet reached the upper bound of the number of retransmission attempts, this packet dropped from the queue. We obtained the probability of the packet transmission state as follows:
p s t a t e k = p s u c ( 1 p s u c ) k 1 1 + ( 1 p s u c ) K , 1 k < K p s u c ( 1 p s u c ) K 1 , k = K .

4.2. Stochastic Geometry Analysis for Service Probability

While maintaining a minimum level of quality of service, the servers’ probability of the D2D data queue was defined as the probability of the received SINR above a certain threshold η , which also accounted for the interference between the backlogged links. Using stochastic geometry, the transmission success probability p s u c was characterized via the following lemma.
Lemma 1.
In the depicted underlying D2D network, the transmission success probability p s u c was the complementary cumulative distribution function (CCDF) of the SINR of D2D links, which is expressed as:
p s u c = E r P S I N R m > η r = e η P D d m , m α D · σ N 2 · L I C η P D d m , m α D · L I D η P D d m , m α D
where L I C · and L I D · are the Laplace transforms of I C and I D given by:
L I C η P D d m , m α D = exp 2 π λ B R 1 E g l , m 1 1 + s P C U g l , m d l , m α C v d v
and:
L I D η P D d m , m α D = exp 2 π ρ λ D 0 1 E g m , n 1 1 + s P D v α D v d v
Proof of Lemma 1.
Following [9], we can denote the Laplace transform of the total interference I measured at the origin, as for the benefit of the QoS performance of D2D communications, the servers’ probability is defined as the probability of the received SINR above a certain threshold, which also accounts for the interference between the backlogged links. The successful transmission probability is expressed as:
P S I N R m > η = E r P S I N R m > η r = 0 R P S I N R m > η r f r r d r = 0 R P P D g m , m d m , m α D I C + I D + σ N 2 > η r 2 r R 2 d r = 0 R 2 R 2 P g m , m > η P D d m , m α D I C + I D + σ N 2 r d r
where f r r is the PDF of the distance from the typical D2D user to the served BS, which is equal to 2 r R 2 , r 0 , R . Because g m , m exp ( 1 ) , by following the same derivation given in [40], the coverage probability is expressed as:
P g m , m > η P D d m , m α D I C + I D + σ N 2 = E I C , I D P g m , m > η P D d m , m α D I C + I D + σ N 2 r , I C , I D = e η P D d m , m α D · σ N 2 · L I C η P D d m , m α D · L I D η P D d m , m α D
and:
L I D s = E ρ Φ D , g m , n exp s n ρ Φ D \ m P D g m , n d m , n α D = * E ρ Φ D n ρ Φ D \ m E g m , n exp s P D g m , n d m , n α D = * * exp 2 π ρ λ d 0 1 E g m , n 1 1 + s P D v α D v d v
where * is true based on the i.i.d. distribution of g m , n and * * is from the probability generating functional (PGFL) of the PPP. By the same way, the derivation of L I C s :
L I C s = E Φ C , g l , m exp s l Φ C P C U g l , m d l , m α C = exp 2 π λ B R 1 E g l , m 1 1 + s P C U g l , m d l , m α C v d v .
By substituting (7)–(9) into (6), the closed-form expression of successful transmission probability is obtained, which shows that establishing a D2D link needs to meet the lower bound of SINR. □

4.3. Embedded Markov Chain Approach

The queuing process was represented by a single dimension discrete time Markov chain, and the state set was denoted as X ( t ) , t 0 . We adopted the embedded Markov chain to analyze the packet state of the D2D buffer. The corresponding probability transition matrix is expressed as:
P = p 0 , 0 p 0 , 1 0 0 p 1 , 0 p 1 , 1 p 1 , 2 0 0 p 2 , 1 p 2 , 2 p 2 , 3 0 0 0 p 3 , 2 p 3 , 3 p 3 , 4 0 p L max 1 , L max 2 p L max 1 , L max 1 p L max 1 , L max 0 0 0 0 p L max , L max 1 p L max , L max
where p i , j denotes the transition probability of the queue length state from i to j.
For the diagonal of matrix P , when 1 i L max , the transition from state i to i 1 occurred only when the data were successfully transmitted and there was no data packet arrival. If the packet was sent for the K th time, it left the queue regardless (that is, whether successfully transmitted or not).
p i , j = p s u c k = 1 K 1 p s t a t e k + p s t a t e K 1 q , 1 i L max , j = i 1
When 1 < i < L max , the transition from state i to i occurred in two conditions: First, the packet failed to be sent, and there was no data arrival with the probability 1 q . Second, a packet was successful sent, while a new packet arrived with the probability q. The transition probability is described as follows:
p i , j = 1 p s u c k = 1 K 1 p s t a t e k 1 q + p s u c k = 1 K 1 p s t a t e k + p s t a t e K q , 1 i < L max , j = i 1 q , i = j = 0
Specifically, when i = j = L max , the transition occurred as long as the packet in the sending state from State 1 to K 1 failed to be sent because of the limited buffer.
p i , j = 1 p s u c k = 1 K 1 p s t a t e k + p s u c k = 1 K 1 p s t a t e k + p s t a t e K q , i = j = L max
When 1 i < L max , j = i + 1 , the transition of the queue length from i to i + 1 occurred only if the packet failed to be sent and a packet arrived with probability q.
p i , j = 1 p s u c k = 1 K 1 p s t a t e k q , 1 i < L max , j = i + 1 q , i = 0 , j = i + 1

5. Queuing Stationary Analysis and Performance Parameters

5.1. Steady-State Distribution Analysis

Assuming that the queuing system achieved stability after a long-running process, let Π = π 0 , π 1 , , π L max be the steady-state probability distribution. For stable systems, the steady state solution can be obtained by solving:
Π P = Π , Π 1 = 1
where 1 is the unity vector with L max + 1 dimensions, 1 = 1 , 1 , , 1 T . The steady state solution was obtained via the iterative algorithm given in the following lemma.
Lemma 2.
With the transition probability matrix P in (10), we solved (15) and obtain the following steady-state solution:
π 0 = 1 1 + i = 1 L max p 0 , 1 p 1 , 2 p i 1 , i p i , i 1 p 2 , 1 p 1 , 0
π i = p 0 , 1 p 1 , 2 p i 1 , i p i , i 1 p 2 , 1 p 1 , 0 1 + i = 1 L max p 0 , 1 p 1 , 2 p i 1 , i p i , i 1 p 2 , 1 p 1 , 0 1 , 1 i L max
where π 0 represents the idle state probability. π i , 1 i L max denote the probability of having an i queue length.
Proof of Lemma 2.
π 0 and π i , 1 i L max are obtained by solving the balance equation and standardized Equation in (15), and we can get the matrix equation group as follows:
π 0 p 0 , 1 = π 1 p 1 , 0 π i p i , i + 1 + p i , i 1 = π i 1 p i 1 , i + π i + 1 p i + 1 , i , 1 i < L max π i p L max , L max 1 = π i 1 p L max 1 , L max , i = L max π 0 + π 1 + π L max = 1 .
From the first formula of (18), π i can expressed by π 0 as follows:
π i = p 0 , 1 p 1 , 2 p i 1 , i p i , i 1 p 2 , 1 p 1 , 0 π 0 , 1 i L max .
By utilizing the normalization condition Π 1 = 1 , we obtain π 0 as Equation (16). By substituting Equation (16) into Equation (19), the general formula π i is derived as Equation (17). □
From Equation (15), we can see the elements matrix of transition probability P was required for solving the steady-state distribution Π . Moreover, we can see via Equations (11)–(14) that the transition probability depended on the transmission success probability, average arrival rate, and retransmission state probability. The transmission success probability was calculated by stochastic geometry, which accounted for the interfering devices’ intensity in our mathematical model. On the contrary, the idle state probability of D2D transmitter π 0 was solved by queuing theory. Therefore, the analysis processing of the steady-state distribution by the queuing model and the successful transmission probability by the thinned PPP imposed a mathematical causality problem. We used the fixed point iteration method to solve this causality problem for the steady-state distribution, shown in Algorithm 1 as follows.
Algorithm 1: A fixed point iteration method to calculate the steady-state probability distribution.
1: Initialize Π 0 = 1 , 0 , 0 , 0 ;
2: For i = 1
3:       (i) Calculate transmission success probability p s u c in Formula (3) by using Π i 1 ,
4:       (ii) Calculate P s t a t e in Formula (2) by using p s u c ,
5:       (iii) Plug p s u c and P s t a t e into Formulas (11)–(14), and construct transition probability matrix P ,
6:       (iv) Plug transition probability matrix P into Formulas (16) and (17) in Lemma 2, and obtain Π i ,
7:       (v) Update Π i 1 by using Π i , and obtain Π i = Π 0 i , Π 1 i , , Π L max i ,
8:       (vi) i = i + 1 ,
9: Repeat Steps (i)-(vi) until Π i Π i 1 ε return Π i ;
10: End.

5.2. Performance Parameters

Here, with the explicit formulation of the steady-state distribution, the system performance was evaluated by the average queue length, average throughput, average delay, and dropping probability. Q u e u e ¯ denotes the average number of packets in the D2D user buffer. The expression can be written as:
Q u e u e ¯ = i = 0 L max i π i = i = 0 L max i · p 0 , 1 p 1 , 2 p i 1 , i p i , i 1 p 2 , 1 p 1 , 0 1 + i = 1 L max p 0 , 1 p 1 , 2 p i 1 , i p i , i 1 p 2 , 1 p 1 , 0 1 .
The average throughput of the queue can be acquired as:
T h r ¯ = 1 π 0 · p s u c = i = 1 L max p 0 , 1 p 1 , 2 p i 1 , i p i , i 1 p 2 , 1 p 1 , 0 1 + i = 1 L max p 0 , 1 p 1 , 2 p i 1 , i p i , i 1 p 2 , 1 p 1 , 0 · p s u c .
The average delay, which was the average time before a packet departed from the queue, can be expressed according to Little’s law [37] as follows:
D e l ¯ = Q u e u e ¯ T h r ¯ = i = 0 L max i π i 1 π 0 · p s u c = i = 1 L max i p 0 , 1 p 1 , 2 p i 1 , i p i , i 1 p 2 , 1 p 1 , 0 1 + i = 1 L max p 0 , 1 p 1 , 2 p i 1 , i p i , i 1 p 2 , 1 p 1 , 0 1 i = 1 L max i p 0 , 1 p 1 , 2 p i 1 , i p i , i 1 p 2 , 1 p 1 , 0 1 + i = 1 L max p 0 , 1 p 1 , 2 p i 1 , i p i , i 1 p 2 , 1 p 1 , 0 1 1 1 + i = 1 L max p 0 , 1 p 1 , 2 p i 1 , i p i , i 1 p 2 , 1 p 1 , 0 1 p s u c 1 1 + i = 1 L max p 0 , 1 p 1 , 2 p i 1 , i p i , i 1 p 2 , 1 p 1 , 0 1 p s u c .
We note that the average throughput was equivalent to the actual arrival rate of the D2D link. The dropping probability caused by overflow, which was related to the probability of data generation and the buffer size, can be calculated as:
p d r o p 1 = π L max · q = q p 0 , 1 p 1 , 2 p L max 1 , L max p L max , L max 1 p 2 , 1 p 1 , 0 1 + i = 1 L max p 0 , 1 p 1 , 2 p i 1 , i p i , i 1 p 2 , 1 p 1 , 0 1 .
Then, according to the K th retransmission strategy, the dropping probability due to the failed transmission of a packet in its K th transmission state can be given as:
p d r o p 2 = p s t a t e K 1 p s u c = p s u c ( 1 p s u c ) K 1 1 ( 1 p s u c ) K 1 .
The total dropping probability is equivalent to:
p d r o p = π L max · q + p s t a t e K 1 p s u c .

5.3. The Optimal Number of Retransmission Attempts

In this section, we discuss the approach to choose the optimal number of retransmission attempts K * such that:
K * = arg max K 0 , T h r ¯ ,
where T h r ¯ is given in (21). We can see that the average throughput is a function of the number of retransmission attempts K * if the other system parameters are fixed. Nevertheless, it is hard to obtain a closed-form solution of K * , and the optimal K * can be numerically obtained. Theoretically, the value space of K * can be any nonnegative integer, but if it is too large, it leads to lower average throughput. Thus, we took a group of numbers K 0 , K max and obtained the optimal solution as:
K * = arg max K 0 , K max T h r ¯

6. Numerical and Simulation Results

In this section, we present the MATLAB simulations that were used to verify the validity of the above analytical results. The extensive simulation results are given to illustrate the behavior of the system with respect to the change in its loading parameters. The performances under different D2D density and packet arrival rates are investigated using the results of simulations and theoretical analysis. Further, we present the dropping probability of the D2D link with and without the retransmission strategy, and the optimal retransmission time was obtained by maximizing the average throughput. The major parameters in our simulation are listed in Table 1. In the following numerical results, unless otherwise stated, we considered a simulation area of 20 km × 20 km. D2D transmitters were spatially distributed according to a homogeneous PPP with the density parameter λ D 10 users / k m 2 , 20 users / k m 2 , 30 users / k m 2 . Independent and identically distributed Rayleigh fading with unit variance was considered for all links. To validate our derived results, the simulation results were carried out and repeated for over 10,000 iterations. The simulation parameters that were based on the Monte Carlo simulation method are shown in Table 1.
Figure 3 compares the numerical and simulation results in terms of the average queue length, average throughput, average delay, and dropping probability with varying data arrival rates and different path loss factors in D2D communications. The values of the path loss factor α were 3, 3.5, and 4. Without loss of generality, we set the number of D2D links as 30 in a single cell and the maximum number of retransmission attempts K = 3 . It can be seen that the numerical results closely coincided with the simulation results.
Figure 3a shows that the average queue length increased with the mean packet arrival rate, and α influenced the steepness of the curves. With the increase in the arrival rate, the average queue length increased and then reached the maximum buffer size. This means that the transmission ability of the D2D user was insufficient to send the packets within a time slot because of the high arrival rate. The average throughput varied with the mean arrival rate, and the path loss exponent is displayed in Figure 3b. When the arrival rate was not more than the successful transmission probability, the average throughput increased with the arrival rate. The reason was that lightly loaded D2D sent data packets without blocking the queue. When the arrival rate exceeded the transmission ability, the average throughput reached saturation, and the dropping probability sharply increased, as shown in Figure 3c, which was caused by increasing overflow dropping packets. Figure 3d is the curve of the average delay. Take α = 3 for example: the average delay tended to be relatively flat after q = 0.7 . The reason was that the fixed sending capability slowed the growth rate of the average delay when the queue buffer was full.
Figure 3 also shows the influence of the path loss factor. Compared with α = 3.5 and α = 4 , the average queue length for α = 3 reached saturation more quickly. Note that the average performance had a gradually decreasing trend with a lower path loss exponent, and more packets were left in the queue. As a result, the average throughput was even lower, and the average delay and dropping probability were much higher. The results indicated that higher path loss reduced the influence of interference links to the D2D receiver and improved the probability of successful transmission.
Then, we evaluated the impact of D2D density on the performance parameters in Figure 4. We set α = 4 . We can see that the analytical and simulation results basically matched. In Figure 4a, with the increase in the mean arrival rate, the average queue length was much quicker to reach the maximum capacity as more D2D links accessed the network. This was because when the received interference increased, more packets returned to the queue for retransmission. Figure 4b,d shows that a high D2D density λ D = 30 users / k m 2 resulted in lower average throughput and higher average delay compared with the performance for λ D = 10 users / k m 2 and λ D = 20 users / k m 2 . The reason was that higher interference received by the D2D transmitter resulted in a longer waiting time for the packets. The throughput became lower, and packets needed to wait longer to be transmitted. Figure 4c illustrates the dropping probability as the packet arrival rate varied for different D2D density. As discussed below, the dropping probability included two parts: (1) the arrival of packets caused by the overflow, which was related to the mean arrival rate and buffer size; (2) according to the retransmission strategy, the dropping probability was generated by the failure of data transmission in the K th sending attempt. When the arrival rate was comparatively low, the number of packets in the buffer was quite small. Thus, the dropped packets were mainly caused by unsuccessful sending, which was determined by the instantaneous channel situation. When the arrival rate increased, the dropping probability increased markedly and continued to grow. The dropping probability was mainly influenced by a heavy traffic load.
Figure 5 illustrates the dropping probability of a D2D user with and without the retransmission strategy for a varying D2D density. We set q = 0.4 , α = 4 . The dropping probability curves showed a rising trend that corresponded to the increase of D2D density. It was obvious that the dropping probability gradually decreased with the increase in the number of retransmission attempts. This was because there was no overflow in a lightly loaded queue, and the retransmission strategy provided failed packets with more than one chance for transmission: the greater the number of retransmission times, the lower the number of dropped packets.
Figure 6 shows that average throughput versus the number of retransmission attempts for the mean arrival rate that varied from 0.4 to 0.6. The curves of the average throughput first rose and then declined with the increase in retransmission times. The throughput values for q = 0.5 and q = 0.6 reached their peak at K = 2 , while the throughput for q = 0.4 reached its maximum at K = 3 . In other words, as the mean arrival rate grew, the optimal throughput was reached after fewer retransmission attempts. Furthermore, when K = 5 , the average throughput decreased with the increase in the arrival rate. The reason was that too many retransmission attempts caused packets to overflow significantly as they increased because of the high arrival rate and full buffer.

7. Conclusions

This paper focused on the performance analysis of D2D communication in underlay mode in cellular networks. Firstly, by adopting queuing theory and stochastic geometry, we developed a spatiotemporal traffic model to model a retransmission mechanism for D2D underlay communication. Considering the influence of interference among D2D links and the channel condition, we described the dynamic traffic model of a D2D receiver as a queuing model with dynamic data arrival and a finite buffer. Following the SW-ARQ protocol, we modeled the D2D communication model with a retransmission strategy as a feedback queuing model and formulated it as a Markov chain to analyze the D2D queue length state of the packets in the buffer, and the closed-form expression of the steady-state distribution was obtained. Then, the expressions of the performance metrics, namely the average queue length, mean throughput, average packet delay, and packet dropping probability, were obtained. Simulation results showed the validity and rationality of the theoretical analysis. Moreover, simulation results indicated that the performance evaluation method using the feedback queuing model had practical significance in D2D heterogeneous networks. In future work, we can apply the queuing model and analytical approach presented in this paper to conducting performance studies on D2D-assisted wireless caching networks. By employing the queuing theory and stochastic geometry, we can build a spatiotemporal model to analyze the delay and obtain the probability in caching networks simultaneously. We can also study the performance of the go-back-N (GBN-ARQ) and selective-repeat (SR-ARQ) protocols in multi-hop communication. Specially, we will concentrate on using more realistic assumptions to build a dynamic model in further research. We hope our work can provide a more accurate theoretical basis for the design of the actual system.

Author Contributions

J.X. and Q.Z. conceived of and designed the experiments; J.X. performed the experiments; J.X., T.Z., G.L., and Q.Z. analyzed the data; J.X. contributed materials/analysis tools; J.X. wrote the paper. All authors have read and agreed to the published version of the manuscript.

Funding

The work is supported by the Natural Science Foundation of China (61971239, 61631020), the Innovation Project for Postgraduates of Jiangsu Province (KYCX19_0887), the Youth Foundation of Anhui Polytechnic University (2014YQ40), the General Research Project of Anhui Higher Education Promotion Plan (Grant TSKJ2015B18, KZ00215021, KZ00215022), and the High-level Introduction of Talent Scientific Research Start-up Fund of Jiangsu Police Institute (2019).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Jameel, F.; Hamid, Z.; Jabeen, F.; Zeadally, S.; Javed, M.A. A Survey of Device-to-Device Communications: Research Issues and Challenges. IEEE Commun. Surv. Tutor. 2018, 20, 2133–2168. [Google Scholar] [CrossRef]
  2. Noura, M.; Nordin, R. A survey on interference management for device-to-device (D2D) communication and its challenges in 5G networks. J. Netw. Comput. Appl. 2016, 71, 130–150. [Google Scholar] [CrossRef]
  3. Xu, C.; Feng, J.; Huang, B.; Zhou, Z.; Mumtaz, S.; Rodriguez, J. Joint relay selection and resource allocation for energy-efficient D2D cooperative communications using matching theory. Appl. Sci. 2017, 7, 491. [Google Scholar] [CrossRef] [Green Version]
  4. Zhang, Y.; Li, F.; Al-Qaness, M.A.; Luan, X. A Resource Allocation Scheme for Multi-D2D Communications Underlying Cellular Networks with Multi-Subcarrier Reusing. Appl. Sci. 2017, 7, 148. [Google Scholar] [CrossRef] [Green Version]
  5. Bello, O.; Zeadally, S. Intelligent device-to-device communication in the internet of things. IEEE Syst. J. 2014, 10, 1172–1182. [Google Scholar] [CrossRef]
  6. Liu, X.; Ansari, N. Green relay assisted D2D communications with dual batteries in heterogeneous cellular networks for IoT. IEEE Internet Things J. 2017, 4, 1707–1715. [Google Scholar] [CrossRef]
  7. Hashim, Z.; Gupta, N. Futuristic device-to-device communication paradigm in vehicular ad-hoc network. In Proceedings of the 2016 International Conference on Information Technology (InCITe)-The Next Generation IT Summit on the Theme-Internet of Things: Connect Your Worlds, Noida, India, 6–7 October 2016; pp. 209–214. [Google Scholar]
  8. Cao, H.; Leung, V.; Chow, C.; Chan, H. Enabling technologies for wireless body area networks: A survey and outlook. IEEE Commun. Mag. 2009, 47, 84–93. [Google Scholar] [CrossRef]
  9. Andrews, J.G.; Baccelli, F.; Ganti, R.K. A tractable approach to coverage and rate in cellular networks. IEEE Trans. Commun. 2011, 59, 3122–3134. [Google Scholar] [CrossRef] [Green Version]
  10. Peng, M.; Li, Y.; Quek, T.Q.; Wang, C. Device-to-device underlaid cellular networks under Rician fading channels. IEEE Trans. Wirel. Commun. 2014, 13, 4247–4259. [Google Scholar] [CrossRef]
  11. ElSawy, H.; Hossain, E.; Alouini, M.S. Analytical modeling of mode selection and power control for underlay D2D communication in cellular networks. IEEE Trans. Commun. 2014, 62, 4147–4161. [Google Scholar] [CrossRef] [Green Version]
  12. George, G.; Mungara, R.K.; Lozano, A. An analytical framework for device-to-device communication in cellular networks. IEEE Trans. Wirel. Commun. 2015, 14, 6297–6310. [Google Scholar] [CrossRef]
  13. Lin, X.; Andrews, J.G.; Ghosh, A. Spectrum sharing for device-to-device communication in cellular networks. IEEE Trans. Wirel. Commun. 2014, 13, 6727–6740. [Google Scholar] [CrossRef]
  14. Lei, L.; Wang, H.; Shen, X.S.; Cheng, N.; Zhong, Z. Flow-level performance of device-to-device underlaid OFDM cellular networks. In Proceedings of the 2015 IEEE/CIC International Conference on Communications in China (ICCC), Shenzhen, China, 2–4 November 2015; pp. 1–6. [Google Scholar]
  15. Mou, X.; Lei, L.; Zhong, Z. Performance Analysis of Resource Allocation Schemes in Device-to-Device Communications with Bursty Traffic. In Proceedings of the 2014 International Conference on Information Science & Applications (ICISA), Seoul, Korea, 6–9 May 2014; pp. 1–4. [Google Scholar]
  16. Quer, G.; Pappalardo, I.; Rao, B.D.; Zorzi, M. Proactive caching strategies in heterogeneous networks with device-to-device communications. IEEE Trans. Wirel. Commun. 2018, 17, 5270–5281. [Google Scholar] [CrossRef]
  17. Huang, S.; Liang, B.; Li, J. Distributed Interference and Delay Aware Design for D2D Communication in Large Wireless Networks With Adaptive Interference Estimation. IEEE Trans. Wirel. Commun. 2017, 16, 3924–3939. [Google Scholar] [CrossRef]
  18. Zhong, Y.; Quek, T.Q.S.; Ge, X. Heterogeneous cellular networks with spatio-temporal traffic: Delay analysis and scheduling. IEEE J. Sel. Areas Commun. 2017, 35, 1373–1386. [Google Scholar] [CrossRef] [Green Version]
  19. Liu, L.; Zhong, Y.; Yang, H.H.; Sheng, M.; Quek, T.Q.; Li, J. Mean packet throughput analysis of downlink cellular networks with spatio-temporal traffic. In Proceedings of the GLOBECOM 2017-2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar]
  20. Chang, S. Theory of information feedback systems. IRE Trans. Inf. Theory 1956, 2, 29–40. [Google Scholar] [CrossRef]
  21. Moeneclaey, M.; Bruneel, H.; Bruyland, I.; Chung, D.Y. Throughput optimization for a generalized stop-and-wait ARQ scheme. IEEE Trans. Commun. 1986, 34, 205–207. [Google Scholar] [CrossRef]
  22. Alabbasi, A.; Shihada, B. Optimal cross-layer design for energy efficient D2D sharing systems. IEEE Trans. Wirel. Commun. 2016, 16, 839–855. [Google Scholar] [CrossRef] [Green Version]
  23. Ma, R.; Chang, Y.J.; Chen, H.H.; Chiu, C.Y. On relay selection schemes for relay-assisted D2D communications in LTE-A systems. IEEE Trans. Veh. Technol. 2017, 66, 8303–8314. [Google Scholar] [CrossRef]
  24. Lee, N.; Lin, X.; Andrews, J.G.; Heath, R.W. Power Control for D2D Underlaid Cellular Networks: Modeling, Algorithms, and Analysis. IEEE J. Sel. Areas Commun. 2015, 33, 1–13. [Google Scholar] [CrossRef] [Green Version]
  25. Xu, Y.; Yin, R.; Han, T.; Yu, G. Dynamic resource allocation for Device-to-Device communication underlaying cellular networks. Int. J. Commun. Syst. 2015, 27, 2408–2425. [Google Scholar] [CrossRef]
  26. Bao, P.; Yu, G.; Yin, R. Novel frequency reusing scheme for interference mitigation in D2D uplink underlaying networks. In Proceedings of the Wireless Communications & Mobile Computing Conference, Sardinia, Italy, 1–5 July 2013; pp. 491–496. [Google Scholar]
  27. Chae, H.S.; Gu, J.; Choi, B.G.; Chung, M.Y. Radio resource allocation scheme for device-to-device communication in cellular networks using fractional frequency reuse. In Proceedings of the Asia Pacific Conference on Communications, Sabah, Malaysia, 2–5 October 2011; pp. 58–62. [Google Scholar]
  28. Ningombam, D.D.; Shin, S. Optimal Resource Management and Binary Power Control in Network-Assisted D2D Communications for Higher Frequency Reuse Factor. Sensors 2019, 19, 251. [Google Scholar] [CrossRef] [Green Version]
  29. Jarray, C.; Giovanidis, A. The effects of mobility on the hit performance of cached D2D networks. In Proceedings of the 2016 14th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt), Tempe, AZ, USA, 9–13 May 2016; pp. 1–8. [Google Scholar]
  30. Xenakis, D.; Kountouris, M.; Merakos, L.; Passas, N.; Verikoukis, C. Performance analysis of network-assisted D2D discovery in random spatial networks. IEEE Trans. Wirel. Commun. 2016, 15, 5695–5707. [Google Scholar] [CrossRef]
  31. Krishnan, S.; Dhillon, H.S. Effect of User Mobility on the Performance of Device-to-Device Networks With Distributed Caching. IEEE Wirel. Commun. Lett. 2017, 6, 194–197. [Google Scholar] [CrossRef] [Green Version]
  32. Ibrahim, R.; Assaad, M.; Sayrac, B.; Ephremides, A. Overlay D2D vs. Cellular communications: A stability region analysis. In Proceedings of the 2017 International Symposium on Wireless Communication Systems (ISWCS), Bologna, Italy, 28–31 August 2017; pp. 378–383. [Google Scholar]
  33. Wang, N.; Gulliver, T.A. Queue-Aware Transmission Scheduling for Cooperative Wireless Communications. IEEE Trans. Commun. 2015, 63, 1149–1161. [Google Scholar] [CrossRef]
  34. De Vuyst, S.; Wittevrongel, S.; Bruneel, H. Delay analysis of the stop-and-wait ARQ protocol over a correlated error channel. In Proceedings of the HET-NETs, West Yorkshire, UK, 1–3 January 2004; p. 21. [Google Scholar]
  35. Li, J.; Zhao, Y.Q. Packet delay analysis for multichannel communication systems with MSW-ARQ. Perform. Eval. 2009, 66, 380–394. [Google Scholar] [CrossRef]
  36. Xin, J.; Zhu, Q.; Liang, G.; Zhang, T.; Zhao, S. Performance analysis of cellular networks with D2D communication based on queuing theory model. Ksii Trans. Internet Inf. Syst. 2018, 12, 2450–2469. [Google Scholar]
  37. Li, J.; Zhao, Y.Q. Resequencing analysis of stop-and-wait ARQ for parallel multichannel communications. IEEE/ACM Trans. Netw. 2009, 17, 817–830. [Google Scholar] [CrossRef]
  38. Yang, H.H.; Wang, Y.; Quek, T.Q.S. Delay Analysis of Random Scheduling and Round Robin in Small Cell Networks. IEEE Wirel. Commun. Lett. 2018, 7, 978–981. [Google Scholar] [CrossRef] [Green Version]
  39. Thangaraj, V.; Vanitha, S. M/M/1 queue with feedback a continued fraction approach. Int. J. Comput. Appl. Math. 2010, 5, 129–140. [Google Scholar]
  40. Lei, L.; Shen, X.S.; Dohler, M.; Lin, C.; Zhong, Z. Queuing Models With Applications to Mode Selection in Device-to-Device Communications Underlaying Cellular Networks. IEEE Trans. Wirel. Commun. 2014, 13, 6697–6715. [Google Scholar] [CrossRef]
  41. Zheng, Q.; Zheng, K.; Sun, L.; Leung, V.C. Dynamic performance analysis of uplink transmission in cluster-based heterogeneous vehicular networks. IEEE Trans. Veh. Technol. 2015, 64, 5584–5595. [Google Scholar] [CrossRef]
Figure 1. A hybrid network consisting of both cellular and D2D links.
Figure 1. A hybrid network consisting of both cellular and D2D links.
Applsci 10 01097 g001
Figure 2. Feedback queuing model.
Figure 2. Feedback queuing model.
Applsci 10 01097 g002
Figure 3. The D2D performance parameters versus packet arrival rate under different path loss factors α .
Figure 3. The D2D performance parameters versus packet arrival rate under different path loss factors α .
Applsci 10 01097 g003
Figure 4. The D2D performance parameters versus packet arrival rate for different D2D densities λ D .
Figure 4. The D2D performance parameters versus packet arrival rate for different D2D densities λ D .
Applsci 10 01097 g004
Figure 5. The dropping probability for D2D communication under different retransmission times K.
Figure 5. The dropping probability for D2D communication under different retransmission times K.
Applsci 10 01097 g005
Figure 6. The average throughput versus the number of retransmission times under different mean arrival rates q.
Figure 6. The average throughput versus the number of retransmission times under different mean arrival rates q.
Applsci 10 01097 g006
Table 1. Simulation parameters of Monte Carlo simulation. CU, cellular user.
Table 1. Simulation parameters of Monte Carlo simulation. CU, cellular user.
ParameterValue
time slot duration1 ms
path loss factor ( α )3, 3.5, 4
cellular user transmit power23 dBm
D2D user transmit power20 dBm
the power of the additive white Gaussian noise−104 dBm
packet size (B)100 bits
buffer size (packets)10
duration of a time slot1 ms
radius of cell (R)500 m
D2D transmission length ( r d )25 m
SINR threshold of CUEs0 dB
density of BS ( λ B )1 BS / k m 2
Density of CU ( λ C )1 user / k m 2

Share and Cite

MDPI and ACS Style

Xin, J.; Zhu, Q.; Liang, G.; Zhang, T. Performance Analysis of D2D Communication with Retransmission Mechanism in Cellular Networks. Appl. Sci. 2020, 10, 1097. https://doi.org/10.3390/app10031097

AMA Style

Xin J, Zhu Q, Liang G, Zhang T. Performance Analysis of D2D Communication with Retransmission Mechanism in Cellular Networks. Applied Sciences. 2020; 10(3):1097. https://doi.org/10.3390/app10031097

Chicago/Turabian Style

Xin, Jianfang, Qi Zhu, Guangjun Liang, and Tianjiao Zhang. 2020. "Performance Analysis of D2D Communication with Retransmission Mechanism in Cellular Networks" Applied Sciences 10, no. 3: 1097. https://doi.org/10.3390/app10031097

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop