Next Article in Journal
CED-Net: Crops and Weeds Segmentation for Smart Farming Using a Small Cascaded Encoder-Decoder Architecture
Previous Article in Journal
A Compact Size Wideband RF-VGA Based on Second Generation Controlled Current Conveyors
Previous Article in Special Issue
PAPR Reduction in UFMC for 5G Cellular Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cooperative Admission Control with Network Coding in 5G Underlying D2D-Satellite Communication

School of Electronic and Information Engineering, Beihang University, Beijing 100083, China
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(10), 1601; https://doi.org/10.3390/electronics9101601
Submission received: 3 September 2020 / Revised: 21 September 2020 / Accepted: 24 September 2020 / Published: 30 September 2020
(This article belongs to the Special Issue Wireless Communication and Networking for 5G)

Abstract

:
Cooperative communication supported by device to device (D2D)-LEO earthed satellite increases the performance of the resilient network and offloads base station. Additionally, network coding in a packet-based cooperative framework provides diversity and speedy recovery of lost packets. Cooperative communication advantages are subject to effective joint admission control strengthened by network coding for multiple interfaces. Joint admission control with network coding involves multiple constraints in terms of user selection, mode assignment, power allocation, and interface-based network codewords, which is challenging to solve collectively. Sub-problematization and its heuristic solution lead to a less complex solution. First, the adaptive terrestrial satellite power sentient network (ATSPSN) algorithm is proposed based on low complex convex linearization of mix integer non-linear problem (MINLP), NP-hard. ATSPSN provides optimum power allocation, mode assignment, and user selection based on joint channel conditions. Second, a multiple access network coding algorithm (MANC) is developed underlying the D2D-satellite network, which provides novel multiple interface random linear network codewords. At the end, the bi-directional matching algorithm aiming for joint admission control with network coding, named JAMANC-stream and JAMANC-batch communication, is proposed. JAMANC algorithm leads to a less complex solution and provides improved results in terms of capacity, power efficiency, and packet completion time. The theoretical lower and upper bounds are also derived for comparative study.

1. Introduction

Cooperative communication is a significantly promising technology in providing diversity and efficient use of resources. Meanwhile, cooperative communication supported by network coding is a technique widely used for secure and effective communication without upgrading traditional network architecture on the physical layer. Network coding (NC) provides improved network capacity, diversity, efficiency, and flexibility. Joint admission control under consideration of energy efficiency, capacity, and fair usage policy plays a vital role in cooperative communication to provide uninterrupted communication.
Initially, the network coding is used for the single-mode devices, i.e., cellular devices, where devices form a wireless cluster of NC instead of all devices individually communicating to the base station [1]. The result is increased performance in terms of data rate, robustness, delay, security, and energy consumption. The cooperative network coding then extended to the device to device (D2D) communication, which further increases the overall capacity and throughput of the network [2,3,4]. The utilization of D2D and cellular network in network coding decreases the packet recovery time, and meets the performance of cellular via network coding [5]. Satellite multicast delivery is superior to multi terrestrial cast in the number of scenarios because of the bigger footprint [6]. Cooperative terrestrial-satellite transmission aided by satellite link increases the bandwidth, which is further strengthened by the network coding [7,8,9]. The satellite is also be used as a backhaul with the advantage to offload base station [10]. Utilizing the multiple modes under optimized network codes provides quick recovery of the lost packet and higher capacity. However, the authors did not consider the cooperative admission control based on the network code and channel condition in multiple access network devices.
Apart from multiple access control, the network code based transmission strategy has vast potential to provide good service quality under the efficient utilization of resources in future D2D content distribution [11]. Two-level decentralized joint relay selection and resource allocation named NC-D2D proposed in [12], assisted by network coding underlying D2D communication. Joint relay selection and resource allocation in perceptive of network coding aided by D2D explored in [13], which consists of a two-level decentralized approach termed NC-D2D. This technique solves the relay selection and resources allocation problems alternatively to obtain stable solutions for these two problems. The Games algorithm associates the D2D with network coding, and the greedy algorithm associates the resources with the network and provides cooperative communication for resource allocation and network codes for the D2D network resource allocation with the opportunistic network coding improves the network’s performance and provides another dynamics in terms of optimization of the network [14]. Relay based network coding has been proposed by adapting to the requirement of multi source-destination, where signals are limitedly affected by external interference and provide reliable communication [15,16]. The authors in [17] define the topology and resource allocation for network coding, which increases the throughput and energy efficiency. Network aware resource allocation with random network coding for cooperative communication using a gradient algorithm in [18] improves throughput overall. Fast resource allocation for network traffic is developed in [19] that maximizes the utility in multicast based on the capacity and coded in the same session. The authors considered the admission control/topology and network coding separately and not optimized jointly to improve performance. Besides, multiple access, including the terrestrial-satellite network, is not considered in cooperative communication.
Designing the cooperative network code, which also considers channel condition increases the overall performance [20]. Network codes are designed so that good channel conditions transmit the significant coded packets and increase the network’s performance. So effective joint admission control designed with network coding for multiple interfaces is essential for cooperative communication. Instantly Decodable Network Coding (IDNC) technology leads to instant decodability. It withstands with adverse channel conditions [21], so a novel admission control method for IDNC-assisted distribution of the data algorithm is proposed but does not consider multiple interfaces. Previous literature techniques considered cooperative relay selection, resource allocation, and spatially diversity in network coding but did not account for effective admission control under joint channel conditions with random linear network codes underlying multiple interfaces. Different admission control techniques have been formulated for terrestrial-satellite networks with optimized power allocation. The purpose is to increase the throughput by using the resources efficiently [22,23] but did not consider the strength of network coding. The cooperative admission control (mode assignment, power allocation, and user selection) with opportunistic network coding for multiple access interfaces, i.e., cellular with D2D-satellite supported network jointly optimized adaptive to channel condition and packets available, has not been taken in literature due to its infeasible nature and complexity to best of our knowledge.

1.1. Contributions

The major contribution of this paper towards literature are as follows.
  • Joint formulation of admission control with network coding supported by D2D-satellite multiple interfaces leads to the complex problem due to multiple constraints and not feasible to solve as one piece. So the objective function is divided into subproblems and then solved using heuristic algorithms (ATSPSN and MANC) to maximize the capacity and lower packet completion time. In the end, the matching algorithm is used for joint optimization, which leads to convergence and less complex solution overall.
  • The problem formulated for joint admission control is mix integer nonlinear problem, Np hard in nature, and requires exhaustive search due to integer combinatorial nature. As its complexity increases exponentially, so using an exhaustive search method is not a feasible solution. The relaxation of the problem based on an outer approximation to linearization is proposed, ensuring convergence to a global optimum solution with less complexity. The formulated problem named Adaptive Terrestrial Power Sentient Network (ATSPSN) is then solved by NOMAD, Branch cut, and Branch bound solver.
  • Novel multiple access network coding framework (MANC) is proposed for stream and batch techniques supported via the D2D-satellite network. The stream technique ensures the decodability of the data immediately after receiving the packets and essential for the crucial application. Batch uses random linear network coding (RLNC) and provides less packet completion time. The theoretical lower and upper bounds are mathematically derived for lossless second stage channel, which is then extended to the second stage lossy channel for practical results.
  • A bi-directional matching algorithm is proposed for cooperative admission with network coding for joint optimization to provide better performance overall. The matching algorithm named as Joint Admission-Multiple Access Network Coding (JAMANC) provides the optimization in both directions, i.e., forward and backward, unlike the Gape Sharpley algorithm. The advantage is that this technique provides optimization concerning both sets, i.e., JPFL (Joint admission preference list) and MPFL (multiple access network preference list).
  • The satellites’ role in 5G communication with the advancement in Micro-Sat cannot be denied and part of 5G future vision. However, the link budget cost has caused slow progress in the integration of terrestrial-satellite communication. In our algorithm, the satellite is efficiently integrated to decrease overall the link budget cost.

1.2. Article Structure

The structure of the rest of the paper is as follows. Section 2 defines the network model, which includes both the system model and the packet coding framework. Section 3 defines the problem formulation for admission control, multiple access network coding, followed by a bi-directional matching algorithm for joint admission with network coding cooperation. First, the algorithm is formulated for a lossless channel followed by lossy channel conditions. Moreover, the complexity analysis is included in this section. Section 4 defines the simulation and results in terms of capacity, energy efficiency, and packet completion time.

2. System Model

We considered a single cell for simplicity with the base station at the center of the cell. The same can also be used for multiple cells. Internet of things (IoT’s) and mobile users are distributed stochastically around the base station with distance d c e l l 1 . The model is shown in the Figure 1. The smart devices are equipped with both terrestrial and satellite antennas. D2D users act as D2D transmitters when the mode is assigned as D2D with other receivers in close proximity as per SINR calculation. The D2D receivers are statistically distributed around the transmitter using the same frequency as used by cellular links. Let l represents all the links in our complete network model, i.e., SAT, mobile, and D2D links. The R represents all the users selected in the network known as admission users and includes D2D X d l users, X c l cellular users, and X s l satellite. The channel gain h for l t h links is modeled as:
h = h * β G e ( d o d ) η
where d is distance between transmitter to receiver and d o is antenna far field reference distance. η is path loss factor and h * is exponential random channel.
The P l d l and P l c l is the optimum power allocated by our algorithm for transmission in D2D and cellular modes, respectively. The SINR calculation of terrestrial links represented as
S I N R ( l d , l c ) = | h ( l d / l c ) | 2 P ( l d / l c ) l N t + l = 1 l ( l d 1 / l c 1 ) | h ( l ( l d / l c ) | 2 P l ( l d / l c ) .
Same terrestrial frequency resources are allocated to SAT links. The SINR of satellite users X s selected in l links are mathematically represented as
S I N R ( l s ) = | h l s | 2 P l s N t + l = 1 l s | h ( l l s ) | 2 P ( l l s ) .
The gain of the SAT-terrestrial link includes a space environment for calculating power received by satellite. The P l s l is optimum power allocated by terrestrial user for l s links. The maximum output power of base station and satellite links denoted by P e n b m a x and P S A T m a x . An integer indicator is defined for mode selection, which is defined as.
ν l = 1 , SAT 0 , D 2 D 1 , cellular .
The capacity of the network is defined mathematically as
Δ T l = 0 l ( 1 + ν l ) ( 1 ν l ) l o g ( 1 + ( S I N R ) X d l ) + 1 / 2 ( 1 + ν l ) ( ν l ) l o g ( 1 + ( S I N R ) X c l ) + ( 1 / 2 ) ν l ( ν l 1 ) l o g ( 1 + ( S I N R ) X s l ) .
The Coarraza–Vatalaro channel model is used, a combination of Rice and lognormal distribution, and best suits for terrestrial-LEO earth orbit communication. The pdf of Rician distribution conditioned on shadowing s is given as:
P ( r / s ) = 2 ( K + 1 ) r s 2
exp ( K + 1 ) r 2 s 2 K I o ( 2 r s K ( K + 1 ) ) .
where K is Rician factor and I o is Bessel function with zero order. Two link losses are considered, i.e., free space loss (FSL) and atmospheric loss [24]. FSL in link distance d given as:
F ( f r e e s p a c e l o s s ) = 20 l o g 4 π d .

Network Packet Framework

The network coding framework previously considered in literature consists of the cellular links or cellular-D2D links during the broadcast of the missing packets from the base station. These techniques exploit the strength of multiple interfaces to enhance the potential of network coding. To illustrate cellular network coding (NC), consider the Figure 2. After receiving the packets, assume due to channel noise, the p1 packet is missing from device 1. p2 packet is missing by device 2, and the p3 packet is missing for the device 03. The packets are recovered by re-transmitting the packet in cellular. In this case, 03 re-transmission is required to recover the lost packets. However, using network coding packets can be recovered in two timeslots by transmitting p1⊕p2 and p2⊕p3. The transmission has been reduced from 3 to 2.
We will exploit the strength of D2D to recover the lost data, as shown in Figure 3. The device 1 has a p1 missing packet, so device 2 will transmit the p1⊕p3 packet via the D2D link, and similarly, the other device will transmit p1. The transmission has been reduced from 03 timeslots to 2 timeslots, increasing the network coding gain.
Consider the cooperative network coding supported by the D2D-satellite interface, which is also used in our model. Suppose the base station transmits 04 packets. p1 is missing from device 1, p2 is missing from device 2, and p3-p4 packets are missing from device 3. To recover the packets effectively, we will now use all the interfaces available to recover the packets. First, p1⊕p2 is transmitted by device 3 via the D2D link over the uplink. Simultaneously, the p3⊕p4 packet is transmitted via satellite link for devices 1 and 2. So the transmission reduced from the 4 to 1. In same timeslot, the base station sends p5, which will be received by the devices with already received all the packets in the first stage of transmission. The benefit is that p4 is now available with the devices for re-transmission in the next time slot via the D2D link, as shown in Figure 4.
The example demonstrates that as multiple interfaces are used, then the strength of the network coding is increased to manifolds.
Let p denotes total packets for R admitted users. ⨿ r set of packets received and γ n is set of device that receive packets such that ⨿ ( t , n t ) = p γ n in n t stage. The reception and re-transmission of the packets have been divide into 02 stages. All the packets in the X set are broadcast via a cellular link in the first stage. In the second stage, the random linear combination of the packets is re-transmitted based on the cooperative admission network codes. The benefit for two stages is that in the first stage, only cellular links operate and result in less energy utilization because the devices need not operate in all modes, avoiding wastage of power. Second, if there is no loss in first stage, then the D2D–satellite links remain close. The benefit is lower energy and lowers link budget cost. As the cost of satellite links is expensive, so it is utilized in the second stage when deemed essential. In the first stage, all the packets p are transmitted from the base station to R devices via a joint admission link to decrease the loss at the first stage. However, due to the scarcity of the resources and noise, few packets are lost during the first stage, with the loss factor defined as:
p r b _ l o s s _ p ( i ) = log l ( i ) α ( i ) .
p r b _ l o s s _ p ( i ) denotes the logarithm of real packet loss probability during the time slot [ i ; i + 1 ] . l ( i ) is the number of of lost packets and α ( i ) is the number of packets that arrive. After the first stage, the set of packets lost is named as deficient D. The set of packets received by the devices is named as acquired A such that A = p D . In the second stage, the packets not acquired by the devices are recovered jointly via the D2D-satellite link by utilizing the cooperative admission control with packets available in the network from the first stage. The network codes for multiple interfaces are matched with the joint admission preference list for mode selection for the best capacity and high SINR during the transmission of the packets. This approach increases the chance of the packets to receive successfully in the next time slot and provides effective utilization of the physical layers. The network code is beneficial to the satellite link during re-transmission as well, but in our case, the transmission of packets from D2D devices to the satellite is ignored. The satellite’s purpose is to relay the missing packets, so the satellite will not receive any packets by the D2D devices. This reduces the link budget cost.

3. Problem Formulation

3.1. Joint Admission Control-ATSPSN

The formulated problem consists of multiple constraints and multiple objective functions. The objective function defined as
Δ ( R , P d l , P c l , P s l ) = Δ s ( R ) l ϵ R Δ T ( R , P d l , P c l , P s l ) .
where Δ s = | X | | R | and Δ T ( R , P d l , P c l , P s l ) = ( 1 + ν l ) ( 1 ν l ) C X d l + 1 / 2 ( 1 + ν l ) ( ν l ) C X c l + ( 1 / 2 ) ν l ( ν l 1 ) C X s l . The utility function in (10) ensures that the user is selected only in one mode, i.e., SAT, D2D, or cellular. The utility function is either a sum-rate maximization problem or a power minimization problem. We will use the first approach as it provides more flexibility to determine the optimum power from the complete range of power available with users and sensors. The objective function, along with the constraints equation, is given as:
m a x ( R , P d l , P c l , P s l ) Δ ( R , P d l , P c l , P s l )
subject to
  • C1:   Δ T ( R , P d l , P c l , P s l ) C l m i n , ∨ l ϵ R
  • C2:   P l d l r η ( 1 + ν l ) ( 1 ν l ) P l d m i n , ∨ l ϵ R
  • C3:   P l s l r η ν l ( ν l 1 ) P l s m i n , ∨ l ϵ R
  • C4:   P l u ( 1 + ν l ) ( ν l ) P l , u m a x , ∨ l ϵ R
  • C5:   l R ( 1 + ν l ) ( 1 ν l ) P l ( d l , b s ) l P b s m a x
  • C6:   l R ν l ( ν l 1 ) P l ( d l , S A T ) l P S A T m a x
  • C7:   P l d l 0 , P l u 0 , P l d l 0 , P l s l 0 , ∨ l ϵ R
  • C8:   C l s ( i ) l C l d ( i ) l 0 , ∨ l ϵ R
  • C9:   X d X c X s = R .
The objective function in (11) defines the optimum power allocation and user admission along with the appropriate mode assignment. Constraint C1 defines that the capacity of the device selected is greater than the minimum rate requirement. C2 to C6 defines the power boundaries for the algorithm. C2 and C3 ensures that power allocated to mobile user/sensors less than minimum power ( P l s m i n / P l d m i n ) beyond radius (r) to avoid interference in other cell. C4 ensures that the terrestrial users’ uplink power should always be less than or equal to the devices’ maximum operating power, i.e., P l , u m a x . The summation of all terrestrial ( P l ( d l , b s ) ) and satellite ( P l ( d l , S A T ) l )downlinks power should be less than maximum power of base station and satellite, respectively (refer to C5 and C6) i.e., P b s m a x and P S A T m a x . The power allocated cannot be zero, as ensured by C7. The C8 ensures to keep penalizing cost at low. If the capacity of link i in D2D mode is greater than or equal to SAT mode, D2D mode is selected. Terrestrial-D2D communication framework is the primary means of communication, and terrestrial-SAT is a secondary means of communication to enhance the network’s capacity and user admission. C9 ensures that users are selected in only one mode at one time.
The formulated problem is mix integer non-linear problem (MINLP). User selection is binary, while power and mode selection is an integer variable. The problem is NP-hard and relaxed to the linear problem by using outer approximation. Convex linear problem is formulated by fixing integer to upper bounds and solved using outer approximation. GAMS Branch-cut uses search space, and NOMAD uses refined directions to decrease the processing time to find a global optimum solution. By introducing a new variable z k , the objective function in (11) in j th iteration, mathematically represents as:
m a x ( z k , R , P d l , P c l , P s l ) Δ ( R , P d l , P c l , P s l )
subject to C1 to C9 (11).
  • C10; C l u z k l ϵ R
  • C11; C l d z k l ϵ R
  • C13; C l s z k l ϵ R .
* include set of constraints from C1 to C13, P * = ( z k , R , P d l , P c l , P s l ) and = R ν l . Qualification of constraints cannot be violated by fixing values of ⋎ and P * is non-strictly convex for fixed ⋎. The primitive problem is given as:
m i n ( P * ) Δ t j , P * Δ t | Δ * j , P * 0
By solving (13), we get P * for master problem. The primitive problem provides a lower bound while the master problem gives an upper bound. The master problem consists of two steps to achieve linearization. In the first step, we project on integer space Δ * . Mathematically, represented as:
m i n ( j ) m i n ( P * ) Δ t j , P * 0
We can Formulate (14) further as
m i n ( j ) η ( j ) η ( j ) = m i n ( P * ) Δ t ( j , P * ) subject to Δ * j , P * 0
Further, we introduce a variable as e and projection of solution (15) in j th iteration will become as
m i n ( j , P * , e ) .
subject to
e Δ t j , P * Δ t j , P * P P * j such that Δ * j , P * Δ t j , P * P P * j 0 .
Equation (16) generate lower limits, leads to MILP. The same formulation is further solved by GAMS branch-cut and NOMAD to find an optimal solution. The Algorithm 1 give brief steps for the ATSPSN GAMS branch cut. The details about ATSPSN NOMAD and branch bound along with problem formulation are discussed in the conference version of this paper [25].
Algorithm 1: ATSPSN (GAMS-Branch-cut)
1.    j ← 1
2.    Initializes j , Δ t and constraint space S j
3.    ϵ 10 3
4.    Convergence ← Violated
5.    while Convergence==Violated then for non violated space
6.    P * arg min Δ t j , P * subject to Δ * j , P * 0
7.    Upper limit Δ t j , P *
8.    * , P * , e * arg min e , P , e subject to e Δ t j , P * Δ t j , P * P P * 0 Δ t j , P * Δ t j P * P P * 0 0 Δ t S A T j j , P * Δ t D 2 D j j , P *
9.    Lower limit ← e
10     if u p p e r l i m i t l o w e r l i m i t ϵ then
11     Convergence holds
12     else
13     j j + 1
14     j *
15    S ← Violated region
16     end if
17     end while

3.2. Multiple Access Network Coding (Lossless Second Stage)

After proposing the optimum admission control, the next part is developing multiple interfaces based on random linear network codes to decrease packet completion time by taking advantage of network coding routing. The first stage as lossy and lossless second stage is considered before developing the algorithm for a complex channel, which will be extended for lossy after developing the algorithm. The packets are lost in first stage during transmission from the base station. However, in re-transmission, there is no loss of packets. The primary aim of this approach is to evaluate the strength of our network coding without considering noise. In MANC batch, the packets re-transmitted from source/satellite and D2D are designed so that end of re-transmission, the packet completion time is minimum. First, the source determines the packets received by all the admitted devices and updates the acquired matrix A. The linear combination of the packets is sent by satellite (if all packets available) or by the source over a large field. Once packets are received, devices update their deficient D matrix until the D becomes a null set. The D2D devices with a max number of acquired A are selected for the transmission on the D2D link.

3.2.1. MANC Batch

The upper bound of the packets completion time T when transmitted by the MANC-batch is bounded mathematically by
T max ( | X c | , 1 3 ( max n R | D n | + min n R | D n | ) , 1 2 max n R | D n | ) .
The proof is provided in Appendix A.

3.2.2. MANC Stream

As compared to MANC-batch, the MANC-stream is developed so that the packets can be decoded immediately after receiving the innovative packet. The algorithm aims to achieve this goal in minimum possible packet completion time. The combination of the packets is made for the cellular communication supported by D2D-satellite links so that opportunistic network coding can be achieved from multiple interfaces. However, the exhaustive search method to look for all the possible combinations and then find the best possible combination is time-consuming and requires high computational complexity. So heuristic packet combination with linear complexity using a greedy algorithm is developed. The algorithm is divided into the following three main steps.
  • Scheme to create the linear combination of the packets for transmission.
  • Grouping the packets into sets X c , X s , and X d as per packets already available in the network.
  • Determine the appropriate mode of access to transfer the packets between satellite and D2D links.

Creating the Packet

The greedy algorithm is used for creating the packets sequentially. First, the missing packets are determined for each device. After that, the code is formed and then check with the previous codeword, if possible, combine them. The starting point will be an uncoded packet and then merged the latter to form the coded packets. If no merger can be made further, then the new uncoded packet is created and merged again, as shown in Algorithm 2.
Algorithm 2: Creating and grouping of packets
1.    Define vector W l with size K for packets p m .
2.    Initialization: W l [ n ] , X c , X s , a n d X d .
3.    for (Any R n device).
4.    if ( p m desired by R n ).
5.    W l [ n ] = p m and p m removed from | D n | .
4.    Find W l such that W l [ n ] = p m then W l [ n ] = NULL then.
5.    Replace W l with W l + W l [ n ] and delete W l [ n ] ( p m of W l and W l [ n ] should not coincide with each other).
6.    X c is a set that consists of packets such that each element of W l [ n ] is not similar and not equal to NULL. i.e, W l [ n ] NULL and W l [ n ] W l [ 1 ] where n ϵ R .
7.    X d is a set that consists of packets such that at least one slot is NULL, i.e., W l [ k ] = NULL.
8.    X s is a set that consists of the packet that has the combination of the remaining packets. Mainly, formed by the W l that doesn’t contain any NULL set and at least two different packets, i.e.,  W l [ n ] NULL and W l [ n ] W l [ x ] .

Grouping of Packets

After creating the independent packets, they are sorted out in groups of X c , X s , and X d based on the transmission from the source/satellite and D2D link. The packets of X c are only transmitted from the source because they consist of packets not received by satellite and any D2D device during the transmission in first stage. The packets in X s can be transmitted through satellite links and D2D links. However, the time required for completion for the D2D link is twice as compared to the satellite link. X c is only packets that need to re-transmit from the base station. However, other then X c , the X s , and X d offload the base station. Now in the case of the X s , if they are to be transmitted by D2D link, then the same vector is divided into two vectors, which results in two transmissions while the same requires one transmission from a satellite link. The time requirement is shown in Table 1.

Selecting Medium of Transmission

In each timeslot for transmission, two combinations of the packets are selected, such that X c X d X s . One is transmitted from the base station/satellite, and the other is transmitted from the D2D link. The main aim is to achieve the packet recovery in minimum time as much possible. Now the packets in X c can only be transmitted by the base station, so 1st the packets in X c are transmitted. At the same time, the packets are transmitted from X d and X s . The X s packets are transmitted from the satellite, and it targets all the devices. The X d targets devices are other than its self. For instant decodability, the packets are transmitted as per the sequence of the packets. Mostly, X c is transmitted first and then followed by X d / X s or both.The upper bound of the MANC-stream is given by
T [ m i n ( m a x ( X 2 , X c ) , m a x ( | X c | , 1 3 ( 2 m i n n ε R | D n | ) + | X d | ) , 1 2 ( m i n n ε R | D n | + | X d | ) ) ] .
The proof is provided in Appendix B.

3.3. Multiple Access Network Coding (Lossy Second Stage)

The lossless second stage helps identify our proposed network coding scheme’s strength, but in reality, there is always some loss. The previous approach is not feasible as it requires a fixed set for all timeslots. The packet completion now depends on the loss in the first stage and the packets lost in the second stage. The packet completion depends upon the packet transmitted and the packets received by the target receivers, which is defined as γ n . The admitted receivers have defined as the devices which successfully receive the innovative packets send in that timeslot. First, find the average number of the admitted receivers that receive the targeted packet successfully is calculated as n γ n ( 1 τ n ) . Moreover, the successful packets received given as n γ n ( 1 ϑ n ) .

MANC Batch (Second Stage Lossy)

The Algorithm 3 defines the MANC-batch for lossy communication.
Algorithm 3: MANC Batch (Lossy second stage)
Source packet selection criteria
1.    Make a random linear combination of the packets at the higher galileos field in X.
2.    The transmitter (base station/satellite) broadcast the packet innovative for all the devices.
3.    For (any device in R)
4.    γ n = m | ( p ϵ A n | p A m means that packet p cannot be shown as a random linear combination of the packets in | A k | .
5.    | A v g n | = n γ n ( 1 τ n ) .
6.    x = a r g m a x n ϵ R A v g n .
7.    Linear combination of the packet for | D x | .
8.    x broadcasts the linear combination of the packets from the source.
In Algorithm 3, the number of the average successful receiver during the re-transmission phase is given by the n γ n ( 1 ϑ n ) while the receiver with | D n | > 0 is interested in the innovative packets. To maximize the successful reception of the innovative packets, the γ n devices are selected in such a way to maximize the successful receivers. First, the source determines the missing packets in the devices, and second, transmit the linear combination of the packets from the source. Network coded packet from source or satellite carries information about all the missing packets from the source. So the code always maximizes the selection of maximum γ n devices. After selecting packets from the source, now comes the criteria to select packets from the D2D links in the local network. One device is selected as a controller based on criteria in line 6 of Algorithm 3, which selects the transmitter with the maximum number of the average receivers to have innovative packets in one transmission time slot. Moreover, the linear combination should be independent of all the packets in | A m | . The mobile device x with the largest average successful receivers is selected as the transmitter, and if more than one, then one is selected randomly at the moment for simplicity. After transmitting from the source and via the D2D link, if the innovative data received successfully, then it is added in the matrix of the | A k | . Now for the next transmission, again, the transmitter with the max number of | A n | and independent from | A k | is selected and transmits the data, which is as per our algorithm in lossless channel. The upper bound for packet completion time for the MANC-batch for lossy second stage channel is given as:
T [ max ( | X c | 1 n R ϑ n ) , T i ] .
such that
T i = max ( T x , T r ) , i f | D r | D x | 1 ϑ n τ n + ϑ x | D x | 1 ϑ x | D r | 2 ϑ r τ n
T x = | D r | ( 1 2 ϑ r τ x , r + 2 ϑ x ) + | D x | ( 1 τ x , r ) ( 1 ϑ r τ x , r + ϑ x ) ( 3 2 ϑ r τ x , r )
T r = | D r | ( 1 2 ϑ r τ x , r + 2 ϑ x ) + | D x | ( 1 τ x , r ) ( 1 ϑ r τ x , r + ϑ x ) ( 3 2 ϑ r τ x , r )
x = arg m a x n ϵ R | A n | = arg m i n n ϵ R | D n | ]
r = arg m a x n ϵ ( γ n x ) | D n | 2 ϑ r τ n .
The proof is provided in Appendix C.

MANC-Stream (Second Stage Lossy)

We will now develop the MANC stream algorithm to cater to the lossy second stage as the lossless algorithm is not feasible. According to Algorithm 2, the packets are created independent and then grouped in the sets of X c , X d , and X s when there is no loss in second stage transmission. This approach is not suitable for the lossy channel as the sets fixed in the lossless channel, but some packets lost due to noise, and the sets’ fixed approach cannot be used effectively. Particularly in the case of X d , the sets need to be changed by each reception because not all devices receive the source’s innovative packet. Second, the priority of the packets to be sent in the next timeslot in the second stage changes due to the loss of innovative packets in this stage. The main aim is to prioritize the packets, which can be received by many devices to deliver more information in lesser time. Analysis of these two reasons, it compulsory to update the Algorithm 2 for MANC- stream. The new Algorithm 4 defines the MANC-stream from the perspective of the lossy channel.
Algorithm 4: MANC Stream (Lossy second stage)
1.    Grouping of the packets based on the | D n | into a set of the X c , X d , and  X s using the algorithm II.
2.    if (∼ isempty ( X c ) ).
3.    ( X c ) first element is elected and transmitted from the source.
4.    elseif (∼isempty ( X d ) )
5.    The device with a higher number of average receivers (based on probability loss) is selected, and then X d packets transmitted. The transmitted packet is equal to a r g m a x p ϵ X d n ( W l [ n ] 0 ) ( 1 ϑ n ) .
6.    elseif (∼isempty ( X s ) )
7.    X s first element is elected and transmitted from the satellite or source based on higher average receivers.
Independent packet via D2D:
8.    Consider p packet within W l vector in X s set. Any device can transmit the partial of packet p by linear network coding in the vector W l W l [ x ] . The average successful receivers is given by a r g m a x p ϵ X d n ( W l [ n ] 0 ) 1 τ n . Find all the receiver with the corresponding packets and average successful receivers.
9.    After finding all the average of the successful receivers, now send the packet from the transmitter having the maximum average successful receivers via D2D link.
In Algorithm 4, first determines the sets of the X c , X d , and X s by using the algorithm proposed for the lossless stage. Then two sets of a linear combination of the packets are transmitted, one from source or satellite (depending on availability of the packets) and other from local devices via D2D link. This way, more information is delivered in a one-time slot of transmission. Now, the selection of the packets from the source depends upon the average number of successful receivers in the set of X c and X s and is equal to the n R ( 1 ϑ n ) . At the same time, the average maximum successful receiver from X d within vector W l is equal to a r g m a x p ϵ X d n ( W l [ n ] 0 ) ( 1 ϑ n ) . Since, γ r is a subset of γ n , so n ε R ( 1 ϑ n ) is the average successful receiver in X c X s higher than a r g m a x n ϵ γ r n ( W l [ n ] 0 ) ( 1 ϑ n ) . Between X c and X s , X c is sent first on the priority and after that X s packets are sent from the satellite link. Now the order of transmitting the is, X c at first, X s as second and X d as the third in the sequence. For X d , the device with the maximum number of the average receivers is selected as a transmitter. Now consider the packet p from X s within in vector W l . Each device n ϵ R transmit some part of the data available in its attained set A. Suppose W l [ x ] is set of packets vector that is required by the device x. The average number of successful receivers for transmission from x is equal to n ( W l [ n ] W l [ p ] ) ( 1 τ x , y ) . In [7] of Algorithm 4, it determines the maximum number of the average receivers for the X d . The upper bound of the packet completion time is given as:
T max T t x , c , ( T t x , c + T s , s ) ( T t x , c + T t x , d + T t x , s ) T s , d + T s , s + T t x , d + T t x , s .
The proof is provide in Appendix D.

3.4. General Lower Bound on T

In the end, the general lower bound for transmission is developed for MANC-stream and MANC-batch when a random linear combination of the network coding is used. The comparison of our proposed algorithm is made with lower bound to find the effectiveness of our algorithm. The closer the packet completion time is with a lower bound, the better is our coding gain. The lower bound on T for cooperative network coding with multiple interface devices is given as:
T max | X c | 1 n R ϑ n , max n R min n ( R n ) | W n | 2 ϑ n τ x , n .
The proof is provided in Appendix E.

3.5. Cooperative Admission Control with Multiple Access Network Coding (JAMANC Algorthim)

After the appropriate power allocation, user selection, and mode assignment for each device, the ATSPSN gives the preference list (mode and user selection) for all the admitted devices named JPFL. On the other hand, the MANC gives another PFL based on the network codes developed for multiple interfaces named MPFL. It categorizes the developed codes in 03 sets X c , X s , and X d as as shown in Figure 5.
The stable matching algorithm is developed whose purpose is to maximize the reward (capacity, packet completion time, etc.) jointly so that the benefit of both the techniques be utilized for better performance. For this purpose, a bi-directional local search matching algorithm is used [26]. As compared to the Gale-Shapley algorithm to find an optimal solution, which is selfish matching for the first PFL, the bi-directional used to maximize keeping the in view both PFL. The egalitarian cost c ( V ) , and the joint cost for stable matching with instances V is defined d ( V ) is mathematically defined as:
c ( V ) = J P F L ( V ) + M P F L ( V )
d ( V ) = | J P F L ( V ) M P F L ( V ) | .
There are several methods to search for stable egalitarian matching, which includes genetic algorithm, ant colony algorithm (ACS), approximation algorithm for finding the near-optimal solution for stable matching. As the number of stable matching (SM) tends to increase exponentially, so these techniques are not feasible in terms of the complexity. The bi-directional local search approach has better performance to attain the egalitarian matching [27]. In this scheme, one forward from MPFL and other backward from JPFL used and found where both meet, indicating the optimal solution. For search, GALE Sharpley [28] used while for the break joint operations [29] is used to generate stable neighboring matching to avoid getting stuck in a local optimum. GALE Sharpley algorithm finds the man optimal stable matching; in our case, MANC optimal stable matching. At starts, the algorithm assigns no mode. At each iteration step, the algorithm selects a device from MPFL and selects the most appropriate matching from the JPFL list. If the mode in n device from JPFL is free, it will be matched with the device from the same n device from MPFL. If the device from JPFL is already engaged with some other device, so it rejects the matching from MPFL. The algorithm terminates when all the devices from MPFL are linked to the JPFL or show invalid matching. If MPFL and JPFL are interchanged, then the optimization is based on the JPFL instead of the MPFL. Once the pairing is done in one direction, then the break joint operation is done. Let V be a stable matching and (JPFL, MPFL) be engaged in V. The break joint problem as derived from [29], denoted by the B r e a k J o i n t ( V , M P F L ) , find the stable matching from V to MPFL. In the beginning, the algorithm assigns the preferred mode of the JPFL with the MPFL preference mode. The algorithm performs a sequence of matching, rejection, and acceptance based on the Gale-Shapley algorithm at each iteration. There is always 02 free mode any time execution of the algorithm, if the JPFL mode matches with MPFL mode for the corresponding device, then there is no need of other modes, and B r e a k J o i n t ( V , M P F L ) returns a stable matching V of l engaged pairs. The Mc Vitae and Wilson imposed conditions [29] are used for stable matching in the break-joint JAMANC operation as follows.
  • Condition 1: If B r e a k J o i n t ( V , M P F L ) returns V on M P F L , then the B r e a k J o i n t ( V , i ) only be performed on MPFL ⊳ i M P F L .
  • Condition 2: In B r e a k j o i n t ( V , M P F L ) , only MPFL with M P F L M P F L propose, otherwise the B r e a k j o i n t ( V , M P F L ) is stopped.
At first in Algorithm 5, Gale Sharpley is used to finding the optimal matching of mode selection for JPFL and MPFL, which gives a start for the BiLS-Joint algorithm. At each iteration, within two directions, the algorithm finds a neighbor set of the current solution, which are V l e f t or V r i g h t by calling B r e a k J o i n t ( V l e f t , M P F L ) or B r e a k J o i n t ( V l e f t , J P F L ) . The algorithm evaluates all the neighbors’ stable matchings by cost function f ( V ) . The algorithm jumps to the next solution, which gives the smallest value of the f ( V ) . The algorithm can also select the next solution to be a random neighbor with minimum probability to avoid getting stuck in a local optimum solution. If the next solution turns to be worse, then that direction is discarded. Similarly, if the best current solution of the direction is better than the previous, then the best is assigned to the current solution. The algorithm moves the current solution to the next and repeats all the steps. The algorithm terminates if either one of the directions has no neighbors left or two directions meet each other utilizing the MPFL mode assignment. If both forward and backward searches pause and the MPLF cost of the current matching of the forward search MPFL( V l e f t ) is equal or higher then backward MPFL( V r i g h t ), then the results are obtained from bi-directional. This gives the best solution so far and terminates at this point.
Algorithm 5: JAMANC Algorithm
Input: An instance l of ATSPSN(JPFL)-MANC (MPFL) matching.
Output: A stable matching (Mode identification).
1.    V l e f t := GALESHAPLEY(I,MPFL);⟶ MPFL propose JPFL;
2.    V R i g h t := GALESHAPLEY(I,JPFL); ⟶ JPFL propose MPFL;
3.    if ( f ( V l e f t < f ( V R i g h t ) ) then
4.    V b e s t : = V l e f t
5.    else
6.    V b e s t : = V R i g h t
7.    end
8.    Forward := Valid;
9.    Backward:= Valid;
10.    while (valid) do
11.    if (forward) then
12.    neighborSet:= ⊖;
13.    for (each device in the MPFL set) do
14.    Stable Matching:= B R E A K J O I N T ( M l e f t , MPFL)
15.    neighborSet:=(neighborSet) ∪ (stable Matching)
16.    end
17.    if (small random probability p) then
18.    M n e x t := a random matching in neighborSet;
19.    else
20.    V n e x t := arg m i n V ε n e i g h b o r S e t ( f ( V ) ) ;
21.    if ( f ( V n e x t ) f ( V l e f t ) ) then
22.    forward := In Valid
23.    if ( f ( V b e s t ) < f ( V l e f t ) ) then
24.    V b e s t : = V l e f t
25.    end
26.    end
27.    V l e f t : = V n e x t
28.    end
29.    if (backward) then
30.    neighborset:= ⊖;
31.    for (each device in JPFL set) do
32.    stableMatching := B R E A K J O I N T ( V R i g h t , J P F L )
33.    neighborSet:= ( n e i g h b o r S e t ) ( s t a b l e M a t c h i n g )
34.    end
35.    if (small random probability p) then
36.    V n e x t := a random matching in neighborSet;
37.    else
38.    V n e x t := arg m i n V ε n e i g h b o r S e t ( f ( V ) ) ;
39.    end
40.    if ( f ( V n e x t ) > f ( V r i g h t ) ) then
41.    backward := Invalid
42.    if f ( V b e s t ) > f ( V r i g h t ) then
43.    V b e s t : = V r i g h t
44.    end
45.    end
46.    V r i g h t : = V n e x t
47.    end
48.    if ((not forward) and (not backward)) then
49.    if (MPFL( V l e f t ) J P F L ( V r i g h t ) ) then
50.    Forward := Vaild
51.    Backward := Valid
52.    else
53.    Break;
54.    end
55.    end
56.    end
57.    while end
58.   Return V b e s t

3.6. Complexity

The admission control with NC is divided into sub-problems and then jointly optimized together. The complexity depends upon the highest complexity in our sub-algorithms. In terms of time cost, the approximated big O of ATSPSN branch-cut is O ( l o g ( n ) ) , where n is the number of users. The MANC-batch and MANC-instant complexity with the second stage as lossless is O ( X 2 + n ) . While the complexity of the MANC-instant with second stage lossy is O ( X 3 + n 2 ) . So the complexity of the MANC-instant is greater then MANC-batch as the transmission sets are calculated again after each loss of the packet. The Time Complexity of the Gale-Shapley Algorithm is O ( n 2 ) . The overall complexity of the JAMANC algorithm for stream and batch is defined (29) and (30) respectively, as:
Complexity ( batch ) = m a x [ O ( l o g ( n ) , O ( X 2 + n ) , O ( n 2 ) ]
Complexity ( stream ) = m a x [ O ( l o g ( n ) , O ( X 3 + n 2 ) , O ( n 2 ) ] .

4. Simulation Results

Monte Carlo simulation was carried out. The results are average out on 500 simulations for ATSPSN and JAMANC algorithms, where optimization is computationally extensive. The step size is taken as two devices for the ATSPSN. The step size for MANC and JAMANC algorithm is five devices and five packets. Small intervals provide better mean estimates leads to a higher confidence interval. However, 5000 iterations are used for the MANC algorithm to cater for all possible combinations of packet missing. First, the ATSPSN algorithm is compared, followed by the JAMANC algorithm, and a comparative study is carried with the MANC standalone (extended NCMI algorithm proposed in [5]) and ATSPSN standalone algorithm [25]. Moreover, mode analysis is done. The performance of coding is compared with the upper and lower bounds derived earlier. As per International Mobile Telecommunications 2020 (IMT-2020) guidelines [30], the significant key performance indicators (KPIs) for the 5G network is capacity, energy efficiency, and fair usage policy. The time required to complete the packet completion is a critical factor in analyzing the network coding [5]. Earlier packet completion time leads to better performance of the network. The standard KPIs are used to analyze the strength of our proposed algorithms.

4.1. Joint Admission Control (ATSPSN)

Figure 6 shows the capacity analysis of the different techniques. ATSPSN GAMS branch cut outperforms ATSPSN NOMAD, and GAMS branch bound. Moreover, when the satellite is used as a supported network, the overall capacity increases. Figure 7 shows mode analysis in terms of the capacity. The hybrid mode, which includes joint optimization of the cellular supported by the D2D satellite network, performs better than the standalone mode. Moreover, at higher admitted users, the satellite capacity increases compared to D2D because of more interference due to an increase in operating devices. The satellite is selected in our algorithm when deemed essential, leading to less link budget costs.
Figure 8 shows that the ATSPSN GAMS branch cut has better energy efficiency as compared to NOMAD and Branch bound due to faster convergence to the optimal solution. So our algorithm has optimum power allocation as compared to other techniques.
The detailed analysis of the ATSPSN algorithm is made in the conference version of the paper [25], which includes admitted user’s analyses, mode analyses, and complexity. It is concluded via [25] that the overall ATSPSN GAMS branch-cut has better performance in terms of maximization of user selection, energy efficiency, capacity, and complexity as compared to other techniques. ATSPSN GAMS branch-cut is used further to cooperative network coding (JAMANC algorithm).

4.2. Cooperative Admission Control with Network Coding (JAMANC)

Now, the JAMANC algorithm’s comparison is made with standalone techniques (ATSPSN/MANC) and standalone modes (cellular/D2D/satellite). MANC is an extended version of the NCMI (Network coding multiple interfaces) proposed in [5] with satellite included apart from D2D-cellular communication. The quantitative performance is compared with theoretical bounds derived during problem formulation section in terms of packet completion time. ATSPSN-NoNC is defined as the algorithm with joint admission control optimization, and without network coding, i.e., the missing packets send based on channel conditions on multiple interfaces. JAMANC defines algorithms with cooperative admission control with multiple interface network coding. MANC is defined as an algorithm that consists of multiple interface codes, but the selection of interfaces does not consider optimum admission control.
First, we evaluate the strength of the network code by considering the lossless second stage. Figure 9 shows the results for the lossless second stage with requisite upper bounds. MANC batch has better performance as compared to MANC-instant. MANC batch transmits all the missing packets and the devices required to wait for all the combinations for decodability, leading to less packet completion time. On the other hand, the MANC instant transmits the data with the aim of instant decodability, so it requires more re-transmission. However, our proposed algorithm acquires the performance close to lower bounds and better as compared to NoNC. It is also to note that JAMANC has the same performance as MANC. So the joint optimization of admission control with network coding does not improve performance because all the channels are considered lossless, and using random channels for transmission does not affect the performance of the network. In terms of the number of devices Figure 10, initially, MANC-instant performance is better than NoNC, but after a specific number of active devices, the performance becomes the same. The reason is due to each packet lost at least by one device. MANC-batch has better performance as compared to NoNC/instant and independent on the increase in the number of devices. The network code designed for multiple interfaces lowers the packet completion time, especially at higher admitted users. It is concluded that our RLNC algorithms designed for multiple interfaces lower packet completion time regardless of the increase in packets or active devices.
Figure 9 and Figure 10 showed that the optimum NC with multiple interfaces designed based on RLNC increases the performance of the network. However, the second stage lossless, is not the realistic depiction of communication and represents the idealistic channel condition. Now moving towards the lossy second stage, the channel conditions also play a vital role. Figure 11 shows the comparison of packet completion time of different techniques and modes with the number of the packets in the second stage lossy network. JAMANC-batch, having cooperative admission with batch network coding, has better performance than JAMANC-stream and MANC standalone. It shows that if the right channel conditions send prioritized RLNC codes under optimized interfaces, it increases the network’s performance in real-time. The subfigures show that the JAMANC batch and stream have lesser packet completion time than upper bounds. JAMANC batch packet completion time is closer to lower bounds despite adverse channel conditions in second stage, which indicates that joint optimized admission control under cooperative network coding with multiple interfaces improves performance, which is the strength of this article.
Figure 12 shows a comparison of the JAMANC algorithm with other techniques and modes with the number of devices in the network. JAMANC batch has overall less packet completion time as compared to JAMANC-stream and MANC. Moreover, as the number of the devices increases, the MANC algorithm’s packet completion time increases, but in the JAMANC algorithm, the packet completion almost remains the same. It is because JAMANC caters to the channel conditions while transmitting the RLNC packets, but MANC transmits randomly without considering the channel conditions. Our algorithm’s main advantage is that the number of active devices in the network increases without compromising performance. The subfigures in Figure 12 show that our algorithms remain below the upper bound even in adverse conditions.
We will now discuss the mode analysis of the different techniques with a number of packets and the number of devices. Figure 13 shows that the JAMANC hybrid has better performance and mostly independent upon the number of devices in the network in case of a batch algorithm. The simulation shows that utilizing all the three modes effectively and taking the strength of admission control with network coding increases overall performance. Similarly, Figure 13a,b shows that with an increase in packets, JAMANC with hybrid mode, i.e., cellular supported by D2D-Satellite, has lesser packet completion time. Besides, our algorithm JAMANC selects satellite when deemed essential, reducing the link budget cost overall.
The probability of packet loss plays a vital role in performance for network coding. Now we consider the loss factor and analyze our algorithms based on packet drops. Figure 14 shows the comparison of the packet completion time with the probability loss factor. The difference in performance between JAMANC and MANC is negligible at lesser loss factor values because of high SINR values. However, as the probability loss increases, the MANC packet completion time increases, but JAMANC packet completion time increases slowly because of effective admission control to cater to the interference (refer to zoom version of Figure 14). The strength of cooperative admission control is shown by comparing the performance of the MANC with ATSPSN-NoNC. ATSPSN-NoNC outperforms the MANC algorithm at a higher probability loss factor because the joint channel condition plays a significant role at adverse interference. The multiple interfaces provide better performance than a single interface at a higher loss factor when JAMANC hybrid mode is selected compared to standalone modes. In short, cooperative admission control with network coding underlying multiple interfaces jointly optimized lead to better performance even at worse channel conditions or higher packet loss factor.

5. Conclusions

In this paper, we presented cooperative admission control with network coding for cellular/IoT devices supported by the D2D-satellite network. The problem formulated is divided into subproblems, and the heuristic solution is developed for each subproblem to keep the complexity of the proposed algorithm low. First, the joint admission control, which includes mode assignment, power allocation, and user selection, is formulated. The problem is MINLP, which is NP-hard. The linearization of the formulated problem is proposed, which ensure convergence. Then it is solved by GAMS branch cut, NOMAD, and branch bound solvers. ATSPSN-GAMS branch cut outperforms other techniques in terms of capacity, admitted user selection, energy efficiency, and complexity. Second, a novel network coding for multiple interfaces (MANC) has been developed for the stream and batch decodability techniques. The stream is used for instant decodability while the batch is used to lower packet completion time, where devices can wait for all linear combinations of the packets to arrive for decodability. Three sets are developed, categorizing the random linear network code for transmission from multiple interfaces, i.e., cellular, D2D, and satellite. The aim is to achieve packet completion in minimum time. For comparative study, the lower and upper bounds are derived for each technique in a lossless and lossy second stage channel. A bi-directional matching algorithm named JAMANC is introduced to find optimal mode selection and network codes utilizing the cooperative admission with MANC preference list. JAMANC is developed by coordinating the joint admission with multiple interface network coding with a supported D2D-satellite network. The simulation proves that JAMANC performs better than standalone techniques, i.e., ATSPSN and MANC, and standalone interface, i.e., cellular, D2D, and satellite. Overall, the packet completion time decreases for JAMANC-stream and JAMANC-batch with low complexity and lesser link budget cost. Our scheme proves that the cooperation between admission control based on joint channel conditions with network codes based on packets available in multiple interfaces is an effective technique to improve performance, especially at adverse channel conditions or higher packet loss.

Author Contributions

A.A. experimented and contributed significantly to analysis and manuscript preparation; Z.Q. contributed to the conception of the study; S.H. performed the data analyses and wrote the manuscript; L.C. helped perform the analysis with constructive discussions. All authors have read and agreed to the published version of the manuscript.

Funding

The Fundamental Research Funds support this research for the Central Universities (No. YWF-20-BJ-J-197).

Conflicts of Interest

The authors declare no conflict of interest.

Glossary

SymbolDefinition
lLinks in the network i.e., cellular, D2D and SAT
RTotal admitted users in network
X c l Admitted cellular users in l links
X s l Admitted satellite users in l links
X d l Admitted d2d users in l links
hChannel gain
P ( r / S ) Rician distribution conditioned on shadowing
P l d l Power allocated to D2D link
P l c l Power allocated to cellular link
P e n b m a x Max power of the base station
P S A T m a x Max power of the satellite transmission
X c Matrix that transmits in cellular mode only in NC
X s Matrix that transmits in cellular or d2d mode in NC
X d Matrix that transmits in d2d only in NC
ν l Integer indicator for mode selection
Δ T l Total capacity of the network in l links
Δ s Utility function
C l s ( i ) l Capacity of i t h satellite link in l links
C l d ( i ) l Capacity of i t h d2d link in l links
DDeficient matrix i.e., packets lost
AAcquired matrix i.e., packets received
pTotal packets transmitted
p Sets of the packet received
γ n Sets of users successfully received the transmitted packets
c ( V ) Egalitarian cost
d ( V ) Joint cost with V instance

Appendix A. Theorem 1

Proof. 
In MANC-batch, the packets’ linear combination is transmitted by the satellite/source and D2D in the second stage. Therefore, the size of the A increases by two except those that already have the maximum size of the acquired A. The size of the transmitter is increased by the one. In the first transmission slot, the size, x = arg m a x n ϵ R | A n | is selected as the transmitter, which results in an increase in the length of the A n by two and size of A x increased by one. Now, for the next time slot for the transmission, the x remains as the transmitter device until there is some other device in the network which has more innovative packets then-current x device. Now it takes | A x | | A n | time slot of transmission for n device to have the A same size as of acquired by x device and selected as the transmitter. So considering rvr = arg m i n n ϵ ( R / x ) | A n | = arg m a x n ϵ ( R / x ) | D n | , it takes about | A t | | A r v r | for transmitter to get select. Two cases will be evaluated further, as shown.
  • ( X | A x | ) | A x | | A r v r | : After the transmission of the packet from the max transmitter, the size of the | A x | will be the same as the size to X and the | A r v r | less in size as compared to the | A x | . So for the rest of the communication, x in our case will remain the transmitter and will be upper bounded by the timeslots for transmission for device r v r such that 1 2 max n ϵ R | D n | .
  • ( X | A x | ) | A x | | A r v r | : The size of the | A x | becomes equal to the size of the | A r v r | when innovative packet increases by | A x | - | A r v r | time slots of the transmission. So devices r v r and x will be selected for transmission alternatively. The scheme is that at the one-time slot of transmission, x be selected, and in other times of transmission, r v r is selected. So the size of | A r v r | increases by three after every two consecutive transmission slots. So packet time upper bounded to satisfy the r v r is defined as 1 3 ( | D r v r | + | D x | ) .
  • Finally, the timeslots cannot be less than | X c | .
So the upper bound is defined by the Equation (17). □

Appendix B. Theorem II

Proof. 
Let us consider following cases.
  • X c ( 2 | X s | + | X d | ) : During this conditional statement, the base station transmits the packets X c and the D2D area network coded packets transmit the X s and X d via D2D link in such a way that first X d is transmitted then X s is transmitted after that. After the ( 2 | X s | + | X d | ) timeslots of transmission, only | X c | ( 2 | X s | + | X d | ) packets are left behind for the transmission and requires | X c | ( 2 | X s | + | X d | timeslots to re-transmit the packets from the base station. The packet completion under this condition is mathematically written as T ( 1 ) = | X c | .
  • ( 2 | X s | + | X d | ) | X c | ( | X d | | X s | ) : To evaluate this condition, the problem is divide into two statements. First, | X c | | X d | and second | X c | | X d | . For the first case, if the base station is transmitting from | X c | , then via D2D link | X d | is transmitted. Since | X c | | X d | is then after some time, all the packets in | X c | transmitted and only | X c | | X d | packets are left to transmit. Then cooperative transmission is done by the satellite and D2D for codes available in X s . After | X c | | X d | timeslot, one code is sent by D2D link from | X d | and at the same time, one code is transmitted from the X s . At last, only packets | X s | ( | X d | | X c | ) will remain and sent by the 2 3 ( | X s | ( | X d | | X c | ) ) timeslot for transmission through satellite and cooperative devices in D2D. So the required number of time slots for re-transmission in second stage is 1 3 ( | X s | + ( | X d | + 2 | X c | ) ) . Now for the second case, the base station transmits the packet from | X c | and | X d | via D2D link. The | X c | | X d | , so after | X c | | X d | transmission, only | X c | | X d | packets is left to be transmitted by D2D link. It takes 2 3 ( | X s | ( | X s | | X d | ) 2 ) timeslots by the source and D2D supported satellite network to complete the re-transmission of the complete packets. So for case two, 1 3 ( | X s | + 2 | X c | + | X d | ) is the total completion time required. Moreover, the inequality | D n | ( | X c | + | X s | ) holds for all devices n ε R . Mathematically, shown as
    | X s | ( m i n | D n | X c ) n ε R .
    The upper bound on packet completion time becomes as
    T ( 2 ) = 1 3 ( 2 | X s | + 2 | X c | + | X d | ) 1 3 ( 2 m i n n ε R | D n | + | X d | ) .
  • | X c | ( | X d | | X s | ) : The base station starts re-transmitting the packets available in | X c | set, and | X d | packets are transmitted via the D2D link. After | X c | time slots, all the packets transmitted by the base station and ( | X d | | X c | ) packets are left to be transmitted by the satellite and D2D links. In next time slots, ( | X d | | X c | ) packets are transmitted via D2D link and satellite links cooperatively. At last, | X d | | X c | | X s | left and it takes ( | X d | | X c | | X s | ) 2 timeslots fo the transmission by satellite and D2D cooperative network. So combining all the cases, the upper bound of the packet completion time becomes as
    T ( 3 ) = | X d | + | X c | + | X s | 2 | X d | + m i n n ϵ R | D n | 2 .
By combining the T ( 1 ) , T ( 2 ) and T ( 3 ) , we get the Equation (18). □

Appendix C. Theorem III

Proof. 
In MANC-batch with a lossless second stage, the source or satellite transmits the linear combination of all the missing packets in the devices. In contrast, the local device with the maximum number of the packets available transmits the linear combination via the D2D link. If there are multiple devices with the same number of A, then one is selected randomly. Now in the lossy stage, the transmitter with a maximum number of average receivers is selected to transmit the linear combination of packets. For upper bound, the worse case situation is considered for packet completion. At the start, x = a r g m a x n ϵ R | A n | is selected as a transmitter, which means the device attained a maximum number of the packets. Each device other then transmitter (device x) receives two packets, one from σ probability channel loss from source/satellite and another from probability loss via D2D links. The device x receives one linear combination of the packet from σ probability channel loss. The size of | D x | is reduced to ( 1 γ n ) . The | D n | size is reduced to ( 2 ϑ r τ n ) at each timeslot until the size of the desire | D n | becomes equal to the size of the | D x | . As per Algorithm 2, a device is selected as the transmitter with the maximum number of acquired | A n | . When innovative packets increase, then the x transmitter changes. After the average k transmission slot, the size of | D n | n ϵ R is equal to | D n | k ( ( 2 ϑ r τ n ) , and the size of the | D x | is equal to | D n | k ( 1 ϑ x ) . The receiver with r as a r g m a x n ϵ R | A n | = arg m i n n ϵ R | D n | takes maximum k = | D r | | D x | ( 2 ϑ r τ n ) timeslots for the transmission and solving, which gives | D x | k ( 1 ϑ x ) = | D r | k ( 2 ϑ r τ n ) for another device as transmitter average. Consider two cases below.
  • k | D x | 1 ϑ x : After the time slot of | D x | 1 ϑ x transmission, the size of the desire D for x device becomes equal to the size of the X and r size of desire D is less than X. In this case, x is the transmitter for the timeslot of the next transmission until all packets are received successfully. So packet completion time is equal to timeslot of transmission of T | D x | / 1 ϑ .
  • k | D x | 1 ϑ x : After k timeslots of the transmission, the size of the desire D of r device becomes equal to the size of the desire D of the x. The r and x devices selected for the transmission for the next timeslots alternatively until the end of the innovative packets. So the size of | D r | and | D x | are ( 1 ϑ r ) + ( 2 ϑ r τ n ) and ( 1 ϑ x ) + ( 2 ϑ r τ n ) in alternative timeslots of transmission. It takes T r = k + 2 | D r | k ( 2 ϑ r τ x , r ) ( 3 2 ϑ r τ x , r ) and T r = k + 2 | D x | k ( 1 ϑ x ) ( 3 2 ϑ r τ x , r ) . Now placing the value of k = | D r | | D x | / ( 2 ϑ r τ n ) ( 1 ϑ x ) .
The above conditions conclude proof for upper bound given by Equation (19). □

Appendix D. Theorem IV

Proof. 
First, the sets X c , X d , and X s are constructed using the Algorithm 2 for 1st transmission slot. Then T t x , c , T t x , s and T t x , d are the average time packet completion for the source (base station or satellite) to transmit the packets from X c , X d , and X s . respectively, while T s , s is average packet time for packet completion via D2D in the sets of X s and X d , as shown
T t x , c = | X c | 1 max ϑ n n R
T t x , d = p X d 1 1 max n | ( W l [ n ] 0 ϑ n
T s , s = p X s 1 1 max n | ( W l [ n ] W l [ x ] τ x , n + 1 1 max n | ( W l [ n ] = W l [ x ] τ x , n .
Here the x transmits the partial packet from the X s set of the packets. Now x is elected in such a way that it maximizes the average receivers in the network as per Algorithm 4. x is the device that transmits the remaining packet p, which is an uncoded packet from vector W l [ x ] .
T s , d = p X d 1 1 max n | ( W l [ n ] 0 τ x , n .
where x transmits packet p ϵ X d , and x is selected such a way that it maximizes the number of average receivers such that x = arg max i | ( W l [ i ] W l [ x ] ) n | ( W l [ n ] = W l [ x ] ) ( 1 τ i , n ) .
Initially, the set of X c , X d , and X s is considered for the transmission of the linear combination of the packets in 1st timeslot. After that, the number of time slots required from the transmission such that | D n | = 0 defines the upper bound on time (T). The total number of the timeslots required for the transmission to recover the data decreases by updating the X c , X d , and X s after each transmission slot as compared to fixed X c , X d , and X s after 1st timeslot. First, the packet completion from the source/satellite determined for X c , X d , and X s , sets which is denoted by T t x , c , T t x , s and T t x , d respectively. Similarly, the average time via the D2D link for X d , and X s is given as T s , s and T s , d respectively. The average transmission required from the source/satellite is ( 1 ϑ n ) where ϑ n is lost from the source in case of the base station and satellite in case all the packets available with the satellite after first stage. It takes an average of 1 1 max ϑ n n R transmission slots to transfer the packets partially. The other part of the packets is taken 1 1 max n | ( W l [ n ] = W l [ x ] τ x , n timeslots to transmits these residual packets. Let’s consider the following 03 cases.
  • T t x , c ( T s , s + T s , d ) : The base station/satellite transmits the packet in X c and takes T t x , c the average time for the transmission of the packets. While packets in X t = X d X s are transmitted by the local devices via D2D links and take around ( T s , s + T s , d ) time for transmission. After this, the average of the | X c | | X c | ( T s , s + T s , d ) / T t x , c = | X c | ( T t x T s , s T s , d ) / T t x , c remaining from X c . The source/SAT requires an average transmission slot as ( | X c | ( T t x , c T s , s T s , d ) / T t x , c ) × T t x , c / | X c | = T t x , c T s , s T s , d . The average packet completion time becomes as T a = T t x , c .
  • T t x , c ( T s , s + T s , d ) : After transmission of the packet from the source and via D2D link, the average packets ( | X d | + | X s | ( T t x , c ( | X s | + X d ) / T s , s + T s , d ) = ( T s , s + T s , d T t x , c ) ( | X s | + X d ) / T s , s + T s , d left in X n . It takes an average transmission slot to transmit the packets by using the D2D is given as
    ( T s , s + T s , d T t x , c ) ( | X s | + | X d | ) / ( T s , s + T s , d ) × [ ( T s , s + T s , d ) ( T t x , s + T t x , d ) ] / ( T s , s + T s , d ) = ( T t x , c + T s , d ) ( T s , s + T s , d T t x , c ) / ( T s , s + T s , d + T t x , c ) .
    The timeslot for packet completion is given as T b = ( T s , s + T s , d ) ( T t x , c + T t x , s + T t x , d ) T s , s + T s , d + T t x , s + T t x , d .
By combining both conditions, we get Equation (25). □

Appendix E. Theorem V

Proof. 
When the cellular supported by satellite-D2D links are jointly used, than the time is represented by the T j . Two linear combinations are sent, one from the source or satellite and other from local devices via the D2D link. The probability of loss from source/satellite is denoted by the ϑ n and loss probability from the D2D transmitter to the receiver is denoted by the τ x , n . The average number of the time slot for transmission for device n is equal to the ( 1 ϑ n ) ( 1 τ x , n ) = 2 ϑ n τ x , n . It takes an average of | X n | / 2 τ x , n ϑ n time slots for n devices with transmitter x for timeslot of the transmission via D2D. The x is selected in such a way to minimize the T j . The T j is given as
T j | X n | 2 ϑ n τ x , n .
min x ( R n ) | W n | 2 ϑ n τ x , n .
Using a linear combination of network codes, the net time to satisfy the time taken by all the devices to complete the packets is equal to the maximum time taken by individual devices to attain the packets. Mathematically, express as
T = max n R T j
max n ( R ) min x ( R n ) | W n | 2 ϑ n τ x , n .
The average time slot required for transmission for X c to be received by at least one device is equal to 1 / 1 n R ϑ n . So the maximum time required from the transmission of packets is higher than | X c | / 1 n R ϑ n . So packet completion time is bounded by the Equation (26). □

References

  1. Pedersen, M.V.; Fitzek, F.H.P.; Larsen, T. Implementation and Performance Evaluation of Network Coding for Cooperative Mobile Devices. In Proceedings of the ICC Workshops—2008 IEEE International Conference on Communications Workshops, Beijing, China, 19–23 May 2008; pp. 91–96. [Google Scholar] [CrossRef] [Green Version]
  2. Leyva-Mayorga, I.; Roberto, T.; Vicent, P.; Sreekrishna, P.; Nguyen, G.T.; Jorge, M.B.; Fitzek, F.H.P. Network-Coded Cooperation and Multi-Connectivity for Massive Content Delivery. IEEE Access 2020, 8, 15656–15672. [Google Scholar] [CrossRef]
  3. Alsharfa, R.M.; Mohammed, S.L.; Gharghan, S.K.; Khan, I.; Choi, B.J. Cellular-D2D Resource Allocation Algorithm Based on User Fairness. Electronics 2020, 9, 386. [Google Scholar] [CrossRef] [Green Version]
  4. Khan, M.I.; Alam, M.M.; Moullec, Y.L.; Yaacoub, E. Throughput-Aware Cooperative Reinforcement Learning for Adaptive Resource Allocation in Device-to-Device Communication. Future Internet 2017, 9, 72. [Google Scholar] [CrossRef] [Green Version]
  5. Keshtkarjahromi, Y.; Seferoglu, H.; Ansari, R.; Khokhar, A. Device-to-Device Networking Meets Cellular via Network Coding. IEEE/ACM Trans. Netw. 2018, 26, 370–383. [Google Scholar] [CrossRef]
  6. Giambene, G.; Kota, S.; Pillai, P. Satellite-5G Integration: A Network Perspective. IEEE Netw. 2018, 32, 25–31. [Google Scholar] [CrossRef]
  7. Wang, X.; Li, H.; Tong, M.; Pan, K.; Wu, Q. Network Coded Cooperative Multicast in Integrated Terrestrial-Satellite Networks. In Proceedings of the 2019 IEEE Symposium on Computers and Communications (ISCC), Barcelona, Spain, 29 June–3 July 2019; pp. 1–6. [Google Scholar]
  8. Jadoon, M.A.; Khan, Z.A.; Khan, I.; Shah, A.; Khalifa, O.O. Network coding for hybrid satellite-terrestrial networks over non-identical fading channels. In Proceedings of the 2013 International Conference on Computing, Electrical and Electronic Engineering (ICCEEE), Khartoum, Sudan, 26–28 August 2013; pp. 589–592. [Google Scholar]
  9. Chan, C.C.; Al-Hourani, A.; Choi, J.; Gomez, K.M.; Kandeepan, S. Performance Modeling Framework for IoT-over-Satellite Using Shared Radio Spectrum. Remote Sens. 2020, 12, 1666. [Google Scholar] [CrossRef]
  10. Zeydan, E.; Turk, Y. On the Impact of Satellite Communications Over Mobile Networks: An Experimental Analysis. IEEE Trans. Veh. Technol. 2019, 68, 11146–11157. [Google Scholar] [CrossRef]
  11. Wang, L.; Li, Y.; Pan, B.; Wu, Q.; Yin, J.; Xu, L. Network Coding for Efficient Video Multicast in Device-to-Device Communications. Sensors 2020, 20, 2254. [Google Scholar] [CrossRef]
  12. Zhao, Y.; Li, Y.; Chen, X.; Ge, N. Joint Optimization of Resource Allocation and Relay Selection for Network Coding Aided Device-to-Device Communications. IEEE Commun. Lett. 2015, 19, 807–810. [Google Scholar] [CrossRef]
  13. Gao, C.; Li, Y.; Zhao, Y.; Chen, S. A Two-Level Game Theory Approach for Joint Relay Selection and Resource Allocation in Network Coding Assisted D2D Communications. IEEE Trans. Mob. Comput. 2017, 16, 2697–2711. [Google Scholar] [CrossRef] [Green Version]
  14. Tassi, A.; Chatzigeorgiou, I.; Vukobratović, D. Resource-Allocation Frameworks for Network-Coded Layered Multimedia Multicast Services. IEEE J. Sel. Areas Commun. 2015, 33, 141–155. [Google Scholar] [CrossRef] [Green Version]
  15. Xing, W.; Liu, F.; Wang, C.; Xiao, M.; Wang, P. Multi-source network-coded D2D cooperative content distribution systems. J. Commun. Netw. 2018, 20, 69–84. [Google Scholar]
  16. Singh, A.; Nagaraju, A. Heuristic-based opportunistic network coding at potential relays in multi-hop wireless networks. J. Int. J. Comput. Appl. 2020, 1–12. [Google Scholar] [CrossRef]
  17. Xu, D.; Li, Y.; Li, J.; Ahmed, M.; Hui, P. Joint Topology Control and Resource Allocation for Network Coding Enabled D2D Traffic Offloading. IEEE Access 2017, 5, 22916–22926. [Google Scholar] [CrossRef]
  18. Zhang, D.; Su, K.; Mandayam, N.B. Network coding aware resource allocation to improve throughput. In Proceedings of the 2012 IEEE International Symposium on Information Theory Proceedings, Cambridge, MA, USA, 1–6 July 2012; pp. 1311–1315. [Google Scholar]
  19. Wang, C.; Lin, X. Fast Resource Allocation for Network-Coded Traffic - A Coded-Feedback Approach. In Proceedings of the IEEE INFOCOM 2009, Rio de Janeiro, Brazil, 19–25 April 2009; pp. 2801–2805. [Google Scholar]
  20. Hu, G.; Xu, K.; Xu, Y. Throughput optimization with random network coding in cooperative wireless network. In Proceedings of the 2017 First International Conference on Electronics Instrumentation and Information Systems (EIIS), Harbin, China, 3–5 June 2017; pp. 1–6. [Google Scholar]
  21. Wang, S.; Zhang, Q.; Lu, S. NCaAC: Network Coding-Aware Admission Control for Prioritized Data Dissemination in Vehicular Ad Hoc Networks. J. Wirel. Commun. Mob. Comput. 2020. [Google Scholar] [CrossRef] [Green Version]
  22. Zhu, X.; Jiang, C.; Kuang, L.; Ge, N.; Guo, S.; Lu, J. Cooperative Transmission in Integrated Terrestrial-Satellite Networks. IEEE Netw. 2019, 33, 204–210. [Google Scholar] [CrossRef]
  23. Awan, A.Y.; Ali, M.; Naeem, M.; Qamar, F.; Sial, M.N. Joint Network Admission Control, Mode Assignment, and Power Allocation in Energy Harvesting Aided D2D Communication. IEEE Trans. Ind. Inf. 2020, 16, 1914–1923. [Google Scholar] [CrossRef]
  24. Latachi, I.; Mohammed, K.; Ahmed, H.; Tajjeeddine, R.; Ahmed, K.; Nasser, A.; Sanae, D.; Smail, Z. Link budget analysis for a LEO cubesat communication subsystem. In Proceedings of the 2017 International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), Fez, Morocco, 22–24 May 2017; pp. 1–6. [Google Scholar]
  25. Awan, A.; Qi, Z.; Shan, H. Co-operative Admission Control and Optimum Power Allocation underlying 5G-IoT Networks aided D2D-Satellite Communication. In Proceedings of the 2020 International Wireless Communications and Mobile Computing (IWCMC), Limassol, Cyprus, 15–19 June 2020; pp. 1025–1030. [Google Scholar]
  26. Viet, H.H.; Trang, L.H.; Lee, S.G.; Chung, T.C. A bidirectional local search for the stable marriage problem. In Proceedings of the 2016 International Conference on Advanced Computing and Applications, ACOMP, Can Tho City, Vietnam, 23–25 November 2016; pp. 18–24. [Google Scholar]
  27. Gelain, M.; Pini, M.; Rossi, F.; Venable, K.; Walsh, T. Local Search Approaches in Stable Matching Problems. Algorithms 2013, 6, 591–617. [Google Scholar] [CrossRef]
  28. Gale, D.; Shapley, L.S. College Admissions and the Stability of Marriage. Am. Math. Mon. 1962, 69, 9–15. [Google Scholar] [CrossRef]
  29. McVitie, D.G.; Wilson, L.B. The Stable Marriage Problem. Commun. ACM 1971, 14, 486–490. [Google Scholar] [CrossRef]
  30. Fuentes, M.; Luis, C.J.; Christiane, D.I.; Lang, Y.; Eduardo, G.; Volker, P.; Lazarakis, F.I.; Ole, G.; Omer, B.; Jian, Y.; et al. 5G New Radio Evaluation Against IMT-2020 Key Performance Indicators. IEEE Access 2020, 8, 110880–110896. [Google Scholar] [CrossRef]
Figure 1. Network Model.
Figure 1. Network Model.
Electronics 09 01601 g001
Figure 2. Network coding (Cellular only).
Figure 2. Network coding (Cellular only).
Electronics 09 01601 g002
Figure 3. Network coding (D2D only).
Figure 3. Network coding (D2D only).
Electronics 09 01601 g003
Figure 4. Multiple Access Network Coding (MANC).
Figure 4. Multiple Access Network Coding (MANC).
Electronics 09 01601 g004
Figure 5. Workflow: Cooperative admission with network coding (NC).
Figure 5. Workflow: Cooperative admission with network coding (NC).
Electronics 09 01601 g005
Figure 6. Capacity: NOMAD, Branch cut, Branch Bound.
Figure 6. Capacity: NOMAD, Branch cut, Branch Bound.
Electronics 09 01601 g006
Figure 7. Capacity: Mode Analysis.
Figure 7. Capacity: Mode Analysis.
Electronics 09 01601 g007
Figure 8. Energy Efficiency.
Figure 8. Energy Efficiency.
Electronics 09 01601 g008
Figure 9. No. of packets vs. completion time (lossless second stage).
Figure 9. No. of packets vs. completion time (lossless second stage).
Electronics 09 01601 g009
Figure 10. No. of devices vs. completion time (lossless second stage).
Figure 10. No. of devices vs. completion time (lossless second stage).
Electronics 09 01601 g010
Figure 11. Packet Completion time vs. no. of packets (lossy second stage).
Figure 11. Packet Completion time vs. no. of packets (lossy second stage).
Electronics 09 01601 g011aElectronics 09 01601 g011b
Figure 12. Packet Completion vs. no. of devices (lossy second stage).
Figure 12. Packet Completion vs. no. of devices (lossy second stage).
Electronics 09 01601 g012aElectronics 09 01601 g012b
Figure 13. Mode analysis: Versus no. of packets/no. of devices. (a) Batch (versus no. of packets), (b) Stream (versus no. of packets), (c) Batch (versus no. of devices), (d) Stream (versus no. of devices).
Figure 13. Mode analysis: Versus no. of packets/no. of devices. (a) Batch (versus no. of packets), (b) Stream (versus no. of packets), (c) Batch (versus no. of devices), (d) Stream (versus no. of devices).
Electronics 09 01601 g013
Figure 14. Packet Completion time versus probability loss factor.
Figure 14. Packet Completion time versus probability loss factor.
Electronics 09 01601 g014
Table 1. Time required for packet completion.
Table 1. Time required for packet completion.
MatrixCellular LinkD2D LinkSatellite Link
X c txx
X s x2tt
X d xtx

Share and Cite

MDPI and ACS Style

Awan, A.; Qi, Z.; Hu, S.; Chen, L. Cooperative Admission Control with Network Coding in 5G Underlying D2D-Satellite Communication. Electronics 2020, 9, 1601. https://doi.org/10.3390/electronics9101601

AMA Style

Awan A, Qi Z, Hu S, Chen L. Cooperative Admission Control with Network Coding in 5G Underlying D2D-Satellite Communication. Electronics. 2020; 9(10):1601. https://doi.org/10.3390/electronics9101601

Chicago/Turabian Style

Awan, Asfandyar, Zhao Qi, Shan Hu, and Lijiang Chen. 2020. "Cooperative Admission Control with Network Coding in 5G Underlying D2D-Satellite Communication" Electronics 9, no. 10: 1601. https://doi.org/10.3390/electronics9101601

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop