Abstract

This paper studies the base stations deployment problem in orthogonal frequency-division multiple access (OFDMA) based private wireless access networks for smart grid (SG). Firstly, we analyze the differences between private wireless access networks for SG and public cellular access networks. Then, we propose scheduling and power control based algorithms for the radio resource allocation subproblem and K-means, simulated annealing (SA), and particle swarm optimization (PSO) based algorithms for the base station (BS) location selection subproblem and iterate over these two sets of algorithms to solve the target problem. Simulation results show that the proposed method can effectively solve the target problem. Specifically, the combination of power control based resource allocation algorithm and PSO based location selection algorithm is recommended.

1. Introduction

It is critical that the underlying communication technology shall support efficient data exchange between various domains comprising smart grid (SG) [1]. This paper studies the orthogonal frequency-division multiple access (OFDMA) [2] based private wireless access networks for SG. Actually, wireless technologies can be used in the grid for monitoring, metering, and data gathering [317]. Specifically, SG devices such as switching station, distribution circuit, and distributed energy sites will produce various information data and send them periodically to the base station (BS) to realize the automation of power distribution and electricity information acquisition. In order to achieve this requirement, many technical problems need to be solved. Among them, this paper addresses the problem of how to optimize the deployment of BSs.

This problem has been extensively studied in the literature for the public cellular access networks. However, the scenario of private wireless access networks for SG is quite different from that of the public cellular access networks.

Property 1 (the locations of devices can be considered as fixed). Due to the peculiarity of SG, the locations of most power devices can be considered as fixed or quasi-fixed.

Property 2 (the uplink transmission is dominant [18, 19]). The smart grid network is an uplink dominated network, as the main data flow is from power devices to control center. The most often requirement of communications in SG is devices periodically reporting status monitoring data to the control center via BSs. Therefore, the direction of most data transmissions will be uplink.

Property 3 (the transmission rate requirement of devices can be considered as fixed [19]). The communications happening in the SG belong to the type of machine-to-machine (M2M) communications and the uplink data transmission rate requirement of each device can be considered as fixed or quasi-fixed.

Property 4 (the frequency separation requirement [19]). Wireless networks are more vulnerable than their wired counterparts due to the potential for direct access to the transport medium. Hence, security must be considered at every layer of the protocol stack in the private wireless access networks for SG. In addition to the authentication, authorization, and encryption considered at the application layer, the frequency separation mechanism at the physical layer shall also be considered, which is explained as follows. Actually, data produced by different types of devices in smart grid shall be transmitted to different destination systems. For example, as shown in Figure 1, the data produced by data terminal unit (DTU) shall be transmitted to the production service system, while the data produced by video terminal unit (VTU) shall be transmitted to the management service system. Due to the security purpose, the transmission paths used by different types of data shall be separated as much as possible. The separation can be achieved physically or logically. For example, four different approaches to construct the access network are illustrated in Figure 1, where the data paths in Figure 1(a) are the most separated; that is, the separation is achieved physically, while the data paths in Figure 1(d) are the least separated; that is, the separation can be achieved logically. Further, in addition to the separation for the wireline segment, data transmission over the wireless segment of data path shall also be separated for different types of devices. This requires that different types of devices shall use different frequency channels to transmit their data; that is, different types of devices sharing the same frequency channel will not be allowed. This is the frequency separation requirement considered in this work.

As a first step towards addressing the above issues, this paper investigates the problem of how to deploy BSs and allocate wireless resources so that the uplink transmission requirements are efficiently met. For this problem, we propose to decompose it into the resource allocation subproblem and the location selection subproblem and solve these two subproblems in an iterative fashion. The remainder of the paper is organized as follows. Section 2 formulates the joint resource allocation and location selection problem. Section 3 presents the overall framework to address this problem. Sections 4 and 5 propose resource allocation and location selection algorithms, respectively. Simulation results are reported in Section 6. Finally, we conclude in Section 7.

2. Problem Formulation

Consider a set of SG devices scattered in an area . Let denote the set of devices. For each device , let denote the minimum uplink data rate requirement and the uplink transmission power. The value of shall satisfy , where is the upper bound. For convenience, let and , respectively. Assume that all devices are classified into different types. Let denote the set of type- SG devices, .

Assume that the private wireless access network consists of BSs which are located in the area . Let denote the deployment location of the th BS, , where and are the horizontal and vertical ordinate of the deployment location, respectively. For convenience, let . Not every location in can be the candidate location for BS. Assume that denotes the candidate BS location set in and the deployment location of BS can only be selected from the elements of . That is, we restrict . In addition, let denote the relationship between SG devices and BSs, where is the set of devices served by the th BS. For simplicity and without loss of generality, we assume that the value of is determined by the distance based rule. That is, a device will be served by the BS which is the closest to it.

Consider a OFDMA based private wireless access network. The radio resource is defined as follows. In the frequency domain, assume that the total bandwidth is divided into channels. Let and denote total and channel bandwidth in Hertz, respectively. In the time domain, assume that the time axes are organized into consecutive slots and consecutive slots constitute a frame. The basic resource unit for data transmission is a resource block (RB) which is defined as one channel in the frequency domain and one slot in the time domain, respectively. In each frame, assume that slots can be used for uplink communications. Therefore, for each channel, there are RBs which are allocatable. Finally, define binary variable to denote the results of radio resource allocation which is valued 1 if the th RB of the th channel is allocated to device and 0 otherwise. Each device shall be allocated a number of RBs to meet its minimum data rate requirement. For convenience, let .

Given that the RB has been allocated to device , the received signal-interference-noise-ratio (SINR) experienced by device on this RB at BS can be written aswhere is the path loss from device to BS , is the power of background noise, is the power of interference, and is the set of devices which share the same RB with device . For simplicity and without loss of generality, we assume that the path loss mainly depends on the distance and can be calculated according to the formula for a distance separation of meters and we assume that there is no interference between distant devices. Let denote the uplink data rate achieved by device on RB which is calculated by the Shannon formula asThen, the total data rate achieved by device , denoted as , can be calculated asFor convenience, let .

Finally, the problem addressed in this paper can be formulated as, given the parameters , , , , , , , , , , , , and , how to determine the values of deployment location , transmission power , and radio resource allocation , so that the achieved data rate approaches as much as possible. The symbols used in this paper are summarized in List of Symbols.

3. The Framework

It is difficult to solve , , and simultaneously. Therefore, we decompose the problem into two subproblems. The first is the location selection subproblem which determines ; the second is the resource allocation subproblem which determines and . Specifically, the resource allocation subproblem determines and based on produced by the location selection subproblem. Then, the payoff of the current is calculated. Let denote the payoff of a given .

The general expression of the payoff function can be written aswhere is an increasing function representing the utility of device and is also an increasing function representing the cost of device . In this paper, we firstly let , where is the minimum uplink data rate requirement of device . Secondly, since the locations of devices in smart grid are fixed and the power can be supplied by alternating current adapter, we just let . This is a difference between wireless communications for smart grid and for land mobile users. Therefore, we define the satisfaction ratio of device as the ratio between achieved data rate and required data rate; that is,and we then define as the sum of satisfaction ratio over all devices; that is,which is used to measure how good the given is.

The problem can be solved by solving these two subproblems in an iterative fashion. The value of for the current will be fed back to the location selection subproblem for guided search of the better . The next two sections will solve these two subproblems in sequence.

4. Resource Allocation Methods

The task of resource allocation is to determine and given . Two different methods based on different principles are presented. The first is scheduling based for which uplinks which are far away from each other are scheduled to share the same RB. The second is power control based for which the transmission power of each uplink is controlled so that uplinks which are not far away from each other can also share the same RB.

4.1. Scheduling Based Resource Allocation

This method consists of four steps, which are described in sequence as follows.

4.1.1. Uplink Transmission Power Setting

This subsection determines the transmission power for each device . As stated before, for this method, uplinks which are far away from each other (i.e., do not interfere with each other) will be scheduled to share the same RB. Therefore, for the scheduling based method, it can be expected that the interference power in (1) is negligible. That is, we assume that there is no interference between distant devices. Thus, given the RB allocated to device , the received SINR experienced by device on this RB at BS can be approximately written aswhere device is served by BS (i.e., ) and is the minimum SINR requirement. is a system parameter and common to all devices and RBs. Therefore, the uplink transmission power can be set toThat is, since in this method distant devices between which there is no interference are scheduled simultaneously, there is no power control and power is strictly a function of the target minimum SINR requirement.

4.1.2. Interference Graph Construction

The interference graph is used to indicate whether any two devices can reuse the same RB due to the interference between them. As indicated by Property 4, different types of devices shall transmit data over different channels. So we need to construct interference graph for each type, respectively. Let denote the interference graph for the th type, , where is the vertex set in which each vertex represents a device of the th type and is the edge set in which each edge represents devices and which cannot reuse the same RB. There are two rules to decide if edge exists. Assume that devices and are served by BS and , respectively. The first rule is if , then edge exists. The second rule is if but the interference caused to each other is too large, then edge exists. Specifically, if the distance between device and BS is less than the interference radius of device or if the distance between device and BS is less than the interference radius of device , then edge exists.

The calculation of interference radius is as follows. For device , the interference radius is defined as the distance at which the received SINR is , where is the SINR requirement to ensure that the device does not cause nonnegligible interference to other uplinks that are out of the range of interference radius. According to (7), we have the equation for asfrom which the value of can be solved. After calculating the interference radius for each device, the interference graph can be constructed. The procedure is outlined in Algorithm 1, where in line () represents the distance between device and BS .

Require: .
Ensure: , .
 ()    for   to   do
 ()     for  any two devices and in   do
 ()      if    then
 ()       connect vertexes and in ;
 ()      end if
 ()      if   or   then
 ()       connect vertexes and in ;
 ()      end if
 ()     end for
 () end for
4.1.3. Utility Function Calculation

For each , the utility function is defined as the sum of satisfaction ratio over all devices of the th type given that a total of channels have been allocated to them. To calculate , define as the sum of satisfaction ratio over all devices of the th type given that the th channel has been allocated to them. Then the value of can be obtained according towhere . Further, to calculate , define as the sum of satisfaction ratio over all devices of the th type given that the th RB of the th channel has been allocated to them. Then the value of can be obtained according toLet denote the set of devices of the th type that share the th RB of the th channel. Then the value of can be calculated aswhere can be obtained by (2). Finally, we say a device is feasible in slot if the total power allocated to this device in this slot does not exceed . The procedure to calculate utility function is outlined in Algorithm 2, where the set is determined in a heuristic manner in lines ()–().

Require: , .
Ensure: and .
 ()    for   to   do
 ()     for   to   do
 ()      for   to   do
 ()       initialize ;
 ()       delete from devices which are not feasible in slot anymore;
 ()       while    do
 ()        determine device with the lowest satisfaction ratio in ;
 ()        put into ;
 ()        delete and devices connected to it from ;
 ()    end while
 ()    calculate ;
 ()    recover ;
 ()    update satisfaction ratio of all devices in ;
 ()   end for
 ()   calculate ;
 ()   calculate ;
 ()  end for
 () end for
4.1.4. RB Allocation

This subsection presents the RB allocation algorithm. As indicated by Property 4, due to the security consideration, different types of devices shall use different frequency channels and different types sharing the same frequency channel are not allowed. This is the constraint which channel allocation shall satisfy. The procedure of the scheduling based RB allocation is outlined in Algorithm 3, where denotes the number of channels which have been allocated to the th type. Specifically, after the type which is allocated to the th channel has been selected in line (), the RBs of the th channel shall be allocated according to which has been obtained in Algorithm 2, as shown in line ().

Require: and .
Ensure: .
 () initialize , ;
 () for   to   do
 ()  allocate the th channel to the th type with the minimum and break the tie arbitrarily;
 ()  let ;
 ()  for   to   do
 ()   allocate the th RB to devices in ;
 ()   let for each ;
 ()  end for
 () end for
4.2. Power Control Based Resource Allocation

This method consists of four steps, which are described in sequence as follows.

4.2.1. Grouping

Let denote the set of type- devices which are served by BS , . The value of can be derived from the value of , which can be derived from the value of . Let denote the grouping for the th type, where is the set of devices of the th type which can share the same RB and is the number of groups. The procedure of grouping is outlined in Algorithm 4.

Require: .
Ensure: .
 ()    for   to   do
 ()     let ;
 ()     for   to   do
 ()      for   to   do
 ()       if    then
 ()        select any device from and put into ;
 ()        delete device from ;
 ()       end if
 ()      end for
 ()  end for
 () end for
4.2.2. Uplink Transmission Power Control

Since all devices in share the same RB, the received SINR in (1) can be rewritten aswhere and is the minimum SINR requirement. Similarly, is a system parameter and common to all devices and RBs.

We propose an iterative update algorithm for finding the minimum transmission power satisfying the above equation. Specifically, for the th iteration, the optimal power to be used by device can be obtained by solving the following equation:where is the power settings obtained at iteration . According to (14), the value of can be easily obtained using the bisection method [20]. Additionally, if the value of is greater than , it will be set as . The update of the values of transmission power proceeds in iterations until the power convergence.

4.2.3. Utility Function Definitions

The utility function is defined as the sum of satisfaction ratio over all devices in given that a total of channels have been allocated to them. To calculate , define as the sum of satisfaction ratio over all devices in given that the first RBs of the th channel have been allocated to them. Then the value of can be obtained according towhere and the value of can be obtained according towhere and .

4.2.4. RB Allocation

This subsection presents the RB allocation algorithm. Similarly, different types of devices are not allowed to share the same frequency channel, which is the constraint which channel allocation shall satisfy.

For convenience, we define function asIn addition, we say a group is feasible in slot if the total power allocated to each device in this slot does not exceed . The procedure of the power control based RB allocation is outlined in Algorithm 5, where also denotes the number of channels which have been allocated to the th type. Specifically, after the type which is allocated to the th channel has been selected in line (), the RBs of the th channel shall be allocated according to which has been obtained in Algorithm 4, as shown in line ().

Require: .
Ensure: .
 ()    initialize , ;
 ()    for   to   do
 ()     allocate the th channel to the th type with the minimum and break the tie arbitrarily;
 ()     let ;
 ()     for   to   do
 ()      select which is feasible in slot and has the minimum ;
 ()      let for each ;
 ()      calculate for each ;
 ()     end for
 ()  calculate for each ;
 () end for

5. Location Selection Methods

The task of location selection is to search for the location . Three different location selection methods are presented. The first is K-means based [21]. This method is raw and is used as the benchmark in this work. The next two are simulated annealing (SA) based [22] and particle swarm optimization (PSO) based [23], respectively.

5.1. -Means Based Location Selection

Initially, is randomly selected from the candidate location set as the deployment locations of BSs, where and are the horizontal and vertical ordinate of the deployment location, respectively. Then, we can obtain the corresponding which describes the relationship between SG devices and BSs. Next, the BS locations are updated as follows. Assume that the locations of device are , where and are the horizontal and vertical ordinate of the location of device , respectively. The new BS locations can be calculated aswhere , and is the number of devices served by the th BS. For each , if the calculated does not belong to , it shall be set as the element in which is the closest to the calculated value.

5.2. SA Based Location Selection

The location selection is to iterate over all candidate locations to find the best location that maximizes the satisfaction ratio. Since the enumeration is practically impossible, an algorithm with controllable complexity which can output a solution within the given time limit is desirable. We consider a stochastic local search algorithm which progressively traverses from one location to its neighbor in a probabilistic manner for finding the global optimal solution. Specifically, an algorithm based on simulated annealing is proposed, as outlined in Algorithm 6.

()    initialize ;
()    initialize ;
()    initialize  ;
()    determine the values of and given  ;
()    determine the value of given  , , and ;
()    initialize    and ;
()    while    do
()     update  ;
()     update and given  ;
()  update given  , , and ;
()  if    then
()   update    and ;
()   if    then
()    update and ;
()   end if
()  else
()   update and with probability ;
()  end if
()  let ;
()  let ;
() end while
() return  .

Beginning with an initial location, the variable records the location with the highest payoff obtained so far as the algorithm proceeds. In lines () and (), the resource allocation methods in Section 4 are used to determine the values of and . At each iteration, a new location among the neighborhood of current location is chosen in line (). The new location is determined as follows. First, for the current , we can obtain and then calculate the satisfactory ratio of each . For each iteration only one BS location is changed. We choose BS with the lowest satisfactory ratio to change the location. Specifically, we select a candidate BS location from which is no more than meters away from the original BS location as the new BS location, where is a parameter. If yields a better payoff than , the search proceeds with for the next iteration. Otherwise, is still chosen with probability based on the concept of simulated annealing in line (). In line (), the temperature decreases after each iteration according to an annealing schedule , where is also a parameter. Different values of , , and can be set to control the speed of cooling.

5.3. PSO Based Location Selection

In this subsection, a particle swarm optimization based algorithm is presented to search for the location. Assume that the swarm consists of particles and the search space is dimensional. Let represent the position of the th particle, where is a two-dimensional vector representing the deployment location of the th BS. Let represent the velocity of the th particle, where is a two-dimensional vector for which and represent the horizontal and vertical velocity, respectively. Let represent the position of the best solution found by the th particle and let represent the position of the best solution found by all particles during the search. The position of each particle is updated by using , where is the position of the th particle at iteration and is the new velocity of the th particle at iteration . The velocities of the particles are updated according to , where is the position of the best solution found by the th particle at iteration , is the position of the best solution found by all particles during the search so far, and and are random values generated by the uniform distribution in the interval .

Additionally, for the PSO based algorithm, there are two types of collisions. For the first type, the particles could be attracted to regions outside the feasible search space ; for the second type, the velocity of particles could be too large. The anticollision mechanisms for preserving the feasibility of solution are as follows. For the first type of collision, if occurs, we set randomly selected location in . For the second type of collision, if it occurs, we setwhere and is the velocity limit.

The procedure for PSO based algorithm is outlined in Algorithm 7, where is the iteration limit.

()    initialize ;
()    for  particle to   do
()     initialize the velocity   in ;
()     initialize the position   in ;
()     determine the value of given  ;
()     initialize and ;
()    end for
()    calculate and determine  ;
()    while    do
()  for  particle to   do
()   update the velocity ;
()   update the position ;
()   determine the value of given ;
()   if    then
()    update ;
()    update  ;
()   end if
()  end for
()  calculate ;
()  if    then
()   update ;
()   update  ;
()  end if
()  let ;
() end while
() return  .

6. Performance Evaluation

6.1. Parameter Setting

Assume there are a total of types of SG devices. In the case of no particular description, the required uplink data rate of each type is  kbps,  kbps, and  kbps, respectively, and the number of devices of each type is 50, 50, and 50, respectively. We randomly distribute these devices in a circle region with a radius of 1200 meters. Further, we assume that contains a total of 350 candidate BS locations which are also randomly generated in . Based on the simulation settings in [24, 25], wireless communication related parameters are set as follows. The maximum transmission power is 20 dBm. The path loss formula is  dB for a distance separation of meters. The total bandwidth is 5 MHz and the bandwidth of each channel is 180 kHz. Assume that the power of background noise , where the noise power spectrum density  dBm/Hz. The minimum SINR requirement is 3 dB, which is used in (7) and (13) to determine transmit power. The SINR requirement is dB, which is used in (9) to determine interference radius. Finally, the number of slots in each frame is 20. In the case of no particular description, assume that the number of usable slots is also 20. For SA, there are three parameters , , and . For and , based on the recommendations in [20, 26, 27], we set and . For , we have run many simulation experiments to find an appropriate value of it. Simulation results show that the larger the value of is, the better the supporting ratio is. Therefore, since the value of shall be between 0 and 1, we set . For PSO, there are five parameters , , , , and . For , , , and , based on the recommendations in [27, 28], we set , , , and . For , we have run many simulation experiments to find an appropriate value of it. Simulation results show that the value of shall not be too small or too large. Specifically, if the value of is too small, the convergence rate of PSO will be very slow; if the value of is too large, PSO will oscillate and not converge. Therefore, after many simulation experiments, we have selected to achieve acceptable convergence rate. Finally, for both algorithms, the iteration limit is set to be 1000.

Combining different resource allocation and location selection algorithms, we have a total of six different schemes. We evaluate the performance of above schemes for different parameter configurations. For each parameter configuration, we run simulation experiments for 1000 times and average the results.

6.2. Simulation Results

This subsection presents the performance evaluation results of the proposed schemes under different scenarios and the effects of various system parameters are evaluated and compared.

6.2.1. Convergence

We show in Figure 2 a typical trace of the progression of benefits for guided stochastic search in all schemes, where “PC” and “Sched” represent power control and scheduling based resource allocation algorithm, respectively. We can find that the payoff of the best location selection is increased gradually and will be converged to a constant value finally. Therefore, the curves in Figure 2 show that the proposed schemes are converged to a steady state. Additionally, we can observe that the solution quality and the required number of iterations to converge are significantly different from each other. Firstly, the final values of payoff for different schemes are different. Specifically, the “PC + PSO” scheme can achieve the highest payoff (i.e., 128.5030) among all schemes. Recall that the payoff is defined as the sum of satisfaction ratio over all devices where the satisfaction ratio of a device is defined as the ratio between achieved data rate and the required data rate. For this set of simulation experiments, since there are totally 150 devices (as stated in the beginning of Section 6.1), the value of payoff will not be higher than 150. Therefore, a payoff of 128.5030 means that most data rate requirements have been satisfied. Secondly, for K-means related schemes (i.e., the “PC + K-means” and “Sched + K-means” schemes), although their payoff is not high (i.e., 104.8572 and 100.1876), the required numbers of iterations to converge (i.e., 2 and 2) are much smaller than other schemes; that is, they converge much faster than other schemes. Therefore, we can conclude that different schemes can achieve different tradeoffs between solution quality and convergence rate.

For any device , if its uplink data rate requirement is met (i.e., ), we say this device is satisfied. Further, we define the supporting ratio as the ratio between the number of devices which have been satisfied and the total number of devices. In the following simulation experiments, we will evaluate the impact of the number of channels (i.e., the total bandwidth), the number of BSs, and the number of devices on the performance (i.e., the supporting ratio) of all these six schemes. Additionally, we would like to claim that all the values plotted in Figures 3, 4, and 5 are obtained after the algorithms have converged to a steady state.

6.2.2. Impact of the Number of Channels

The number of channels is equal to , where is the total bandwidth. Figure 3 shows the supporting ratio of all proposed schemes when the total bandwidth or, equivalently, the number of channels is varied. For this set of simulation experiments, there are totally 150 devices, for which the sum of data rate requirements is Mbps. We set the number of BSs to be 10. It can be observed that when the total bandwidth (i.e., the number of channels) increases, the supporting ratio increases. Specifically, when the total bandwidth is 9 MHz (i.e., the number of channels is 50), the supporting ratio of the “PC + PSO” and “PC + SA” schemes is as high as 1 (i.e., the data rate requirements of all 150 devices have been satisfied), but the supporting ratio of the “PC + K-means” and “Sched + K-means” schemes is just 0.8713 and 0.8605, respectively (i.e., there are still and devices whose data rate requirements are not satisfied, resp.).

Finally, it can be observed that the “PC + PSO” scheme is the best among all other schemes, which will be validated again by the following simulation results. This is due to two aspects of reasons. For the first reason, SA and PSO are metaheuristics, which efficiently explore the search space to find near-optimal solutions. By searching over a large set of feasible solutions, they can find good solutions with less computational effort compared to simple heuristics (e.g., the K-means method). Therefore, SA and PSO are superior to K-means in finding good solutions. For the second reason, if two devices are close to each other, they could interfere with each other if they use the same RB. For the PC method, the transmission power of each device is controlled so that devices which are close to each other can also share the same RB; for the Sched method, only devices which are far away from each other can share the same RB. Since the PC method allows devices which are close to each other to transmit data simultaneously, it can admit more devices than the Sched method. On the other hand, for the PC method, since there exists interference among neighbor devices, each device will have to increase its transmission power to combat such interference to meet the minimum SINR requirement. This makes devices using the PC method consume more power resource than the Sched method. Therefore, the PC method can admit more devices than the Sched method via consuming more power.

6.2.3. Impact of the Number of BSs

Figure 4 shows the supporting ratio of all proposed schemes when the number of BSs is varied. We can observe that when the number of BSs increases, the supporting ratio increases, since the average distance between devices and access points is shortened. Specifically, when the number of BSs is 15, the supporting ratio of the “PC + PSO” and “PC + SA” schemes is 1 and 0.9767, respectively (i.e., there are zero and devices whose data rate requirements are not satisfied, resp.), but the supporting ratio of the “PC + K-means” and “Sched + K-means” schemes is just 0.8447 and 0.7743, respectively (i.e., there are still and devices whose data rate requirements are not satisfied, resp.). Therefore, we can conclude that the “PC + PSO” scheme is the best one and for the simulated scenario at least 15 BSs shall be deployed so that the supporting ratio of one can be achieved. For the following simulations, we will set the value of to be 15.

6.2.4. Impact of the Number of Devices

Figure 5 shows the supporting ratio of all proposed schemes when the number of devices is varied. For convenience, let denote the number of devices of the th type. Let denote the initial value of . As stated in the beginning of Section 6.1, we set , , and . We will collect the performance metrics (i.e., the supporting ratio) which is a function of (, , ). However, it is hard to visualize high-dimensional data when the dimension is greater than two. Therefore, we run the simulation for three times. For the th () run, we change the values of while keeping the values of other () fixed to be , where . Due to the limited space, we only plot the simulation results of the second run in Figure 5 where the horizontal axis represents the number of devices of the second type. We can observe that when the number of devices increases, the supporting ratio decreases, since the radio resource consumed by each type of devices increases. Specifically, when the number of devices of the second type is increased to be 100, there are totally devices, for which the sum of data rate requirements is Mbps. For this scenario, the supporting ratio of the “PC + PSO” and “PC + SA” schemes is still 0.8626 and 0.8420, respectively (i.e., there are and devices whose data rate requirements can be satisfied, resp.), but the supporting ratio of the “PC + K-means” and “Sched + K-means” schemes is only 0.6600 and 0.6015, respectively (i.e., there are only and devices whose data rate requirements have been satisfied, resp.). Comparing these curves, we can also conclude that the “PC + PSO” scheme is more preferable than other schemes.

7. Conclusions

In this paper, we study the joint BS location selection, transmission power control, and wireless channel allocation problem in OFDMA based private wireless access networks for smart grid. We transform the joint problem into channel allocation and site selection subproblems and solve these two subproblems iteratively. According to the simulation results, the combination of power control based resource allocation algorithm and PSO based location selection algorithm is recommended to solve the joint problem.

List of Symbols

:The area in which a set of SG devices is scattered
:The set of devices
:The minimum uplink data rate requirement of device
: The uplink transmission power of device
:The maximum uplink transmission power
:The number of types of devices
:The set of SG devices of the th type
:The number of BSs
: The deployment location of the th BS
:The set of candidate BS locations
:The set of devices served by the th BS
:The total bandwidth in Hertz
:The number of channels into which the total bandwidth is divided
:The channel bandwidth in Hertz
: The number of slots in a frame
:The number of slots which can be used for uplink communications in each frame
:The binary variable indicating whether the th RB of the th channel is allocated to device
:The received SINR experienced by device on the RB at BS
:The path loss from device to BS
:The power of background noise
:The power of interference
:The set of devices which share the same RB with device
:The path loss for a distance separation of meters
:The uplink data rate achieved by device on RB
:The total data rate achieved by device
:The set of all
:The set of all
:The set of all
:The set of all
:The set of all
:The set of all
:The satisfaction ratio of device
:The sum of satisfaction ratio over all devices
:The minimum SINR requirement
:The interference graph for the th type
: The vertex set in
:The edge set in
:The edge which represents devices and cannot reuse the same RB
:The interference radius of device
:The SINR requirement to calculate
:The distance between device and BS
:The sum of satisfaction ratio over all devices of the th type given that a total of channels have been allocated to them
: The sum of satisfaction ratio over all devices of the th type given that the th channel has been allocated to them
:The sum of satisfaction ratio over all devices of the th type given that the th RB of the th channel has been allocated to them
:The set of devices of the th type that share the th RB of the th channel
:The number of channels which have been allocated to the th type
:The set of type- devices which are served by BS
:The set of devices of the th type which can share the same RB
:The number of groups
:The set of all
:The power setting obtained at iteration
:The sum of satisfaction ratio over all devices in given that a total of channels have been allocated to them
: The sum of satisfaction ratio over all devices in given that the first RBs of the th channel have been allocated to them
:The sum of over all groups
:The locations of device .

Competing Interests

The authors declare that there is no conflict of interests regarding the publication of this paper.

Acknowledgments

This work was supported by the National Natural Science Foundation of China (no. 61571111).