Interference mitigation in device-to-device communications / edited by Masood Ur Rehman, Ghazanfar Ali Safdar, Mohammad Asad Rehman Chaudhry. - 1 online resource. -

Includes index.

Table of Contents

Preface

Acknowledgments

About the Editors

List of Contributors

Chapter 1: Introduction to D2D Communications

1.1 Evolution of D2D Communication

1.2 D2D Communication in Cellular Spectrum

1.3 Classification of D2D Communication

1.3.1 In-band D2D Communication

1.3.2 Out-band D2D Communication

1.4 Challenges in D2D Implementation

1.5 Book Organization

1.6 Summary

Chapter 2: Interference Mitigation in D2D Communication Underlaying LTE-A Network

2.1 Applicability of D2D Communication

2.2 Interference – The Compelling Issue in D2D

2.3 Types of D2D Communication

2.3.1 In-Band D2D Communication

2.3.1.1Underlay In-Band

2.3.1.2 Overlay In-Band

2.3.2 Out-Band D2D Communication

2.3.2.1 Network-Assisted D2D Communication

2.3.2.2Autonomous D2D Communication

2.4 D2D Communication Underlaying Cellular Network – The Challenges

2.4.1 Device Discovery

2.4.2 Mode Selection

2.4.3 Radio Resource Management

2.4.4 Modification to LTE-A Architecture

2.4.5 Security in D2D

2.4.6 Mobility Management

2.5 Interference Management Techniques in D2D

2.5.1 Power Control Techniques

2.5.2 Radio Resource Allocation Techniques

2.5.3 Joint Power Control and Radio Resource Allocation Techniques

2.5.4 Spectrum Splitting Techniques

2.5.5 Other Interference Mitigation Techniques

2.5.6 Multiple-Input Multiple-Output Techniques

2.5.7 Comparative Analysis of D2D Interference Mitigation Techniques

2.6 Summary

Chapter 3: Rethinking D2D Interference: Beyond the Past

3.1 Interference Manipulation

3.1.1 Example

3.2 Formulation of Interference Manipulation Problem

3.3 Matrix Rank Minimization: A Way to Manipulate Interference

3.3.1 Reduction of Interference Manipulation to Matrix Rank Minimization

3.3.2 Minimum Rank Matrix to Transmission Scheme

3.3.3 Does the Field Size Matter?

3.4 Interference Manipulation: A Boolean Satisfiability Approach

3.5 Interference Manipulation: Index Coding Perspective

3.5.1 Interference Manipulation is NP-hard

3.5.2: An Efficient Solution for Interference Manipulation

3.4 Summary

Chapter 4: User Pairing Scheme for Efficient D2D Content Delivery in Cellular Networks

4.1 D2D Content Delivery

4.2 D2D Content Delivery Architecture

4.2.1 Network Model

4.2.2 Channel Model

4.2.3 Content Delivery Model

4.3 D2D Content Delivery Strategies

4.3.1 Pairing Range

4.3.2 Energy Efficiency for Multicast and Unicast

4.3.3 Caching and Delivery

4.4 D2D Delivery Mode Selection

4.5 Performance Evaluation

4.6 Summary

Chapter 5: Resource Allocation for NOMA-based D2D Systems Coexisting with Cellular Networks

5.1 NOMA-based D2D Systems

5.2 System Model and Performance Analysis

5.2.1 System Model and Assumptions

5.2.2 Capacity Analysis of D2D and Cellular Networks

5.2.2.1 Uplink Cellular Networks Transmission

5.2.2.2 Downlink NOMA-D2D Transmission

5.3 Joint Subchannel Assignment and Power Control for D2D Communication

5.3.1 Subchannel Assignment Scheme

5.3.2 Power Control Scheme

5.4 Optimization of D2D Device Pairing

5.5 Results and Discussion

5.5.1 Channel Model

5.5.2 Performance Evaluation

5.6 Summary

Chapter 6: Distributed Multi-Agent RL-Based Autonomous Spectrum Allocation in D2D Enabled Multi-Tier HetNets

6.1 D2D Resource Allocation Methods

6.2 Reinforcement Q-Learning

6.3 System Model

6.4 Resource Allocation in Multi-tier D2D Communication

6.4.1 Autonomous Spectrum Allocation Scheme

6.5 Performance Evaluation

6.5.1 Performance of D2D Users

6.5.2 Performance of Cellular Users

6.5.3 Coverage Analysis

6.5.4 Computational Time Analysis

6.5.5 Memory Requirements

6.5.6 Effect of Base Stations Density

6.5.7 Effect of Network Tiers

6.6 Summary

Chapter 7: Adaptive Interference Aware Device-to-Device Enabled Unmanned Aerial Vehicle Communications

7.1 Key Elements in D2D Communication

7.1.1 D2D Network Discovery

7.1.2 SWIPT for D2D

7.1.3 Resource Allocation

7.1.4 3GPP Standardization

7.2 Unmanned Aerial Vehicles in D2D

7.2.1 Key Challenges in UAV-based D2D

7.2.2 Transmission over PC5 Interface for UAV-based D2D Discovery

7.2.3 Interference in UAV-based D2D

7.3 Summary

Chapter 8: Emergency Device-to-Device Communication: Applicability, Case Studies and Interference Mitigation

8.1 Emergency D2D Communication

8.2 Approaches for Efficient Emergency D2D Communication

8.3 Emergency D2D Communication: Case Studies

8.4 Interference Mitigation in Emergency D2D Communication

8.4.1 Radiated Power Management

8.4.2 Frequency Allocation

8.4.2.1 Hybrid Schemes for Power Control and Intelligent Frequency Allocation

8.4.3 Time Division Multiplexing (TDM)

8.4.4 Adjacent Channel Interference Cancellation in DSRC

8.4.5 Use of MIMO Antennas

8.4.5.1 Beam Steering in 3GPP 5G NR Supported Vehicular Systems

8.5 Summary

Chapter 9: Disaster Management Using D2D Communication With Power Transfer and Clustering Techniques

9.1 D2D Communication in Disaster Management

9.2 D2D Communication in Disaster Management: Key Considerations

9.3 D2D Disaster Management System Architecture

9.3.1 Time Switching Based Protocol

9.3.2 Network Configuration

9.3.3 Outage Probability for Mode Selection

9.4 Power Transfer Using Relaying and Clustering in D2D Disaster Management

9.4.1 System Model

9.4.2 Performance Evaluation

9.5 Results and Discussion

9.6 Summary

Chapter 10: Road Ahead for D2D Communications

10.1 Future Prospects and Challenges

10.1.1 Spectrum Sharing and Coexistence

10.1.2 Standardization

10.1.3 Secure Communication

10.1.4 Energy Consumption and Energy Harvesting

10.1.5 Interreference Management

10.1.6 Resource Allocation

10.1.7 Device Discovery

10.1.8 Handover

10.1.9 D2D in Vehicular Communications

10.1.10 D2D in Disaster Management

10.1.11 D2D at Millimeter Wave Frequencies

10.1.12 D2D and Social Networks

10.1.13 D2D and Visible Light Communication

Index

"Device-to-Device Communications (D2D) is one of the key enabling technologies for the IoT and 5G which are the next technological marvels for the wireless industry. The performance of these wireless systems is degraded due to the interfering signals from proximity of legacy systems operating in similar frequency bands. Restriction of device form-factor and co-location of a number of electronic components in a small volume further complicates the design and efficiency challenge. These factors should be explored in order to get an efficient D2D solution working at a minimal interference level. This book fills the gap in addressing these important issues and will educate the reader on the most important aspects of the D2D communication and interference management techniques and lay the foundations for future advancements."--


About the Author

Masood Ur Rehman, PhD, is a Lecturer in Electronic and Nanoscale Engineering at the University of Glasgow, UK. He is a Fellow of the Higher Education Academy UK, Senior Member of the IEEE, and Associate Editor of the IEEE Access, IEEE Antennas & Wireless Propagation Letters, Microwave & Optical Technology Letters and IET Electronics Letters.

Ghazanfar Ali Safdar, PhD, is a Senior Lecturer in Computer Networking at the University of Bedfordshire, UK. He is Associate Fellow of Higher Education Academy, UK. He was an R&D Engineer with Carrier Telephone Industries and Schlumberger, France. Dr. Safdar is Editor-in-Chief of EAI Endorsed Transactions on Energy Web and Information Technology, Area Editor of Springer Wireless Networks and Topic Editor of MDPI JSAN.

Mohammad Asad Rehman Chaudhry, PhD, MBA,is a thought-leader, innovator and entrepreneur leading multi-disciplinary projects in Digital Disruption and Future-Tech. He has developed strategy recommendations for Fortune 500. Dr. Chaudhry also leads IEEE Standards in Software-Defined and Virtualized Ecosystems.

9781119788812 9781119788829 111978882X


Wireless communication systems.
Electromagnetic interference.


Electronic books.

TK5103.2 / .I5179 2022eb

621.384