ebook img

Interference Mitigation in Device-to-Device Communications PDF

243 Pages·2022·8.188 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Interference Mitigation in Device-to-Device Communications

(cid:2) InterferenceMitigationinDevice-to-DeviceCommunications (cid:2) (cid:2) (cid:2) (cid:2) (cid:2) (cid:2) (cid:2) (cid:2) Interference Mitigation in Device-to-Device Communications Edited by Masood Ur Rehman JamesWattSchoolofEngineering,UniversityofGlasgow,UK Ghazanfar Ali Safdar SchoolofComputerScienceandTechnology,UniversityofBedfordshire,UK (cid:2) (cid:2) Mohammad Asad Rehman Chaudhry Soptimizer,Toronto,Canada (cid:2) (cid:2) Thiseditionfirstpublished2022 ©2022JohnWiley&SonsLtd Allrightsreserved.Nopartofthispublicationmaybereproduced,storedinaretrievalsystem,or transmitted,inanyformorbyanymeans,electronic,mechanical,photocopying,recordingor otherwise,exceptaspermittedbylaw.Adviceonhowtoobtainpermissiontoreusematerialfrom thistitleisavailableathttp://www.wiley.com/go/permissions. TherightofMasoodUrRehman,GhazanfarAliSafdar,andMohammadAsadRehmanChaudhry tobeidentifiedastheauthorsoftheeditorialmaterialinthisworkhasbeenassertedinaccordance withlaw. RegisteredOffices JohnWiley&Sons,Inc.,111RiverStreet,Hoboken,NJ07030,USA JohnWiley&SonsLtd,TheAtrium,SouthernGate,Chichester,WestSussex,PO198SQ,UK EditorialOffice TheAtrium,SouthernGate,Chichester,WestSussex,PO198SQ,UK Fordetailsofourglobaleditorialoffices,customerservices,andmoreinformationaboutWiley productsvisitusatwww.wiley.com. Wileyalsopublishesitsbooksinavarietyofelectronicformatsandbyprint-on-demand.Some contentthatappearsinstandardprintversionsofthisbookmaynotbeavailableinotherformats. LimitofLiability/DisclaimerofWarranty Whilethepublisherandauthorshaveusedtheirbesteffortsinpreparingthiswork,theymakeno representationsorwarrantieswithrespecttotheaccuracyorcompletenessofthecontentsofthis workandspecificallydisclaimallwarranties,includingwithoutlimitationanyimpliedwarranties ofmerchantabilityorfitnessforaparticularpurpose.Nowarrantymaybecreatedorextendedby salesrepresentatives,writtensalesmaterialsorpromotionalstatementsforthiswork.Thefactthat anorganization,website,orproductisreferredtointhisworkasacitationand/orpotentialsource offurtherinformationdoesnotmeanthatthepublisherandauthorsendorsetheinformationor (cid:2) (cid:2) servicestheorganization,website,orproductmayprovideorrecommendationsitmaymake.This workissoldwiththeunderstandingthatthepublisherisnotengagedinrenderingprofessional services.Theadviceandstrategiescontainedhereinmaynotbesuitableforyoursituation.You shouldconsultwithaspecialistwhereappropriate.Further,readersshouldbeawarethatwebsites listedinthisworkmayhavechangedordisappearedbetweenwhenthisworkwaswrittenand whenitisread.Neitherthepublishernorauthorsshallbeliableforanylossofprofitoranyother commercialdamages,includingbutnotlimitedtospecial,incidental,consequential,orother damages. LibraryofCongressCataloging-in-PublicationData Names:UrRehman,Masood,editor.|Safdar,GhazanfarAli,editor.| Chaudhry,MohammadAsadRehman,editor. Title:Interferencemitigationindevice-to-devicecommunications/edited byMasoodUrRehman,GhazanfarAliSafdar,MohammadAsadRehman Chaudhry. Description:Hoboken,NJ:Wiley,2022.|Includesindex. Identifiers:LCCN2021046319(print)|LCCN2021046320(ebook)|ISBN 9781119788799(cloth)|ISBN9781119788805(adobepdf)|ISBN 9781119788812(epub) Subjects:LCSH:Wirelesscommunicationsystems.|Electromagnetic interference. Classification:LCCTK5103.2.I51792022(print)|LCCTK5103.2(ebook)| DDC621.384–dc23 LCrecordavailableathttps://lccn.loc.gov/2021046319 LCebookrecordavailableathttps://lccn.loc.gov/2021046320 CoverDesign:Wiley CoverImage:©metamorworks/Shutterstock Setin9.5/12.5ptSTIXTwoTextbyStraive,Chennai,India 10 9 8 7 6 5 4 3 2 1 (cid:2) (cid:2) DedicatedtoALLAH,theLordandtheSustainerofalltherealms. AsadlowershiswingsofhumilitytoMumandAbbu. MohammadAsadRehmanChaudhry MasoodUrRehman GhazanfarAliSafdar Tomybiggestinspiration,myparents,KhalilUrRehmanandIlfazBegum mysupportsystem,siblings;Habib,Waheed,Taheraandwife;Faiza andappleofmyeyes,myson,Musaab. MasoodUrRehman Tomylateparents,SafdarHussainandSadiqSultana andmytwolittleangels,TahaandTaqiandmywife,Misbah. GhazanfarAliSafdar (cid:2) (cid:2) (cid:2) (cid:2) (cid:2) (cid:2) (cid:2) (cid:2) vii Contents Preface xiii Acknowledgments xv AbouttheEditors xvii ListofContributors xix 1 IntroductiontoD2DCommunications 1 GhazanfarAliSafdar,MasoodUrRehman,andMohammadAsadRehman Chaudhry 1.1 D2DCommunication 1 (cid:2) 1.2 EvolutionofD2DCommunication 3 (cid:2) 1.3 D2DCommunicationinCellularSpectrum 6 1.4 ClassificationofD2DCommunication 9 1.5 ChallengesinD2DImplementation 10 1.6 Summary 11 References 11 2 InterferenceMitigationinD2DCommunicationUnderlaying LTE-ANetwork 13 GhazanfarAliSafdar,MasoodUrRehman,MujahidMuhammad,and MuhammadA.Imran 2.1 ApplicabilityofD2DCommunication 15 2.2 Interference–TheCompellingIssueinD2D 17 2.3 TypesofD2DCommunication 17 2.3.1 In-BandD2DCommunication 18 2.3.1.1 UnderlayIn-Band 18 2.3.1.2 OverlayIn-Band 19 2.3.2 Out-BandD2DCommunication 19 2.3.2.1 Network-AssistedD2DCommunication 21 2.3.2.2 AutonomousD2DCommunication 22 2.4 D2DCommunicationUnderlayingCellularNetwork–The Challenges 23 2.4.1 DeviceDiscovery 24 2.4.2 ModeSelection 25 2.4.3 RadioResourceManagement 25 (cid:2) (cid:2) viii Contents 2.4.4 ModificationtoLTE-AArchitecture 27 2.4.5 SecurityinD2D 27 2.4.6 MobilityManagement 28 2.5 InterferenceinD2D 28 2.5.1 PowerControlTechniques 31 2.5.2 RadioResourceAllocationTechniques 32 2.5.3 JointPowerControlandRadioResourceAllocationTechniques 33 2.5.4 SpectrumSplittingTechniques 34 2.5.5 OtherInterferenceMitigationTechniques 34 2.5.6 Multiple-InputMultiple-OutputTechniques 35 2.5.7 ComparativeAnalysisofD2DInterferenceMitigationTechniques 39 2.6 Summary 42 References 42 3 RethinkingD2DInterference:BeyondthePast 49 MohammadAsadRehmanChaudhryandZakiaAsad 3.1 InterferenceManipulation 49 3.1.1 Example 50 3.2 FormulationofInterferenceManipulationProblem 52 3.3 MatrixRankMinimization:AWaytoManipulateInterference 53 3.3.1 ReductionofInterferenceManipulationtoMatrixRank (cid:2) (cid:2) Minimization 53 3.3.2 MinimumRankMatrixtoTransmissionScheme 54 3.3.3 DoestheFieldSizeMatter? 55 3.4 InterferenceManipulation:ABooleanSatisfiabilityApproach 55 3.5 InterferenceManipulation:IndexCodingPerspective 56 3.5.1 InterferenceManipulationIsNP-hard 57 3.5.2 AnEfficientSolutionforInterferenceManipulation 58 3.6 Summary 60 References 60 4 UserPairingSchemeforEfficientD2DContentDeliveryin CellularNetworks 63 YanliXu 4.1 D2DContentDelivery 63 4.2 D2DContentDeliveryArchitecture 65 4.2.1 NetworkModel 65 4.2.2 ChannelModel 66 4.2.3 ContentDeliveryModel 66 4.3 D2DContentDeliveryStrategies 67 4.3.1 PairingRange 67 4.3.2 EnergyEfficiencyforMulticastandUnicast 72 4.3.3 CachingandDelivery 73 (cid:2)

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.