scispace - formally typeset
Journal ArticleDOI

Resource allocation for device-to-device communications underlaying LTE-advanced networks

TLDR
A novel resource allocation scheme based on a column generation method for D2D communications in LTE-Advanced networks is introduced to maximize the spectrum utilization by finding the minimum transmission length in terms of time slots while protecting the cellular users from harmful interference and guaranteeing the QoS of D1D links.
Abstract
The Long Term Evolution-Advanced (LTEAdvanced) networks are being developed to provide mobile broadband services for the fourth generation (4G) cellular wireless systems. Deviceto- device (D2D) communications is a promising technique to provide wireless peer-to-peer services and enhance spectrum utilization in the LTE-Advanced networks. In D2D communications, the user equipments (UEs) are allowed to directly communicate between each other by reusing the cellular resources rather than using uplink and downlink resources in the cellular mode when communicating via the base station. However, enabling D2D communications in a cellular network poses two major challenges. First, the interference caused to the cellular users by D2D devices could critically affect the performances of the cellular devices. Second, the minimum quality-of-service (QoS) requirements of D2D communications need to be guaranteed. In this article, we introduce a novel resource allocation scheme (i.e. joint resource block scheduling and power control) for D2D communications in LTE-Advanced networks to maximize the spectrum utilization while addressing the above challenges. First, an overview of LTE-Advanced networks, and architecture and signaling support for provisioning of D2D communications in these networks are described. Furthermore, research issues and the current state-of-the-art of D2D communications are discussed. Then, a resource allocation scheme based on a column generation method is proposed for D2D communications. The objective is to maximize the spectrum utilization by finding the minimum transmission length in terms of time slots for D2D links while protecting the cellular users from harmful interference and guaranteeing the QoS of D2D links. The performance of this scheme is evaluated through simulations.

read more

Citations
More filters
Proceedings ArticleDOI

Game theoretic resource allocation for multicell D2D communications with incomplete information

TL;DR: This paper fully considers this scenario, i.e., players have incomplete information of others, and investigates the resource allocation problem for multicell D2D communications where a D1D link utilizes common resources of multiple cells, and proposes a game-theoretic approach under the incomplete information condition.
Journal ArticleDOI

Interference-aware multi-hop path selection for device-to-device communications in a cellular interference environment

TL;DR: It is shown that by understanding the location of the user, an interference-aware routing algorithm can be devised and an adaptive Interference-Aware-Routing (IAR) algorithm, that on average achieves a 30% increase in hop distance, but can improve the overall network capacity by 50% whilst only incurring a minor 2% degradation to the CC capacity.
Proceedings ArticleDOI

Floating band D2D: Exploring and exploiting the potentials of adaptive D2D-enabled networks

TL;DR: This work model and formulate a general and adaptive multi-band mode selection problem, namely Floating Band D2D, which dramatically increases network utility and achieves near complete fairness.
Journal ArticleDOI

On improving SINR in LTE HetNets with D2D relays

TL;DR: The proposed two-step D2D heuristic algorithm maintains almost the same SINR as that of Full Power Femto scheme and improves SinR of IUEs by 40%.
Journal ArticleDOI

Forewarned is forearmed: Assessment of IoT information security risks using analytic hierarchy process

TL;DR: In this article, the authors proposed an approach to prioritizing and ranking IoT risks using the analytical hierarchy process (AHP), a multi-criteria decision-making technique, and a well-defined IoT risk taxonomy is defined comprising of 25 risks across six layers of the IoT model.
References
More filters
Book

Introduction to linear optimization

TL;DR: p. 27, l.
Journal ArticleDOI

Device-to-device communication as an underlay to LTE-advanced networks

TL;DR: Device-to-device (D2D) communication underlaying a 3GPP LTE-Advanced cellular network is studied as an enabler of local services with limited interference impact on the primary cellular network.
Journal ArticleDOI

Branch-and-Bound Methods: A Survey

TL;DR: The essential features of the branch-and-bound approach to constrained optimization are described, and several specific applications are reviewed, including integer linear programming Land-Doig and Balas methods, nonlinear programming minimization of nonconvex objective functions, and the quadratic assignment problem Gilmore and Lawler methods.
Journal ArticleDOI

Resource Sharing Optimization for Device-to-Device Communication Underlaying Cellular Networks

TL;DR: The results show that by proper resource management, D2D communication can effectively improve the total throughput without generating harmful interference to cellular networks.
Related Papers (5)