Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

access icon free Interference-aware multi-hop path selection for device-to-device communications in a cellular interference environment

Device-to-device (D2D) communications are widely seen as an efficient network capacity scaling technology. The co-existence of D2D with conventional cellular (CC) transmissions causes unwanted interference. Existing techniques have focused on improving the throughput of D2D communications by optimising the radio-resource management and power allocation. However, very little is understood about the impact of the route selection of the users and how optimal routing can reduce interference and improve the overall network capacity. In fact, traditional wisdom indicates that minimising the number of hops or the total path distance is preferable. Yet, when interference is considered, the authors show that this is not the case. In this study, they show that by understanding the location of the user an interference-aware-routing (IAR) algorithm can be devised. They propose an adaptive IAR algorithm that on average achieves a 30% increase in hop distance, but can improve the overall network capacity by 50% whilst only incurring a minor 2% degradation to the CC capacity. The analysis framework and the results open up new avenues of research in location-dependent optimisation in wireless systems, which is particularly important for increasingly dense and semantic-aware deployments.

References

    1. 1)
      • 13. Hyunkee Min, S.P., Lee, J., Hong, D.: ‘Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks’, IEEE Trans. Wirel. Commun., 2011, 10, (12), pp. 33954000.
    2. 2)
      • 5. Wang, L., Wu, H., Ding, Y., et al: ‘Hypergraph based wireless distributed storage optimization for cellular D2D underlays’, IEEE J. Sel. Areas Commun. (JSAC), 2016, 34, (10), pp. 26502666.
    3. 3)
      • 1. Lin, X., Andrews, J., Ghosh, A., et al: ‘An overview of 3GPP device-to-device proximity services’, IEEE Commun. Mag., 2014, 52, (4), pp. 4048.
    4. 4)
      • 16. Zhu, L., Li, C., Wang, Y., et al: ‘On stochastic analysis of greedy routing in vehicular networks’, IEEE Trans. Intell. Transp. Syst., 2015, 16, (6), pp. 33533366.
    5. 5)
      • 10. Chang, Z., Ristaniemi, T.: ‘Efficient use of multicast and unicast in collaborative OFDMA mobile cluster’. IEEE Vehicular Technology Conf. (VTC), Dresden, June 2013, pp. 15.
    6. 6)
      • 22. Zou, K.J., Wang, M., Yang, K.W., et al: ‘Proximity discovery for device-to-device communications over a cellular network’, IEEE Commun. Mag., 2014, 52, (6), pp. 98107.
    7. 7)
      • 11. Guo, W., Wassell, I.J.: ‘Capacity-outage-tradeoff for cooperative networks’, IEEE J. Sel. Areas Commun. (JSAC), 2012, 30, (9), pp. 16411648.
    8. 8)
      • 23. De, S.: ‘On hop count and Euclidean distance in greedy forwarding in wireless ad hoc networks’, IEEE Commun. Lett., 2005, 9, (11), pp. 10001002.
    9. 9)
      • 9. Duan, Y., Li, C., Guo, C., et al: ‘Finding the shortest path in huge data traffic networks: a hybrid speed model’. 2015 IEEE Int. Conf. on Communications (ICC), 2015, pp. 69066911.
    10. 10)
      • 4. Simsek, M., Merwaday, A., Correal, N., et al: ‘Device-to-device discovery based on 3GPP system level simulations’. IEEE Global Communications Conf. (Globecom), Atlanta, June 2013, pp. 555560.
    11. 11)
      • 17. Xu, Q., Ren, P., Song, H., et al: ‘Security enhancement for IOT communications exposed to eavesdroppers with uncertain locations’, IEEE Access, 2016, 4, pp. 28402853.
    12. 12)
      • 12. Sachs, J., Maric, I., Goldsmith, A.: ‘Cognitive cellular systems within the TV spectrum’. IEEE New Frontiers in Dynamic Spectrum (DYSPAN), Singapore, 2010, pp. 112.
    13. 13)
      • 24. Andreev, S., Pyattaev, A., Johnsson, K., et al: ‘Cellular traffic offloading onto network-assisted device-to-device connections’, IEEE Commun. Mag., 2014, 52, (4), pp. 2031.
    14. 14)
      • 6. Bai, B., Wang, L., Han, Z., et al: ‘Caching based socially-aware D2D communications in wireless content delivery networks: a hypergraph framework’, IEEE Wirel. Commun., 2016, 23, (4), pp. 7481.
    15. 15)
      • 3. Phunchongharn, P., Hossain, E., Kim, D.I.: ‘Resource allocation for device-to-device communications underlaying LTE-advanced networks’, IEEE Wirel. Commun., 2013, 20, (4), pp. 91100.
    16. 16)
      • 8. Bhorkar, A., Naghshvar, M., Javidi, T., et al: ‘Adaptive opportunistic routing for wireless ad hoc networks’, IEEE/ACM Trans. Netw., 2012, 20, (1), pp. 243256.
    17. 17)
      • 2. Feng, D., Lu, L., Yi, Y., et al: ‘Device-to-device communications underlaying cellular networks’, IEEE Trans. Commun., 2013, 61, (8), pp. 35413551.
    18. 18)
      • 21. 3GPP: ‘Further advancements for E-UTRA physical layer aspects (rel.9)’. Technical Report, 3GPP TR36.814v9, 2010.
    19. 19)
      • 18. Wu, Y., Guo, W., Yuan, H., et al: ‘Device-to-device (D2D) meets LTE-unlicensed’, IEEE Commun. Mag., 2016, 54, (5), pp. 154159.
    20. 20)
      • 20. Wang, S., Guo, W., McDonnell, M.D.: ‘Downlink interference estimation without feedback for heterogeneous network interference avoidance’. Int. Conf. on Telecommunications (ICT), Lisbon, May 2014, pp. 8287.
    21. 21)
      • 14. Yuan, H., Guo, W., Wang, S.: ‘Emergency route selection for D2D cellular communications during an urban terrorist attack’. IEEE Int. Conf. on Communications Workshops (ICC), Sydney, June 2014, pp. 237242.
    22. 22)
      • 15. Du, Q., Song, H., Xu, Q., et al: ‘Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous cps’, Pers. Ubiquit. Comput., 2015, 19, (7), pp. 10331043.
    23. 23)
      • 7. Wang, L., Tang, H., Cierny, M.: ‘Device-to-device link admission policy based on social interaction information’, IEEE Trans. Veh. Technol., 2015, 64, (9), pp. 41804186.
    24. 24)
      • 19. Haenggi, M.: ‘Stochastic geometry for wireless networks’ (Cambridge University Press, England, UK, 2012).
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-com.2016.0640
Loading

Related content

content/journals/10.1049/iet-com.2016.0640
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address