3 research outputs found

    Energy-Efficient Multicast Transmission for Underlay Device-to-Device Communications: A Social-Aware Perspective

    Get PDF
    In this paper, by utilizing the social relationships among mobile users, we present a framework of energy-efficient cluster formation and resource allocation for multicast D2D transmission. In particular, we first deal with D2D multicast cluster/group formation strategy from both physical distance and social trust level. Then we aim to maximize the overall energy-efficiency of D2D multicast groups through resource allocation and power control scheme, which considers the quality-of-service (QoS) requirements of both cellular user equipment and D2D groups. A heuristic algorithm is proposed to solve above energy-efficiency problem with less complexity. After that, considering the limited battery capacity of mobile users, we propose an energy and social aware cluster head update algorithm, which incorporates both the energy constraint and social centrality measurement. Numerical results indicate that the proposed social-tie based D2D multicast group formation and update algorithm form a multicast group in an energy efficient way. Moreover, the proposed resource and power allocation scheme achieves better energy efficiency in terms of throughput per energy consumption. These results show that, by exploiting social domain information, underlay D2D multicast transmission has high practical potential in saving the source on wireless links and in the backhaul

    Device-to-device communication in cellular networks : multi-hop path selection and performance.

    Get PDF
    Over the past decade, the proliferation of internet equipment and an increasing number of people moving into cities have significantly influenced mobile data demand density and intensity. To accommodate the increasing demands, the fifth generation (5G) wireless systems standards emerged in 2014. Device-to-device communications (D2D) is one of the three primary technologies to address the key performance indicators of the 5G network. D2D communications enable devices to communicate data information directly with each other without access to a fixed wireless infrastructure. The potential advantages of D2D communications include throughput enhancement, device energy saving and coverage expansion. The economic attraction to mobile operators is that significant capacity and coverage gains can be achieved without having to invest in network-side hardware upgrades or new cell deployments. However, there are technical challenges related to D2D and conventional cellular communication (CC) in co-existence, especially their mutual interference due to spectrum sharing. A novel interference-aware-routing for multi-hop D2D is introduced for reducing the mutual interference. The first verification scenario of interference-aware-routing is that in a real urban environment. D2D is used for relaying data across the urban terrain, in the presence of CC communications. Different wireless routing algorithms are considered, namely: shortest-path-routing, interference-aware-routing, and broadcast-routing. In general, the interference-aware-routing achieves a better performance of reliability and there is a fundamental trade-off between D2D and CC outage performances, due to their mutual interference relationship. Then an analytical stochastic geometry framework is developed to compare the performance of shortest-path-routing and interference-aware-routing. Based on the results, the spatial operational envelopes for different D2D routing algorithms and CC transmissions based on the user equipment (UEs) physical locations are defined. There is a forbidden area of D2D because of the interference from the base stations (BSs), so the collision probability of the D2D multi-hop path hitting the defined D2D forbidden area is analysed. Depend on the result of the collision probability, a dynamic switching strategy between D2D and CC communications in order to minimise mutual interference is proposed. A blind gradient-based transmission switching strategy is developed to avoid collision within the collision area and only requires knowledge of the distances to the serving base station of the current user and the final destination user. In the final part of my research, the concept of LTE-U (Long term evolution for Unlicensed Spectrum), which suggests that LTE can operate in the unlicensed spectrum with significant modifications to its transmission protocols, is investigated. How the envisaged D2D networks can efficiently scale their capacity by utilising the unlicensed spectrum with appropriately designed LTE-Unlicensed protocols is examined

    Capacity Approaching Coding Strategies for Machine-to-Machine Communication in IoT Networks

    Get PDF
    Radio access technologies for mobile communications are characterized by multiple access (MA) strategies. Orthogonal MA techniques were a reasonable choice for achieving good performance with single user detection. With the tremendous growth in the number of mobile users and the new internet of things (IoT) shifting paradigm, it is expected that the monthly mobile data traffic worldwide will exceed 24.3 exabytes by 2019, over 100 billion IoT connections by 2025, and the financial impact of IoT on the global economy varies in the range of 3.9 to 11.1 trillion dollars by 2025. In light of the envisaged exponential growth and new trends, one promising solution to further enhance data rates without increasing the bandwidth is by increasing the spectral efficiency of the channel. Non-orthogonal MA techniques are potential candidates for future wireless communications. The two corner points on the boundary region of the MA channel are known to be achievable by single user decoding followed by successive decoding (SD). Other points can also be achieved using time sharing or rate splitting. On the other hand, machine-to-machine (M2M) communication which is an enabling technology for the IoT, enables massive multipurpose networked devices to exchange information among themselves with minor or no human intervention. This thesis consists of three main parts. In the first part, we propose new practical encoding and joint belief propagation (BP) decoding techniques for 2-user MA erasure channel (MAEC) that achieve any rate pair close to the boundary of the capacity region without using time sharing nor rate splitting. While at the encoders, the corresponding parity check matrices are randomly built from a half-rate LDPC matrix, the joint BP decoder employs the associated Tanner graphs of the parity check matrices to iteratively recover the erasures in the received combined codewords. Specifically, the joint decoder performs two steps in each decoding iteration: 1) simultaneously and independently runs the BP decoding process at each constituent sub-graph to recover some of the common erasures, 2) update the other sub-graph with newly recovered erasures and vice versa. When the number of erasures in the received combined codewords is less than or equal to the number of parity check constraints, the decoder may successfully decode both codewords, otherwise the decoder declares decoding failure. Furthermore, we calculate the probability of decoding failure and the outage capacity. Additionally, we show how the erasure probability evolves with the number of decoding iterations and the maximum tolerable loss. Simulations show that any rate pair close to the capacity boundary is achievable without using time sharing. In the second part, we propose a new cooperative joint network and rateless coding strategy for machine-type communication (MTC) devices in the multicast settings where three or more MTC devices dynamically form a cluster to disseminate messages between themselves. Specifically, in the basic cluster, three MTC devices transmit their respective messages simultaneously to the relay in the first phase. The relay broadcasts back the combined messages to all MTC devices within the basic cluster in the second phase. Given the fact that each MTC device can remove its own message, the received signal in the second phase is reduced to the combined messages coming from the other two MTC devices. Hence, this results in exploiting the interference caused by one message on the other and therefore improving the bandwidth efficiency. Furthermore, each group of three MTC devices in vicinity can form a basic cluster for exchanging messages, and the basic scheme extends to N MTC devices. Furthermore, we propose an efficient algorithm to disseminate messages among a large number of MTC devices. Moreover, we implement the proposed scheme employing practical Raptor codes with the use of two relaying schemes, namely amplify and forward (AF) and de-noise and forward (DNF). We show that with very little processing at the relay using DNF relaying scheme, performance can be further enhanced. We also show that the proposed scheme achieves a near optimal sum rate performance. In the third part, we present a comparative study of joint channel estimation and decoding of factor graph-based codes over flat fading channels and propose a simple channel approximation scheme that performs close to the optimal technique. Specifically, when channel state information (CSI) is not available at the receiver, a simpler approach is to estimate the channel state of a group of received symbols, then use the approximated value of the channel with the received signal to compute the log likelihood ratio. Simulation results show that the proposed scheme exhibits about 0.4 dB loss compared to the optimal solution when perfect CSI is available at the receiver
    corecore