Enabling Technologies for 5G Mobile SystemsView this Special Issue
Research Article | Open Access
Yijun Guo, Jing Gao, Jianjun Hao, "Exploiting the User-Level Interference Based on Network Coding in D2D Underlaid Cellular Networks", Mobile Information Systems, vol. 2015, Article ID 142967, 8 pages, 2015. https://doi.org/10.1155/2015/142967
Exploiting the User-Level Interference Based on Network Coding in D2D Underlaid Cellular Networks
Interference is an important and challenging problem faced by the D2D underlaid cellular networks. In this paper, we focus on the user-level interference under multicasting scenarios. Rather than the traditional pairwise way of D2D communications, we propose to implement the information exchanging through a groupwise way. Through introducing the idea of network coding, the proposed scheme is able to utilize the interference as valid signals to enhance the receiving performance, instead of only managing or controlling it. Both theoretical analysis and simulation results prove that the proposed scheme achieves better SINR performance and lower resources occupation than the traditional pairwise D2D transmission schemes.
Device-to-device (D2D) underlaid cellular networks  have attracted increasing interests in recent years with the proliferation of wireless devices and the fast progress of mobile computing and wireless network services. It enables nearby pieces of user equipment (UE) to exchange data directly with each other over D2D links without the help of cellular base stations (BS). The advantages of D2D communications lie in high-rate local data transmission, high spectral frequency efficiency by reusing cellular resources, and the capability of lightening the load at BS [2, 3]. From user’s aspects, the D2D techniques mainly provides authenticated peer-to-peer communications, public safety services, and context-aware services. From operator’s aspects, it lies in enhancing the network operation through user cooperation on the D2D links . Recently, 3GPP LTE Rel-12 has a dedicated study item for D2D in which technical specifications are currently being discussed by the industry . D2D underlaid cellular networks became a popular subject for research in recent years, and various studies have been made to increase the performance of the networks and support more advanced mobile services and applications [6–9].
Interference is a severe problem faced by D2D underlaid cellular networks. On the one hand, since the D2D links reuse the cellular time-frequency resources, the interchannel interference (ICI) between the cellular and D2D links, referred to as cell-level ICI, emerges. On the other hand, the ICI between D2D links themselves, referred to as user-level ICI, increases as the number of D2D users increases since they share limited time-frequency resources. Both cell-level ICI and user-level ICI severely deteriorate the entire system performance . Many efforts have been made in recent years to manage the interference in D2D underlaid cellular networks, in order to improve the spectrum efficiency and ultimately improve the network capacity. In view of spectrum scarcity (a deficit of about 275 MHz by 2014 according to FCC), it is clear that any improvement on the interference control and management side is more than just favorable and eventually shall bring us closer to the yet unknown capacity of cellular networks.
Schemes based on orthogonal resource allocation are studied as direct ways for D2D interference management in [10–14]. Works in [10–12] mainly focus on the cell-level ICI. The principle is to assign orthogonal time frequency to D2D user equipment (DUE) and cellular user equipment (CUE). Authors in [13, 14] introduce specialized schemes for user-level interference such as maximum carrier-to-interference ratio (MCI) scheduling and maximum throughput (MT) scheduling. However, these orthogonal schemes have not considered the spectrum efficiency.
For efficiency enhancement, nonorthogonal frequency reuse strategies are investigated in [3, 15–17]. -interference limited area control scheme is proposed to manage interference in . It limits DUE’s maximum transmit power and excludes the CUEs from the -interference limited area, in order to minimize the interference to DUEs. In , three receiving modes are switched at the D2D receiver according to the interference level in order to improve the D2D performance in terms of outage probability. The mind of cooperative interference cancellation (CIC) has been introduced in . CIC exploits the interference correlation between close-by users to eliminate interference cooperatively and improve downlink throughput. The authors in  adopt interference alignment (IA) to mitigate the cell-level interference and improve capacity. This paper intends to adopt interference alignment (IA) for improving the energy efficiency (EE) of both the device-to-device (D2D) and cellular links in a D2D multiple-input and multiple-output (MIMO) downlink underlaying cellular network. For this case, a critical issue is to properly coordinate existing interference to guarantee both reliable macro cellular and D2D communications as they simultaneously reuse the same frequency and time resources. However, these schemes only treat the interference as a negative factor and focus on controlling and eliminating but do not consider utilizing the interference for better receiving.
In D2D underlaid cellular networks, it is important and challenging to manage the interference in the presence of limited resources and large amount of users. To deal with the interference problem and improve network capacity discussed above, in this work, we focus on the user-level interference under multicasting scenarios and propose to introduce the idea of network coding (NC) into D2D underlaid cellular networks. Rather than the traditional pairwise way, we propose to implement the information exchanging process through a groupwise way and utilize the interference to enhance the receiving performance. Besides serving as a physical transmission scheme for multicasting services in cellular networks, we expect the proposed scheme to be applicable in other network research fields for a higher network performance.
The remainder of this paper is organized as follows. Section 2 gives the system model; Section 3 describes the proposed NC-based groupwise (NC-G) transmission scheme; Section 4 analyzes the theory performance; Section 5 simulates and compares the NC-G scheme with another two traditional schemes; Section 6 concludes the paper.
Notations. Lowercase boldface letters represent vectors. returns the absolute value of a scalar and gives the norm of a vector.
2. Background and Foundation
2.1. System Model
Consider D2D underlaid cellular networks consisting of one BS and 2 D2D pairs. Use a two-dimensional plane to represent their positions. Place the BS node at the original point and place the 4 DUE nodes as a rectangle as shown in Figure 1. The topology is determined by three kinds of distance: denotes the distance between two DUEs in a pair; denotes the distance between the centers of two pairs; denotes the distance between BS and the rectangular center.
D2D communications are established and share time-frequency resources with the cellular communications through central controlling from BS using dedicated control channels. Use physical resource block (PRB) to measure the time-frequency resources. The transmitting and receiving of each DUE node are implemented with different PRBs.
The base station (BS) need to broadcast a block of data to the 4 D2D user equipments (DUEs). To alleviate its own load, BS distributes the block of data to each DUE and initiates D2D communications to exchange information locally. Each DUE, denoted by , has been allocated data of length to exchange, denoted by . As for D2D communication, assume that -ary modulation is adopted for all the DUEs; the D2D links are block fading, and perfect channel state information (CSI) is known at the receivers.
2.2. The Traditional Way
The proposed scheme detailed later will be compared with the traditional underlaid D2D communication scheme based on pairwise transmissions. Based on pairwise way, the 4 DUEs as discussed in Section 2.1 have to establish communications and exchange their information in pairs.
Below we give a simple pairwise transmission scheme. A complete information exchange process between the 4 DUEs contains three stages, as listed in Table 1, where represents the notion that the communication channel between and is constructed and they could exchange information with each other. In particular, under the communication target described in Section 2.1, in the first stage, and exchange and while and exchange and . In the following stages, the two pairs are interchanged for similar pairwise information exchanging. After three stages, each DUE node has exchanged information with 3 other DUE nodes. Thus, all of the 4 DUEs obtain the complete data .
3. Problem Description
As mentioned above, there are two kinds of interferences in an underlaid cellular D2D network: cell-level ICI and user-level ICI. The former one has been researched deeply and would not be discussed in this paper. When limited PRBs are assigned for D2D communications, the user-level ICI is a severe problem especially when the amount of DUEs is large.
In particular, as for the pairwise D2D way, if two D2D pairs positioned in each other’s communication range are assigned by the same PRBs, they would interfere with each other as illustrated in Figure 2. For example, let denote the modulation function and let denote the symbol vector modulated by ; that is, . Assume each symbol is energy normalized; that is, .
Focus on the receiving at . The valid signal is from through . Since also uses to transmit to , the signal received by is interfered with and is formulated aswhere characterizes the path loss effect of channel . constrains the transmit power at . denotes the multipath fading item with its entries modeled as independent and identically distributed (i.i.d.) Rayleigh variables. models the normalized additive Gaussian noise at the receiver of .
According to (1), the received signal-to-noise-plus-interference ratios (SINR) at are given byObviously, the valid signals from are interfered with by the signals from . Besides, given transmit power, the receiving performance would degrade when increases; that is, the two D2D pairs become close.
Based on the above analysis, user-level ICI management is an important and challenging problem in underlaid D2D networks, and it is our major concern in this work. In the following sections, we will show a new group-based transmission scheme for multicasting scenarios. Rather than controlling or eliminating the interference by traditional schemes, the proposed scheme is able to exploit the user-level ICI to improve the receiving performance using the idea of network coding.
4. The Proposed Scheme
With the proposed NC-based groupwise scheme, two D2D pairs, that is, 4 DUE nodes, are organized as a group to implement the information exchanging process, as illustrated in Figure 3. Assume that all of the 4 DUEs are synchronized through the BS. The synchronization problem in realization would be discussed later. and use to receive and to transmit. and are just opposite, using to receive and to transmit.
We propose to exploit the idea of network coding in order to enable the simultaneous receiving of two distinct signals and also improve the transmission efficiency. In particular, focus on the exchanging of the th symbols to describe the proposed scheme. A complete exchange of the th symbols is defined as each DUE obtaining the th symbols from all the DUEs, that is, . This process contains two stages, referred to as the precoding (PC) stage and the network coding (NC) stage, respectively.
4.1. The PC Stage
Initially, each of the 4 DUEs only has its own codeword, that is, , , , and , respectively. The PC stage occupies two time slots (TS). At the transmitter of each DUE node, for example, , it precodes its own symbol by different coefficients in the two time slots, denoted by and , respectively, and then sends them to its two neighbor receivers. At the receiver, each DUE receives superposition of two signals from the two neighbors in each TS.
Focus on the reception at for illustration. receives signals from both and simultaneously. For the assumption of block fading, the channel fading coefficients could be seen as the same during the whole exchanging process of the th symbols. Thus, the superposition signals received by during and , respectively, are formulated aswhere represents the reception at in for the th symbol. Notice here that the signal from is transmitted through , which would not interfere with the receiving at through .
With the two received signals, is able to recover and if and only if the two precoding vectors and are linearly independent. For simplicity, specify the precoding coefficients used by the 4 DUEs in the PC stage as shown in Table 2. Hence, at , and can be recovered through simple Gaussian eliminations aswhere denotes the recovered version of at . Then can demodulate and to get the codewords and as
4.2. The NC Stage
Next, the NC stage occupies one TS to complete the whole exchange of between the 4 DUEs. The transmitter of each DUE node performs linear network coding, for example, XOR function to the two codewords it has already obtained during the previous PC stage. Then it remodulates and sends the encoded codewords through its transmit PRB. At the receiver, each DUE receives superposition of two copies of the encoded symbol from its two neighbors. Through demodulating the superposition signal to get the encoded codeword, and then decoding it using local codeword information, each DUE can obtain the last unknown codeword. So far, the whole exchanging process for the th symbols between all the 4 DUEs is completed.
Focus on the reception at for illustration, again. Through the previous PC stage, its two neighbors and have already gotten the information from and , denoted by and , respectively. In , and perform network coding to the recovered codewords and then modulate the network coded codeword asrespectively. Correspondingly, receives the superposition of these two copies of the network coded symbol , formulated as
In order to get , first applies the combining receiving method to the superposition signal and detects asThen demodulates to get the encoded codeword asFinally, decodes using its local codeword to obtain as
Through the PC stage and the NC stage, gets the whole th symbols . As for , , and , the communication processes are similar with . As described above, for each DUE, both signals from the two neighbors transmitting in the same PRB are valid signals rather than interference. Hence the purpose of exploiting interference to improve the receiving performance is realized.
4.3. Realization Problems
Two realization problems would be discussed in this subsection.
Intuitively, the proposed scheme is highly dependent on the synchronization between the 4 DUEs, which seems difficult to realize. However, the stress is relieved in cellular-controlled D2D networks. The reason is that the centralized control mode allows every DUE to be synchronized with the center node, that is, the BS. On the other hand, the synchronization offset caused by the transmission delay between DUE nodes can be negligible since a D2D communication is established only if the DUEs are close.
4.3.2. Assignment of Precoding Coefficients
As described in the scheme, the 4 DUEs need to be preassigned the precoding coefficients for the PC stage. This assignment can be implemented easily by the BS through its control channels with all of the DUEs during the establishment stage of the D2D communication.
5. Performance Analysis
From a statistical point of view, the 4 DUEs are symmetric and equivalent. Without loss of generality, focus on to analyze its SINR performance and the results can be extended to the other DUE nodes.
5.1. The SINR of the Proposed Scheme
The proposed scheme has different SINR in its two stages. In the PC stage, the combined received signal for the decoding of iswhich corresponds to SINR of . Similarly, the combined received signal for the decoding of iswhich corresponds to SINR of . Hence, the average SINR during the PC stage can be calculated as
In the NC stage, since is known by locally, the decoding performance of equals . View the two versions of from and , that is, and , as the same information; the combined received signal can be formulated asThe corresponding instant SINR which equals the SINR in the NC stage is shown as
5.2. Comparison with the Traditional Scheme
Next, we compare the SINR performance of the proposed scheme and the traditional scheme. For the whole data , according to (2), the SINR of the traditional scheme is formulated asAccording to (13) and (15), the SINRs of the proposed scheme in the two stages are, respectively, written asWith a simple deduction, we prove that . Besides, is a big probability event when the distance from to has a magnitude equal to the distance from to .
6.1. Simulation Scenario and Schemes
Three schemes are simulated and compared in this section:(1) NC-G Scheme: the proposed NC-based groupwise transmission scheme. Use function to represent the amount of used physical resources blocks. Thus, it holds that(2) OF-P scheme: the traditional pairwise transmission with orthogonal resources. Each D2D pair occupies a distinct PRB to exchange information; thus we have(3) IF-P scheme: the traditional pairwise transmission with identical resource. Two pairs use the same PRB for transmission; thus we have
6.2. Simulation Parameters Setting
The path loss effect is characterized by the log distance path loss model , formulated aswhere is the path loss index, is the reference distance, is the wavelength of the carrier waves, and represents the path loss in the unit of . As for the transmission within buildings with line of sight (LOS), is set in the range of , and takes value near 1 when the transmission distance is no bigger than 1 kilometer. The multipath fading effect is modeled as the Rice fading with index .
The simulation parameters are set as shown in Table 3. symbols for each DUE had been exchanged to get stabilized simulation results.
6.3. Simulation Results
The received SINRs are simulated to observe the receiver performance intuitively.
Figure 4 compares the SINR distribution functions of the three schemes in each stage or each phase ( and ). Define as the topology parameter vector. The parameters are set as , , and . The result shows that, within the scheme, although the signals received in stage 1 and stage 2 are distributed differently, the positions of their peaks are nearly the same. Within both the and the schemes, the signals received in phase 1 and phase 2 have the same distribution, which is better than phase 3. This is because, in phase 3, DUEs on the diagonal of the square are paired to communicate. Longer distance causes worse SINR. As for the comparison between three schemes, we observe that is the best, is inferior, and is the worst.
Next, we fix and dBm and vary from −40 dB (Rayleigh distribution) to 15 dB (Gaussian distribution). Use the SINRs in stage 1 of and phase 1 of to represent each scheme. The results are illustrated in Figure 5. With different Rice index , the position of the peak value in each scheme only moves a little. However, as decreases, the SINR curve of each scheme becomes more diffuse, which implies that the variance increases.
Then, we fix and and vary from −70 dBm to 70 dBm. The results are shown in Figure 6. The increase of leads to a leftward shift in the SINR curve of each scheme but hardly changes the shape of each curve.
The average symbol error rate (SER) at receivers is simulated under different channel fading and topology.
When , the cases where dB, 0 dB, and 15 dB are simulated. The curves of SER with changes are plotted in Figure 7. The result corresponding to dB performs the best since the channel fading obeys an approximate Gaussian distribution. As dB increases, the SER performance degrades severely. Besides, the performance gains brought by the also degrade. However, the NC-G scheme performs better than the other two schemes in all of these cases.
Finally, we fixed dB and changed to observe the SER performance under different topology. The results illustrated in Figure 8 show that when the average of and increases, for example, changing from to , the SER performance degrades correspondingly. However, when the average distance is fixed and decreases, for example, changing from to , the SER performance remains nearly unchanged.
In this paper, we focus on the user-level interference under multicasting scenarios. Rather than the traditional pairwise way of D2D communications, we propose to implement the information exchanging through a groupwise way. Through introducing the idea of network coding, the proposed scheme is able to utilize the interference as valid signals to enhance the receiving performance, instead of only managing or controlling it. Both theoretical analysis and simulation results prove that the proposed scheme achieves better SINR performance and lower resources occupation than the traditional pairwise D2D transmission schemes. Besides serving as a physical transmission scheme for multicasting services in cellular networks, we expect the proposed scheme to be applicable in other network research fields for a higher network performance.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
This work is supported by the National Basic Research Program of China (973 Program) 2012CB315801.
- K. Doppler, M. Rinne, C. Wijting, C. B. Ribeiro, and K. Hug, “Device-to-device communication as an underlay to LTE-advanced networks,” IEEE Communications Magazine, vol. 47, no. 12, pp. 42–49, 2009.
- S. Hakola, C. Tao, J. Lehtoma, and T. Koskela, “Device-to-device (D2D) communication in cellular network—performance analysis of optimum and practical communication mode selection,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '10), pp. 1–6, April 2010.
- H. Min, J. Lee, S. Park, and D. Hong, “Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks,” IEEE Transactions on Wireless Communications, vol. 10, no. 12, pp. 3995–4000, 2011.
- L. Lei, Z. D. Zhong, C. Lin, and X. M. Shen, “Operator controlled device-to-device communications in LTE-advanced networks,” IEEE Wireless Communications, vol. 19, no. 3, pp. 96–104, 2012.
- 3GPP, “Technical specification group services and system aspects; feasibility study for proximity services (ProSe) (release 12),” 3GPP TR 22.803, 2012.
- N. Y. Lee, X. Q. Lin, J. G. Andrews, and R. W. Heath, “Power control for D2D underlaid cellular networks: modeling, algorithms, and analysis,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 1, pp. 1–13, 2015.
- G. Zhang, K. Yang, P. Liu, and J. Wei, “Power allocation for full-duplex relaying based D2D communication underlaying cellular networks,” IEEE Transactions on Vehicular Technology, 2014.
- C. Zheng and M. Kountouris, “Distributed SIR-aware opportunistic access control for D2D underlaid cellular networks,” in Proceedings of the IEEE Global Communications Conference, pp. 1540–1545, December 2014.
- H. ElSawy, E. Hossain, and M.-S. Alouini, “Analytical modeling of mode selection and power control for underlay D2D communication in cellular networks,” IEEE Transactions on Communications, vol. 62, no. 11, pp. 4147–4161, 2014.
- T. D. Hoang, L. B. Le, and T. Le-Ngoc, “Joint subchannel and power allocation for D2D communications in cellular networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC '14), pp. 1338–1343, April 2014.
- T. D. Hoang, L. B. Le, and L. N. Tho, “Resource allocation for D2D communications under proportional fairness,” in Proceedings of the IEEE Global Communications Conference, pp. 1259–1264, December 2014.
- L. B. Le, “Fair resource allocation for device-to-device communications in wireless cellular networks,” in Proceedings of the IEEE Global Communications Conference (GLOBECOM '12), pp. 5451–5456, December 2012.
- S. Mumtaz, K. M. S. Huq, A. Radwan, J. Rodriguez, and R. L. Aguiar, “Energy efficient interference-aware resource allocation in LTE-D2D communication,” in Proceedings of the 1st IEEE International Conference on Communications (ICC '14), pp. 282–287, June 2014.
- M. Shariat, A. Quddus, S. Ghorashi, and R. Tafazolli, “Scheduling as an important cross-layer operation for emerging broadband wireless systems,” IEEE Communications Surveys & Tutorials, vol. 11, no. 2, pp. 74–86, 2009.
- H. Min, W. Seo, J. Lee, S. Park, and D. Hong, “Reliability improvement using receive mode selection in the device-to-device uplink period underlaying cellular networks,” IEEE Transactions on Wireless Communications, vol. 10, no. 2, pp. 413–418, 2011.
- R. Tanbourgi, H. Jäkel, and F. K. Jondral, “Cooperative interference cancellation using device-to-device communications,” IEEE Communications Magazine, vol. 52, no. 6, pp. 118–124, 2014.
- J. Jiang, M. Peng, W. Wang, and K. Zhang, “Energy efficiency optimization based on interference alignment for device-to-device MIMO downlink underlaying cellular network,” in Proceedings of the IEEE Globecom Workshops, pp. 585–590, Atlanta, Ga, USA, December 2013.
- J. Andrusenko, R. L. Miller, J. A. Abrahamson, N. M. Merheb Emanuelli, R. S. Pattay, and R. M. Shuford, “VHF general urban path loss model for short range ground-to-ground communications,” IEEE Transactions on Antennas and Propagation, vol. 56, no. 10, pp. 3302–3310, 2008.
Copyright © 2015 Yijun Guo et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.