Resource management for D2D underlaying cellular network with hybrid multiple access technologies

Zhisheng Sun, Min Sheng, Daosen Zhai, Yan Zhang, Jiandong Li

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

6 Scopus citations

Abstract

This paper investigates the resource management problem for device-to-device (D2D) underlaying cellular network. In particular, cellular users employ sparse code multiple access (SCMA) while D2D users employ orthogonal frequency division multiple access (OFDMA). In this system, the cross-tier interference between cellular users and D2D users is highly coupled and if not properly handled, the potentials of the two 5G key enabling technologies (i.e., SCMA and D2D) cannot be fully exploited. To tackle this problem, we first construct an interference graph to depict the cross-tier interference, based on which an efficient resource allocation algorithm is devised to well coordinate the interference. Then, we propose an easily implemented iterative power control scheme to optimize the transmit power of all users. Finally, simulation results exhibit the performance gain of our algorithms as compared with other schemes.

Original languageEnglish
Title of host publication2016 8th International Conference on Wireless Communications and Signal Processing, WCSP 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781509028603
DOIs
StatePublished - 21 Nov 2016
Externally publishedYes
Event8th International Conference on Wireless Communications and Signal Processing, WCSP 2016 - Yangzhou, China
Duration: 13 Oct 201615 Oct 2016

Publication series

Name2016 8th International Conference on Wireless Communications and Signal Processing, WCSP 2016

Conference

Conference8th International Conference on Wireless Communications and Signal Processing, WCSP 2016
Country/TerritoryChina
CityYangzhou
Period13/10/1615/10/16

Fingerprint

Dive into the research topics of 'Resource management for D2D underlaying cellular network with hybrid multiple access technologies'. Together they form a unique fingerprint.

Cite this