did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781119788799

Interference Mitigation in Device-to-Device Communications

by ; ;
  • ISBN13:

    9781119788799

  • ISBN10:

    111978879X

  • Edition: 1st
  • Format: Hardcover
  • Copyright: 2022-03-21
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $143.94 Save up to $0.72
  • Buy New
    $143.22
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Supplemental Materials

What is included with this book?

Summary

Explore this insightful foundational resource for academics and industry professionals dealing with the move toward intelligent devices and networks

Interference Mitigation in Device-to-Device Communications delivers a thorough discussion of device-to-device (D2D) and machine-to-machine (M2M) communications as solutions to the proliferation of ever more data hungry devices being attached to wireless networks. The book explores the use of D2D and M2M technologies as a key enabling component of 5G networks. It brings together a multidisciplinary team of contributors in fields like wireless communications, signal processing, and antenna design.

The distinguished editors have compiled a collection of resources that practically and accessibly address issues in the development, integration, and enhancement of D2D systems to create an interference-free network. This book explores the complications posed by the restriction of device form-factors and the co-location of several electronic components in a small space, as well as the proximity of legacy systems operating in similar frequency bands.

Readers will also benefit from the inclusion of:

  • A thorough introduction to device-to-device communication, including its history and development over the last decade, network architecture, standardization issues, and regulatory and licensing hurdles
  • An exploration of interference mitigation in device-to-device communication underlaying LTE-A networks
  • A rethinking of device-to-device interference mitigation, including discussions of the challenges posed by the proliferation of devices
  • An analysis of user pairing for energy efficient device-to-device content dissemination

Perfect for researchers, academics, and industry professionals working on 5G networks, Interference Mitigation in Device-to-Device Communications will also earn a place in the libraries of undergraduate, graduate, and PhD students conducting research into wireless communications and applications, as well as policy makers and communications industry regulators.

Author Biography

Masood Ur Rehman, PhD, is a Lecturer in Electronic and Nanoscale Engineering at the University of Glasgow. He is a Fellow of the Higher Education Academy UK, Senior Member of the IEEE, and Associate Editor of the IEEE Access, IEEE Antennas & Wireless Propagation Letters, Microwave & Optical Technology Letters and IET Electronics Letters.

Ghazanfar Ali Safdar, PhD, is a Senior Lecturer in Computer Networking at the University of Bedfordshire in the United Kingdom. He is Associate Fellow of Higher Education Academy, UK. He was an R&D Engineer with Carrier Telephone Industries and Schlumberger, France. Dr. Safdar is Editor-in-Chief of EAI Endorsed Transactions on Energy Web and Information Technology, Area Editor of Springer Wireless Networks and Topic Editor of MDPI JSAN.

Mohammad Asad Rehman Chaudhry, PhD, MBA, is a thought-leader, innovator and entrepreneur leading multi-disciplinary projects in Digital Disruption and Future-Tech. He has developed strategy recommendations for Fortune 500. Dr. Chaudhry also leads IEEE Standards in Software-Defined and Virtualized Ecosystems.

Table of Contents

Preface

Acknowledgments

About the Editors

List of Contributors

Chapter 1: Introduction to D2D Communications

1.1 Evolution of D2D Communication

1.2 D2D Communication in Cellular Spectrum

1.3 Classification of D2D Communication

1.3.1 In-band D2D Communication

1.3.2 Out-band D2D Communication

1.4 Challenges in D2D Implementation

1.5 Book Organization

1.6 Summary

Chapter 2: Interference Mitigation in D2D Communication Underlaying LTE-A Network

2.1 Applicability of D2D Communication

2.2 Interference – The Compelling Issue in D2D

2.3 Types of D2D Communication

2.3.1 In-Band D2D Communication

2.3.1.1Underlay In-Band

2.3.1.2 Overlay In-Band

2.3.2 Out-Band D2D Communication

2.3.2.1 Network-Assisted D2D Communication

2.3.2.2Autonomous D2D Communication

2.4 D2D Communication Underlaying Cellular Network – The Challenges

2.4.1 Device Discovery

2.4.2 Mode Selection

2.4.3 Radio Resource Management

2.4.4 Modification to LTE-A Architecture

2.4.5 Security in D2D

2.4.6 Mobility Management

2.5 Interference Management Techniques in D2D

2.5.1 Power Control Techniques

2.5.2 Radio Resource Allocation Techniques

2.5.3 Joint Power Control and Radio Resource Allocation Techniques

2.5.4 Spectrum Splitting Techniques

2.5.5 Other Interference Mitigation Techniques

2.5.6 Multiple-Input Multiple-Output Techniques

2.5.7 Comparative Analysis of D2D Interference Mitigation Techniques

2.6 Summary

Chapter 3: Rethinking D2D Interference: Beyond the Past

3.1 Interference Manipulation

3.1.1 Example

3.2 Formulation of Interference Manipulation Problem

3.3 Matrix Rank Minimization: A Way to Manipulate Interference

3.3.1 Reduction of Interference Manipulation to Matrix Rank Minimization

3.3.2 Minimum Rank Matrix to Transmission Scheme

3.3.3 Does the Field Size Matter?

3.4 Interference Manipulation: A Boolean Satisfiability Approach

3.5 Interference Manipulation: Index Coding Perspective

3.5.1 Interference Manipulation is NP-hard

3.5.2: An Efficient Solution for Interference Manipulation

3.4 Summary

Chapter 4: User Pairing Scheme for Efficient D2D Content Delivery in Cellular Networks

4.1 D2D Content Delivery

4.2 D2D Content Delivery Architecture

4.2.1 Network Model

4.2.2 Channel Model

4.2.3 Content Delivery Model

4.3 D2D Content Delivery Strategies

4.3.1 Pairing Range

4.3.2 Energy Efficiency for Multicast and Unicast

4.3.3 Caching and Delivery

4.4 D2D Delivery Mode Selection

4.5 Performance Evaluation

4.6 Summary

Chapter 5: Resource Allocation for NOMA-based D2D Systems Coexisting with Cellular Networks

5.1 NOMA-based D2D Systems

5.2 System Model and Performance Analysis

5.2.1 System Model and Assumptions

5.2.2 Capacity Analysis of D2D and Cellular Networks

5.2.2.1 Uplink Cellular Networks Transmission

5.2.2.2 Downlink NOMA-D2D Transmission

5.3 Joint Subchannel Assignment and Power Control for D2D Communication

5.3.1 Subchannel Assignment Scheme

5.3.2 Power Control Scheme

5.4 Optimization of D2D Device Pairing

5.5 Results and Discussion

5.5.1 Channel Model

5.5.2 Performance Evaluation

5.6 Summary

Chapter 6: Distributed Multi-Agent RL-Based Autonomous Spectrum Allocation in D2D Enabled Multi-Tier HetNets

6.1 D2D Resource Allocation Methods

6.2 Reinforcement Q-Learning

6.3 System Model

6.4 Resource Allocation in Multi-tier D2D Communication

6.4.1 Autonomous Spectrum Allocation Scheme

6.5 Performance Evaluation

6.5.1 Performance of D2D Users

6.5.2 Performance of Cellular Users

6.5.3 Coverage Analysis

6.5.4 Computational Time Analysis

6.5.5 Memory Requirements

6.5.6 Effect of Base Stations Density

6.5.7 Effect of Network Tiers

6.6 Summary

Chapter 7: Adaptive Interference Aware Device-to-Device Enabled Unmanned Aerial Vehicle Communications

7.1 Key Elements in D2D Communication

7.1.1 D2D Network Discovery

7.1.2 SWIPT for D2D

7.1.3 Resource Allocation

7.1.4 3GPP Standardization

7.2 Unmanned Aerial Vehicles in D2D

7.2.1 Key Challenges in UAV-based D2D

7.2.2 Transmission over PC5 Interface for UAV-based D2D Discovery

7.2.3 Interference in UAV-based D2D

7.3 Summary

Chapter 8: Emergency Device-to-Device Communication: Applicability, Case Studies and Interference Mitigation

8.1 Emergency D2D Communication

8.2 Approaches for Efficient Emergency D2D Communication

8.3 Emergency D2D Communication: Case Studies

8.4 Interference Mitigation in Emergency D2D Communication

8.4.1 Radiated Power Management

8.4.2 Frequency Allocation

8.4.2.1 Hybrid Schemes for Power Control and Intelligent Frequency Allocation

8.4.3 Time Division Multiplexing (TDM)

8.4.4 Adjacent Channel Interference Cancellation in DSRC

8.4.5 Use of MIMO Antennas

8.4.5.1 Beam Steering in 3GPP 5G NR Supported Vehicular Systems

8.5 Summary

Chapter 9: Disaster Management Using D2D Communication With Power Transfer and Clustering Techniques

9.1 D2D Communication in Disaster Management

9.2 D2D Communication in Disaster Management: Key Considerations

9.3 D2D Disaster Management System Architecture

9.3.1 Time Switching Based Protocol

9.3.2 Network Configuration

9.3.3 Outage Probability for Mode Selection

9.4 Power Transfer Using Relaying and Clustering in D2D Disaster Management

9.4.1 System Model

9.4.2 Performance Evaluation

9.5 Results and Discussion

9.6 Summary

Chapter 10: Road Ahead for D2D Communications

10.1 Future Prospects and Challenges

10.1.1 Spectrum Sharing and Coexistence

10.1.2 Standardization

10.1.3 Secure Communication

10.1.4 Energy Consumption and Energy Harvesting

10.1.5 Interreference Management

10.1.6 Resource Allocation

10.1.7 Device Discovery

10.1.8 Handover

10.1.9 D2D in Vehicular Communications

10.1.10 D2D in Disaster Management

10.1.11 D2D at Millimeter Wave Frequencies

10.1.12 D2D and Social Networks

10.1.13 D2D and Visible Light Communication

Index

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program