IEEE Transactions on Vehicular Technology (ISSN: 0018-9545)Citation for the published paper: Wanlu, S. ; Ström, E. ; Brännström, F. et al. (2015) "Radio Resource Management for D2Dbased V2V Communication". IEEE Transactions on Vehicular Technology Abstract-Direct device-to-device (D2D) links have been proposed as a possible enabler for vehicle-to-vehicle (V2V) communications, where the incurred intra-cell interference and the stringent latency and reliability requirements are challenging issues. In this paper, we investigate the radio resource management problem for D2D-based V2V communication. Firstly, we analyze and transform the latency and reliability requirements of V2V communication into optimization constraints that are computable using only the slowly varying channel information. This transformation opens the possibility of extending certain existing D2D techniques to cater for V2V communication. Secondly, we propose a problem formulation that fulfills the different requirements of V2V communication and traditional cellular communication. Moreover, a Separate resOurce bLock and powEr allocatioN (SOLEN) algorithm is proposed to solve this problem. Finally, simulations are presented to evaluate different schemes, which illustrate the necessity of careful design when extending D2D methods to V2V communication and also show promising performance of the proposed SOLEN algorithm.
Abstract-Deploying direct device-to-device (D2D) links is a promising technology for vehicle-to-X (V2X) applications. However, intra-cell interference, along with stringent requirements on latency and reliability, are challenging issues. In this paper, we study the radio resource management problem for D2D-based safety-critical V2X communications. We first transform the V2X requirements into the constraints that are computable using slowly varying channel state information only. Secondly, we formulate an optimization problem, taking into account the requirements of both vehicular users (V-UEs) and cellular users (C-UEs), where resource sharing can take place not only between a V-UE and a C-UE but also among different VUEs. The NP-hardness of the problem is rigorously proved. Moreover, a heuristic algorithm, called Cluster-based Resource block sharing and pOWer allocatioN (CROWN), is proposed to solve this problem. Finally, simulations results indicate promising performance of the CROWN scheme.
We present a framework for the analysis of the error floor of coded slotted ALOHA (CSA) for finite frame lengths over the packet erasure channel. The error floor is caused by stopping sets in the corresponding bipartite graph, whose enumeration is, in general, not a trivial problem. We therefore identify the most dominant stopping sets for the distributions of practical interest. The derived analytical expressions allow us to accurately predict the error floor at low to moderate channel loads and characterize the unequal error protection inherent in CSA.
Abstract-Direct device-to-device (D2D) communication has been proposed as a possible enabler for vehicle-to-vehicle (V2V) applications, where the incurred intra-cell interference and the stringent latency and reliability requirements are challenging issues. In this paper, we investigate the radio resource management problem for D2D-based V2V communications. Firstly, we analyze and mathematically model the actual requirements for vehicular communications and traditional cellular links. Secondly, we propose a problem formulation to fulfill these requirements, and then a Separate Resource Block allocation and Power control (SRBP) algorithm to solve this problem. Finally, simulations are presented to illustrate the improved performance of the proposed SRBP scheme compared to some other existing methods. I. INTRODUCTION A. MotivationRecently, vehicle-to-vehicle (V2V) communications have attracted great interest. Usually, these types of applications have a strongly localized nature, i.e., requiring cooperation between vehicles in close proximity. Furthermore, other common features to most applications are real-time requirements, as well as strict requirements on reliability and access availability. For instance, the EU project METIS considers that a maximum end-to-end delay of 5 ms, with transmission reliability of 99.999% should be guaranteed [1].Current legacy solutions for V2V communications are adhoc communications over the 802.11p standard and backendbased communications over the Long Term Evolution (LTE) cellular standard. The main problem with the 802.11p legacy system is that it is mainly optimized for a WLAN-type of environment with no or very low mobility. On the other hand, in LTE systems, as analyzed by [2], the performance for vehicular communications is not satisfactory, especially in terms of latency and reliability. Therefore, there is a strong desire of finding better solutions to support V2V communications.Meanwhile, device-to-device (D2D) communication is identified as one of the technology complements for next generation communication system. In a D2D underlaying cellular infrastructure, two physically close user equipment (UE) devices can directly communicate with each other by sharing the same resources used by regular cellular UEs (C-UEs). Correspondingly, three promising gains, i.e., proximity gain, reuse gain, and hop gain, may be offered [3].By comparing the quality of service (QoS) requirements of V2V communications and the potential benefits of D2D
We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives rise to a double unequal error protection (DUEP) phenomenon: the more a user repeats its packet, the higher the probability that this packet is decoded by other users, but the lower the probability for this user to decode packets from others. We analyze the performance of B-CSA over the packet erasure channel for a finite frame length. In particular, we provide a general analysis of stopping sets for B-CSA and derive an analytical approximation of the performance in the error floor (EF) region, which captures the DUEP feature of B-CSA. Simulation results reveal that the proposed approximation predicts very well the performance of B-CSA in the EF region. Finally, we consider the application of B-CSA to vehicular communications and compare its performance with that of carrier sense multiple access (CSMA), the current MAC protocol in vehicular networks. The results show that B-CSA is able to support a much larger number of users than CSMA with the same reliability.
We consider a frame asynchronous coded slotted ALOHA (FA-CSA) system for uncoordinated multiple access, where users join the system on a slot-by-slot basis according to a Poisson random process and, in contrast to standard frame synchronous CSA (FS-CSA), users are not frame-synchronized. We analyze the performance of FA-CSA in terms of packet loss rate and delay. In particular, we derive the (approximate) density evolution that characterizes the asymptotic performance of FA-CSA when the frame length goes to infinity. We show that, if the receiver can monitor the system before anyone starts transmitting, a boundary effect similar to that of spatially-coupled codes occurs, which greatly improves the iterative decoding threshold. Furthermore, we derive tight approximations of the error floor (EF) for the finite frame length regime, based on the probability of occurrence of the most frequent stopping sets. We show that, in general, FA-CSA provides better performance in both the EF and waterfall regions as compared to FS-CSA. Moreover, FA-CSA exhibits better delay properties than FS-CSA.
Trellis-code multiple-access (TCMA) is a narrowband multiple-access scheme based on trellis-coded modulation. There is no bandwidth expansion, so users occupy the same bandwidth as one single user. The load of the system, in number of bits per channel use, is therefore much higher than the load in, for example, conventional code-division multiple-access systems. Interleavers are introduced as a new feature to separate the users. This implies that the maximum-likelihood sequence detector (MLSD) is now too complex to implement. Iterative detectors are therefore suggested as an alternative to the joint MLSD. The conventional interference cancellation (IC) detector has lower complexity than the MLSD, but its performance is shown to be far from acceptable. Even after a novel improvement of the IC detector, the performance is unsatisfactory. Instead of using IC, another iterative detector is suggested. This detector updates the branch metric for every iteration, and avoids the standard Gaussian approximation. Simulations show that the performance of this detector can be close to single-user performance, even when the interleaver and the phase offset are the only user-specific features in the TCMA system.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.