2019
DOI: 10.1109/access.2019.2894721
|View full text |Cite
|
Sign up to set email alerts
|

Resource Allocation for D2D Communications Underlaying Cellular Networks Over Nakagami-<inline-formula> <tex-math notation="LaTeX">$m$ </tex-math> </inline-formula> Fading Channel

Abstract: In this paper, we investigate the sum-rate maximization of cellular users (CUs) and device-todevice (D2D) pairs for the D2D communications underlaying cellular networks over the Nakagami-m fading channel. We consider a resource-abundant scenario where the number of CUs is more than that of D2D pairs and discuss the joint optimization of signal-to-interference-plus-noise ratio (SINR) thresholds and CU-D2D pairing. We formulate the problem as mixed-integer non-linear programming, which is NP-hard in general. To … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…Extensive works have been studied on channel allocation for D2D enabled network. In sparse D2D communication networks, which means the quantity of D2D users are no more than quantity of CUEs, resource allocation problem of D2D users is usually modeled as a 0-1 integer combinational optimization problem [7][8][9][10][11][12][13]. One kind of them concentrates on the optimal allocation with an attempt to exhaustive searches, for example, Hungarian or graph theory-based algorithm [7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Extensive works have been studied on channel allocation for D2D enabled network. In sparse D2D communication networks, which means the quantity of D2D users are no more than quantity of CUEs, resource allocation problem of D2D users is usually modeled as a 0-1 integer combinational optimization problem [7][8][9][10][11][12][13]. One kind of them concentrates on the optimal allocation with an attempt to exhaustive searches, for example, Hungarian or graph theory-based algorithm [7][8][9][10].…”
Section: Introductionmentioning
confidence: 99%
“…Whereas, the above-mentioned algorithm requires the BS to have knowledge of the instantaneous CSI of all links, and the algorithm is only suitable for one-to-one matching mode. Lu et al [13] investigated the D2D communication channel allocation problem under the Nakagami-m fading channel environment, and proposed an allocation algorithm based on weighted bipartite graph matching. When the number of D2D users and the number of cellular users do not match, the number of both is equalized by adding virtual nodes.…”
Section: Introductionmentioning
confidence: 99%
“…Guaranteed bit rate (GBR) service is required in many applications, such as real-time gaming and audio/video communications, requiring a minimum data rate and strict latency. In previous works, power control and resource allocation methods were proposed to guarantee QoS requirements, such as SINR or data rate [12][13][14][15][16][17][18][19]. However, since most of these works allocate a single channel of a fixed bandwidth to one CU, there is still a problem in that some users have a SINR or a data rate below their QoS requirements.…”
Section: Introductionmentioning
confidence: 99%
“…Adopting D2D technology, the number of supported devices can be improved in mMTC scenarios [18]. By allowing unauthorized devices to reuse the frequency bands of authorized cellular users, bandwidth utilization can be improved [19,20,21]. The literature [22] proposes a heuristic subcarrier allocation method to set the user’s signal-to-noise ratio (SNR) threshold to meet the QoS of the system.…”
Section: Introductionmentioning
confidence: 99%
“…In [25], the authors propose two solutions to manage the communication between D2D devices and the BS to lighten the overhead of MTC devices on the 5G network. However, resource allocation [19,20,21,22,23,24,25] mainly focuses on throughput maximization or interference minimization. In an IIoT enabled by D2D communications, massive devices demand access to the network via D2D mode.…”
Section: Introductionmentioning
confidence: 99%