The present disclosure relates to device-to-device (D2D) communications and operation, network coverage, co-existence, radio emissions and interference mitigation, and in particular to optimizing the capacity of D2D underlays on legacy cellular networks with simultaneous D2D and legacy cellular wireless device transmissions.
In order to achieve high data rates, several technologies including Evolved Universal Mobile Telecommunications System (UMTS) terrestrial radio access (EUTRA) and EUTRA network (EUTRAN) technologies have been defined in the Third Generation Partnership Project (3GPP) Long Term Evolution (LTE) set of wireless communication standards. Furthermore, local service requirements have led to the development of newer technologies such as LTE-Advanced.
In order to provide local services, one approach is to use license exempt spectrum of wireless local area networks (WLANs). Another approach is data transmission on a licensed band in a coordinated and planned network. Toward this second approach, device-to-device (D2D) communication has been studied extensively, where wireless devices in proximity to one another can transmit data directly to each other with reused cellular resource blocks. Due to its local communication nature, D2D communication can be provided with smaller fees compared to the fees for cellular communication. D2D communication provides many benefits that cannot be provided by uncoordinated communication.
Examples of advantages of using D2D communication are summarized as follows:
There are many current and prospective applications for D2D communications. For example, D2D has been used in LTE-based public safety networks in the United States for its security and reliability. In addition, D2D communication is useful in environments where cellular transmission is not available/accessible.
In commercial networks, many social network applications require recognition of nearby wireless devices. Proximity wireless device recognition is usually handled in a centralized manner, where wireless devices are required to register their location information in a server such that the location information can be shared among the other wireless devices, e.g., in FACEBOOK. With D2D, location registration is no longer required for the purpose of proximity discovery. Another prospective application for D2D communication is E-commerce, where nearby agencies need to transfer efficiently a large amount of private data.
One challenge of D2D communication is interference with and among the coexisting cellular wireless devices. For a D2D underlying cellular network, interference needs to be carefully controlled because cellular wireless devices and D2D pairs share the spectrum. In order to manage the interference to the cellular wireless devices in the same cell, several approaches have been proposed such as limiting D2D transmission power, employing a fixed booster factor and a back-off factor to adjust D2D power. An interference limited area has been proposed, where D2D pairs can share the resources of those cellular wireless devices located out of the area.
In practical multi-cell networks, inter-cell interference (ICI) is a challenge that has not been addressed in the D2D literature. The ICI depends on the duplexing scheme used by cellular wireless devices and D2D pairs and the resources blocks shared between D2D pairs and cellular wireless devices. The cellular wireless device and D2D pair powers should be set in an intelligent manner such that the ICI in the neighboring cell does not exceed some required upper limit. Furthermore, having perfect CSI knowledge at the base station is not realistic. In particular, D2D channels and ICI channels may not be perfectly available at the base station.
However, the existing solutions are not without problems. D2D communication could cause large ICI in the neighboring cells. There is currently no power allocation algorithm available limiting ICI caused by the wireless devices in the desired cell to wireless devices in multiple adjacent cells. In addition, the base station may not have perfect CSI knowledge in practical scenarios. There is no power allocation algorithm available in the literature for imperfect CSI scenario with ICI constraint in multiple neighboring cells. The term “perfect” CSI as used in this disclosure means that each of the CSI channel parameters are known. The term “imperfect” CSI as used in this disclosure means that only a subset of the CSI channel parameters are known, where a “subset” of CSI channel parameters means that less than all CSI channel parameters are known (or known only within a defined margin of error) and/or noisy estimated values of the CSI channel parameters, rather than exact values, are known.
Currently known algorithms are not designed to:
Improve the sum rate of the wireless device and D2D pairs with a limit on the ICI generated in multiple neighboring cells with perfect CSI; or
Improve the sum rate of the wireless device and D2D pairs with a limit on the ICI generated in multiple neighboring cells with imperfect CSI.
The D2D communication may be bi-directional communication where both devices receive and transmit in the same or different resources. However, the D2D communication scenario may also comprise that in which one of the devices transmits and the other one receives the signals. There may also exist a point-to-multipoint (e.g., multicast, broadcast) scenario in which case a plurality of devices receive signals from the same transmitting device. This scenario is particularly useful for emergency services or public safety operation to spread vital information to several devices in an affected area. The term D2D communication and D2D operation are interchangeably used throughout this disclosure.
Typically, devices operate under the supervision of the radio access network with radio access nodes (e.g., base station). But in some scenarios the devices themselves establish direct communication constituting the radio access network without the intervention of the network infrastructure.
In cellular network assisted device-to-device communications (or simply network assisted D2D communications), wireless devices in the vicinity of each other can establish a direct radio link (D2D bearer). While wireless devices communicate over the D2D “direct” bearer, they also maintain a cellular connection with their respective serving base station (eNB). This direct link is interchangeably called as network (NW) link, D2D-NW link, etc. The NW link is used, for example, for resource assignment for D2D communication, maintenance of radio link quality of D2D communication link, etc.
Three example coverage scenarios for D2D communication have been defined as follows.
In coverage—In this scenario all D2D wireless devices (WDs) communicating are under the network coverage. This means that the D2D WDs can receive signals from and/or transmit signals to at least one network node. In this case the D2D WD can maintain a communication link with the network. The network in turn can ensure that the D2D communication does not cause unnecessary interference. In coverage is also interchangeably called as in-network (IN) coverage.
Out of coverage—In this scenario D2D WDs communicating with each other are not under network node coverage. This means that the D2D WDs cannot receive signals from and/or transmit signals to any of the network nodes. Typically, the lack of coverage is due to the complete absence of the network coverage in the vicinity of the D2D WDs. However, the lack of coverage may also due to insufficient resources in the network nodes to serve or manage the D2D WDs. Therefore, in this scenario the network cannot provide any assistance to the devices. Out of coverage is also interchangeably referred to as out-of-network (OON) coverage.
Partial coverage—In this scenario at least one D2D WD communicating is under network coverage, and at least one UE communicating is not under network coverage. As mentioned above the D2D WD not being under the network coverage can be due to lack of any network node in its vicinity or due to insufficient resources in any of the network nodes in its vicinity. Partial coverage is also interchangeably referred to as partial-network (PN) coverage.
The present disclosure advantageously provides a method and network device for determining, for both perfect and imperfect CSI scenarios, a power allocation for the pairing of a D2D pair and wireless device transmissions that improves the sum rate of the D2D pair and wireless device transmissions while limiting the ICI generated in a plurality of neighboring cells.
According to one aspect of the disclosure, in some embodiments, a method for configuring a device-to-device (D2D) pair and a cellular wireless device, the cellular wireless device configured to have a direct link with a serving network device of a network cell in which the cellular wireless device resides is provided. The method includes receiving a subset of complete Channel State Information (CSI) parameters for the D2D pair, the cellular wireless device, and at least one neighbor interference level, determining feasibility conditions for pairing the D2D pair and the cellular wireless device transmissions based at least on the received subset of CSI parameters, determining a power allocation for the pairing of the D2D pair and cellular wireless device transmissions, the power allocation being based on a sum rate of the D2D pair and cellular wireless device transmissions, and configuring the D2D pair and cellular wireless device based at least in part on the determined power allocation while limiting an inter-cell interference (ICI) generated in a plurality of neighboring cells.
According to other embodiments, the complete CSI parameters include a channel response between the D2D pair, a channel response between the cellular wireless device and the network device, an interference channel between a D2D transmitter and the network device, an interference channel between the cellular wireless device and a receiving device of the D2D pair, an inter-cell interference (ICI) channel between the D2D pair and a neighbor base station, and an ICI channel between the cellular wireless device and the neighbor base station.
According to other embodiments, the method further includes determining a plurality of beam vectors at the D2D pair and determining the power allocation for the pairing of the D2D pair and cellular wireless device transmissions based at least on the determined plurality of beam vectors. According to other embodiments, determining the power allocation for the pairing of the D2D pair and cellular wireless device transmissions includes determining a transmission power (Pc) for the cellular wireless device and a transmission power (Pd) for the D2D pair.
According to other embodiments, determining the feasibility conditions for pairing the D2D pair and the cellular wireless device transmissions includes determining whether a predetermined criteria are met when sharing the same Physical Resource Blocks (PRBs) between the cellular wireless device and the D2D pair. According to other embodiments, the predetermined criteria includes predefined Signal-to-Noise Ratio (SINR) thresholds for the D2D pair and the cellular wireless device, and at least one predefined ICI channel threshold.
According to another aspect, in some embodiments, a network device for configuring a D2D pair and a cellular wireless device, the cellular wireless device configured to have a direct link with a serving network device of a network cell in which the cellular wireless device resides is provided. The network device includes a receiver configured to receive a subset of complete CSI parameters for the D2D pair, the cellular wireless device, and at least one neighbor interference level, and processing circuitry including a memory and a processor, the memory in communication with the processor. The memory has instructions that, when executed by the processor, configure the processor to determine feasibility conditions for pairing the D2D pair and the cellular wireless device transmissions based at least on the received subset of CSI parameters, determine a power allocation for the pairing of the D2D pair and cellular wireless device transmissions, the power allocation being based on a sum rate of the D2D pair and cellular wireless device transmissions, and configure the D2D pair and cellular wireless device based at least in part on the determined power allocation while limiting an ICI generated in a plurality of neighboring cells.
According to some embodiments, the complete CSI parameters include a channel response between the D2D pair, a channel response between the cellular wireless device and the network device, an interference channel between a D2D transmitter and the network device, an interference channel between the cellular wireless device and a receiving device of the D2D pair, an ICI channel between the D2D pair and a neighbor base station, and an ICI channel between the cellular wireless device and the neighbor base station.
According to some embodiments, the processor is further configured to determine a plurality of beam vectors at the D2D pair and determine the power allocation for the pairing of the D2D pair and cellular wireless device transmissions based at least on the determined plurality of beam vectors. According to some embodiments, determining the power allocation for the pairing of the D2D pair and cellular wireless device transmissions includes determining a transmission power (Pc) for the cellular wireless device and a transmission power (Pd) for the D2D pair.
According to some embodiments, determining the feasibility conditions for pairing the D2D pair and the cellular wireless device transmissions includes determining whether a predetermined criteria are met when sharing the same PRBs between the cellular wireless device and the D2D pair. According to some embodiments, the predetermined criteria includes predefined SINR thresholds for the D2D pair and the cellular wireless device, and at least one predefined ICI channel threshold.
According to another aspect, in some embodiments, a method for configuring a D2D pair and a cellular wireless device, the cellular wireless device configured to have a direct link with a serving network device of a network cell in which the cellular wireless device resides, is provided. The method includes receiving complete CSI parameters for the D2D pair, the cellular wireless device, and at least one neighbor interference level, determining feasibility conditions for pairing the D2D pair and the cellular wireless device transmissions based at least on the received complete CSI parameters, determining a power allocation for the pairing of the D2D pair and cellular wireless device transmissions, the power allocation being based on a sum rate of the D2D pair and cellular wireless device transmissions, and configuring the D2D pair and cellular wireless device based at least in part on the determined power allocation while limiting the inter-cell interference (ICI) generated in a plurality of neighboring cells.
According to some embodiments, the complete CSI parameters include a channel response between the D2D pair, a channel response between the cellular wireless device and the network device, an interference channel between a D2D transmitter and the network device, an interference channel between the cellular wireless device and a receiving device of the D2D pair, an ICI channel between the D2D pair and a neighbor base station, and an ICI channel between the cellular wireless device and the neighbor base station.
According to some embodiments, the method further includes determining a plurality of beam vectors at the D2D pair and determining the power allocation for the pairing of the D2D pair and cellular wireless device transmissions based at least on the determined plurality of beam vectors. According to some embodiments, determining the power allocation for the pairing of the D2D pair and cellular wireless device transmissions includes determining a transmission power (Pc) for the cellular wireless device and a transmission power (Pd) for the D2D pair.
According to some embodiments, determining the feasibility conditions for pairing the D2D pair and the cellular wireless device transmissions includes determining whether a predetermined criteria are met when sharing the same PRBs between the cellular wireless device and the D2D pair. According to some embodiments, the predetermined criteria includes predefined SINR thresholds for the D2D pair and the cellular wireless device, and at least one predefined ICI channel threshold.
According to another aspect, in some embodiments, a network device for configuring a D2D pair and a cellular wireless device, the cellular wireless device configured to have a direct link with a serving network device of a network cell in which the cellular wireless device resides, is provided. The network device includes a receiver configured to receive complete CSI parameters for the D2D pair, the cellular wireless device, and at least one neighbor interference level, and processing circuitry that includes a memory and a processor, the memory in communication with the processor. The memory has instructions that, when executed by the processor, configure the processor to determine feasibility conditions for pairing the D2D pair and the cellular wireless device transmissions based at least on the received complete CSI parameters, determine a power allocation for the pairing of the D2D pair and cellular wireless device transmissions, the power allocation being based on a sum rate of the D2D pair and cellular wireless device transmissions, and configure the D2D pair and cellular wireless device based at least in part on the determined power allocation while limiting an inter-cell interference (ICI) generated in a plurality of neighboring cells.
According to some embodiments, the complete CSI parameters include a channel response between the D2D pair, a channel response between the cellular wireless device and the network device, an interference channel between a D2D transmitter and the network device, an interference channel between the cellular wireless device and a receiving device of the D2D pair, an inter-ICI channel between the D2D pair and a neighbor base station, and an ICI channel between the cellular wireless device and the neighbor base station.
According to some embodiments, the processor is further configured to determine a plurality of beam vectors at the D2D pair and determine the power allocation for the pairing of the D2D pair and cellular wireless device transmissions based at least on the determined plurality of beam vectors. According to some embodiments, determining the power allocation for the pairing of the D2D pair and cellular wireless device transmissions includes determining a transmission power (Pc) for the cellular wireless device and a transmission power (Pd) for the D2D pair.
According to some embodiments, determining the feasibility conditions for pairing the D2D pair and the cellular wireless device transmissions includes determining whether a predetermined criteria are met when sharing the same PRBs between the cellular wireless device and the D2D pair. According to some embodiments, the predetermined criteria includes predefined SINR thresholds for the D2D pair and the cellular wireless device, and at least one predefined ICI channel threshold.
A more complete understanding of the present embodiments, and the attendant advantages and features thereof, will be more readily understood by reference to the following detailed description when considered in conjunction with the accompanying drawings wherein:
The disclosure provides one or more embodiments for configuring D2D pairs and cellular wireless devices. One embodiment is described in the subsequent sections. A method to improve, as compared with known solutions, the throughput of a D2D pair and a legacy cellular or wireless access network (WAN) device sharing the same physical resource blocks (PRBs) within the same cell is described. Specifically, the method improves the sum rate with or without perfect CSI assumptions under power and multiple interference constraints, as well as defined quality of service (QoS) requirements, while limiting the ICI generated in a plurality of neighboring cells.
The disclosure provides embodiments that advantageously improve the sum rate or aggregate throughput of simultaneous transmission between D2D pairs and cellular wireless devices under the power and constraints of interference from multiple other cells, as well as QoS requirements, and considers the practical scenario of multiple neighboring cells with and without perfect CSI.
The disclosure also advantageously solves the non-convex power allocation problem and obtains the solution in closed form while outperforming the heuristic power allocation algorithms significantly in terms of sum rate and rate gain.
The disclosure is applicable to a network device such as a multi-antenna base station which schedules one cellular wireless device and a D2D pair on the same PRBs as shown in
The term “network device” will be used herein to refer to a network node and/or a network capable wireless device. The network device herein can be the serving network node of the wireless device or any network node with which the wireless device can establish or maintain a communication link and/or receive information, e.g., via broadcast channel. For example,
Herein, the term network device 12 and can be any kind of network node which may include a radio network node such as base station, radio base station, base transceiver station, base station controller, network controller, evolved Node B (eNB), Node B, Multi-cell/multicast Coordination Entity (MCE), relay node, access point, radio access point, Remote Radio Unit (RRU) Remote Radio Head (RRH), a core network node (e.g., Mobile Management Entity (MME), Self-Organizing Network (SON) node, a coordinating node, positioning node, Minimization of Drive Tests (MDT) node, etc.), or even an external node (e.g., 3rd party node, a node external to the current network), wireless access point, etc. Note that herein a base station is but one example of a node. Implementations are not limited solely to base stations.
In embodiments of the present disclosure, the term “wireless device 16” may refer to any network capable device, for example, a wired network device such as wired a machine type communication (MTC) device, or a wireless device, such as a user equipment (UE). However, the nodes described herein need not be limited to a UE. The nodes may be any type of device that is configured or configurable for communication through wireless communication. Examples of such nodes are sensors, modems, smart phones, (MTC, or narrow band Internet of Things (NB IoT)) devices also known as machine to machine (M2M) devices, personal data assistants (PDAs), iPADs, Tablets, smart phones, laptop embedded equipped (LEE), laptop mounted equipment (LME), USB dongles, etc.
The disclosure includes embodiments which can be implemented in a network device and a network capable wireless device. The network device herein can be the serving network node of the wireless device or any network device with which the wireless device can establish or maintain a communication link and/or receive information (e.g., via a broadcast channel).
The embodiments also use a generic term “D2D pair 18.” However, a D2D transmitting device and receiving device forming the D2D pair 18 can be any types of wireless device, which are capable of at least communication through wireless communication. Examples of such devices are sensors, modems, smart phones, machine type (MTC or NB IoT) devices (also known as machine to machine (M2M) device), PDA, iPAD, Tablet, laptop embedded equipped (LEE), laptop mounted equipment (LME), USB dongles etc.
Although terminology from 3GPP LTE (or E-UTRAN) is used in this disclosure, this should not be seen as limiting the scope of the disclosure to only the aforementioned system. Other wireless systems, including Wide Band Code Division Multiple Access (WCDMA), Universal Mobile Telecommunications System (UMTS) Terrestrial Radio Access (UTRA)-Frequency Division Duplexing (FDD), UTRA TDD, and Global System for Mobile Communications (GSM) Edge Radio Access Network (GERAN)/EDGE, may also benefit from exploiting the ideas covered within this disclosure.
The embodiments are described when D2D pairs 18 and cellular WDs 16 are configured to be served by or operate with a single carrier (i.e., single carrier operation of the WD 16) for communication or configured to use or operate a single carrier in a network device. However, the embodiments are also applicable for multi-carrier or carrier aggregation based communication.
The computation complexity of the sum rate algorithm described herein is low. The powers and beam weight are obtained essentially in closed-form. A fourth-order equation with closed-form solution is given. Then one pair of powers out of a few candidates is selected in order to improve the sum rate. The algorithm can be easily implemented in an eNB scheduler due to its simplicity. It is noted that although some of the algorithms described herein and graphs depicted in the figures are labeled with the term “maximum” or “maximization,” the term “optimal” may also be used to describe these algorithms and graphs. The methods and arrangements described herein are to determine an optimal power allocation for the pairing of the D2D pair 18 and cellular wireless device 16 transmissions, while limiting the ICI generated in a plurality of neighboring cells. Thus, the terms “maximum” and “maximization” shall not necessarily be construed as “reaching a pinnacle” or attaining a highest amount.
Furthermore, the sum rate algorithm disclosed herein leads to a unique solution, i.e., the optimum powers and beam vectors optimized to help improve the sum rate. Hence, from an observability perspective if a competitor uses the same algorithm with the same constraints and objective, the same powers are obtained for similar channel information. This can be observed by measuring transmitter powers of the WD 16 and D2D pair 18, Signal-to-Interference-plus-Noise-Ratio (SINR) at the receivers, and ICI in the neighboring cells.
The disclosure includes an embodiment which is described in the subsequent sections. More specifically, this embodiment of the disclosure includes the following steps:
Step 1: Obtain, by receiver 20 of network device 12, CSI data of the transmit channels for the candidate D2D pair 18, candidate cellular WD 16 and other cell eNB interference levels.
Step 2: Determine, by processor 26 of network device 12, feasibility conditions for pairing of D2D and cellular WD 16 transmissions.
Step 3: Solve, by processor 26 in conjunction with power allocator 28, the optimal power allocation for the D2D pair 18/WD 16 pairing.
The system parameter definitions and configuration under which the network and mobile nodes operate is summarized below.
Furthermore, the following mobile and network node is assumed to be configured as follows:
The WD 16, the D2D transmitter, and the D2D receiving device are each equipped with a single antenna;
The base station (BS) has N antennas;
Receive beamforming is supported at the BS; and
w: is defined as the unit-norm receive beamforming vector associated with a WD 16.
The following configuration is assumed to be supported with regard to Radio Resource Management (RRM) parameters:
The channel state information (CSI) parameters are measured at the serving cell network node (i.e. eNB) 12, the D2D pair 18, the cellular mobile node 16 (i.e. cellular WD), or the neighboring cell network node as indicated.
CSI is measured for the following channels hD, hC, gD, gC, fD,j, and fC,j as defined below. The relevant duration and periodicity of the measurements can be defined by the network as a parameter or determined by the network node 12 (i.e. eNB) scheduler as part of the measurement step of the disclosure.
In this disclosure it is assumed that the PRBs of cellular WDs 16 are shared with the D2D pair 18. The D2D pair 18 shares at most the resource assignment of one WD 16, i.e., each D2D pair 18 interferes with at most one WD 16 in its serving cell.
The SINR at the D2D receiving device is given by:
The uplink received SINR at the BS from the WD 16 is given by:
This disclosure assumes unit norm beamweights, i.e., ∥w∥2=1.
The transmissions of both the D2D pair 18 and the WD 16 cause ICI in b neighboring cells. This disclosure addresses ICI for uplink transmission at neighboring base stations and the algorithms herein can also be applied to limiting ICI in a scenario with downlink transmission in neighboring cells.
The worst-case inter-cell interference (ICI) received in neighboring BS j, denoted by PI,j is given by:
P
I,j
=P
C
∥f
C,j
∥
2
+P
D
∥f
D,j∥2. (3)
Note that the actual ICI is upper-bounded by (Equation 3) since |wIHf|≤∥f∥, where wI denotes the neighboring cell beamforming vector. Let wj denote the beam vector at neighboring BS j. Note that wj is typically unknown to the WD 16 and D2D pair 18 in the desired cell. Since |wjHfj|≤∥fj∥, PI,j in (Equation 3) is an upper bound of the instantaneous ICI. If wj is known, then ∥fj∥ can be replaced by |wjHfj| to limit the instantaneous ICI.
The sum rate maximization problem is given by:
The following parameters are employed in the method to improve the sum rate:
is the correlation coefficient.
The steps for solving the maximization problem (4) are summarized in Algorithm 1:
The non-linear, non-convex optimization problem (Equation 4) is solved by formulating and solving two sub-problems, namely:
In this section, the aim is to find the necessary and sufficient condition to determine whether the D2D pair 18 can be admitted. In order to allow the D2D pair 18 to share the WD 16 resource, the constraints (5)-(8) should be satisfied, i.e., ∃{PC,PD} such that:
(6), (7), (8).
Since HChChCH and ΛDσ2I+PDgDgDH, the beamforming problem at the BS for a fixed set of powers {PC,PD} can be written as:
Since (Equation 10) has the generalized eigenvalue problem structure, the optimum beamforming vector is given by:
wo=ΛD†hC. (11)
It can be shown that ΛD0 and hence, the pseudo inverse becomes the matrix inversion and wo=ΛD−1hC. Using the matrix inversion lemma, it can be shown that:
Substituting (Equation 11) into (Equation 2), the maximum SINR associated with the WD 16 is given by:
It is denoted that the correlation coefficient of the desired WD 16 channel and the interference channel from the D2D transmitter to the BS is
Then, (Equation 13) becomes
After beamforming and substituting the optimal beam weights, the feasibility test problem involves finding {PC,PD} such that:
(6), (7), (8).
The constraint (Equation 6) is characterized by a line on the PC-PD plane. The constraint (Equation 15) is analyzed to obtain the necessary and sufficient conditions for the problem (Equation 4) to be feasible.
It is assumed that the constraints (Equation 15) and (Equation 6) are met with equality. Then there exists a set of powers {PC,PD} satisfying these two equality constraints. For notation simplicity, D2D pair 18 and WD 16 power are denoted by x and y in the following. For optimum D2D pair 18 and WD 16 power, the notations PDo=xo and PCo=yo are used. It is assumed that (Equation 15) is met with equality. This can be rewritten as:
where
It can be shows that:
Hence, y is a concave strictly increasing function of x. The SINR constraint (Equation 6) can be expressed as:
where
D2D pair 18 and WD 16 power satisfies both (Equation 16) and (Equation 19) by xI and yI, respectively. Solving the intersection of the line (Equation 19) and the curve (Equation 16) results in:
The necessary and sufficient condition for feasibility of D2D communication is given by:
0<xI≤PDmax, (22)
0<yI≤PCmax, (23)
and
c
1,j
y
I
+c
2,j
x
I≤1, j=1, . . . , b (24)
where c1,j∥fC,j∥2/Ĩ and c2,j∥fD,j∥2/Ĩ. Note that if either (Equation 22) or (Equation 23) does not hold, the maximum D2D pair 18 or WD 16 power is not enough to meet both SINR targets. If (Equation 24) does not hold, the ICI constraint cannot be satisfied.
After substituting (Equation 11) into (Equation 2), the problem of improving the sum rate for a D2D pair 18 and a WD 16 becomes:
subject to (5),(6),(7),(8).
The objective function (Equation 25) can be expressed as:
where a|hD|2 and b∥hCω2/σ2.
The optimal power solution pair (xo, yo) is at the vertical, horizontal, or tilted boundary of j of Axy, given by x=PDmax, y=PCmax, or c1,jy+c2,jx=1, respectively. It can be shown that for any given power pair (x, y) in the interior of the admissible area and any ζ>1, there exists another power pair (ζx,ζy) such that:
R(ζx,ζy)>R(x,y). (27)
Since log is a strictly increasing function, the following is considered:
It can be seen that
The following is defined:
In the following, the objective (Equation 25) is analyzed, assuming the constraint (Equation 8) is not active at optimality. Then the scenario when (Equation 8) is active at optimality in Lemma 2 is considered. If the optimal power pair is on the boundary line segment, where at least one of the powers is the maximum {PCmax,PDmax}, i.e., (Equation 8) is not active, Lemma 1 shows that at least one power in the optimal pair (PCo,PDo) will be the maximum allowable power at optimality. In the following, the behavior of h(x)R(x,PCmax) and g(y)R(PDmax,y) are analyzed to find the optimal power allocation.
If the boundaries of the feasible region Axy do not include c1,jy+c2,jx=1 for j=1, . . . , b, then the optimal power pair {xo,yo} for problem (Equation 25) is at one end point of the vertical or horizontal boundary line segment of Axy. The function g(y) can be written as:
Taking the derivative of (Equation 30) results in:
where μ=α3α22+α1(α2α3−1). Then either
has a valid solution only if μ<0. Supposing μ<0 and taking the second derivative, the result is:
since μ<0 implies α1(1−α2α3)>0. In other words, R(PDmax,PC) is a convex function of PC.
Now assume, PCo=PCmax. Then h(x) can be written as:
taking the derivative of (33) results in:
where ω=β1K22+β1β2K22−β2K1K2. Note that
has a valid solution only if ω<0. If ω<0, then the second derivative of (33) becomes:
Hence R(PD,PCmax) is a convex function of PD.
It can be seen from Lemma 1 that the optimal power, if exists, is not in the interior of the feasible region. The optimal power can be found if it is one of the corners of rectangle on power plane due to maximum power constraints. In the following, the scenario that the optimum power pair is on the tilted line due to ICI constraint in neighboring BS j, i.e., c1,jy+c2,jx=1 is considered.
If the boundaries of the feasible region Axy inclue c1,jy+c2,jx=1 for some j, then the optimal power pair (xo,yo) is given in one of the two cases: 1) An end point of the horizontal, vertical, or tilted boundary line segment(s) of Axy; or 2) an interior point of tilted boundary line segment(s) of Axy, whose x-coordinate for c1,jy+c2,jx=1 is one of the roots of the following quartic equation:
e
4
x
4
+e
3
x
3
+e
2
x
2
+e
1
x+e
0=0, (36)
where:
e
0
=aa
1
K
2
2(b1+1)−a12b1K1K2−a12b2K22
e
1=−2aa1b2b2K22+aa1K2(b1+1)+aa1K2−2aa1K1K2b1+aa1b1K2+2a12b2K2(K1−1)+2a1b1K1K2K4+2a1b2K22K4
e
2
=aa
1
b
2
K
2(3K1−4)+aa1(1+b1(1−K1))−a12b2(1−K1)+b2K22K4(a−K4)+b1K1K2K4(a−K4)−4a1b2K2K4(K1−1)
e
3=−2aa1b2(1−K1)+2a1K4b2(1−K1)−2b2K2K4(K1−1)(a−K4)
e
4
=K
4(a−K4)b2(1−K1),
and a1σD22+K3/c1,j, K4K3c2,j/c1,j, b1b/c1,j, and b2bc2,j/c1,j.
The WD 16 power associated with the root xo is given by
The optimum power on the line due to ICI is the solution of the following optimization problem:
Substituting
into (37), the optimization problem becomes:
where
Since R(x) is continuous and has the first order derivative, the optimum x is obtained by solving
Computing the derivative and after some algebraic manipulations,
can be recast as (Equation 36), which completes the proof.
In the following sections, the set of end points in the admissibility region are determined. An iterative algorithm is found by analyzing the feasible region when a new tilted line is added (a new active BS is considered in a neighboring cell). Two matrices can be defined: C which includes the end points of the feasible region due to constraints (Equation 7) and (Equation 8), i.e., without considering minimum SINR requirements for both the D2D pair 18 and WD 16; and A which specifies the line segment connecting any two consecutive end points in C. In particular, C is initially set to C0 when we just constraint (Equation 7) is considered. The first and last columns of C0 are [0,0]T, i.e. the origin coordinates. The other end points in C0 are set in a clock-wise order. The column A:,i is [Ai1, Ai2, Ai3]T when the line segment between C:,i and C:,i+1is Ai1x+Ai2y=Ai3.
Let Axy,j denote the feasible region after considering ICI constraint j considering constraints (Equation 7) and (Equation 8) as shown in
In order to test the admissibility of the D2D pair 18 and obtain the optimal power for the D2D pair 18 and WD 16, the intersection of Axy,b is considered with the curve and line associated with minimum SINR requirements (Equation 5) and (Equation 6) with equality for the WD 16 and D2D pair 18, respectively. The necessary and sufficient condition for the D2D pair 18 to be admissible is that the solution sI[xI, yI]T (Equation 20) that satisfies:
Δ·SIoδ (40)
where Δ and δ are obtained through Algorithm 1. Let {tilde over (P)} and {tilde over (Q)} denote the points where the line I−{tilde over (P)} and curve I−{tilde over (Q)} intersect Axy,b as shown in
In order to solve problem (Equation 25), all candidates must be found to be optimal power. By Lemma 1 and Proposition 2, the optimal power pair (xo, yo) can be one of Points {{tilde over (P)}, Pi, . . . , Pj, {tilde over (Q)}}. In Algorithm 1, C denotes the set of all feasible corner points. Then all the roots of (Equation 36) are found whose x-coordinates are within the range of two consecutive corner points of C . Let Sj denote the set of roots that meet the range constraint for c1,jy+c2,jx=1. The set of candidate points on the interior of line segment c1,jy+c2,jx=1 is given by Zj{(x,(1−c2,jx)/c1,j):x∈Sj}. The set of candidate pairs (xo, y9) for given by Po=C∪j−1bZj.
Embodiment #2 includes the following steps:
Step 1: Obtain, by receiver 20 of network node 12, imperfect CSI data of the transmit channels for the candidate D2D pair 18, candidate cellular WD 16 and other cell eNB interference levels.
Step 2: Determine, by processor 26 of network node 12, feasibility conditions for pairing of D2D pair 18 and cellular WD 16 transmissions.
Step 3: Solve, by processor 26 in conjunction with power allocator 28, the optimal power allocation for the D2D pair 18/WD 16 pairing.
Based on the above assumptions, D2D pair 18 SINR and ICI at each neighboring BS are random variables. Due to only partial CSI knowledge, the SINR constraint (Equation 6) is replaced with a probabilistic constraint limiting the outage probability of D2D pair 18 SINR. The ICI constraint (Equation 8) is also replaced with an expected constraint.
The expected sum rate maximization problem with imperfect CSI is given by: P1:
subject to Pr{γD≤{tilde over (γ)}D}≤ε, (41)
E[P
I,j
]≤Ĩ, j=1, . . . , b (42)
(5) and (7)
where ε is the limit on the outage probability of the D2D pair 18 SINR. The optimal beam vector is given by (Equation 11).
Due to some challenges involved in solving P1, an objective of P1 with log2(1+γC)+log2(1+
subject to (5), (7), (41) and (42).
Analysis and simulations show that there is negligible performance degradation due to approximating the objective of P1.
The following parameters are employed in the proposed method to improve the sum rate, i.e., improve the sum rate over known solutions:
The steps for solving the maximization problem (Equation 43) are summarized in Algorithm 2:
Approach to solve the expected sum-rate maximization problem P1
Step 2: The Feasibility Test
The necessary and sufficient condition for feasibility of D2D communication with imperfect CSI is given by:
0<xI≤PDmax, (44)
0<yI≤PCmax, (45)
{tilde over (c)}1,jyI+{tilde over (c)}2,jxI≤1, j=1, . . . , b (46)
where {tilde over (c)}1,jλC,j/Ĩ and {tilde over (c)}2,jλD,j/Ĩ and (xI,yI) is the numerical solution of the following system of equations:
where
The cumulative density function (CDF) for random variable
is first obtained where X: exp(η1/x) and Y: exp(η2/y).
The constraint Equation 41 can be written as FZ({tilde over (γ)}D)≤ε, i.e.,
It is shown that
is a convex and increasing function of x. Furthermore, the D2D pair 18 SINR requirement (Equation 50) can be satisfied only if:
The solution of
is xI, which can be found using the bisection algorithm within the range xmin≤x≤PDmax.
As an example, the feasible region for problem P1 is shown in
After substituting the optimal beam vector (Equation 11) into (Equation 5), the problem of maximizing the expected sum rate for a D2D pair 18 and a WD 16 becomes:
If the D2D pair 18 and WD power 16 is given by x and y, respectively, the expected D2D rate becomes
where
Assuming |hD|2: exp(η1) and |gC|2: exp(η2), we have
In order to simplify the notations, the variables
are changed. Then the vertical boundary line x=PDmax and horizontal boundary line y=PCmax can be represented by {circumflex over (x)}=v1 and ŷ=v2, respectively with
Similarly, the tilted boundary line {tilde over (c)}1,jy+{tilde over (c)}2,jx=1 can be written as ĉ1,j/ŷ+ĉ2,j/{circumflex over (x)}+1 with ĉ1,j={tilde over (c)}1,jη2σD2 and ĉ2,j={tilde over (c)}2,jη1σD2 for j=1, . . . , b.
The optimal power pair ({circumflex over (x)}o,ŷo) to maximize P2 is given in one of the two cases: 1) An end point of the horizontal, vertical, or tilted boundary line segment(s) of Axy; or 2) an interior point of the horizontal, vertical, or tilted boundary line segment(s) of Axy, where x{circumflex over (x)} and ŷ are obtained in the following cases:
where {circumflex over (α)}3=bη2σD2(1−K1PDmax/(K2+PDmax)), V1=E1(v1)exp(v1), and fV(ŷ)=ŷ2−ŷv1−v1.
where {circumflex over (β)}=bPCmax, {circumflex over (K)}1=K1η1σD2/K2, {circumflex over (K)}2=η1σD2/K2, V2=E1(v2)exp(v2), and fV({circumflex over (x)})=v22+v2−v2{circumflex over (x)}.
h
T({circumflex over (x)})=f1,T({circumflex over (x)})+f2,T exp({circumflex over (x)})E1({circumflex over (x)})−f3,T exp(gT({circumflex over (x)}))E1(gT({circumflex over (x)}))=0 (60)
where
The proof herein is only for the tilted boundary line. The other cases can be proved similarly. If ICI constraint j (Equation 42) is active at optimality, the optimal power is the solution of the following optimization problem:
where {circumflex over (b)}bη2σD2. Substituting
into the objective function above results in maxxR({circumflex over (x)}), where
Since R({circumflex over (x)}) is continuous and has a first-order derivative, the optimum {circumflex over (x)}o is either an end point of the interval defied by Axy or obtained by solving dR({circumflex over (x)})/d{circumflex over (x)}=0, which results in the equation in (Equation 60).
Note that the equations (Equation 58)-(Equation 60) should be solved numerically. However, simulations show that hV(ŷ)=0 and hH({circumflex over (x)})=0 do not have a valid solution in the specific intervals determined by Axy. Furthermore, hT({circumflex over (x)})=0 may have at most one root in the interval {circumflex over (x)}min≤{circumflex over (x)}≤{circumflex over (x)}max where {circumflex over (x)}min and {circumflex over (x)}max are obtained by C in Algorithm 2. Hence, the solution can be obtained using the bisection algorithm.
Considering the objective in P1, a numerical equation needs to be solved to solve the optimal power allocation problem over each boundary line. There is no closed-form solution for these equations. In order to tackle this issue, another objective is considered, as follows.
Using Jensen's inequity, E[ log2(1+γD)]≤log2(1+E[γD]). After replacing the objective in P1, the following problem is analyzed:
subject to (52-55),
where RU=(1+γC)(1+E[γD]). It can be shown that
By solving P3, it can be shown that the optimal power is always at one end of the vertical or horizontal boundary lines of the feasible region, i.e., there is no need to solve any equation corresponding to the vertical and horizontal boundary lines.
If the boundaries of the feasible region Axy do not include {tilde over (c)}1,jy+{tilde over (c)}2,jx=1 for j=1, . . . , b then the optimal power pair {xo,yo} for P3 is at one end point of the vertical or horizontal boundary line segment of Axy. Substituting y=PCmax and x=PDmax into the objective of P3, h(x)RU(x,PCmax) and g(y)RU(PDmax,y) are defined. To show that the maximum of g(y) for ã≤y≤{tilde over (b)} is obtained when yo is at either ã or {tilde over (b)}, it is sufficient to show that g(y) is a strictly monotonic function, or g(y) is a strictly convex function. In the following, it is shown that g(y) is such a function. In both cases, since P3 is a maximization problem, yo is an end point of the domain determined by Axy. A similar proof is provided for h(x). The function g(y) can be written as
where
μ3PDmaxη2/η1, μ2μ1μ3+1, and μσD2η2.
Taking the first derivative of g(y), results in:
Since μ1>0, μ1>0, μ1>0, μ>0, and y≥0, either
i.e., g(y) is a strictly increasing function or
may have a valid solution only if {circumflex over (μ)}(−μ3/y2+μ3/y)exp(μ/y)E1(μ/y)+μ2/y+μy2<0 for some y. Supposing {circumflex over (μ)}<0 and taking the second derivative, the result is
since {circumflex over (μ)}<0 implies (μ3/y2−μ3/y)exp(μ/y)E1(μ/y)−μ3/y2−μ2/y>0. In other words, g(y) is a convex function.
Similarly, h(x) can be written as
where
and β2bPCmax. Taking the first derivative of h(x), the result is
where ĥ(x)β1(1+β2(1−K1))x2+2β1K2(1+β2(1−K1))x and ωβ1K22+β1β2K22−β2K1K2. Since K1≤1, K2>0, β1>0, β2>0, and x≥0, either h(x) is a strictl;y increasing function or
may have a valid solution only if ω<0. Supposing ω<0 and taking the second derivative of h(x), the result is:
i.e., h(x) is a convex function.
In order to find the optimal power pair as an interior point of a tilted boundary line segment, the variables
are changed.
If the boundaries of the feasible region Axy include {tilde over (c)}1,jy+{tilde over (c)}2,jx=1 for some j, then the optimal power pair (xo,yo) to maximize P3 is given in one of the two cases: 1) An end point of the horizontal, vertical, or tilted boundary line segment(s) of Axy; or 2) an interior point of tilted boundary line segment(s) of Axy, where ŷo for ĉ1,j/ŷ+ĉ2,j/{circumflex over (x)}=1 is one of the simple roots of the following equation:
J
T(ŷ)=J1,T(ŷ)+J2,T(ŷ)exp(ŷ)E1(ŷ)=0 (64)
where
The proof is similar to Proposition 3.
In order to find the optimal powers for the D2D pair 18 and the WD 16 in P3, the objective function should be studied on tilted boundary lines of the feasible region. As shown in Lemma 6, a numerical equation involving E1(⋅) function with no closed-form solution needs to be solved. To make this problem tractable, it is proposed to obtain the power through solving another problem as follows.
This disclosure proposes replacing the objective of P1 by
It is observed through simulation that this can be done without almost any performance degradation. In other words, it is proposed to solve the following problem:
subject to (52-55).
Noting
P4 can be solved using the proposed algorithm for perfect CSI scenario in closed form. The steps to obtain the optimal powers are summarized in Algorithm 2. Let (x*,y*) denote the solution of P4. Substituting (x*,y*) into the objective of P2, results in R(x*,y*)≤Ro. In order to study the performance degradation due to solving P4 instead of P2, an upper-bound is found on the performance of P2 in the following proposition.
An upper-bound on the objective of P2 can be obtained by solving the problem:
subject to (52-55),
Two random variables XxE[|hD|2 and YσD2+yE[|gC|2] are considered for notation simplicity.
First, it is shown that the following inequality holds:
Note that X and Y are independent random variables. Hence:
since f(y)=1/(y) is a convex function.
Now, it is shown that φ(t)=(1+t)exp(t)E1(t) is a strictly decreasing function of t. The continued fraction expansion of E1(t) is given by [1]:
Ignoring high order terms in (Equation 68):
Using the inequality (Equation 69) and taking the first order derivative of φ(t), results in:
Since φ(t) is a strictly decreasing function, the right hand side (66) is maximized by Substituting y=PCmax, i.e.,
Finally, note that E[ log2(1+X/Y)]≤log2(1+E[X/Y]) for any given (x,y) due to Jensen's inequality. Hence, the optimal objective of P5 is always an upper-bound on the optimal objective P2.
In one embodiment, the complete CSI parameters include a channel response between the D2D pair 18, a channel response between the cellular wireless device 16 and the network device 12, an interference channel between a D2D transmitter and the network device 12, an interference channel between the cellular wireless device 16 and a receiving device of the D2D pair 18, an ICI channel between the D2D pair 18 and a neighbor base station, and an ICI channel between the cellular wireless device and the neighbor base station. In one embodiment, processor 26 is further configured to determine a plurality of beam vectors at the D2D pair 18 and determining the power allocation for the pairing of the D2D pair 18 and cellular wireless device 16 transmissions based at least on the determined plurality of beam vectors.
In one embodiment, determining the power allocation for the pairing of the D2D pair 18 and cellular wireless device 16 transmissions includes determining a transmission power (Pc) for the cellular wireless device 16 and a transmission power (Pd) for the D2D pair 18. In one embodiment, determining the feasibility conditions for pairing the D2D pair 18 and the cellular wireless device 16 transmissions includes determining whether a predetermined criteria are met when sharing the same Physical Resource Blocks (PRBs) between the cellular wireless device 16 and the D2D pair 18. In one embodiment, the predetermined criteria include predefined Signal-to-Noise Ratio (SINR) thresholds for the D2D pair 18 and the cellular wireless device 16, and at least one predefined ICI channel threshold.
In one embodiment, the complete CSI parameters include a channel response between the D2D pair 18, a channel response between the cellular wireless device 16 and the network device 12, an interference channel between a D2D transmitter and the network device 12, an interference channel between the cellular wireless device 16 and a receiving device of the D2D pair 18, an ICI channel between the D2D pair 18 and a neighbor base station, and an ICI channel between the cellular wireless device 16 and the neighbor base station.
In one embodiment, processor 26 is further configured to determine a plurality of beam vectors at the D2D pair 18, and determine, in conjunction with power allocator 28, the power allocation for the pairing of the D2D pair 18 and cellular wireless device 16 transmissions based at least on the determined plurality of beam vectors.
In one embodiment, determining the power allocation for the pairing of the D2D pair 18 and cellular wireless device 16 transmissions includes determining a transmission power (Pc) for the cellular wireless device 16 and a transmission power (Pd) for the D2D pair 18.
In one embodiment, determining the feasibility conditions for pairing the D2D pair 18 and the cellular wireless device 16 transmissions includes determining whether a predetermined criteria are met when sharing the same Physical Resource Blocks (PRBs) between the cellular wireless device 16 and the D2D pair 18. In one embodiment, the predetermined criteria include predefined Signal-to-Noise Ratio (SINR) thresholds for the D2D pair 18 and the cellular wireless device 16, and at least one predefined ICI channel threshold.
In one embodiment, the receiver 20 receives the complete CSI parameters (a “perfect” CSI scenario) and the processor 26 is configured to determine feasibility conditions for pairing the D2D pair 18 and the cellular wireless device 16 transmissions based at least on the complete CSI parameters.
As will be appreciated by one of skill in the art, the concepts described herein may be embodied as a method, data processing system, and/or computer program product. Accordingly, the concepts described herein may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects all generally referred to herein as a “circuit” or “module.” Furthermore, the disclosure may take the form of a computer program product on a tangible computer usable storage medium having computer program code embodied in the medium that can be executed by a computer. Any suitable tangible computer readable medium may be utilized including hard disks, CD-ROMs, electronic storage devices, optical storage devices, or magnetic storage devices.
Some embodiments are described herein with reference to flowchart illustrations and/or block diagrams of methods, systems and computer program products. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general-purpose computer (to thereby create a special purpose computer), special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable memory or storage medium that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture including instruction means which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
It is to be understood that the functions/acts noted in the blocks may occur out of the order noted in the operational illustrations. For example, two blocks shown in succession may in fact be executed substantially concurrently or the blocks may sometimes be executed in the reverse order, depending upon the functionality/acts involved. Although some of the diagrams include arrows on communication paths to show a primary direction of communication, it is to be understood that communication may occur in the opposite direction to the depicted arrows.
Computer program code for carrying out operations of the concepts described herein may be written in an object-oriented programming language such as Java® or C++. However, the computer program code for carrying out operations of the disclosure may also be written in conventional procedural programming languages, such as the “C” programming language. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer. In the latter scenario, the remote computer may be connected to the user's computer through a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Many different embodiments have been disclosed herein, in connection with the above description and the drawings. It will be understood that it would be unduly repetitious and obfuscating to literally describe and illustrate every combination and subcombination of these embodiments. Accordingly, all embodiments can be combined in any way and/or combination, and the present specification, including the drawings, shall be construed to constitute a complete written description of all combinations and subcombinations of the embodiments described herein, and of the manner and process of making and using them, and shall support claims to any such combination or subcombination.
It will be appreciated by persons skilled in the art that the embodiments described herein are not limited to what has been particularly shown and described herein above. In addition, unless mention was made above to the contrary, it should be noted that all of the accompanying drawings are not to scale. A variety of modifications and variations are possible in light of the above teachings, which is limited only by the following claims.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/IB2017/053886 | 6/28/2017 | WO | 00 |
Number | Date | Country | |
---|---|---|---|
62355607 | Jun 2016 | US |