Interference Cancellation for Relay-Assisted D2D Communication

KSII Transactions on Internet and Information Systems (TIIS).
2015.
Sep,
9(9):
3276-3292

- Received : October 17, 2014
- Accepted : July 20, 2015
- Published : September 30, 2015

Download

PDF

e-PUB

PubReader

PPT

Export by style

Article

Metrics

Cited by

TagCloud

Relay-assisted D2D communication extends the communication range of the D2D pairs and helps users to form D2D pairs effectively. However, due to the introduction of the multi-hop relaying, the D2D communication has to occupy extra transmission time, which may decrease the efficiency of the communication system. In this paper, we propose a scheme to make node receive D2D signal and BS signal at overlapping time to improve the spectrum efficiency according to ZigZag decoding and successive-interference-cancellation (SIC). In this way, more data can be delivered during the same duration, thus the network throughput can be further improved. Numerical results verify the performance improvement of the proposed scheme when compared with a baseline scheme. Moreover, we expand the proposed scheme from one-hop relay scenario to multi-hop relay scenario.
W
ith the tremendous growing of the demand for user services and data requests, the traditional cellular network may not meet the requirements of massive data link services. Meanwhile the direct data exchange between mobile users is possible via device-to-device (D2D) communication, which has the potential to improve the spectrum efficiency. Recently, D2D communication has attracted much attention from both academic and industrial fields
[1]
[5]
. By means of spectrum sharing, D2D users can exploit the network topology to render additional gains in the network throughput
[2]
[3]
[6]
.
D2D communication without multi-hop relaying has been widely discussed, and the introduction of relay-assisted D2D communication can significantly reduce the system outage probability
[12]
. Generally, the relay selection directly affects the performance of relay-assisted D2D communication system
[7]
. The relaying technology expands the communication range of the D2D pair and enhances the reliability of the D2D communication. Therefore, the relay-assisted D2D communication is attracting more and more attention.
A plethora of studies are about improving the efficiency of the relay-assisted D2D system. In
[12]
, the authors derived out the premise of interference constraint for the relay-assisted D2D communication mode, and gave the advice of criteria based on the optimal path selection and system capacity in cellular network. In
[13]
, authors considered interference constraint conditions using different algorithms such as Kuhn-Munkras (KM) algorithm and greedy algorithm to make the relay routing selection decision. In
[7]
[22]
, authors developed several distributed resource management schemes for D2D communication underlaying cellular networks. In the distributed resource management scheme, each D2D user could decide the transmission resources and power independently. In
[8]
, authors proposed two types of efficient algorithms, analyzed the optimal design of D2D spatial density and transmit power, and derived the achievable transmission capacity of multi-hop D2D system in closed-form expression, to achieve the maximum capacity while minimizing the total interference power. In
[16]
, authors propose a solution using message passing technique where each user equipment sends and information messages to/from the relay node in an iterative manner with the goal of achieving an optimal allocation. In
[9]
[21]
, authors proposed a D2D cooperative relay scheme to relieve the congestion problem.
In summary, the introduction of relay-assisted D2D communication will bring many benefits, but there will also be a lot of challenges
[10]
. Generally, the circumstance of interference and the transmission strategy will have different characteristics, which need to be considered. For example,
[12]
and
[13]
have provided solutions to the case of interference constraints. One salient feature of our paper is the utilization of interference cancellation and ZigZag
[14]
[15]
, i.e., we exploit interferences, and then propose a solution to remove such interferences. Despite the introduction of the interference, the proposed solution can signidicantly improve the spectrum efficiency of D2D communication. We provide an idea that they may work together under the premise of meeting certain delay constraint. It does help some cases like multi video conference or applications which need the help of both BS and other user under the premise of meeting certain delay constraint. Besides, Our strategy can be used not only in one-hop relay assist D2D communication but also in multi-hop relay assisted D2D communication. We expand the sense to multi-hop relay assisted D2D communication and found that it is even better than one-hop case.
The cellular network scenario with D2D communication. The solid line represents the signal transmission and the dashed line represents the interference caused by BS to node R
A relay-assisted D2D communication model is illustrated in
Fig. 1
, we assume that the data from BS can be transmitted to node D directly while the data from node S cannot be transmitted tonode D directly, thus node S needs to transmit the data via a relay node R. Specifically,, the data has to be transmitted from node S to node R, and then goes ahead from node R to node D. In the conventional inteference avoidance scheme (as show in
Table 1
.), such process needs to occupy three time slots at least. Specifically, the node D needs to keep idle state at the first time slot, since the data is transmitted from node S to node R, and the BS is not allowed to cause interferece to the S-to-R communucation link. At the second time slot, node R forwards the received data to node D, while node S and the BS have to keep silent. At the third time slot, the BS transmits data to node D. Therefore, node D can receive all the packets from the BS and node S. The BS does not transmit data to node D at the first time slot in the conventional scheme to avoid interference to node R, even through node D has the possibility to receive the data. In contrast, when we consider the case that the interference is allowed, i.e., the S-to-R and BS-to-D communcations can occur at the same time slot, a novel interference cancellation scheme can be proposed to improve the system throughput.
Table 2
shows the two-slot operation of the proposed scheme, which is different from the three-slot operation of the conventional schcme. The spectrum efficiency improvement of the proposed scheme can be significant. However, the obtaining the data from the BS and node S at node D correctly via the proposed scheme is a challenging problem. We will solve such problem in the following sections of this paper.
The timeline of the conventional scheme
The timeline of the proposed scheme
Packet collision at the relay node. S_{b} represents the packet from the BS and S_{s} represents the packet from node S
At the second time slot, since node R cannot decode the collision packet, the collision packet will be amplify-forwarded to node D. The collision packet can be decoded at node D with the assitance of the packet obtained from the BS at the first time slot. Based on this observation, we come up with a interference cancellation scheme to decode the collision packet at node D.
Now we use the equation to describe the communication process. The packet from node S to node D is expressed as
S
, and the packet fromthe BSto node D is represented by
X
. At the first time slot
T
_{1}
, the signals received by node R and node D can be expressed as follows, respectively
At the second time slot
T
_{2}
, the signal received by node D can be expressed as:
where
H
represents the channel matrix between two nodes (the subscript) and we suppose that node D and node R can obtain
H
. We use
α
to denote the forward amplification factor of node R.
N
_{0}
,
N
_{1}
and
N
_{2}
represent Gaussian additive white noises.
Put (1) into (2) and(3), we have two linear equations with two unknown variables, thus node D can get
S
and
X
:
If the channel condition is good enough, i.e., the signal-to-noise ratio (SNR) of data from the BS to node D and the SNR of data from node S to node R are adequately high, the noise signal
N
_{0}
,
N
_{1}
and
N
_{2}
can be negligible. If the relay forward amplification factor
α
is 1, then
S
and
X
can be simplified as :
Clearly, this is a closed-form expression, which can be solved directly with low complexity.
S
→
R
,
R
→
D
) is denoted by
r_{s}
(in bit/second), the rate of
BS
→
D
is denoted by
r_{b}
(in bit/second). The length of the packet, which is defined as the number of contained bits, is denoted by
l_{s}
(for packet from node S to node D) and
l_{b}
(for packet from BS to node D), they are the same for both schemes. The completion time (in second) of the communication process is
t_{s}
(for packet from node S to node D) or
t_{b}
(for packet from the BS to node D). For each scheme (
Table 1
,
Table 2
), we have the following equations:
For the conventional scheme, the total transmission time is
The total transmission rate is
If we use the interference cancellation scheme, the total transmission time is
Here
represents the overlapping time for a collision packet.
Clearly, the total transmission rate is
The ratio of
r_{IC}
to
r
can be obtained as follows
We assume that
l_{s}
=
l_{b}
and the data rate in each time slot is the same (
r_{BS → D}
=
r_{S → R}
=
r_{R → D}
) for both schemes, thus we have
t_{sr}
=
t_{rd}
=
t_{b}
for both schemes. The transmission sequence is illustrated in
Fig. 3
. According to the above equations, we know that the interference cancellation scheme can improve the overall transmission rate by up to 50% if the overlapping time at the first time slot is close to
t_{b}
or
t_{sr}
. However, the throughput would be degraded when the interference caused by the proposed scheme results in a high bit error rate (BER).
Transmission sequence and collision packet at the relay node
S_{s}
and
S_{b}
represent the packets from node S and the packet from the BS, respectively.
y_{R}
(t) represents the continuous-time signal received by node R at the first time slot.
y_{RD}
(t) represents the continuous-time signal received by node D at the first time slot.
y_{RD}
(t) represents the continuous-time signal received at the second time slot from node R to node D. . Moreover,
y_{R}
[
k
] =
y_{R}
[
kT_{s}
] ,
k
is an integer. To simplify the analysis, we assume that the BPSK (Binary Phase Shift Keying) modulation is adopted in the system, so that in each time slot we have
y_{R}
[
k
] =
y_{R}
(
kT_{s}
) ,
y_{D}
[
k
] =
y_{D}
(
kT_{s}
) ,
y_{RD}
[
k
] =
y_{RD}
(
kT_{s}
) ∈ {-1, 1}
^{2}
[4]
. Notice that, the analysis can also be extended to other modulation cases. The continuous-time signals received by node R and node D can be represented as follows:
Combining (15) and (16) with (17), we have
Then, (15) and (18) need to be solved. Specifically, compute
s_{RD}
(t) by using (15), which represents the estimate of
s_{b}
. Therefore,
y_{RD}
(t) without interference in (18) can be expressed as:
If the BER of
s_{b}
(t) (the estimate of
s_{b}
(t) ) is
P_{b}
, we have additional estimation error
e_{b}
[
k
- Δ
_{1}
] =
s_{b}
[
k
- Δ
_{1}
] -
s_{b}
[
k
- Δ
_{1}
] ∈ {-2, 0, 2} according to (19),. For a given channel, the BER of the data from node S can be expressed as:
If the BPSK modulation Q (which is defined as:
) is uniformly distributed, in equation (20) the two elements of the right side are equal. So we have
According to (19),
w
(t) consists of three parts actually, due to the method of interference cancellation. Then, the error probability of
w
(t) also consists of three parts.
Here
h_{RD}
z
_{2}
(
t
) +
z
_{3}
(
t
) is AWGN (Additive White Gaussian Noise) with variance
Next, we define
, then,
means that function
V
just takes the real part. Therefore, the probability of
V
can be described by function
Q
(
x
) , where
. The two elements in (23) also have similar expressions.
If we define
then
P_{s}
(
k
) can be expressed as
Here
S_{b}
from the BS correctly. At the second time slot, node D receives the packet from node R, then, it compares the packet with the former one and makes the correlation to get the exact location of the collision point. Notice that, the correlation spikes when the correlated former message aligns with the same part in the second time slot message
[14]
.
The decomposition of the collision packet
If the length of
S_{b}
is
M
, we have
which are exactly the same in fact. If we take interference and different route path into consideration, such two packets can be different. We can decode
S_{b}
with SISO and iterative decoding to reduce the BER. The process is shown in
Fig. 5
.
The flow diagram for iterative decoding
Generally, the decoding process is similar with the Turbo code decoding. The Decoder1 decodes the
first, and then the Decoder2 will take Decoder1's output LLR (Loglikelihood Ratio) as extrinsic information to decode
. Similarly, the Decoder2 decodes
, and then the Decoder1 will take Decoder2's output LLR as the extrinsic information to decode
. The iteration is done until the difference between adjacent verdicts is small enough, they will output the final result.
The decoding process uses the time diversity characteristics of signal
S_{b}
to reduce the BER. This is also beneficial for other parts of the decoding.
In a practical system, the frequency of the transmitter and the receiver are not often completely uniform, so there is a problem of frequency offset. Frequency offset can result in a time-linear distortion increasing on phase, i.e.,
y
[
k
] =
Hx
[
k
]
e
^{j2πkδfT}
+
z
[
k
] , so the receiver has to estimate
δf
for compensation.
In a time slot, frequency offset will not change dramatically. We can obtain the coarse estimate of the initial deviation from the part without collisions (like
S_{s}
at the duration Δ
_{1}
in
Fig. 4
) first. This coarse estimate is not sufficient because any residual error in the sub-packet will affect the next sub-packet and be accumulated in the linear phase distortions of the period. As a result, when we reconstruct the collision packet
C
(As shown in
Fig. 4
),
s_{s}
[
k
],
k
∈ { Δ
_{1}
+1, Δ
_{1}
+2,…
N
} ;
s_{b}
[
k
],
k
∈ { 1, 2,…Δ
_{2}
} , we have to track the phase.
If we subdivide the part of collision (that is collision part in
Fig. 4
), as showed in
Fig. 6
, then the relationship between adjacent parts, i.e., the block of slash lines and the block of horizontal lines (at right side in
Fig. 6
) of the frequency offset can be estimated by the following formula:
Part of the subdivision map for part of collision
We can use the tail of
S_{b}
(
Fig. 4
), which is interference-free to estimate
δf
_{1}
and
δϕ
. The collision part of
S_{b}
can be estimated by the signal received by node D at the first time slot. The estimated packet
s_{b}
is the block of horizontal lines. Then, compute the estimated value
s_{s}
at the corresponding position in
S_{s}
,which is the block of vertical lines in
Fig. 6
.Clearly, when node D estimating value
s_{s}
, it does not know the frequency offset in
S_{s}
. The frequency offset in
S_{s}
can be estimated by the interference-free part in
S_{s}
by using (24). We can perform the reconstruction of
S_{s}
(the block of vertical lines)with the estimated value of the frequency offset. It can be brought into collision part to re-evaluate the block of slash lines. For the following parts, the method to deal with the white blocks is just like the method to deal with the block of slash lines and the block of horizontal lines before. As depicted in
Fig. 7
, we can step through the iterative manner to calibrate the deviation. Specifically, the iterative termination condition is that the difference between adjacent estimated values of the frequency offset is less than an extremely tiny value.
The flow diagram for iterative reconstruct data decoding
We have just described the way of the forward recovery process. Similarly, the recovery process of
S_{s}
can be done in the backward direction. The final output considers both forward and backward results of the recovery processes. The same principles and strategies can be used to solve the transmission problem of the sampling offset and the final result can take all of them into consideration.
Normalized throughputs of conventional scheme and interference cancellation scheme when the SNR of the BS is 20DB
In
Fig. 9
, we set the SNR of the BS to 14DB. In such situation, some data from the BS cannot be decoded correctly, thus the BER performance is average. The normalized throughput of the BS is below 0.4, which means that about 20% data had been re-transmitted. As the SNR of the D2D link increases, the proposed scheme performs much better than the conventional scheme. The ratio of maximum normalized throughputs of two schemes is 0.7911 to 0.627, which means the gains can up to 26% when the channel condition of the BS is medium.
Normalized throughputs of conventional scheme and interference cancellation scheme when the SNR of the BS is 14DB
In
Fig. 10
, we set the SNR of the BS to 12DB. The throughput of the BS shows really unsatisfactory performance. In such situation, the proposed scheme loses its advantage. The reason lies in the fact that it is difficult for node D to decode the data from the BS, which means it is difficult to figure out the base data of the collision packet. Therefore, the node D cannot perform the interference cancellation effectively. We can find that it is not suitable to utilize the proposed scheme when the channel condition of the BS is bad.
Normalized throughputs of conventional scheme and interference cancellation scheme when the SNR of the BS is 12DB
Finally, the relationship between the SNR and the BER of the data from node S to node D is illustrated in
Fig. 11
, where X-axis represents the SNR of data S and Y-axis represents the BER of data S. The blue curve represents that the SNR of the BS is -20DB. The red curve represents that the SNR of the BS is 0DB. The black curve represents that the SNR of the BS is 20DB.We could obtain that, when the SNR of the data from the BS is -20DB,
p_{b}
(the BER of the data from the BS) varies from 0.4325 to 0.4667. The blue curve shows that the BER of data S is around 0.44. From the previous derivation, we know that the vibration range is related to the variance of the noise. A smaller variance shows a gradual decreasing trend. In this simulation, the variance of the noise does not change, and therefore the vibration range is substantially similar during the whole process.
p_{s}
(the BER of data from node S) does not increase as the SNR of data S increases. However, it approaches a stable value as the SNR of data S increases. The red curve represents that node D receives the data from the BS when the SNR of the data from the BS is 0DB. At this time,
p_{b}
approaches 0.10. We can find that, under such scenario, the BER of data S is related to both
p_{b}
and
p_{s}
. When the SNR of data S becomes larger,
p_{s}
becomes smaller and approaches a stable value as the SNR of data S increases. From the previous derivation, we know that
p_{s}
is related to
p_{b}
at this time. Similar to the blue curve, the vibration range is related to the variance of the noise. The black curve represents that node D receives the data from the BS when the SNR of data from BS is 20DB. As the SNR of data S increases,
p_{s}
approaches zero. Clearly, the numerical results are consistent with our theoretical derivations.
The relationship between the SNR and the BER of the data from node S when they are decoded at node D, the blue line represents the case that the SNR of the BS is -20DB, the red line represents the case that the SNR of the BS is 0DB, the black line represents the case that the SNR of the BS is 20DB
In short, the simulation told us when the channel condition of the BS is good or not too bad, the proposed scheme performs much better than the conventional scheme. However, when the channel condition of the BS is really bad, the node D cannot perform the interference cancellation effectively.
Multi relay-forward case
As illustrated in
Fig. 13
, it needs to eliminate the white part packet first since the relay can receive the complete white part packet. The correlation calculation can find the exact location in the collision packet, and it can be removed. In this case, if it needs
k
relay nodes to complete D2D communication, the conventional scheme takes
k
+ 1 time slots to obtain the data from node S. By using the interference cancellation scheme, node D not only obtains one packet from node S in the
k
+ 1 time slots but also obtains
k
packets from the BS.
Collision packet in a multi relay-forward case
Considering the number of data packets transferred per unit time, the packets rate R, in conventional scheme:
By using the interference cancellation scheme:
compare (25) and (24) we have:
We can see that as
K
become larger, using the interference cancellation scheme will have greater improvement in relay-assisted D2D communication, under the condition that a certain level of BER is tolerable.
Thus, the total throughput of node D can be significantly increased.
Hongyi Zhao is a PhD student in School of Electronics Information and Communications, Huazhong University of Science and Technology, Wuhan, P. R. China. He received the B.S. degree in information and communication engineering at Huazhong University of Science and Technology, Wuhan, P. R. China in 2010. In the following year, he was sent directly to study for the doctorate in information and communication engineering at Huazhong University of Science and Technology. He mainly carries on the research of D2D communication, the distributed cooperation and the capacity of communication system.
Yang Cao is currently an assistant professor in School of Electronics Information and Communications, Huazhong University of Science and Technology, Wuhan, P. R. China. He received the Ph.D degree and B.S. degree in information and communication engineering at Huazhong University of Science and Technology, Wuhan, P. R. China in 2014 and 2009, respectively. From 2011 to 2013, Dr. Yang Cao worked in School of Electrical, Computer, and Energy Engineering, Arizona State University in United States as a visiting scholar. His research interests include resource allocation for cellular device-to-device communications and smart grids. Dr. Yang Cao has coauthored more than 20 papers on refereed IEEE journals and conferences. He was awarded CHINACOM Best Paper Award in 2010 and awarded Microsoft Research Fellowship in 2011.
Yingzhuang Liu is Yingzhuang Liu is a professor of Huazhong University of Sci.&Tech. (HUST). His main research field is broadband wireless communication, including LTE and IMT Advanced system, etc., especially its Radio Resource Management. From 2000 to 2001, hes was a postdoctoral researcher in Paris University XI. From 2003 up to now, he has presided over 10 national key projects, published more than 80 papers and held more than 30 patents in the field of broadband wireless communication. He is now the group leader of broadband wireless research of HUST, which has more than 10 young teachers and more than 20 PhD students. Yingzhuang Liu is a professor of Huazhong University of Sci.&Tech. (HUST). His main research field is broadband wireless communication, including LTE and IMT Advanced system, etc., especially its Radio Resource Management. From 2000 to 2001, he was a postdoctoral researcher in Paris University XI. From 2003 up to now, he has presided over 10 national key projects, published more than 80 papers and held more than 30 patents in the field of broadband wireless communication. He is now the group leader of broadband wireless research of HUST, which has more than 10 young teachers and more than 20 PhD students.

1. Introduction

2. System Model

The basic scenario with two types of communication mode is depicted in
Fig. 1
. Specifically, one mode is cellular communication mode, i.e., users communicate with the base station (BS) through the coordination and scheduling of the BS. The other mode is D2D communication mode, in which users communicate with each other directly or via relay nodes. In such scenario, there are several cellular users and D2D users share the downlink frequency of the cellular network in underlaying method.
PPT Slide

Lager Image

The timeline of the conventional scheme

PPT Slide

Lager Image

The timeline of the proposed scheme

PPT Slide

Lager Image

3. Using the interference cancellation scheme to improve the spectrum efficiency

The communication process can be described as follows: at the first time slot, node S sends the packet to relay node R, and the BS transmits packet to the node D at the same time slot. At this instant, we can imagine that node D can decode the complete packet from the BS, which is interference-free, while relay node R gets a collision packet. Since the collision packet consists of two different packets from two different sources, the collision of packets will be slightly staggered over the timeline as shown in
Fig. 2
even though node S and the BS transmit packets at the same time slot.
PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

4. The performance analysis

We assume that the data transmission is synchronous at the packet-level, while it is asynchronous at the symbolic-level. In this section, we will theoretically analyze the impact of the proposed scheme on the system performances of the relay-assisted D2D communication.
- 4.1 The impact on the throughput performance

We first analyze the impact on the system throughput. The rate of D2D communication (
PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

- 4.2 The impact on the BER performance

In this section, we will analyze the impact of the interference cancellation scheme on the BER.
Based on equations (1) - (7), the collision packet can be decoded accordingly.
Generally, the distance between node S and node R is relatively shorter than the distance between the BS and node R. We assume that the packet from node S arrives at node R first. In fact, if the packet from the BS arrives at R first, the process of analysis is similar.
In
Fig. 3
, we suppose that
PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

- 4.3 Improve the BER performance

To improve the BER performance of the proposed scheme, the decoding accuracy can be enhanced based on SISO (Soft-In Soft-Out) and iterative decoding, thus the error propagation can be mitigated in the presence of collisions. This section primarily introduces how to further reduce the BER, and how to manage the frequency offset and the sample offset problems that may arise in practical scenarios.
As shown in
Fig. 4
, at the first time slot, node D decodes packet
PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

5. Numerical Results

In this section, we compare the numerical results of the conventional scheme and the interference cancellation scheme. We focus on the normalized throughput, which is the ratio of the actual rate of correct data to the theoretically maximum data rate at certain duration. It is clear that a higher BER renders a lower throughput.
Fig. 8
shows the normalized total throughput, throughput of the BS (data from the BS to node D), throughput of D2D (data from node S to node D). The total throughput means the sum throughputs at node D of the data streams from the BS and node S. We can observe that the total throughput will increase when the SNR of the D2D link increases if the SNR of the BS is perfect (e.g., 20DB). When the throughput of the D2D link reaches its maximum value, the proposed scheme can reach a much higher total throughput. If the SNR of the D2D link is good enough (e.g., 20DB or more), the total throughput could reach 1. By contrast, the maximum total throughput of the conventional scheme is around 0.667. It is not difficult to understand why the proposed scheme can reach 1. When the channel condition is good, one half of the valid data comes from the BS (it sends one packet in one time slot and then keep silent for one time slot), the other one half of the valid data comes from node S (it sends one packet in two time slot). In the simulation, we assume that the BS and node S send the same amount of data, and each packet has a fixed length. For the conventional scheme, it has to send two packets at three time-slots even with a good channel condition, so it can just achieve 0.667 throughput as the SNR of the D2D link increases.
PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

6. Multi relay-forward case

Multi-hop relay-assisted D2D seems to be a field which is still untapped. In this section, we will discuss the proposed scheme applied to a multi-hop relay-assisted D2D case.
As illustrated in
Fig. 12
, the proposed scheme is applied to a multiple relay-assisted case. Specifically, before each forwarding behavior, each relay node is required to exclude the known interference of the previous relay node first, and then forwards the received data to the next relay node. Since the current relay could receive the packet from the BS, which is the interference at the former relay, the current relay has the condition to figure it out. That means the last packet from the BS received by the current relay can be excluded from the collision packet comes from the former relay.
PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

PPT Slide

Lager Image

7. Conclusions

In this paper, we have presented a scheme to improve the performance of the relay-assisted D2D communication system in cellular communication networks, with the help of ZigZag decoding and interference cancellation. The proposed scheme can guarantee that both cellular communication and D2D communication achieve higher total throughputs in the condition of good BS channel. Moreover, we have theoretically proved that the proposed scheme can achieve a satisfactory BER performance. Numerical results have verified the effectiveness of the proposed scheme compared to the conventional scheme.
BIO

Xia W.
,
Shao S.
,
Sun J.
“Relay selection strategy for device to device communication,”
IET International Conference on Information and Communications Technologies (IETICT)
2013
318 -
323

Kaufman B.
,
Aazhang B.
“Cellular networks with an overlaid device to device network,”
Asilomar Conference on Signals, Systems and Computers
2008
1537 -
1541

Li J. C. F.
,
Lei M.
,
Gao F.
“Device-to-device (D2D) communication in MU-MIMO cellular networks,”
IEEE GLOBECOM
2012
3583 -
3587

Zhang X.
,
Shin K. G.
“DAC: distributed asynchronous cooperation for wireless relay networks,”
IEEE INFOCOM
2010
1 -
9

Asadi A.
,
Wang Q.
,
Mancuso V.
“A survey on device-to-device communication in cellular networks,”
IEEE Communications Surveys & Tutorials

Vanganuru K.
,
Ferrante S.
,
Sternberg G.
“System capacity and coverage of a cellular network with D2D mobile relays,”
IEEE MILCOM
2012
1 -
6

Ma X.
,
Yin R.
,
Yu G.
,
Zhang Z.
“A distributed relay selection method for relay assisted device-to-device communication system,”
IEEE PIMRC
2012
1020 -
1024

Wen S.
,
Zhu X.
,
Lin Z.
,
Zhang X.
,
Yang D.
“Distributed resource management for device-to-device (D2D) communication underlay cellular networks,”
IEEE PIMRC
2013
1624 -
1628

Laneman J. N.
,
Tse D. N. C.
,
Wornell G. W.
2004
“Cooperative diversity in wireless networks: efficient protocols and outage behavior,”
IEEE Transactions on Information Theory
50
(12)
3062 -
3080
** DOI : 10.1109/TIT.2004.838089**

Hucher C.
,
Sadeghi P.
2012
“Embracing asynchronism: achieving cooperative diversity using Zigzag interference cancellation,”
IEEE Transactions on Wireless Communications
11
(9)
3240 -
3249
** DOI : 10.1109/TWC.2012.061912.111416**

Wen S.
,
Zhu X.
,
Lin Y.
,
Lin Z.
,
Zhang X.
,
Yang D.
“Achievable transmission capacity of relay-assisted device-to-device (D2D) communication underlay cellular networks,”
IEEE VTC Fall
2013
1 -
5

Wang L.
,
Peng T.
,
Yang Y.
,
Wang W.
“Interference constrained D2D communication with relay underlaying cellular networks,”
IEEE VTC Fall
2013
1 -
5

Wang L.
,
Peng T.
,
Yang Y.
,
Wang W.
“Interference constrained relay selection of D2D communication for relay purpose underlaying cellular networks,”
in Proc. of International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM)
2012
1 -
5

Shyamnath G.
,
Dina K.
“ZigZag decoding: combating hidden terminals in wireless networks,”
ACM SIGCOMM
2008
159 -
170

Rahman M. S.
,
Li Y.
,
Vucetic B.
2010
“An iterative Zigzag decoding for combating collisions in wireless networks,”
IEEE Communications Letters
14
(3)
242 -
244
** DOI : 10.1109/LCOMM.2010.03.092252**

Hasan M.
,
Hossain E.
“Distributed resource allocation for relay-aided device-to-device communication: a message passing approach,”
IEEE Transactions on Wireless Communications

Xie P.
,
Li L.
,
Zhu J.
,
Jin J.
,
Liu Y.
2013
“Cooperative spectrum leasing using parallel communication of secondary users,”
KSII Transactions on Internet and Information Systems
7
(8)
1770 -
1785
** DOI : 10.3837/tiis.2013.08.002**

Chen D.
,
Chang G.
2012
“A survey on security issues of M2M communications in cyber-physical systems,”
KSII Transactions on Internet and Information Systems
6
(1)
24 -
45

Cao Y.
,
Chen X.
,
Jiang T.
,
Zhang J.
“SoCast: social ties based cooperative video multicast,”
IEEE INFOCOM
2014
415 -
423

Cao Y.
,
Jiang T.
,
Wang C.
,
Zhang L.
2012
“CRAC: cognitive radio assisted cooperation for downlink transmissions in OFDMA-based cellular networks,”
IEEE Journal on Selected Areas in Communications
30
(9)
1614 -
1622
** DOI : 10.1109/JSAC.2012.121004**

Cheng R.
,
Huang C.
,
Cheng G.
“A D2D cooperative relay scheme for machine-to-machine communication in the LTE-A cellular network,”
in Proc. of International Conference on Information Networking (ICOIN)
2015
153 -
158

Ye Q.
,
Al-Shalash M.
,
Caramanis C.
,
Andrews J.G.
2015
“Distributed resource allocation in device-to-device enhanced cellular networks,”
IEEE Transactions on Communications
63
(2)
441 -
454
** DOI : 10.1109/TCOMM.2014.2386874**

Citing 'Interference Cancellation for Relay-Assisted D2D Communication
'

@article{ E1KOBZ_2015_v9n9_3276}
,title={Interference Cancellation for Relay-Assisted D2D Communication}
,volume={9}
, url={http://dx.doi.org/10.3837/tiis.2015.09.001}, DOI={10.3837/tiis.2015.09.001}
, number= {9}
, journal={KSII Transactions on Internet and Information Systems (TIIS)}
, publisher={Korean Society for Internet Information}
, author={Zhao, Hongyi
and
Cao, Yang
and
Liu, Yingzhuang}
, year={2015}
, month={Sep}