Font Size: a A A

Study On Resource Reuse And Interference Coordination Techonlogy Of D2D Communication In Lte System

Posted on:2016-09-17Degree:MasterType:Thesis
Country:ChinaCandidate:L KongFull Text:PDF
GTID:2298330467491981Subject:Electronics and Communications Engineering
Abstract/Summary:PDF Full Text Request
With the development of wireless communication technologies, the requirement of data transfer rate, network capacity and spectrum efficiency of communication system become higher. In order to meet such quirement of system performence, device-to-device communication was raised as a promising technology. Now, D2D technology has been in standard process of LTE-Advanced system and it will be a key technology of the future hybird networks. D2D communication can worked in overlay modole and underlay model. Especially in underlay modle, D2D communication should worked together with the cellular network systems, so how to solve the interference between D2D system and cellular system is the major problem which the hybrid network faced.First of all, the research background and contents are outlined. Then, a brief introduction to the state-of-the-art of D2D technology is given, including the session management, channel measurement and model selection. And then emphatically summarized the resource allocation algorithm with that the D2D communication are in underlay work mode.Then, the thesis presents a mathematical model allowing multiple D2D user pairs sharing multiple cellular users’resources in one cell and designs the corresponding distributed interference coordination algorithm based on the Lagrangian dual decomposition method. By numerical simulation of the proposed algorithm, it is proved that the proposed resource management schemes can satisfy the interference constraints and achieve high system capacity.Further more, the thesis puts forward a mathematical which CUE resources should be reused in the presence of multiple eavesdroppers. Then the paper analyzed how eavesdroppers influence the D2D communication resource allocation strategy when they can choose eavesdrop channels intelligently. And a non-cooperative game model was set up based on non-cooperative game theory and utilize security rate as the rules of security communication. Finally makes the channel selection strategy of D2D users and eavesdroppers convergence to the mixed strategy Nash equilibrium. The simulation results show that paper in the proposed algorithm is of good performance.
Keywords/Search Tags:D2D, resource reuse, Lagrangian dualdecomposition, non-cooperative game theory
PDF Full Text Request
Related items