Opportunistic Spectrum Sharing for D2D-Based URLLC

被引:16
作者
Chu, Zheng [1 ]
Yu, Wenjuan [1 ]
Xiao, Pei [1 ]
Zhou, Fuhui [2 ,3 ]
Al-Dhahir, Naofal [4 ]
ul Quddus, Atta [1 ]
Tafazolli, Rahim [1 ]
机构
[1] Univ Surrey, Inst Commun Syst, 5G Innovat Ctr, Guildford GU2 7XH, Surrey, England
[2] Nanjing Univ Aeronaut & Astronaut, Coll Elect & Informat Engn, Nanjing 210000, Jiangsu, Peoples R China
[3] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
[4] Univ Texas Dallas, Dept Elect & Comp Engn, Dallas, TX 75080 USA
基金
英国工程与自然科学研究理事会;
关键词
Finite block-length codes; URLLC; average achievable rate; performance analysis; optimal power allocation; LOW-LATENCY COMMUNICATIONS; COMMUNICATION; RADIO;
D O I
10.1109/TVT.2019.2931625
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A device-to-device (D2D) ultra-reliable low latency communications network is investigated in this paper. Specifically, a D2D transmitter opportunistically accesses the radio resource provided by a cellular network and directly transmits short packets to its destination. A novel performance metric is adopted for finite block-length code. We quantify the maximum achievable rate for the D2D network, subject to a probabilistic interference power constraint based on imperfect channel state information. First, we perform a convexity analysis that reveals that the finite block-length rate for the D2D pair in short-packet transmission is not always concave. To address this issue, we propose two effective resource allocation schemes using the successive convex approximation based iterative algorithm. To gain more insights, we exploit the monotonicity of the average finite block-length rate. By capitalizing on this property, an optimal power control policy is proposed, followed by closed-form expressions and approximations for the optimal average power and the maximum achievable average rate in the finite block-length regime. Numerical results are provided to confirm the effectiveness of the proposed resource allocation schemes and validate the accuracy of the derived theoretical results.
引用
收藏
页码:8995 / 9006
页数:12
相关论文
共 34 条
[1]  
Abramowitz A., 1964, Handbook of Mathematical Functions
[2]  
Ali Kamran, 2016, 2016 IEEE Wireless Communications and Networking Conference: Workshops (WCNCW), P206, DOI 10.1109/WCNCW.2016.7552700
[3]   Disaster Management Using D2D Communication With Power Transfer and Clustering Techniques [J].
Ali, Kamran ;
Nguyen, Huan X. ;
Quoc-Tuan Vien ;
Shah, Purav ;
Chu, Zheng .
IEEE ACCESS, 2018, 6 :14643-14654
[4]  
Ali K, 2015, 2015 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATION WORKSHOPS (PERCOM WORKSHOPS), P537, DOI 10.1109/PERCOMW.2015.7134094
[5]  
[Anonymous], 2016, CONVEX ANAL GLOBAL O
[6]  
[Anonymous], 2017, P IEEE GLOB WORKSH G
[7]  
[Anonymous], 2018, TSG RAB WG1 M 92 MAR, V92
[8]   A Survey on Device-to-Device Communication in Cellular Networks [J].
Asadi, Arash ;
Wang, Qing ;
Mancuso, Vincenzo .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1801-1819
[9]  
Ben-Tal A., 2001, LECT MODERN CONVEX O
[10]  
Boyd S., 2004, Convex Optimization.