1. Introduction
The explosive growth of mobile devices and wireless services results in unprecedented increase of traffic load in cellular system [1]. To cope with this challenging problem, device-to-device communications (D2D) and NOMA are considered as two promising technologies in the fifth generation (5G) wireless communication to improve spectrum efficiency [2].
D2D communications enable two adjacent users can communicate with each other, thus can provide flexible mobile local service, and offload the heavy traffic of base station [3]-[4]. By D2D communication, one mobile user can be directly served by one nearby user who stores his requested contents, instead of by the base station. Through direct communications between mobile users, the heavy traffic of base station can be offloaded, especially for the services in which a group of people request some popular contents they are all interested with, such as live football match or web conference [5]. D2D communications can be implemented as an underlay network to the cellular network, and the transmission power of cellular links and D2D links should be coordinated efficiently to avoid harmful interference to cellular users [6][7]. However, despite of all the benefits brought by D2D communication, the performance of cellular link is not benefited.
To tackle this problem, relaying based D2D communications have been explored in recent years, in which a D2D transmitter also acts as a relay to assist cellular transmission [8]. The benefits of relaying based D2D communication include the following three folds. Firstly, the base station can offload its heavy traffic. Secondly and D2D link can achieve a high spectral efficiency. Thirdly, the performance of cellular link can be improved because of the relaying of D2D transmitter. In short, both D2D links and cellular links can be benefited in this scheme. A half-duplex relaying based D2D communication scheme is proposed in [9], and a power allocation problem is investigated to maximize the achievable rates of D2D link under the constraints on rate requirement of cellular link. In [10], a full-duplex relaying based D2D communication scheme is proposed and the optimal power allocation at the base station and D2D transmitter are derived in closed-form to maximize the achievable transmit rate of D2D link while guaranteeing the QoS of cellular user. In [9] and [10], D2D transmitter forward signals to cellular user and transmit its own signals to D2D receiver simultaneously. Cellular user and D2D receiver access the channel at the same time and each receives its desired signals while treats other user’s signal as interference.
NOMA is considered as promising radio access technology for future cellular system and can achieve significant improvement in spectral efficiency by allowing multiple users to share the same spectrum resource in power domain [11][12]. To avoid the inter-user interference in NOMA network, successive interference cancellation (SIC) technique is applied to decode the received signals. Inspired by the potential benefits of NOMA, many researchers have explored NOMA schemes in different kinds of communications, such as cooperation communications [13], machine-to-machine communications [14] and wireless powered communication network [15]. Several works have been carried out to the performance analysis and optimization of NOMA, including spectral efficiency [16], energy efficiency [17] and physical layer security [18]. Recently, few works have been done so far to explore NOMA in D2D communications. In [19], NOMA transmission is utilized in a D2D group in which one D2D transmitter communicate with multiple D2D receivers simultaneously, and resource allocation problem is investigated. A full-duplex device-to-device aided cooperative NOMA scheme is proposed in [20], in which the NOMA-strong user forwards signals to NOMA-weak user, and the outage probability is derived under the proposed scheme.
Considering performance improvement achieved by NOMA, in this paper we exploit NOMA technique in full-duplex relaying based D2D communications and propose a novel full-duplex NOMA relaying based D2D communication scheme, in which a full-duplex D2D transmitter not only performs direct communication with D2D receiver, but also acts as a full-duplex relay for cellular user. Different from schemes proposed in [9] and [10], the D2D transmitter sends signals to D2D receiver and cellular user in NOMA scheme. Different from [20], the D2D transmitter not only forward data to cellular user, but also has its own data to send. Comparing with above works, the main contributions of this paper are as follows:
1) We propose a novel full-duplex NOMA relaying based D2D underlay communication scheme, by assigning D2D transmitter as full-duplex relay to assist cellular downlink transmission. Specifically, D2D transmitter sends superposition signals to D2D receiver and cellular user in NOMA scheme.
2) Furthermore, we formulate the power allocation problem as maximizing achievable rate of D2D link under the cellular user’s transmit rate constraint and aggregate power constraint. To tackle the power allocation problem, the orignal problem is transformed into a linear fractional programming by variable replacements and solved by linear fractional programming method. Furthermore, we derive the closed-form solution of optimal transmit power on the BS and the D2D transmitter, as well as the optimal power fraction on D2D transmitter.
2. System Model and Problem Formulation
2.1 System Model
We consider a cellular system with one base station (BS), one cellular user (CU) and one D2D pair, which is composed of one D2D transmitter (DT) and one D2D receiver (DR), as illustrated in Fig. 1. Assume DT is equipped with isolated transmit and receive antennas to facilitate full-duplex transmission.
Fig. 1. System Model
During the transmission, DT transmits signals to DR by underlying spectral frequency of CU. Meanwhile, DT acts as a full-duplex relay for cellular downlink transmission and forwards signals to CU. In each timeslot, DT receives cellular signals from BS, while suffers the self-interference from its transmit antenna. Meanwhile DT transmits a superposition signal composed by the regenerated signal which is received from BS and requested by CU, and its own signal which is requested by DR. CU receives the forwarded signal which is originally transmit by the base station and regards the DT’s own signals as interference. DR receives its desired signal from DT and regards the CU’s signals as interference.
To improve the spectral efficiency, DT transmits the superposition signal to CU and DT in NOMA scheme. Successive interference cancellation technique is applied at CU and DR to cope with the multi-user interference.
hB,T denotes the channel coefficient between BS and DT. hT,C and hT,R denote the channel coefficients between DT and CU, DT and DR respectively. hB,C, hB,R denote channel coefficient from BS to CU and DR respectively. Assume DT operates in full-duplex mode with resident self-interference. hLI denotes the equivalent channel coefficient between DT’s transmit antenna to receive antenna after self-interference cancellation. All the channels are modeled as narrow-band quasi-static and frequency-flat-fading channels. Assume the BS and DT can acquire all the channel state information.
In a practical cellular system, the CSI of each channel can be derived as follows. hB,C, hB,R and hB,T are measured by CU, DR and DT respectively and feedback to the BS. hLI which is determined by the physical channel between the transmit antenna and receive antenna of DT as well as the self-interference cancellation technology, can be measured by the DT and feedback to BS. hT,C and hT,R are measured by CU and DR respectively and feedback to the BS.
Denote PB and PT as the transmit power of BS and DT. When DT receives the signal from BS, the signal to interference and noise (SINR) can be represented as
\(\gamma_{B, T}=\frac{P_{B} g_{B, T}}{P_{T} g_{L I}+1}\) (1)
where gB,T and gLI denote the channel to noise ratio (CNR) of channel h,B,T and hLI respectively, \(g_{B, T}=\left|h_{B, T}\right|^{2} / \sigma^{2}, g_{L I}=\left|h_{L I}\right|^{2} / \sigma^{2} \cdot \sigma^{2}\) denote the covariance of the noise at DT.
We assume that the DT operates as a full-duplex decode and forward (DF) relay for CU. DT receives the signals transmitted by BS, superposes it with its own signals requested by DR and then broadcasts the superposition signals to CU and DR. Thus the superimposed signal transmitted by DT is composed of two parts. The first part is the regenerated signal received from the BS and forwarded to the CU. The second part is signal requested by DR from DT.
The superposition signal transmitted by DT can be represented as
\(x_{T}=\sqrt{\alpha P_{T}} x_{C}+\sqrt{(1-\alpha) P_{T}} x_{R}\) (2)
where xC and xR denote the signals required by CU and DR respectively, (1−α)PT denotes the power allocated to D2D link, and αPT denotes the power allocation to CU. We denote α as power partition factor, 0≤α≤1.
The the achievable transmission rate received by DR and CU can be respectively derived as
\(R_{D R}=W \log _{2}\left(1+\gamma_{T, R}\right)\) (3)
\(R_{C U}=W \log _{2}\left(1+\gamma_{B, C}\right)\) (4)
where \(\gamma_{T, R}\) denote the SINR received by DR, \(\gamma_{B, C}\) denote the equivalent end-to-end SINR received by CU, which is dependent on the worse SINR between two hops, \(\gamma_{B, C}=\min \left(\gamma_{B, T}, \gamma_{T, C}\right)\), where \(\gamma_{B, T}\) and \(\gamma_{T, C}\) are the received SINR of DT and CU respectively. The expressions of \(\gamma_{T, C}\) and \(\gamma_{T, R}\) are discussed in the following.
2.2 Problem Formulation
We aim to maximize the achievable transmit rate of D2D link, while guarantee the QoS requirement of CU, in terms of minimum transmit rate. The optimization problem can be formulated as
\(\max _{P_{B}, P_{r}, \alpha} R_{D R}\) (5a)
\(\text { s.t. } \quad R_{C U} \geq R_{\min }^{C}\) (5b)
\(P_{B}+P_{T} \leq P_{\max }\) (5c)
\(P_{B} \geq 0, P_{T} \geq 0\) (5d)
\(0 \leq \alpha \leq 1\) (5e)
Constraint (5b) represent the minimum transmit rate requirement of CU and constraints (5c) represent the total power limit.
Since DT transmit signals to DR and CU simultaneously by applying NOMA transmission protocol, the successive interference cancellation (SIC) can be carried out at the user (DR or CU) with stronger channel, which is usually termed as NOMA-strong user. Thus we analyze the optimization problem (5) in the following two cases considering the relationship of DR’s and CU’s channels.
Case 1: \(g_{T, R} \geq g_{T, C}\), where gT,R and gT,C denote the CNR of channel hT,R and hT,C, \(g_{T, R}=\left|h_{T, R}\right|^{2} / \sigma^{2}, g_{T, C}=\left|h_{T, C}\right|^{2} / \sigma^{2}\). In this case, since the CNR of DR is better than that of CU, we term DR as NOMA-strong user. Correspondingly, the CU is termed as NOMA-weak user. According to the decode sequence of NOMA system, DR can cancel the interference caused by CU’s data. According to the decode sequence of NOMA system, NOMA-strong user (DR in case 1) can first decodes the signals of NOMA-weak user (CU in case 1) and subtracts the interference caused by signal of NOMA-weak user (CU in case 1) from the superimposed signal. Then the NOMA-strong user (DR in case 1) decodes the signals of itself. After successive cancellation, the received SINR of DR (NOMA-strong user) can be represented as
\(\gamma_{T, R}^{1}=\frac{(1-\alpha) P_{T} g_{T, R}}{P_{B} g_{B, R}+1}\) (6)
where gB,R denote the CNR of channel \(h_{B, R}, g_{B, R}=\left|h_{B, R}\right|^{2} / \sigma^{2}\) . The NOMA-weak user decodes its signal directly and regards signal of NOMA-strong user as interference. Thus the received SINR of CU (NOMA-weak user) is given by
\(\gamma_{T, C}^{1}=\frac{\alpha P_{T} g_{T, C}}{P_{B} g_{B, C}+(1-\alpha) P_{T} g_{T, C}+1}\) (7)
where \(g_{B, C}=\left|h_{B, C}\right|^{2} / \sigma^{2}\). Since the equivalent end-to-end received SINR of CU is dependent on the worse SINR of two hops, the constraint (5b) can be rewritten as
\(\gamma_{B, C}=\min \left(\gamma_{B, T}, \gamma_{T, C}^{1}\right) \geq \varphi\) (8)
where \(\varphi=2^{R_{\min }^{C} / W}-1\) denote the minimum SINR that satisfy the rate requirement of CU.
Also, since the DR is NOMA-strong user, DR need to cancel the interference caused by CU’s signal. To ensure this, the achievable rate when DR decodes the signals for CU would no less than the achievable rate that DR received,
\(R_{R}^{(C)} \geq R_{C U}\) (9)
where \(R_{R}^{(C)}\) denotes the achievable rate of DR to decode the signal of CU, \(R_{R}^{(C)}=\log _{2}(1+\gamma_{R}^{(C)})\). \(\gamma_{R}^{(C)}\) denotes the SINR of DR when decoding CU’s signal,
(10)
Since log() is an increasing function, (9) can be rewritten as
(11)
Thus, in this case when DR is NOMA-strong user, optimization problem (5) can be transformed into (12)
Case 2: When , ≥ , , which means that the CNR of CU is better than that of DR, we term CU as NOMA-strong user. Correspondingly, the DR is termed as NOMA-weak user. According to the decode sequence of NOMA system, NOMA-strong user can cancel the interference caused by NOMA-weak user. Accroding to the decode sequence of NOMA system, the received SINR of CU and DR can be respectively represented as
(13) (14)
Since the equivalent end-to-end received SINR of CU is determined by the worse SINR between two hops, constraint (5b) can be transformed into
(15)
where = 2 min / − 1 denote the minimum SINR that satisfy the rate requirement of CU.
Also, since CU is NOMA-strong user, CU needs to cancel the interference caused by DR’s signals. To ensure this, the achievable rate when CU decodes the signals for DR would be no less than the achievable rate that DR received.
(16)
where ( ) denotes the achievable rate when CU decodes the DR’s signal, ( ) = log (1 + ( )). ( ) denotes the SINR when CU decodes DR’s signal. ,
(17)
Since log() is an increasing function, (16) can be converted into
(18)
Then in this case, the optimization (5) can be transformed into (19)
In the following section, we try to solve problem (12) and (19) respectively.
3. Optimal power solution
3.1 Linear Fractional Programming Method
In this section, we propose a linear fraction programming method (LFPM) for problem (12) and problem (15) respectively, by converting the orginal problems into linear fraction program.
Case 1: DR is NOMA-strong user
In this case, power allocation in full-duplex NOMA relaying based D2D communications is formulated as optimization problem (12), which is a non-linear fractional programming and is difficult to solve directly. Fortunately, it can be transformed into a linear fractional programming problem by variables replacement. Let = , , (1 − ) = , , = , + , , constraints (5c) and (5d) can be rewritten as
(20)
(21)
Considering equation (1) and (6), constraint (8) can be equivalent transformed into:
(22)
(23)
Considering (7) and (10), constraint (11) can be transformed as:
(24)
After transformation of constraint (5c) (5d) (15) and (18), then the optimization problem (12) can be transformed into
(25)
The constraints in optimization (25) are all linear constraints and the objective function is a linear factional function. Thus the optimization problem (25) is a linear fractional programming. According linear fractional programming method [21], problem (25) can be transformed into
(26)
Optimization problem (26) can be proved equivalent to optimization problem (25) by variables transform, = , + 1, ′ = / , , ′ = , / , , ′ = , / , = 1/ . We can observe that problem (26) is a linear programming problem, which can be easily solved by convex optimization method [22]. After deriving the optimal solution ′ ∗, , ′ ∗, , ′ ∗, ∗ of problem (26), we can calculate the optimal solution of problem (25), ∗ = ′ ∗/ ∗, , ∗ = , ′ ∗/ ∗, , ∗ = , ′ ∗/ ∗. Then the optimal solution of problem (12) can be derived ∗ = ∗, ∗ = , ∗ + , ∗ , ∗ = , ∗ / ∗.
Case 2: CU is NOMA-strong user
In this case, power allocation in full-duplex NOMA relaying based D2D communications is formulated as optimization problem (19). Since the form of (19) is similar to that of (12), the solution to (19) can be solved similar to problem (12). The details of solution are omitted due to space limitation.
3.2 Closed-form solution
We further derive a closed-form solution to optimization problem (5) in this section. Similarly, we consider two cases: CU as NOMA-strong user and DR as NOMA-strong user.
Case 1: DR is NOMA-strong user
When DR is NOMA-strong user, we aim to derive a closed-form solution of problem (12). To analyze the problem (12) further, we first introduce Lemma 1 and Lemma 2.
Lemma 1: The optimal solution to problem (12) satisfies , = , 1
Proof: Suppose ( ∗, ∗, ∗) is the optimal solution of problem (12), which satisfy all constraints in problem (12), and ∗ is the correspondence value of objective function. Assume , > , 2 . Then there exists a sufficient small constant ε, such that ′ = ∗ − , ′ = ∗ + , ′ = ∗ also satisfy constraints (8) (5c) (5d) and (5e). Since ′ is smaller than PB, constraint (11) also holds. Then we can observe that ( ′ , ′ , ′) is also feasible and ′ ( ′ , ′ , ′) > ∗ ( ∗, ∗, ∗). Thus this contradicts with the assumption that ( ∗, ∗, ∗) is the optimal solution to problem (12).
Assume , < , 1 . Then there exists a sufficient small constant ε, ′ = ∗, ′ = ∗, ′ = ∗ − , which satisfies that ( ′ , ′ , ′ ) is also feasible and ′ ( ′ , ′ , ′) > ∗ ( ∗, ∗, ∗). Also, this contradicts with the assumption that ( ∗, ∗, ∗ ) is optimal solution.
From analysis above, we can derive , = , 1 .
Lemma 2: The optimal solution to problem (12) satisfies = min and , = .
Proof: From (3), (4), (6) and (7), RCU is a decreasing function of α, while RDR is an increasing function of α with fixed PB and PT. Assume ( ∗, ∗, ∗) is the optimal solution of problem (12), which satisfies all constraints. The correspondence optimal value of problem (12) is denoted as ∗ . Suppose ( ∗, ∗, ∗) > min . Then there exists a sufficient small positive constant ε, which satisfies that ′ = ∗, ′ = ∗, ′ = ∗ − is also feasible and ′ ( ′ , ′ , ′) > ∗ ( ∗, ∗, ∗). This contradicts with the assumption that ∗, ∗, ∗ is optimal solution.
Considering Lemma 1 and Lemma 2, constraint (8) in optimization problem (12) can be converted as
(27)
Substituting (1) and (6) into equation (27), we have (28)
(29)
Thus the PB and PT can be expressed as two functions of α. Then we convert the constraints (5d) (5c) and (11) of optimization problem (12) into constraints on α considering (28) and (29). Substituting (28) and (29) into constraint (5d), we can derive two constraints on α as follows
(30)
(31)
To simplify the feasible domain of α, we analyze the relationship of α1 and α2, by analyzing the difference between α1 and α2
(32)
According to (30), (31) and (32), the feasible region of can be represented as
(33)
Substituting (28) and (29) into constraint (5c), we can derive (34)
Also, we analyze the relationship of α2 and α3 by analyzing the difference between α2 and α3
To figure out the relationship between α2 and α3, we introduce Lemma 3.
Lemma 3:It always holds that max , − > 0.
Proof:Since , = min , , , > , we have , > , > . Also considering 2/( ℎ + 2) ≤ 1, we have
max , max , , , max , max , max , max , max , , ( ) ( ) 0 ϕ γ − ≥ − = − + − ≥ − + ≥ − − = > B T B T B TB B T B T T LI T B T B T T LI B T T B T T B T P P P P P P P P P P P P P g g g g g g g g g g g
According to Lemma 3, we shall have 3 2 0 αα− > . Constraints (33) and (34) on α can be simplified as
(35)
Then we focus on constraint (11). Substituting (7) and (10) into constraint (11), we have (36)
From (36), to guarantee DR can perform SIC successfully, the CINR of DR needs to be better than that of CU. (36) can be further rewritten as
(37)
Substituting (28) into (37), we have
(38)
where = , − , , = , , − , , . Then we derive the feasible domain α of in two conditions as
(39)
Then joint considering the constraints of α in (5e) (34) (39), we can obtained the feasible domain of α as follows
(40)
After deriving the feasible domain of α, by substituting (28) and (29) into (7), we can derived another expression of the objective function of (12)
(41)
Note that equation (41) only include one variable α. Also we can observe that 1 , γT R is a decreasing function of α. Thus the optimal solution of α can be derived as
(42)
After deriving the optimal value of , by substituting equation (42) into equation (28) and (29), we can derive the optimal value of and , denoted as ∗ and ∗.
Case 2: CU is NOMA-strong user
When CU is NOMA-strong user, we aim to derive a closed-form solution of problem (19). In this case, we can observe that Lemma 1 and Lemma 2 also hold.
Considering Lemma1 and Lemma 2, constraint (15) in optimization problem (19) can be converted as
(43)
Substituting (1) and (13) into equation (43), we have
(44)
(45)
Thus the PB and PT can be expressed as two functions of α. Then we transform the constraints (5d) (5c) and (18) of optimization problem (12) considering (44) and (45).
Then substituting (44) and (45) into constraint (5d) and (5c), we can derive the feasible region of α as follows
(46)
(47)
From (46) and (47), we have two conditions on α. To simplify the feasible domain of α, we analyze the relationship of 1 and 2, by analyzing the difference between 1 and 2
(48)
According to Lemma 3, , − > 0. Then we shall have 2′ > 1′ . According to (46) and (47), the feasible region of is
(49)
Then we focus on constraint (18). Substituting (14) and (17) into constraint (18), we have
(50)
Equation (50) means that to guarantee CU can perform SIC successfully, the CINR of CU needs to be better than that of DR. Equation (50) can be further rewritten as
(51)
Substituting (44) into (51), we have
(52)
where = , − , , = , , − , , . Then we derive the feasible domain α of in two conditions as
(53)
Then joint considering the constraints of α in (5e) (49) (53), we can obtained the feasible domain of α as follows
(54)
After deriving the feasible domain of α, by substituting (44) and (45) into (14), we can derived another expression of the objective function of (19)
(55)
From (55), we can observe that , γT R is a decreasing function of α. Thus the optimal solution of α can be derived as
(56)
After deriving the optimal value of , by substituting equation (56) into equation (44) and (45), we can derive the optimal value of and , denoted as ∗ and ∗.
To implement the algorithms (LFPM and the closed-form solution) in a practical cellular system, the algorithms are executed in the BS to caculate the optimal power of BS and DT, and then the optimal power (PB, PT, α) is transmitted to the DT to facilitate the full-duplex NOMA relaying based D2D communication.
4. Simulation Results
In this section, we evaluate the performance of the proposed two power allocation methods in the full-duplex NOMA relaying based D2D communications. We compare the performance of LFPM and closed-form solution with that of optimal power allocation in full-duplex relaying based D2D [10], termed as FD D2D relaying (OMA).
According to FD D2D relaying (OMA), the D2D links is allowed to underlay cellular downlink by assigning D2D transmitter (DT) as FD relay to assist cellular downlink transmissions. The DT transmit the integrated signal composed by the regenerated signal that will forward to CU and the signals to be transmitted to DR directly. Both CU and DR suffer from the co-channel interference. While in the proposed scheme (FD NOMA relaying based D2D), the DR and CU received signals from DT according to NOMA communication. Thus, the NOMA-strong user can perform successive interference cancellation and only the NOMA-weak user suffers from the co-channel interference.
Fig. 2. Achievable rate of D2D link versus max
In Fig. 2 and Fig. 3, the achievable rate of D2D link is simulated via Monte Carlo method. All the channels are modeled as Rayleigh fading channels. Fig. 2 illustrates the achievable transmit rate of D2D link versus the total transmit power with min = 70 Kbps, W = 0.1 MHz. We find that the performance of our derived closed-form solution matches that of LFPM perfectly, which verifies the accuracy of the closed-form solution. With the increasing of total power, the achievable transmit rates of D2D link under different power allocation schemes all increase. Both LFPM and closed-form solution outperforms the power allocation solution in [10] and the achievable rate of D2D link of LFPM and closed-form solution is 2.4 times that of power allocation scheme in [10]. This is due to the fact that in [10], both cellular user and D2D receiver suffer the interference of the partner’s signal, while in the proposed scheme in this paper, NOMA-strong user (CU or DR) can perform successive interference cancellation. Also, D2D link can achieve a higher rate with a lower noise variance.
Fig. 3. Achievable rate of D2D link versus min
Fig. 3 illustrates the achievable transmit rate of D2D link versus CU’s minimum transmit rate min with max = 10, W = 0.1 MHz, considering different power allocation scheme. As we can see from Fig. 3, the achievable rate of D2D like decrease with the increase of min .This is due to the fact that when CU requires a higher rate, more power should be allocated on CU and less power is reserved for D2D link. Also the performance of LFPM matches that based on closed-form solution well and both can achieve a better performance than power allocation scheme in [10].
Fig. 4. Achievable rate of D2D link versus gTR
Fig. 4 illustrates the achievable rate of D2D link versus the CNR of D2D link gT,R, considering different power allocation schemes, with g , = g , = 5 dB, g , = g , = -5 dB, min = 70 Kbps, max= 2, W = 0.1 MHz. With the increasing of gTR, the achievable rate of all power allocation scheme increase. Also, the performance of LFPM and closed-form solution increase much faster than that of power allocation scheme in [10] which again verifies our theoretical analysis. We note that as for LFPM and closed-form solution, the performance increases much faster when g , >5dB. This is due to the fact that when g , <5dB, the CNR of DT-DR link is worse of DT-CU link and thus DR is NOMA-weak user. In this condition, DR suffers the interference of CU’s signal. When g , >5dB, DR become NOMA-strong user, and it can cancel the co-channel interference by SIC. The impact of self-interference channel is also illustrated in Fig. 4. We can observe that a lower self-interference channel gain will cause higher performance. This happens due to the fact that with lower self-interference channel gain, less power is needed to achieve the same received SINR at DT. Thus more power is reserved for DT to transmit signals to DR and CU.
Fig. 5. Achievable rate of D2D link versus gTC
The performance of the achievable rate of D2D link versus channel-noise ratio gT,C is illustrated in Fig. 5 with , = 5 dB, min = 60 Kbps. With the increasing of gT,C, the D2D link can achieve a higher rate with all schemes. This is due to the fact that when the CU has a good channel with DT, lower power needs to be used on DT to accomplish the communication with cellular link. Thus more power can be reserved for the D2D link. Specifically, the achievable rate of D2D link is 0 with = 10dB, , = 0dB. In another word, DT needs to allocate all power on CU’s signal to satisfy its minimum rate requirement and the D2D link fails to communicate.
Fig. 6. Optimal solution of α versus gT,C
Fig. 6 illustrates the optimal power allocation fraction α vesus the channel to noise ratio of the channel between DT and CU for the fraction programming method and closed-form solution. The optimal solution of α decreases with the increasing of gT,C. This happens due to the fact that when DT transmit signals to CU with a better channel, less power is needed to achieve the required rate of CU. Thus the power allocation fraction α become small. We can also observe that the optimal solution of decrease sharply at g , = 5dB. This is due to the fact, when g , increases to more than 5dB, CU turns from NOMA-weak user to NOMA-strong user. As NOMA-strong user, less power is allocated because it can cancel the interference caused by NOMA-weak user. At g = 10dB, g = 0dB, the optimal solution α of is 1, which means all the power at DT is used to transmit signals to CU and the achievable rate of D2D link decrease to 0. This can be verified by the simulation result in Fig. 5.
Fig. 7. Achievable rate of D2D link versus gLI
Fig. 7 illustrates the achievable rate of D2D link considering different self interference cancellation ability with , = , = 5 dB, , = , = -5 dB, min = 30 Kbps, max= 2. With the increasing of gLI, which means the full-duplex DT has a bad self-interference cancellation performance, the achievable rate of D2D link decrease for all power allocation schemes. This happens due to the fact that when the DT suffers a larger self-interference, the base station needs to transmit signals with larger power to satisfy the rate requirement of cellular user, causing the power allocated on DT decreased. Compare with figures with gT,R=2dB, when DR is NOMA-weak user, a higher rate of D2D link can be achieved with gT,R=8dB, when DR is termed as NOMA-strong user.
5. Conclusion
In this paper, we propose a novel full-duplex NOMA relaying based device-to-device scheme, which allows D2D transmitter to underlay a cellular network by acting a full-duplex NOMA relay simultaneously. To maximize the achievable rate of D2D link, a power allocation method based on fractional programming is proposed. Furthermore, we derive the closed-form solution of optimal transmit power at the BS and DT as well as the optimal power allocation factor. The simulation results show that the performance of the fractional programming based method matches the close-form solution perfectly and both the proposed schemes outperform the full-duplex relaying based D2D scheme significantly.
References
- Andrews G. Jeffrey, Stefano Buzzi, Wan Choi, Stephen V. Hanly, Angel Lozano, Anthony C. K. Soong and Jianzhong Charlie Zhang, "What will 5G be?" IEEE Journal on Selected Areas in Communications, vol. 32, no. 6, pp. 1065-1082, June, 2014. https://doi.org/10.1109/JSAC.2014.2328098
- Akhil Gupta, and Rakesh Kumar Jha, "A Survey of 5G Network: Architecture and Emerging Technologies." IEEE Access, vol. 3, pp.1206-1232, July, 2015. https://doi.org/10.1109/ACCESS.2015.2461602
- Jun Huang, Shuai Huang, Cong-Cong Xing, Yi Qian, "Game-theoretic power control Mechanisms for device-to-device communications underlaying cellular system," IEEE Transactions on Vehicular Technology, vol. 67, no. 6, pp.4890-4900, Jan., 2018. https://doi.org/10.1109/TVT.2018.2800051
- Xu Chen, Brian Proulx, Xiaowen Gong and Junshan Zhang, "Exploiting social ties for cooperative D2D communications: a mobile social networking case," IEEE/ACM Transactions on Networking, vol. 23, no. 5, pp.1471-1484, June, 2015. https://doi.org/10.1109/TNET.2014.2329956
- Tianyu Wang, Yue Sun, Lingyang Song, Zhu Han, "Social data offloading in D2D-enhanced cellular networks by network formation games," IEEE Trans. on Wireless Communications, vol. 14, no. 12, pp. 7004-7015, December 2015. https://doi.org/10.1109/TWC.2015.2463281
- Rui Yin, Guanding Yu, Huazi Zhang, Zhaoyang Zhang and Geoffrey Ye Li, "Pricing-Based Interference Coordination for D2D Communications in Cellular Networks," IEEE Transactions on Wireless Communications, vol. 14, no. 3, pp.1519-1532, November, 2015. https://doi.org/10.1109/TWC.2014.2368151
- Jun Huang, Cong-Cong Xing, Yi Qian, Zygmunt J. Haas, "Resource Allocation for Multi-cell Device-to-Device Communications Underlaying 5G Networks: A Game-Theoretic Mechanism with Incomplete Information," IEEE Transactions on Vehicular Technology, vol. 67, no.3, pp.2557-2570, October, 2017. https://doi.org/10.1109/tvt.2017.2765208
- Yiyang Pei, Ying-Chang Liang, "Resource allocation for device-to-device communications overlaying two-way cellular networks," IEEE Transactions on Wireless Communications, vol.12, no.7, pp.3611-3621, June 2013. https://doi.org/10.1109/TWC.2013.061713.121956
- Guopeng Zhang, Kun Yang, Shuanshuan Wu, Xiaoyong Mei and Zhikai Zhao, "Efficient power control for half-duplex relay based D2D networks under sum power constraints," Wireless Networks, vol. 21, no. 7, pp.2345-2355, October, 2015. https://doi.org/10.1007/s11276-015-0920-5
- Guopeng Zhang, Kun Yang, Peng Liu, Junyi Wei, "Power Allocation for Full-Duplex Relaying-Based D2D Communication Underlaying Cellular Networks," IEEE Transactions on Vehicular Technology, vol. 64, no. 10, pp. 4911-4916, November, 2015. https://doi.org/10.1109/TVT.2014.2373053
- Zhiguo Ding, Yuanwei Liu, Jinho Choi, Qi Sun, Maged Elkashlan, Chih-Lin I, H. Vincent Poor, "Application of Non-Orthogonal Multiple Access in LTE and 5G Networks," IEEE Communications Magazine, vol. 55, no. 2, pp.185-191, February, 2017. https://doi.org/10.1109/MCOM.2017.1500657CM
- Linglong Dai, Bichai Wang, Yifei Yuan, Shuangfeng Han, Chih-lin I, Zhaocheng Wang, "Non-orthogonal multiple access for 5G: solutions, challenges, opportunities, and future research trends," IEEE Communications Magazine, vol. 53, no. 9, pp. 74-81, September, 2015. https://doi.org/10.1109/MCOM.2015.7263349
- Zhiguo Ding, Mugen Peng, and H. Vincent Poor, "Cooperative Non-Orthogonal Multiple Access in 5G Systems," IEEE Communications Letters, vol. 19, no. 8, pp.1462-1465, June, 2015. https://doi.org/10.1109/LCOMM.2015.2441064
- Zhaohui Yang, Wei Xu, Hao Xu, Jianfeng Shi, Ming Chen, "Energy efficiency non-orthogonal multiple access for machine-to-machine communications," IEEE communications letters, vol.21, no.4, pp.817-820, April, 2017. https://doi.org/10.1109/LCOMM.2016.2641423
- Hristina Chingoska, Zoran Hadzi-Velkov, Ivana Nikoloska, Nikola Zlatanov, "Resource allocation in wireless powered communication networks with non-orthogonal multiple access," IEEE Wireless Communications Letter, vol. 5, no. 6, pp. 684-687, December 2016. https://doi.org/10.1109/LWC.2016.2615616
- Yan Sun, Derrick Wing Kwan Ng, Zhiguo Ding, Robert Schober, "Optimal joint power and subcarrier allocation for full-duplex multicarrier non-orthogonal multiple access systems," IEEE Transactions on Communications, vol. 65, no. 3, pp.1077-1091, January 2017. https://doi.org/10.1109/TCOMM.2017.2650992
- Fang Fang, Haijun Zhang, Julian Cheng, Victor C. M. Leung, "Energy-efficient resource allocation for downlink non-orthogonal multiple access network," IEEE Transactions on Communications, vol. 64, no. 9, pp.3722-3732, July 2016. https://doi.org/10.1109/TCOMM.2016.2594759
- Yi Zhang, Hui-Ming Wang, Qian Yang, Zhiguo Ding, "Secrecy sum rate maximization in non-orthogonal multiple access," IEEE Communications Letters, vol. 20, no. 5, pp.930-933, May, 2016. https://doi.org/10.1109/LCOMM.2016.2539162
- Jingjing Zhao, Yuanwei Liu, Kok Keong Chai, Yue Chen, Maged Elkashlan, Jesus Alonso-Zarate, "NOMA-Based D2D Communications: Towards 5G," in Proc. of IEEE Global Communications Conference, pp.1-6, December 4-8, 2016.
- Zhengquan Zhang, Zheng Ma, Ming Xiao, Zhiguo Ding, Pingzhi Fan, "Full-Duplex Device-to-Device Aided Cooperative Non-Orthogonal Multiple Access," IEEE Transactions on Vehicular Technology, vol. 66, no. 5, May, 2017.
- S. Boyd, and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004.
- M. Grant, and S. Boyd. "CVX: Matlab Software for Disciplined Convex Programming, version 1.21," http://stanford.edu/-boyd/cvx.
Cited by
- Performance of Orthogonal Beamforming with NOMA for Smart Grid Communication in the Presence of Impulsive Noise vol.45, pp.8, 2019, https://doi.org/10.1007/s13369-020-04457-y
- A Spectral Efficient NOMA-based Two-Way Relaying Scheme for Wireless Networks with Two Relays vol.15, pp.1, 2021, https://doi.org/10.3837/tiis.2021.01.020