Skip to main navigation Skip to search Skip to main content

A power allocation algorithm for D2D-direct communication in relay cellular networks

  • Ministry of Public Security of the People's Republic of China
  • Harbin Institute of Technology

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The relay and Device to device (D2D) technologies can be used to improve the Quality of Service (QoS) of a mobile user in the edge region of the cellular networks, To coordinate these two technologies, this paper considers a heterogeneous network containing the D2D-direct, D2D-non-direct and cellular communication mode. Furtherly, a system model taking throughput as optimization object is built to descript this network precisely. It is proved that the objective function and the constraints satisfy the requirements of convex function, and then a power allocation algorithm based on Lagrange Multiplier is proposed to find the optimal solver. Finally, we evaluate the performance of algorithm in terms of throughput and fairness by simulation.

Original languageEnglish
Title of host publicationAd Hoc Networks - 10th EAI International Conference, ADHOCNETS 2018, Proceedings
EditorsShiwen Mao, Wei Xiang, Jun Zheng, Feng Yan, Pascal Lorenz
PublisherSpringer Verlag
Pages59-70
Number of pages12
ISBN (Print)9783030058876
DOIs
StatePublished - 2019
Event10th International Conference on Ad Hoc Networks, ADHOCNETS 2018 - Cairns, Australia
Duration: 20 Sep 201823 Sep 2018

Publication series

NameLecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Volume258
ISSN (Print)1867-8211

Conference

Conference10th International Conference on Ad Hoc Networks, ADHOCNETS 2018
Country/TerritoryAustralia
CityCairns
Period20/09/1823/09/18

Keywords

  • Convex optimization
  • D2D-direct
  • Relay
  • Throughput

Fingerprint

Dive into the research topics of 'A power allocation algorithm for D2D-direct communication in relay cellular networks'. Together they form a unique fingerprint.

Cite this