Performance analysis of Full Duplex D2D in opportunistic spectrum access

Noman Haider, Ahsan Ali, Ying He, Eryk Dutkiewicz

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

Abstract

Opportunistic Spectrum Access (OSA) allows an efficient use of spectrum based on share-it or use-it principle and can be a viable solution for the challenging problem of spectrum scarcity. Emerging systems have been proposed for OSA, where primary users (PU) have guaranteed interference protection from secondary users (SU). The potential of Full Duplex (FD) and Device-To-device (D2D) technologies in 5G has proven to be promising for increasing data rates and network capacity. In this article using stochastic geometry and random graphs, we model and assess the D2D operations in full Duplex/half Duplex mode for SUs, while protecting the PU's transmission by defining the exclusion zone (EZ). Depending on the location and transmit power of D2D users, the induced aggregate interference should not violate the interference threshold for EZ of PUs. For this, we characterize the interference from D2D links and derive the probability for successful D2D users for half-duplex and full duplex modes. Analyses is further supported by extensive simulations results.

Original languageEnglish
Title of host publicationProceedings of The 18th International Symposium on Communications and Information Technologies
Place of PublicationPiscataway, NJ
PublisherInstitute of Electrical and Electronics Engineers (IEEE)
Pages32-37
Number of pages6
ISBN (Electronic)9781538684580, 9781538684573
ISBN (Print)9781538684597
DOIs
Publication statusPublished - 2018
Event18th International Symposium on Communication and Information Technology, ISCIT 2018 - Bangkok, Thailand
Duration: 26 Sep 201829 Sep 2018

Conference

Conference18th International Symposium on Communication and Information Technology, ISCIT 2018
CountryThailand
CityBangkok
Period26/09/1829/09/18

Fingerprint Dive into the research topics of 'Performance analysis of Full Duplex D2D in opportunistic spectrum access'. Together they form a unique fingerprint.

Cite this