拓扑干扰管理:蜂窝系统DoF和SIR之间的权衡

Hassan Kallam, L. Cardoso, J. Gorce
{"title":"拓扑干扰管理:蜂窝系统DoF和SIR之间的权衡","authors":"Hassan Kallam, L. Cardoso, J. Gorce","doi":"10.1109/ICT.2019.8798819","DOIUrl":null,"url":null,"abstract":"Topological interference management (TIM) allows studying the degrees of freedom (DoF) of partially connected linear interference communication networks, where the channel state information at the transmitters (CSIT) is restricted to the topology of the network, i.e., a knowledge of which interference links are weak and which are strong. In this paper, we consider TIM for an infinite downlink cellular network in the one-dimensional (1D) linear and the two-dimensional (2D) hexagonal models. We consider uniformly distributed users in each cellular cell, effectively creating a continuous distribution of users, aiming to study user classes based on different interference profiles rather than on actual individual users' positions. We also consider the construction of the TIM network topology by analyzing different interference thresholds. Unlike previous works, we use TIM at the user class level to find the system's DoF independent of the actual user position. Finally, after proposing a fractional coloring scheme that can achieve the optimal DoF solution, a trade-off between DoF and SIR is given.","PeriodicalId":127412,"journal":{"name":"2019 26th International Conference on Telecommunications (ICT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Topological Interference Management: Trade-off Between DoF and SIR for Cellular Systems\",\"authors\":\"Hassan Kallam, L. Cardoso, J. Gorce\",\"doi\":\"10.1109/ICT.2019.8798819\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Topological interference management (TIM) allows studying the degrees of freedom (DoF) of partially connected linear interference communication networks, where the channel state information at the transmitters (CSIT) is restricted to the topology of the network, i.e., a knowledge of which interference links are weak and which are strong. In this paper, we consider TIM for an infinite downlink cellular network in the one-dimensional (1D) linear and the two-dimensional (2D) hexagonal models. We consider uniformly distributed users in each cellular cell, effectively creating a continuous distribution of users, aiming to study user classes based on different interference profiles rather than on actual individual users' positions. We also consider the construction of the TIM network topology by analyzing different interference thresholds. Unlike previous works, we use TIM at the user class level to find the system's DoF independent of the actual user position. Finally, after proposing a fractional coloring scheme that can achieve the optimal DoF solution, a trade-off between DoF and SIR is given.\",\"PeriodicalId\":127412,\"journal\":{\"name\":\"2019 26th International Conference on Telecommunications (ICT)\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-04-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 26th International Conference on Telecommunications (ICT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICT.2019.8798819\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 26th International Conference on Telecommunications (ICT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICT.2019.8798819","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

拓扑干扰管理(TIM)允许研究部分连接的线性干扰通信网络的自由度(DoF),其中发射机(CSIT)的信道状态信息仅限于网络的拓扑结构,即了解哪些干扰链路弱,哪些干扰链路强。在本文中,我们考虑了一维线性和二维六边形模型下无限下行蜂窝网络的TIM。我们在每个蜂窝单元中考虑均匀分布的用户,有效地创建了用户的连续分布,旨在根据不同的干扰概况而不是实际的单个用户位置来研究用户类别。我们还通过分析不同的干扰阈值来考虑TIM网络拓扑结构的构建。与以前的工作不同,我们在用户类级别使用TIM来独立于实际用户位置找到系统的DoF。最后,提出了一种能够实现最优DoF的分数着色方案,并给出了DoF和SIR之间的权衡。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Topological Interference Management: Trade-off Between DoF and SIR for Cellular Systems
Topological interference management (TIM) allows studying the degrees of freedom (DoF) of partially connected linear interference communication networks, where the channel state information at the transmitters (CSIT) is restricted to the topology of the network, i.e., a knowledge of which interference links are weak and which are strong. In this paper, we consider TIM for an infinite downlink cellular network in the one-dimensional (1D) linear and the two-dimensional (2D) hexagonal models. We consider uniformly distributed users in each cellular cell, effectively creating a continuous distribution of users, aiming to study user classes based on different interference profiles rather than on actual individual users' positions. We also consider the construction of the TIM network topology by analyzing different interference thresholds. Unlike previous works, we use TIM at the user class level to find the system's DoF independent of the actual user position. Finally, after proposing a fractional coloring scheme that can achieve the optimal DoF solution, a trade-off between DoF and SIR is given.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Dual-polarized Antennas Based Directional Modulation Scheme Sliding-Window Processing of Turbo Equalization for Partial Response Channels Feature fusion by using LBP, HOG, GIST descriptors and Canonical Correlation Analysis for face recognition Periodic Time Series Data Classification By Deep Neural Network SFDS: A Self-Feedback Detection System for DNS Hijacking Based on Multi-Protocol Cross Validation
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1