Interference Mitigation Methods for D2D Communication in 5G Network
Interference poses to be a grave threat to wireless communication systems. Quest for higher data rate and higher energy efficiency has led to a paradigm shift. Since the inception of cellular technology in 1980, researchers are in search of a communication system which can exhibit high data rate, low latency, higher capacity, energy efficiency and spectrum efficiency. This led the researchers to explore 5G, operating in mmWave band (30–300 GHz) which is expected to support uncompressed video streaming, 3D telepresence, holographic communication and other multimedia applications. But all these technological advances suffer from a foe, i.e., cross-channel interference and co-channel interference. Thus, this paper chronologically discusses the various models applied to minimize or eradicate the problem of interference in 5G communication systems. Future research directions have also been discussed.
KeywordsInterference D2D communication 5G
- 1.Swetha, G.D., Murthy, G.R.: Selective overlay mode operation for d2d communication in dense 5g cellular networks. In: Computers and Communications (ISCC) 2017 IEEE Symposium on IEEE, pp. 704–709 (2017)Google Scholar
- 13.Gu, X., Zhang, X., Zhou, Z., Cheng, Y., Peng, J.: Game theory based interference control approach in 5g ultra-dense heterogeneous networks. In: Asia-Pacific Services Computing Conference, pp. 306–319. Springer, Cham (2016)Google Scholar
- 16.AlQerm, I., Shihada, B.: A cooperative online learning scheme for resource allocation in 5G systems. In: 2016 IEEE International Conference on Communications (ICC), pp. 1–7 (2016)Google Scholar
- 17.Xu, J., Gu, X., Fan, Z.: D2D power control based on hierarchical extreme learning machine. In: 2018 IEEE 29th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), pp. 1–7 (2018)Google Scholar
- 18.Fan, Z., Gu, X., Nie, S., Chen, M.: D2D power control based on supervised and unsupervised learning. In: 2017 3rd IEEE International Conference on Computer and Communications (ICCC), pp. 558–563 (2017)Google Scholar