CN105577591B - Cross-layer serial interference delet method based on full-duplex communication in a kind of heterogeneous network - Google Patents

Cross-layer serial interference delet method based on full-duplex communication in a kind of heterogeneous network Download PDF

Info

Publication number
CN105577591B
CN105577591B CN201511000159.4A CN201511000159A CN105577591B CN 105577591 B CN105577591 B CN 105577591B CN 201511000159 A CN201511000159 A CN 201511000159A CN 105577591 B CN105577591 B CN 105577591B
Authority
CN
China
Prior art keywords
mrow
msub
micro
msup
base station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201511000159.4A
Other languages
Chinese (zh)
Other versions
CN105577591A (en
Inventor
韩圣千
黄磊
王刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NEC China Co Ltd
Beihang University
Original Assignee
NEC China Co Ltd
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NEC China Co Ltd, Beihang University filed Critical NEC China Co Ltd
Priority to CN201511000159.4A priority Critical patent/CN105577591B/en
Publication of CN105577591A publication Critical patent/CN105577591A/en
Application granted granted Critical
Publication of CN105577591B publication Critical patent/CN105577591B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L25/00Baseband systems
    • H04L25/02Details ; arrangements for supplying electrical power along data transmission lines
    • H04L25/03Shaping networks in transmitter or receiver, e.g. adaptive shaping networks
    • H04L25/03006Arrangements for removing intersymbol interference

Landscapes

  • Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Nitrogen And Oxygen Or Sulfur-Condensed Heterocyclic Ring Systems (AREA)

Abstract

The invention discloses the cross-layer serial interference delet methods based on full-duplex communication in a kind of heterogeneous network, belong to wireless communication technology field.Feasibility, the weighted value of micro-base station calculating transmitting signal, the micro-base station deleted the described method includes full duplex micro-base station acquisition of information, micro-base station verification serial interference send the training signal of weighting, the feasibility and feedback adjustment information and weight that judge fSICIC to micro- user, and micro-base station is according to the adjustment information and weight of reception adjustment transmitting signal.Serial interference deleting technique based on full duplex proposed by the invention only needs each micro-base station complete independently, and the cooperation of macro base station is not required, and on the premise of grand user performance is not reduced, can effectively improve the performance of micro- user.Compared with existing fICIC technologies, the method proposed being capable of significantly more efficient elimination strong jamming;Compared with the SIC technologies under existing semiduplex mode, the method proposed has widely applicable scene.

Description

Cross-layer serial interference delet method based on full-duplex communication in a kind of heterogeneous network
Technical field
The present invention relates to the cross-layer serial interference deleting techniques based on full-duplex communication in a kind of heterogeneous network, belong to channel radio Believe technical field.
Background technology
Heterogeneous network passes through in traditional homogeneous network being made of macro base station (Macro base stations (BSs)) Different types of low-power small base station, such as micro-base station (Micro BSs), femto base station (Pico BSs) etc. are disposed, it can be with Significantly increase the capacity and network coverage quality of cellular system.In order to express easily, hereinafter by low-power small base station Micro-base station is referred to as, the user of service is known as micro- user.Exist compared with traditional homogeneous network, in heterogeneous network more complicated Inter-cell interference, particularly high power macro base station can generate micro- user in its coverage very strong cross-layer interference, sternly The performance of micro- user is limited again.Therefore, the effective of cross-layer interference inhibits to be one of key problem of heterogeneous network system (referring to ginseng Examine document [1]:N.Bhushan,J.Li,D.Malladi,R.Gilmore,D.Brenner,A.Damnjanovic, R.T.Sukhavasi,C.Patel,and S.Geirhofer,“Network densification:the dominant theme for wireless evolution into 5G,”IEEE Commun.Mag.,vol.52,no.2,pp.82–89, Feb.2014.)。
For the cross-layer AF panel problem in heterogeneous network, some solution methods have been proposed in work on hand.It is for example, long Phase evolution system (LTE R10) proposes a kind of enhancing inter-cell interference and inhibits (eICIC, enhanced inter-cell Interference coordination) technology is (referring to bibliography [2]:B.Soret,H.Wang,K.I.Pedersen, and C.Rosa,“Multicell cooperation for LTE-advanced heterogeneous network Scenarios, " IEEE Wireless Commun.Mag., vol.20, no.1, pp.27-34, Feb.2013.), can be in time domain Cross-layer AF panel is carried out with frequency domain.Wherein, time domain eICIC technologies refer to that macro base station keeps silent status in some subframes, It is not dry at these so as to generate the transmission subframe of approximate blank (Almost blank subframe), micro-base station and micro- user Carry out data transmission in the subframe disturbed.Frequency domain eICIC technologies refer to that macro base station and micro-base station are carried out using orthogonal frequency spectrum resource Data transmission, so as to achieve the purpose that avoid cross-layer interference.EICIC is a kind of low complex degree and the interference coordination skill easily implemented Art, but since macro base station and micro-base station can only use time or the frequency spectrum resource of part, greatly limit grand user and micro- The performance of user.Except the eICIC technologies on time and frequency domain, collaboration wave beam forming can be looked at as a kind of spatial domain EICIC technologies are (referring to bibliography [3]:C.Yang,S.Han,X.Hou,and A.F.Molisch,“How do we design CoMP to achieve its promised potential”IEEE Wireless Commun.Mag., Vol.20, no.1, pp.67-74, Feb.2013.), but the interference rejection capability of this technology is limited to the antenna number of macro base station.
Above-mentioned eICIC technologies are the transmission modes by controlling macro base station, are avoided pair in time, frequency or spatial domain Micro- user generates interference.It is different, bibliography [4] (S.Han, C.Yang, and P.Chen, " Full duplex assisted inter-cell interference cancellation in heterogeneous networks,”IEEE Trans.Commun., to appear.) propose it is a kind of based on full-duplex communication cross-layer interference mitigation technology (fICIC, full-duplex assisted ICIC).The basic thought of fICIC is that full duplex technology is applied to micro-base station, makes micro-base station The interference signal from macro base station listened to is forwarded while useful signal is sent to micro- user.Pass through appropriate design two The weight of kind signal, fICIC technologies enable to the interference that micro-base station forwards to be directly received after micro- user is reached with micro- user Interference superposition cancellation, so as to achieve the purpose that inhibit cross-layer interference.It is contemplated that the transmission power limitation of micro-base station, FICIC cannot effectively inhibit stronger cross-layer interference.
Based on eICIC technologies and fICIC technologies, micro- user will be received from macro base station when carrying out data demodulation White Gauss noise is regarded in cross-layer interference as.Serial interference deletes (SIC, successive interference cancellation) It is another common disturbance restraining method.Based on SIC technologies, micro- user first receives from it estimating cross-layer interference letter in signal Number, it then will estimate that obtained cross-layer interference signal is deleted from reception signal, and then be solved under the conditions of noiseless and it is expected letter Number.But since SIC technologies need first to solve interference signal, interference user is only used in conventional half duplex system Data transfer rate is very low or cross-layer disturbs very strong etc. limited scene.
The content of the invention
The present invention in order to solve the problems in the existing technology, provide in a kind of heterogeneous network based on full-duplex communication across Layer serial interference delet method, including following steps:
The first step, full duplex micro-base station acquisition of information;
Described information include macro base station to micro-base station, macro base station to micro- user, micro-base station to micro- user channel and entirely The self-interference channel of duplexing micro-base station, processing delay, micro-base station and the macro base station of micro-base station full duplex self-interference removing module arrive The Channel propagation delay of micro- user is poor and the modulation coding scheme of interference signal;
Second step, the feasibility that micro-base station verification serial interference is deleted:
1) according to the modulation coding scheme of interference signal, micro-base station calculates the dry signal-to-noise ratio needed for demodulation interference signal, note For γM
2) under micro-base station maximum transmission power constraints, the maximum dry signal-to-noise ratio ISNR of user terminal is sought;
3) the maximum ISNR of ISNR is judgedmWith the dry signal-to-noise ratio γ needed for demodulation interference signalMSize, if ISNRm≥ γM, then, and fSICIC technical feasibilities, into the 3rd step;Otherwise fSICIC technologies are infeasible, should use existing eICIC or FICIC methods are disturbed to inhibit cross-layer;
3rd step, micro-base station calculate the weighted value of transmitting signal:
1) the transmitting signal x of micro-base stationsIt is received signal ysThe useful signal s of micro- user is sent to itsPlus Quan He is expressed as:
W in formulaIAnd wDRespectively micro-base station receives signal and is sent to the weight of micro- user's useful signal,F is carrier frequency, t1It is the processing delay of full duplex self-interference removing module in micro-base station;
2) calculating of weight:
Consider the transmission power constraint of micro-base station and solve the ISNR constraints of interference signal, with the Signal to Interference plus Noise Ratio of micro- user SINR is maximized as criterion, optimal weight wIAnd wDIt is obtained by solving following problem:
P in formulaoutIt is the transmission power of micro-base station,t2It is that micro-base station and macro base station reach micro- use Propagation delay at family.
In the following two cases, optimal weight wIAnd wDW is denoted as respectivelyI *And wD *, there is different values, respectively For:
A. whenWhen, wI *Modulus value be | wI *|=0, wD *Modulus value be wD *Phase be 0.
B. whenWhen, formula (4a)~(4c) is converted to:
(5c) is updated in object function (5a), is as a result usedIt represents, A in formula (| wI|) be | wI| it is secondary Multinomial, B (| wI|) be | wI| quartic polynomial, constraints (5c) be re-written as c≤| wI|≤d, c and d is two in formula Constant is obtained by formula (5c) and (5b);Therefore, formula (5a)~(5c) is reduced to:
s.t.c≤|wI|≤d. (6b)
Formula (6a) and (6b) are solved using dichotomy;It is corresponding during dichotomy iteration convergence | wI| it is denoted as i.e. formula The optimal solution of (5a)~(5c), i.e., | wI *|;And then P is obtained by formula (5c)out, substitute into (4b) and obtain | wD *|;Meanwhile wI *Phase ForwD *Phase be 0.
4th step, micro-base station send the training signal of weighting to micro- user:
Micro-base station is sent respectively in two time slots to micro- userAnd wD *Z, wherein z are micro-base station and micro- use Known original training signal per family,And wD *It is the weights of the training signal sent twice respectively;Micro- user's root According to the weighted interference signal received, the equivalent channel after weighting is estimated, i.e.,With
5th step, micro-base station send signal to micro- user:
The weight w that micro-base station will obtainI *And wD *Formula (3) is substituted into, constructs the transmitting signal x of micro-base stations, and be sent to Micro- user.
6th step, micro- user judge the feasibility and feedback adjustment information and weight of fSICIC:
Micro- user calculates actual dry signal-to-noise ratio first, is denoted as ISNR ', calculation formula is as follows:
Y in formulauFor the reception signal of micro- user, E { } represents to calculate average.
Then, ISNR ' and γ are comparedMSize:If ISNR ' >=γM, i.e. fSICIC is feasible, then micro- user is anti-to micro-base station Present binary system instruction scalar ce=1;Otherwise, fSICIC is infeasible, and micro- user feeds back α=0 and desired useful signal to micro-base station Weight wD', wherein wD' calculation formula it is as follows:
7th step, micro-base station adjust transmitting signal according to the adjustment information and weight of reception:
If α=1, micro-base station continues to send data to micro- user according to the weight that the 3rd step calculates;Otherwise, by the 3rd The weight w being calculated in stepD *Replace with wD', and return to the 4th step.
The advantage of the invention is that:
For the cross-layer AF panel problem in heterogeneous network, existing eICIC and cooperative beam figuration technology are to pass through limit Macro base station processed avoids the interference to micro- user in the transmission of time, frequency or spatial domain, this causes grand user and micro- use per family It can only carry out data transmission in the time of part, frequency or spatial domain, reduce their performance.It is proposed by the invention based on The serial interference deleting technique of full duplex only needs each micro-base station complete independently, and the cooperation of macro base station is not required, can be not On the premise of reducing grand user performance, the performance of micro- user is effectively improved.Compared with existing fICIC technologies, the side that is proposed Method being capable of significantly more efficient elimination strong jamming;Compared with the SIC technologies under existing semiduplex mode, the method proposed has more Widely applicable scene.
Description of the drawings
Fig. 1 is flow chart of the method for the present invention;
Fig. 2 is the general isomery network topology physical model used when being modeled to fSICIC;
Fig. 3 is Performance Simulation Results when considering the influence of edge signal-to-noise ratio;
Fig. 4 is Performance Simulation Results when considering the influence of distance;
Fig. 5 is Performance Simulation Results when considering the influence of channel feedback bit.
Specific embodiment
Below in conjunction with drawings and examples, the present invention is described in further detail.
The present invention considers general isomery network topology physical model shown in Fig. 2, proposes in a kind of heterogeneous network based on complete Cross-layer serial interference delet method (fSICIC, full-duplex assisted the successive inter- of duplex communication Cell interference cancellation), flow as shown in Figure 1, including following steps:
The first step, full duplex micro-base station acquisition of information:
Full duplex micro-base station obtain macro base station to micro-base station, macro base station to micro- user, micro-base station to micro- user channel with And self-interference channel, processing delay, micro-base station and the Hong Ji of micro-base station full duplex self-interference removing module of full duplex micro-base station The Channel propagation delay stood to micro- user is poor and the modulation coding scheme of interference signal.Wherein, macro base station is to the letter of micro-base station Road acquisition modes can be that micro-base station receives the downlink training signal broadcasted by macro base station first, then be estimated using existing channel Meter method estimates macro base station to the channel information of micro-base station;The channel acquisition modes of macro base station to micro- user can be that micro- user is first The downlink training signal broadcasted by macro base station is first received, then estimates to obtain using existing channel method of estimation, afterwards to estimation Channel quantified and pass through uplink feedback to micro-base station;The acquisition modes of micro-base station to the channel of micro- user can be divided into Two kinds of situations:For tdd systems, micro-base station receives the uplink training signal sent by micro- user first, then estimates To micro- user to the up channel of micro-base station, according to the reciprocity of uplink and downlink channel, estimated obtained up channel is as micro- Base station is to the down channel of micro- user;For frequency division duplex system, micro- user receives the downlink sent by micro-base station and trains first Signal, then estimation obtain micro-base station to the down channel of micro- user, then the channel of estimation are quantified and passes through uplink Link Feedback is to micro-base station;The self-interference channel of full duplex base station can send training signal by micro-base station oneself and obtain;It is micro- The processing delay of base station full duplex self-interference removing module can measure to obtain at micro-base station;Micro-base station and macro base station are to micro- use The Channel propagation delay difference at family can send test signal to micro- user simultaneously by micro-base station and macro base station, and then micro- user surveys The reaching time-difference of two test signals is measured, and feeds back to micro-base station;The modulation coding scheme of interference signal can be by macro base station Micro-base station is informed by the return link between base station.Second step, the feasibility that micro-base station verification serial interference is deleted:
1) according to the modulation coding scheme of interference signal, micro-base station is calculated according to existing method needed for demodulation interference signal Dry signal-to-noise ratio (Interference-to-signal-plus-noise ratio (ISNR)), is denoted as γM
2) under micro-base station maximum transmission power constraints, the maximum dry signal-to-noise ratio ISNR of user terminal is sought.Detailed process It is as follows:Micro- user ISNR maximization problems can be modeled as:
H in formulams、hsu、hmuIt is macro base station respectively to micro-base station, micro-base station to micro- user and macro base station to micro- user Channel,It is the weight of micro-base station retransmitted jamming signal,It is the transmission power of micro-base station, PsIt is the emission maximum of micro-base station Power,It is the variance of the self-interference channel of micro-base station,It is the variance of noise power.
By solving-optimizing problem formulations (1a), (1b) and (1c), the maximum that can obtain ISNR is:
In formulaWherein | wI +| it is to become AmountMeet equation
A definite value, numerical solution can be used dichotomy and acquires.
3) ISNR is judgedmAnd γMSize, if ISNRm≥γM, then, and fSICIC technical feasibilities, into the 3rd step;Otherwise FSICIC technologies are infeasible, should be disturbed using cross-layer is inhibited the methods of existing eICIC or fICIC.
3rd step, micro-base station calculate the weighted value of transmitting signal:
1) the transmitting signal x of micro-base stationsIt is received signal ysThe useful signal s of micro- user is sent to itsPlus Quan He can be expressed as:
W in formulaIAnd wDRespectively micro-base station receives signal and is sent to the weight of micro- user's useful signal,F is carrier frequency, t1It is the processing delay of full duplex self-interference removing module in micro-base station.
2) calculating of weight:
Consider the transmission power constraint of micro-base station and solve the ISNR constraints of interference signal, with the Signal to Interference plus Noise Ratio of micro- user (Signal-to-interference-plus-noise ratio, SINR) is maximized as criterion, optimal weight wIAnd wDIt can It is obtained by solving following problem:
P in formulaoutIt is the transmission power of micro-base station,t2It is that micro-base station and macro base station reach micro- user The propagation delay at place.
In the following two cases, optimal weight wIAnd wDW is denoted as respectivelyI *And wD *, there is different values, respectively For:
A. whenWhen, wI *Modulus value be | wI *|=0, wD *Modulus value be wD *Phase be 0;
B. whenWhen, optimization problem formula (4a)~(4c) can be converted to:
(5c) is updated in object function (5a), is as a result usedIt represents, A in formula (| wI|) be | wI| it is secondary Multinomial, B (| wI|) be | wI| quartic polynomial, constraints (5c) can be re-written as c≤| wI|≤d, c and d is in formula Two constants can be obtained by formula (5c) and (5b).Therefore, formula (5a)~(5c) can be reduced to:
s.t.c≤|wI|≤d. (6b)
Formula (6a) and (6b) may be employed dichotomy and solved.It is as follows:
A) takeIt takesWherein t is | wI| any value in its domain;
B) giveSolve following unary biquadratic equation:
A(|wI|)=(1+ λ) B (| wI|), (7)
Obtain | wI| solution.
C) if there is any | wI| solution disclosure satisfy that formula (6b), then make λmin=λ, otherwise makes λmax=λ.
D) step b)~c is repeated), solve requirement until meeting precision.
It is corresponding during above-mentioned dichotomy iteration convergence | wI| be denoted as the optimal solution of i.e. formula (5a)~(5c), i.e., | wI *|.Into And P can be obtained by formula (5c)out, substituting into (4b) can obtain | wD *|.Meanwhile wI *Phase be wD *Phase be 0.
4th step, micro-base station send the training signal of weighting to micro- user:
Micro-base station is sent respectively in two time slots to micro- userAnd wD *Z, wherein z are micro-base station and micro- use Known original training signal per family,And wD *It is the weights of the training signal sent twice respectively.Micro- user's root According to the weighted interference signal received, it is estimated that the equivalent channel after weighting, i.e.,With
5th step, micro-base station send signal to micro- user:
The weight w that micro-base station will obtainI *And wD *Formula (3) is substituted into, constructs the transmitting signal x of micro-base stations, and be sent to Micro- user.
6th step, micro- user judge the feasibility and feedback adjustment information and weight of fSICIC:
Micro- user calculates actual dry signal-to-noise ratio first, is denoted as ISNR ', calculation formula is as follows:
Y in formulauFor the reception signal of micro- user, E { } represents to calculate average.
Then, ISNR ' and γ are comparedMSize.If ISNR ' >=γM, i.e. fSICIC is feasible, then micro- user is anti-to micro-base station Present binary system instruction scalar ce=1;Otherwise, fSICIC is infeasible, and micro- user feeds back α=0 and desired useful signal to micro-base station Weight wD', wherein wD' calculation formula it is as follows:
7th step, micro-base station adjust transmitting signal according to the adjustment information and weight of reception:
If α=1, micro-base station continues to send data to micro- user according to the weight that the 3rd step calculates;Otherwise, by the 3rd The weight w being calculated in stepD *Replace with wD', and return to the 4th step.
Embodiment
The present invention proposes the cross-layer serial interference delet method based on full-duplex communication in a kind of heterogeneous network, and flow chart is such as Shown in Fig. 1.Case Simulation uses matlab emulation platforms, and simulation analysis are carried out to the performance of this method.Heterogeneous network physical model is such as Shown in Fig. 2, macro base station is located at the center of macrocell, and micro-base station is located at (ds, 0) at, dsRepresent between macro base station and micro-base station away from It is m from, unit, UE is located at (d at Ss, r), r=40m represents the distance between micro-base station and micro- user, macrocell radius rmc= 500m.The transmission power P of macro base stationm=46dBm, the maximum transmission power P of micro-base stations=30dBm.Channel from macro base station Path loss is 128.1+37.6log10D, d represent macro base station and micro-base station or the distance between macro base station and micro- user, unit It is Km, the path loss of the channel from micro-base station is 141.7+36.7log10D, d represent the distance between micro-base station and micro- user, Unit is Km.In addition, also consider the penetration loss of a 20dB for any one channel to micro- user.SNRedgeRepresent macrocell The average received signal-to-noise ratio of the grand user in edge, noise variance calculation formula are Define self-interferenceUnit is dB, P1It is the transmission power of macro base station.In addition, it is set in simulation process It is 0.95 to determine outage probability, and performance receives the data transfer rate log of signal using micro- user in simulation process2(1+SINR) is weighed, Unit is bps/Hz.
Fig. 3, Fig. 4 and Fig. 5 give simulation result.The data transfer rate R of macro base station transmitting signal is considered in Fig. 3 respectivelyMFor 1bps/Hz and 2bps/Hz, SIRselfFor 90dB and 110dB when, the performance of fSICIC and HD-SIC.Transverse axis represents edge in Fig. 3 Signal to Noise Ratio (SNR)edgeSize, the longitudinal axis represents the average received data transfer rate at micro- user.Transverse axis represents distance d in Fig. 4sSize, The longitudinal axis represents the average received data transfer rate at micro- user.Scene in legend during the no ICI of ICI-free expressions, performance is by public affairs FormulaIt obtains, HD-nonSIC represents scene when micro-base station is using semiduplex mode in fICIC, FD- Hybrid represents that fSICIC and fICIC is used in mixed way, and this mode represents to choose fSICIC under the conditions of each channel, distance etc. With the preferable method of performance in fICIC, similarly HD-hybrid represent HD-SIC and HD-nonSIC be used in mixed way.In Fig. 5 respectively It considers in actual scene, to the influence of performance when channel feedback is respectively 4,6 and 8 bit.It can be seen that work as SIRselfWith SNRedgeIncrease, RMDuring reduction, the performance of fSICIC can increase, as distance dsWhen smaller, the better performances of fSICIC, and significantly Higher than fICIC.When considering imperfect channel, feedback bits more high-performance is also better.

Claims (3)

1. a kind of cross-layer serial interference delet method based on full-duplex communication in heterogeneous network, it is characterised in that:Including following several A step,
The first step, full duplex micro-base station acquisition of information;
Described information include macro base station to micro-base station, macro base station to micro- user, micro-base station to micro- user channel and full duplex The self-interference channel of micro-base station, processing delay, micro-base station and the macro base station of micro-base station full duplex self-interference removing module to micro- use The Channel propagation delay at family is poor and the modulation coding scheme of interference signal;
Second step, the feasibility that micro-base station verification serial interference is deleted:
1) according to the modulation coding scheme of interference signal, micro-base station calculates the dry signal-to-noise ratio needed for demodulation interference signal, is denoted as γM
2) under micro-base station maximum transmission power constraints, the maximum dry signal-to-noise ratio ISNR of user terminal is sought;
3) the maximum ISNR of ISNR is judgedmWith the dry signal-to-noise ratio γ needed for demodulation interference signalMSize, if ISNRm≥γM, Then, fSICIC technical feasibilities, into the 3rd step;Otherwise fSICIC technologies are infeasible, should use existing eICIC or fICIC side Method is disturbed to inhibit cross-layer;The fSICIC technologies refer to the cross-layer serial interference delet method based on full-duplex communication;Institute The eICIC methods stated refer to enhance inter-cell interference suppression technology;The fICIC methods refer to based on full-duplex communication across Layer interference mitigation technology;
3rd step, micro-base station calculate the weighted value of transmitting signal:
1) the transmitting signal x of micro-base stationsIt is received signal ysThe useful signal s of micro- user is sent to itsWeighting Be expressed as:
W in formulaIAnd wDRespectively micro-base station receives signal and is sent to the weight of micro- user's useful signal,F is Carrier frequency, t1It is the processing delay of full duplex self-interference removing module in micro-base station;
2) calculating of weight:
Consider the transmission power constraint of micro-base station and solve the ISNR constraints of interference signal, with the Signal to Interference plus Noise Ratio SINR of micro- user It maximizes as criterion, optimal weight wIAnd wDIt is obtained by solving following problem:
<mrow> <mtable> <mtr> <mtd> <munder> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> <mrow> <msub> <mi>w</mi> <mi>I</mi> </msub> <mo>,</mo> <msub> <mi>w</mi> <mi>D</mi> </msub> </mrow> </munder> </mtd> <mtd> <mrow> <mi>S</mi> <mi>I</mi> <mi>N</mi> <mi>R</mi> <mo>=</mo> <mfrac> <mrow> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mo>|</mo> <msub> <mi>w</mi> <mi>D</mi> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> </mrow> <mrow> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mo>|</mo> <msub> <mi>w</mi> <mi>I</mi> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mrow> <mo>(</mo> <msub> <mi>P</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> <msubsup> <mi>&amp;sigma;</mi> <mi>e</mi> <mn>2</mn> </msubsup> <mo>+</mo> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> <mo>)</mo> </mrow> <mo>+</mo> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> </mrow> </mfrac> </mrow> </mtd> </mtr> </mtable> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>4</mn> <mi>a</mi> <mo>)</mo> </mrow> </mrow>
<mrow> <mtable> <mtr> <mtd> <mrow> <mi>s</mi> <mo>.</mo> <mi>t</mi> <mo>.</mo> </mrow> </mtd> <mtd> <mrow> <msub> <mi>P</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> <mo>=</mo> <mfrac> <mrow> <mo>|</mo> <msub> <mi>w</mi> <mi>I</mi> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mrow> <mo>(</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>s</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mo>+</mo> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> <mo>)</mo> </mrow> <mo>+</mo> <mo>|</mo> <msub> <mi>w</mi> <mi>D</mi> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> </mrow> <mrow> <mn>1</mn> <mo>-</mo> <mo>|</mo> <msub> <mi>w</mi> <mi>I</mi> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <msubsup> <mi>&amp;sigma;</mi> <mi>e</mi> <mn>2</mn> </msubsup> </mrow> </mfrac> <mo>&amp;le;</mo> <msub> <mi>P</mi> <mi>S</mi> </msub> </mrow> </mtd> </mtr> </mtable> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>4</mn> <mi>b</mi> <mo>)</mo> </mrow> </mrow>
P in formulaoutIt is the transmission power of micro-base station,t2It is that micro-base station and macro base station are reached at micro- user Propagation delay;hms、hsu、hmuIt is letter of the macro base station to micro-base station, micro-base station to micro- user and macro base station to micro- user respectively Road,It is the weight of micro-base station retransmitted jamming signal,It is the transmission power of micro-base station, PsIt is the emission maximum work(of micro-base station Rate,It is the variance of the self-interference channel of micro-base station,It is the variance of noise power;
In the following two cases, optimal weight wIAnd wDW is denoted as respectivelyI *And wD *, there is different values, be respectively:
A. whenWhen, wI *Modulus value be | wI *|=0, wD *Modulus value bewD *Phase Position is 0;
B. whenWhen, formula (4a)~(4c) is converted to:
<mrow> <mtable> <mtr> <mtd> <munder> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> <mrow> <mo>|</mo> <msub> <mi>w</mi> <mi>I</mi> </msub> <mo>|</mo> <mo>,</mo> <msub> <mi>P</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> </mrow> </munder> </mtd> <mtd> <mrow> <mi>S</mi> <mi>I</mi> <mi>N</mi> <mi>R</mi> <mo>=</mo> <mfrac> <mrow> <msub> <mi>P</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mo>-</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>s</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mo>|</mo> <msub> <mi>w</mi> <mi>I</mi> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mo>+</mo> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> </mrow> <mrow> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mo>|</mo> <msub> <mi>w</mi> <mi>I</mi> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mrow> <mo>(</mo> <msub> <mi>P</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> <msubsup> <mi>&amp;sigma;</mi> <mi>e</mi> <mn>2</mn> </msubsup> <mo>+</mo> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> <mo>)</mo> </mrow> <mo>+</mo> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> </mrow> </mfrac> <mo>-</mo> <mn>1</mn> </mrow> </mtd> </mtr> </mtable> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>5</mn> <mi>a</mi> <mo>)</mo> </mrow> </mrow>
<mrow> <mtable> <mtr> <mtd> <mrow> <mi>s</mi> <mo>.</mo> <mi>t</mi> <mo>.</mo> </mrow> </mtd> <mtd> <mrow> <mfrac> <mn>1</mn> <mrow> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> </mrow> </mfrac> <mrow> <mo>(</mo> <mfrac> <mrow> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>u</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> </mrow> <msub> <mi>&amp;gamma;</mi> <mi>M</mi> </msub> </mfrac> <mo>-</mo> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> <mo>)</mo> </mrow> <mo>&amp;le;</mo> <msub> <mi>P</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> <mo>&amp;le;</mo> <msub> <mi>P</mi> <mi>S</mi> </msub> </mrow> </mtd> </mtr> </mtable> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>5</mn> <mi>b</mi> <mo>)</mo> </mrow> </mrow>
<mrow> <msub> <mi>P</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> <mo>=</mo> <mfrac> <msup> <mrow> <mo>(</mo> <mo>(</mo> <mrow> <msub> <mi>P</mi> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> <mo>+</mo> <mn>1</mn> </mrow> <mo>)</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>s</mi> </mrow> </msub> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <mo>|</mo> <mo>|</mo> <msub> <mi>w</mi> <mi>I</mi> </msub> <mo>|</mo> <mo>+</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>u</mi> </mrow> </msub> <mo>|</mo> <mo>)</mo> </mrow> <mn>2</mn> </msup> <mrow> <mo>(</mo> <msub> <mi>&amp;gamma;</mi> <mi>M</mi> </msub> <mo>+</mo> <mn>1</mn> <mo>)</mo> <msub> <mi>&amp;gamma;</mi> <mi>M</mi> </msub> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> </mrow> </mfrac> <mo>+</mo> <mfrac> <mrow> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>u</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> </mrow> <mrow> <mo>(</mo> <msub> <mi>&amp;gamma;</mi> <mi>M</mi> </msub> <mo>+</mo> <mn>1</mn> <mo>)</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> </mrow> </mfrac> <mo>-</mo> <mfrac> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> <mrow> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> </mrow> </mfrac> <mo>.</mo> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>5</mn> <mi>c</mi> <mo>)</mo> </mrow> </mrow>
(5c) is updated in object function (5a), is as a result usedIt represents, A in formula (| wI|) be | wI| it is secondary multinomial Formula, B (| wI|) be | wI| quartic polynomial, constraints (5c) be re-written as c≤| wI|≤d, in formula c and d be two often Number, is obtained by formula (5c) and (5b);Therefore, formula (5a)~(5c) is reduced to:
<mrow> <mtable> <mtr> <mtd> <munder> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> <mrow> <mo>|</mo> <msub> <mi>w</mi> <mi>I</mi> </msub> <mo>|</mo> </mrow> </munder> </mtd> <mtd> <mrow> <mfrac> <mrow> <mi>A</mi> <mrow> <mo>(</mo> <mo>|</mo> <msub> <mi>w</mi> <mi>I</mi> </msub> <mo>|</mo> <mo>)</mo> </mrow> </mrow> <mrow> <mi>B</mi> <mrow> <mo>(</mo> <mo>|</mo> <msub> <mi>w</mi> <mi>I</mi> </msub> <mo>|</mo> <mo>)</mo> </mrow> </mrow> </mfrac> <mo>-</mo> <mn>1</mn> </mrow> </mtd> </mtr> </mtable> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>6</mn> <mi>a</mi> <mo>)</mo> </mrow> </mrow>
s.t.c≤|wI|≤d. (6b)
Formula (6a) and (6b) are solved using dichotomy;It is corresponding during dichotomy iteration convergence | wI| it is denoted as i.e. formula (5a) The optimal solution of~(5c), i.e., | wI *|;And then P is obtained by formula (5c)out, substitute into (4b) and obtain | wD *|;Meanwhile wI *Phase bewD *Phase be 0;
4th step, micro-base station send the training signal of weighting to micro- user:
Micro-base station is sent respectively in two time slots to micro- userAnd wD *Z, wherein z are micro-base stations and micro- with per family Known original training signal,And wD *It is the weights of the training signal sent twice respectively;Micro- user is according to connecing The weighted interference signal received estimates the equivalent channel after weighting, i.e.,With
5th step, micro-base station send signal to micro- user:
The weight w that micro-base station will obtainI *And wD *Formula (3) is substituted into, constructs the transmitting signal x of micro-base stations, and it is sent to micro- use Family;
6th step, micro- user judge the feasibility and feedback adjustment information and weight of fSICIC:
Micro- user calculates actual dry signal-to-noise ratio first, is denoted as ISNR ', calculation formula is as follows:
Y in formulauFor the reception signal of micro- user, E { } represents to calculate average;
Then, ISNR ' and γ are comparedMSize:If ISNR ' >=γM, i.e. fSICIC is feasible, then micro- user feeds back two to micro-base station System indicates scalar ce=1;Otherwise, fSICIC is infeasible, and micro- user feeds back the power of α=0 and desired useful signal to micro-base station Value wD', wherein wD' calculation formula it is as follows:
7th step, micro-base station adjust transmitting signal according to the adjustment information and weight of reception:
If α=1, micro-base station continues to send data to micro- user according to the weight that the 3rd step calculates;It otherwise, will be in the 3rd step The weight w being calculatedD *Replace with wD', and return to the 4th step.
2. the cross-layer serial interference delet method based on full-duplex communication in a kind of heterogeneous network according to claim 1, It is characterized in that:The solution procedure of the maximum dry signal-to-noise ratio ISNR of user terminal is as follows in second step (2),
Micro- user ISNR maximization problems is modeled as:
<mrow> <mtable> <mtr> <mtd> <munder> <mrow> <mi>m</mi> <mi>a</mi> <mi>x</mi> </mrow> <mrow> <mo>|</mo> <msub> <mi>w</mi> <mi>I</mi> </msub> <mo>|</mo> </mrow> </munder> </mtd> <mtd> <mrow> <mi>I</mi> <mi>S</mi> <mi>N</mi> <mi>R</mi> <mo>=</mo> <mfrac> <msup> <mrow> <mo>(</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>u</mi> </mrow> </msub> <mo>|</mo> <mo>+</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>s</mi> </mrow> </msub> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <mo>|</mo> <mo>|</mo> <msub> <mover> <mi>w</mi> <mo>&amp;OverBar;</mo> </mover> <mi>I</mi> </msub> <mo>|</mo> <mo>)</mo> </mrow> <mn>2</mn> </msup> <mrow> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mo>|</mo> <msub> <mover> <mi>w</mi> <mo>&amp;OverBar;</mo> </mover> <mi>I</mi> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mrow> <mo>(</mo> <msub> <mover> <mi>P</mi> <mo>&amp;OverBar;</mo> </mover> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> <msubsup> <mi>&amp;sigma;</mi> <mi>e</mi> <mn>2</mn> </msubsup> <mo>+</mo> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> <mo>)</mo> </mrow> <mo>+</mo> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> </mrow> </mfrac> </mrow> </mtd> </mtr> </mtable> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>1</mn> <mi>a</mi> <mo>)</mo> </mrow> </mrow>
<mrow> <mtable> <mtr> <mtd> <mrow> <mi>s</mi> <mo>.</mo> <mi>t</mi> <mo>.</mo> </mrow> </mtd> <mtd> <mrow> <msub> <mover> <mi>P</mi> <mo>&amp;OverBar;</mo> </mover> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> <mo>=</mo> <mfrac> <mrow> <mo>|</mo> <msub> <mover> <mi>w</mi> <mo>&amp;OverBar;</mo> </mover> <mi>I</mi> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mrow> <mo>(</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>s</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mo>+</mo> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> <mo>)</mo> </mrow> </mrow> <mrow> <mn>1</mn> <mo>-</mo> <mo>|</mo> <msub> <mover> <mi>w</mi> <mo>&amp;OverBar;</mo> </mover> <mi>I</mi> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <msubsup> <mi>&amp;sigma;</mi> <mi>e</mi> <mn>2</mn> </msubsup> </mrow> </mfrac> </mrow> </mtd> </mtr> </mtable> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>1</mn> <mi>b</mi> <mo>)</mo> </mrow> </mrow>
<mrow> <mo>|</mo> <msub> <mover> <mi>w</mi> <mo>&amp;OverBar;</mo> </mover> <mi>I</mi> </msub> <mo>|</mo> <mo>&amp;le;</mo> <msqrt> <mfrac> <msub> <mi>P</mi> <mi>s</mi> </msub> <mrow> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>s</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mo>+</mo> <msub> <mi>P</mi> <mi>s</mi> </msub> <msubsup> <mi>&amp;sigma;</mi> <mi>e</mi> <mn>2</mn> </msubsup> <mo>+</mo> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> </mrow> </mfrac> </msqrt> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>1</mn> <mi>c</mi> <mo>)</mo> </mrow> </mrow>
H in formulams、hsu、hmuIt is letter of the macro base station to micro-base station, micro-base station to micro- user and macro base station to micro- user respectively Road,It is the weight of micro-base station retransmitted jamming signal,It is the transmission power of micro-base station, PsIt is the emission maximum work(of micro-base station Rate,It is the variance of the self-interference channel of micro-base station,It is the variance of noise power;
By solving-optimizing problem formulations (1a), (1b) and (1c), the maximum for obtaining ISNR is:
<mrow> <msub> <mi>ISNR</mi> <mi>m</mi> </msub> <mo>=</mo> <mfrac> <msup> <mrow> <mo>(</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>u</mi> </mrow> </msub> <mo>|</mo> <mo>+</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>s</mi> </mrow> </msub> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <mo>|</mo> <mo>|</mo> <msub> <mover> <mi>w</mi> <mo>~</mo> </mover> <mi>I</mi> </msub> <mo>|</mo> <mo>)</mo> </mrow> <mn>2</mn> </msup> <mrow> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mo>|</mo> <msub> <mover> <mi>w</mi> <mo>~</mo> </mover> <mi>I</mi> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mrow> <mo>(</mo> <msub> <msup> <mover> <mi>P</mi> <mo>&amp;OverBar;</mo> </mover> <mo>*</mo> </msup> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> <msubsup> <mi>&amp;sigma;</mi> <mi>e</mi> <mn>2</mn> </msubsup> <mo>+</mo> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> <mo>)</mo> </mrow> <mo>+</mo> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> </mrow> </mfrac> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>2</mn> <mo>)</mo> </mrow> </mrow>
In formulaWherein | wI +| it is variable Meet equation
<mfenced open = "" close = ""> <mtable> <mtr> <mtd> <mrow> <mn>2</mn> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>s</mi> </mrow> </msub> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <mo>|</mo> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> <mo>-</mo> <mn>2</mn> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>u</mi> </mrow> </msub> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mo>|</mo> <msub> <mover> <mi>w</mi> <mo>~</mo> </mover> <mi>I</mi> </msub> <mo>|</mo> <mrow> <mo>(</mo> <mo>|</mo> <msub> <mover> <mi>P</mi> <mo>&amp;OverBar;</mo> </mover> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> <msubsup> <mi>&amp;sigma;</mi> <mi>e</mi> <mn>2</mn> </msubsup> <mo>+</mo> <msubsup> <mi>&amp;sigma;</mi> <mi>n</mi> <mn>2</mn> </msubsup> <mo>)</mo> </mrow> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mo>-</mo> <mrow> <mo>(</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>s</mi> </mrow> </msub> <mo>|</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <mo>|</mo> <mo>|</mo> <msub> <mover> <mi>w</mi> <mo>~</mo> </mover> <mi>I</mi> </msub> <mo>|</mo> <mo>+</mo> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>m</mi> <mi>u</mi> </mrow> </msub> <mo>|</mo> <mo>)</mo> </mrow> <mo>|</mo> <msub> <mi>h</mi> <mrow> <mi>s</mi> <mi>u</mi> </mrow> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <mo>|</mo> <msub> <mover> <mi>w</mi> <mo>~</mo> </mover> <mi>I</mi> </msub> <msup> <mo>|</mo> <mn>2</mn> </msup> <msubsup> <mi>&amp;sigma;</mi> <mi>e</mi> <mn>2</mn> </msubsup> <mfrac> <mrow> <mi>d</mi> <msub> <mover> <mi>P</mi> <mo>&amp;OverBar;</mo> </mover> <mrow> <mi>o</mi> <mi>u</mi> <mi>t</mi> </mrow> </msub> </mrow> <mrow> <mi>d</mi> <mo>|</mo> <msub> <mover> <mi>w</mi> <mo>~</mo> </mover> <mi>I</mi> </msub> <mo>|</mo> </mrow> </mfrac> <mo>=</mo> <mn>0</mn> </mrow> </mtd> </mtr> </mtable> </mfenced>
A definite value, numerical solution acquired using dichotomy.
3. the cross-layer serial interference delet method based on full-duplex communication in a kind of heterogeneous network according to claim 1, It is characterized in that:Formula (6a) and (6b) are solved using dichotomy in 3rd step, are as follows:
A) takeIt takesWherein t is | wI| any value in its domain;
B) giveSolve following unary biquadratic equation:
A(|wI|)=(1+ λ) B (| wI|), (7)
Obtain | wI| solution;
C) if there is any | wI| solution disclosure satisfy that formula (6b), then make λmin=λ, otherwise makes λmax=λ;
D) step b)~c is repeated), solve requirement until meeting precision.
CN201511000159.4A 2015-12-28 2015-12-28 Cross-layer serial interference delet method based on full-duplex communication in a kind of heterogeneous network Expired - Fee Related CN105577591B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201511000159.4A CN105577591B (en) 2015-12-28 2015-12-28 Cross-layer serial interference delet method based on full-duplex communication in a kind of heterogeneous network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201511000159.4A CN105577591B (en) 2015-12-28 2015-12-28 Cross-layer serial interference delet method based on full-duplex communication in a kind of heterogeneous network

Publications (2)

Publication Number Publication Date
CN105577591A CN105577591A (en) 2016-05-11
CN105577591B true CN105577591B (en) 2018-05-18

Family

ID=55887263

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201511000159.4A Expired - Fee Related CN105577591B (en) 2015-12-28 2015-12-28 Cross-layer serial interference delet method based on full-duplex communication in a kind of heterogeneous network

Country Status (1)

Country Link
CN (1) CN105577591B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107484248B (en) * 2016-06-07 2020-12-08 华为技术有限公司 Data transmission method, macro base station and user equipment
CN111133690B (en) * 2017-12-08 2022-09-09 英特尔公司 Method, system and apparatus for reducing inter-station interference in full duplex communication protocol

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102130750A (en) * 2010-01-14 2011-07-20 华为技术有限公司 Signal transmission method and device
CN102820954A (en) * 2012-08-15 2012-12-12 北京工业大学 Method for reducing inter-cell interference of heterogeneous network
EP2637314A1 (en) * 2010-11-05 2013-09-11 ST-Ericsson Semiconductor (Beijing) Co., Ltd. Method and device for eliminating interference in mobile communication system
CN103354534A (en) * 2013-06-20 2013-10-16 东南大学 Asynchronous heterogeneous network microcell interference suppression method based on prefix
CN103929224A (en) * 2014-04-21 2014-07-16 北京邮电大学 Interference suppression method and device in cellular network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102130750A (en) * 2010-01-14 2011-07-20 华为技术有限公司 Signal transmission method and device
EP2637314A1 (en) * 2010-11-05 2013-09-11 ST-Ericsson Semiconductor (Beijing) Co., Ltd. Method and device for eliminating interference in mobile communication system
CN102820954A (en) * 2012-08-15 2012-12-12 北京工业大学 Method for reducing inter-cell interference of heterogeneous network
CN103354534A (en) * 2013-06-20 2013-10-16 东南大学 Asynchronous heterogeneous network microcell interference suppression method based on prefix
CN103929224A (en) * 2014-04-21 2014-07-16 北京邮电大学 Interference suppression method and device in cellular network

Also Published As

Publication number Publication date
CN105577591A (en) 2016-05-11

Similar Documents

Publication Publication Date Title
CN102573033B (en) Multi-Femtocell downlink power interference control method based on game theory
Ding et al. Performance impact of idle mode capability on dense small cell networks
Wei et al. Energy-efficient full-duplex cooperative nonorthogonal multiple access
US9456360B2 (en) Method and systems for decentralized interference management in a multi-antenna wireless communication system
Lee et al. Aligned reverse frame structure for interference mitigation in dynamic TDD systems
CN104868947A (en) Method of realizing beam forming and base station
CN104168574B (en) Uplink transmission method based on adaptable interference selection in mixed cellular system
Ding et al. Analysis on the SINR performance of dynamic TDD in homogeneous small cell networks
Daeinabi et al. Performance evaluation of cell selection techniques for picocells in LTE-advanced networks
CN105577591B (en) Cross-layer serial interference delet method based on full-duplex communication in a kind of heterogeneous network
CN103428843B (en) Power coordinating method integrating effectiveness of near field users and effectiveness of distant filed users
El-Mokadem et al. BER performance evaluation for the downlink NOMA system over different fading channels with different modulation schemes
US20120094650A1 (en) Method of communication
Liu et al. On the performance of nth best relay selection scheme for noma-based cooperative relaying networks with swipt
Wang et al. Reduced power centralized eICIC for LTE-advanced heterogeneous networks
CN103491619A (en) Cognition TD-LTE system uplink power control method with vertical and horizontal interference considered
Barbarossa et al. Optimal radio access in femtocell networks based on markov modeling of interferers' activity
CN105898874A (en) Coordinated multipoint (CoMP) transmission-based distributed heterogeneous network resource distribution method and system
Dalela Prediction methods for long term evolution (lte) advanced network at 2.4 ghz 2.6 ghz and 3.5 ghz
CN103595453B (en) Multi-cell time division multiplexing wireless system beam forming method
Michel et al. Performance evaluation of the eICIC technique applied to a heterogeneous 4G mobile network
US20140205040A1 (en) System and Method for Digital Communications Using Channel Statistics
Prabakar et al. Dynamic Channel State Information based Relay Selection in Device-to-Device Communication
Wu et al. Cooperative interference mitigation for indoor dense femtocell networks
Ma et al. Centralized and distributed optimization of ad-hoc cognitive radio network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180518

Termination date: 20181228