An overview about the new feature proposed for LTE Release 12 and beyond: Proximity Services (ProSe) / D2D.
It covers the D2D features: Discovery, Communication, Security and also shows some use-cases.
This document discusses direct mobile-to-mobile (D2D) communication as a paradigm for 5G networks. It defines D2D communication as allowing devices to communicate directly without routing through network infrastructure. D2D can occur either in licensed spectrum using cellular control or in unlicensed spectrum. The document outlines classifications of D2D, the functional block diagram, power control considerations, applications, and benefits like higher data rates, reliable communication, and power savings. It concludes that D2D communication aided by cellular networks can enhance resource reuse between devices and networks while expanding business opportunities.
This document provides a survey of device-to-device (D2D) communication. It begins with background on the increasing mobile data traffic and challenges it poses. It then classifies D2D technologies as inband or outband. Inband D2D can be network assisted or not, operating in cellular spectrum. Outband D2D operates in unlicensed spectrum. Challenges of D2D include interference management and resource allocation. Applications include offloading and public safety. While D2D promises increased capacity and proximity services, open challenges remain around interference, pricing, and standardization.
This document discusses device-to-device (D2D) communication in 5G networks. It covers several applications of D2D communication such as vehicular communication, public safety, disaster relief, millimeter wave communication, handover and mobility issues, unmanned aerial vehicles, internet of things, and its potential role in 6G networks. Some key points include: D2D can improve capacity and latency in 5G; it supports applications like vehicular communication, proximity services and public safety; challenges include interference management and handover procedures for mobile D2D pairs.
The document discusses new handoff management techniques for device-to-device (D2D) communication in Long Term Evolution-Advanced (LTE-A) cellular networks. It first introduces D2D communication and its classification. It then describes the LTE-A architecture and protocol stack for supporting D2D, including the D2D function block and bearer management. Finally, it proposes using D2D communication to enable seamless handovers and reduce handover delays, outlining a high-level flow for D2D-enabled handovers.
This document discusses device-to-device (D2D) communications in cellular networks. It provides an introduction to D2D, outlines the advantages such as improved efficiency and performance, and challenges including interference management. The objectives of the project are to measure D2D performance with and without interference and compare using uplink and downlink resources. The document describes the simulation scenario and setup, which uses OFDM and Rayleigh fading. Results are presented and further work is proposed to expand the analysis to more complex scenarios.
5G network architecture will include new functional blocks and interfaces defined by 3GPP. There are several options for deploying 5G, including standalone and non-standalone modes. When adding 5G to an existing multi-RAT site, backhaul capacity will need to be increased to at least 10Gbps to support 5G capabilities like massive MIMO and wider channel bandwidths. Migration from EPC to the new 5G core (NGCN) will require interworking between the networks during transition.
Its exploring the technique for spatially successive interference cancellation and superposition of transmission for upcoming radio communication 5G technology.
The new 5G unified air interface is being designed to not only vastly enhance mobile broadband performance and efficiency, but also scale to connect the massive Internet of Things and enable new types of services such as mission critical control that require ultra-low latency and new levels of reliability and security. The new design will unify diverse spectrum types and bands, scale from macro deployments to local hotspots and efficiently multiplex the envisioned 5G services across an extreme variation of requirements.
For more information on 5G technologies, use cases and timelines, please visit us at www.qualcomm.com/5G.
6G networking and connectivity promises significant improvements over 5G through innovative architectures and technologies. 6G aims to enable near-instant, unlimited wireless connectivity to support novel applications like telepresence, autonomous vehicles, and bio-IoT. It envisions integrating space, air, and maritime communications with terrestrial networks. 6G is expected to expand spectrum usage to low THz and visible light bands and employ technologies like nanonetworking, bionetworking, optical networking, and 3D networking. Major research challenges for 6G include developing low-power circuits for new spectrum ranges, seamless integration of multiple technologies, and addressing security and privacy issues in distributed networks.
This document provides an overview of wireless communication technologies from 0G to 4G. It discusses the characteristics of each generation including available services, data speeds, and technologies used. The major mobile operators in Egypt are also mentioned.
The document discusses various topics related to wireless communication channels and networks. It provides details on wireline channels, fading effects, bit error rates for different mediums. It also summarizes key aspects of cellular systems, challenges in wireless communications, deployment of different generations of wireless networks, and traffic routing in wireless networks. The document is written by A.Sanyasi Rao and contains technical details on wireless communication concepts.
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMALprem kamal
This document discusses Orthogonal Frequency Division Multiple Access (OFDMA), a multiple access technique used in wireless communication. OFDMA is a specialized version of Frequency Division Multiple Access (FDMA) where all subcarriers within a channel are orthogonal to each other, allowing them to overlap without interference. This allows for more efficient spectrum usage than traditional FDMA. OFDMA was introduced in the 1960s-70s and has since been used in technologies like Wi-Fi, WiMAX, LTE, and is being researched for future 5G networks due to its ability to support high-speed data transmission.
NOTE: The slides contain the visual effects. So for complete information download the presentation and view it in slideshow mode.
Description of Non-orthogonal Multiple access in 5G networks Detailed discussion on downlink NOMA scenario and future challenges and trends.
Chap 1&2(history and intro) wireless communicationasadkhan1327
The document provides an outline for a course on wireless communication, beginning with an introduction to wireless networking concepts, cellular system design including frequency reuse and handoff, wireless link characteristics such as propagation and fading, modulation techniques, and multiple access methods including TDMA, FDMA, and CDMA. It also gives a brief history of wireless technology from early systems like smoke signals to the development of modern cellular standards such as GSM and LTE. Key wireless networking and mobile communication systems are defined.
The document summarizes the generations of mobile networks from 1G to 5G. 1G introduced analog cell phones in the 1980s with speeds up to 2.4kbps. 2G launched digital networks in the late 1980s supporting speeds up to 64kbps. 3G emerged in the late 1990s providing speeds from 125kbps to 2Mbps and supported more applications. 4G was developed in 2002 with theoretical speeds up to 1Gbps. 5G is being researched to provide incredible transmission speeds with unlimited call volumes and infinite data through advanced technologies like smart radios and wearable devices. Each generation brought improvements in speed and capabilities to support more advanced applications.
The document discusses the evolution of wireless networks from 1G to 5G. 1G networks were the first generation of cellular networks and used analog signals. 2G introduced digital cellular networks like GSM, which offered benefits over 1G like encrypted calls and greater efficiency. 3G networks brought internet access to mobile phones. 4G aims to provide wireless internet with speeds comparable to fixed broadband. 5G networks will integrate existing cellular and WiFi networks to provide universal wireless connectivity without limitations.
The document discusses OFDM (Orthogonal Frequency Division Multiplexing) for wireless communication. It introduces OFDM as a modulation technique that divides the available bandwidth into multiple orthogonal subcarriers. This allows for overlapping subchannels and improves spectral efficiency compared to conventional FDM. The document then covers OFDM system modeling, generation of subcarriers, fading effects, use of guard times and cyclic extensions to mitigate multipath interference, windowing techniques, and factors to consider when choosing OFDM system parameters.
The document provides an overview of 3GPP (3rd Generation Partnership Project), which is an industry collaboration that organizes and manages standards for mobile communications. It describes 3GPP's scope, organizational structure, specification groups, and the evolution of mobile standards from 1G to 4G/5G. Key points covered include 3GPP's responsibility for 2G, 3G, 4G and 5G standards; its organizational and market partners; and new features added in each 3GPP release.
The document discusses CDMA2000, a 3G cellular technology that provides an evolutionary upgrade path from 2G CDMA. It spreads signals across 1.25MHz of spectrum to transmit uniquely encoded signals simultaneously. CDMA2000 supports high-speed packet data through standards like 1X EV-DO that enable up to 2.4Mbps speeds. While it offers advantages like efficient spectrum use and support for advanced services, disadvantages include potential channel pollution from multiple signals and limited international roaming without multimode devices.
6G Training Course Part 7: 6G Technologies - Introduction3G4G
After our successful launch of '5G for Absolute Beginners' course (http://bit.ly/5Gbegins) in 2020, we decided to create an introductory training course on 6G Mobile Wireless Communications technology. The course is ready and the best way to navigate it is via the Free 6G Training page at: https://bit.ly/6Gintro - this will ensure that you have the latest version of each video and also the most recent version of the 6G technologies videos as and they are added.
In this part we will look at 6G Technologies. As this is a huge topic, we are only going to discuss the technologies at a very high level. Later on we will create more detailed presentations on 6G technologies. In this part we will look at some of the 6G technologies being proposed by other researchers, organisations, vendors and operators and create a summary of the 6G technologies that are being discussed. These technologies each merit their own little presentation that we hope to make in the future
This course is part of #Free6Gtraining initiative (https://www.free6gtraining.com/)
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
6G and Beyond-5G Page: https://www.3g4g.co.uk/6G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Free 6G Training Blog: https://www.free6gtraining.com/
Routing protocols are essential for wireless sensor networks to efficiently transmit collected sensor data to data sinks. The document discusses several challenges in designing routing protocols for wireless sensor networks and surveys different routing techniques including flat, hierarchical, and geographic routing. It provides LEACH and PEGASIS as examples of hierarchical routing protocols that use clustering and data aggregation to reduce energy consumption.
The document discusses the evolution of wireless technologies from 1G to 5G. It provides details on the key characteristics of each generation including speed increases over time from kilobits per second to gigabits per second. 5G is described as providing complete wireless communication with almost no limitations through very high transmission speeds. Example applications of 5G that are discussed include smart homes, healthcare, autonomous vehicles and more through its ability to support high bandwidth, low latency connections.
This document discusses optical time division multiplexing (OTDM) systems. It outlines some of the key challenges with OTDM, including nonlinearity in fibers causing signal-to-noise ratio degradation as the number of channels increases. It also discusses the components needed for an OTDM system, including ultra-short optical pulse generation and modulation at the transmitter, and optical clock extraction and demultiplexing at the receiver. Several approaches for OTDM demultiplexing are described, such as using cascaded modulators, nonlinear optical loop mirrors, or four wave mixing in a nonlinear medium.
2. wireless propagation models free space propagationJAIGANESH SEKAR
This document discusses wireless communication propagation mechanisms and propagation models. It explains that when a signal hits an obstacle, it can be reflected, diffracted, or scattered depending on the surface properties. Propagation models are used to predict the average received signal power and design wireless systems by characterizing radio wave propagation based on factors like frequency and distance. Small-scale fading models predict power fluctuations over short ranges, while large-scale models predict average power decreases over large distances between transmitter and receiver.
5G will enable new use cases by providing higher speeds, lower latency, and higher connection densities compared to 4G. It is being standardized by the 3GPP and ITU to meet the IMT-2020 requirements of enhanced mobile broadband, massive machine type communications, and ultra-reliable low latency communications. 5G networks will utilize new spectrum such as sub-6 GHz and millimeter wave bands to deliver multi-Gbps speeds and support the connectivity requirements of use cases like virtual and augmented reality, autonomous vehicles, smart cities, and industrial IoT.
Using Distributed Node-RED to build fog/edge applicationsNam Giang
Technology advancement has pushed computation to the network edge, paving the way for a class of IoT applications that leverage CPU, storage and communications in edge devices. Building these new IoT applications is not an easy task however. Two key challenges include: supporting the dynamic nature of the edge network and the context-dependent characteristics of application logic. In this paper we report our experience in building an edge computing platform that uses a distributed data flow programming model based on the popular open source Node-RED tool. We describe some of the challenges we faced as well as some novel solutions that were implemented in our platform. A new approach in applying the concept of exogenous coordination is also presented and shown to be necessary in building large scale IoT applications across the edge, fog and cloud.
A COMPREHENSIVE SECURE PROTOCOL FOR ALL D2D SCENARIOSijwmn
To fulfill two integral aims of abating cellular traffic and enhancing efficiency of cellular network, D2D is
considered as a novel channel of communication. This form of communication has introduced for 4th cellular
communication and enacts a significant role in the 5th generation. Four D2D communication scenarios
defined in the references, includes direct D2D and relaying D2D communication both with and without
cellular infrastructure. One of the major challenges addressing D2D protocols contributes to the fact that
they have one single secure protocol that can adapt to the four scenarios. In the current study, we propose a
secure D2D protocol based on ARIADNE. To authenticate and key agreement between Source and
Destination, we employ LTE-A AKA protocol, further for broadcast authentication between relaying nodes
TESLA was applied. In Contrary to the recent protocols, our proposed protocol has inconsiderable
computation overhead and trivial communication overhead than SODE and preserve many security
properties such as Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, and
Secure Routing Transmission. We check Authentication, Confidentiality, Reachability, and Secure Key
Agreement of the proposed protocol with ProVerif verification tools.
Its exploring the technique for spatially successive interference cancellation and superposition of transmission for upcoming radio communication 5G technology.
The new 5G unified air interface is being designed to not only vastly enhance mobile broadband performance and efficiency, but also scale to connect the massive Internet of Things and enable new types of services such as mission critical control that require ultra-low latency and new levels of reliability and security. The new design will unify diverse spectrum types and bands, scale from macro deployments to local hotspots and efficiently multiplex the envisioned 5G services across an extreme variation of requirements.
For more information on 5G technologies, use cases and timelines, please visit us at www.qualcomm.com/5G.
6G networking and connectivity promises significant improvements over 5G through innovative architectures and technologies. 6G aims to enable near-instant, unlimited wireless connectivity to support novel applications like telepresence, autonomous vehicles, and bio-IoT. It envisions integrating space, air, and maritime communications with terrestrial networks. 6G is expected to expand spectrum usage to low THz and visible light bands and employ technologies like nanonetworking, bionetworking, optical networking, and 3D networking. Major research challenges for 6G include developing low-power circuits for new spectrum ranges, seamless integration of multiple technologies, and addressing security and privacy issues in distributed networks.
This document provides an overview of wireless communication technologies from 0G to 4G. It discusses the characteristics of each generation including available services, data speeds, and technologies used. The major mobile operators in Egypt are also mentioned.
The document discusses various topics related to wireless communication channels and networks. It provides details on wireline channels, fading effects, bit error rates for different mediums. It also summarizes key aspects of cellular systems, challenges in wireless communications, deployment of different generations of wireless networks, and traffic routing in wireless networks. The document is written by A.Sanyasi Rao and contains technical details on wireless communication concepts.
OFDMA - Orthogonal Frequency Division Multiple Access PPT by PREM KAMALprem kamal
This document discusses Orthogonal Frequency Division Multiple Access (OFDMA), a multiple access technique used in wireless communication. OFDMA is a specialized version of Frequency Division Multiple Access (FDMA) where all subcarriers within a channel are orthogonal to each other, allowing them to overlap without interference. This allows for more efficient spectrum usage than traditional FDMA. OFDMA was introduced in the 1960s-70s and has since been used in technologies like Wi-Fi, WiMAX, LTE, and is being researched for future 5G networks due to its ability to support high-speed data transmission.
NOTE: The slides contain the visual effects. So for complete information download the presentation and view it in slideshow mode.
Description of Non-orthogonal Multiple access in 5G networks Detailed discussion on downlink NOMA scenario and future challenges and trends.
Chap 1&2(history and intro) wireless communicationasadkhan1327
The document provides an outline for a course on wireless communication, beginning with an introduction to wireless networking concepts, cellular system design including frequency reuse and handoff, wireless link characteristics such as propagation and fading, modulation techniques, and multiple access methods including TDMA, FDMA, and CDMA. It also gives a brief history of wireless technology from early systems like smoke signals to the development of modern cellular standards such as GSM and LTE. Key wireless networking and mobile communication systems are defined.
The document summarizes the generations of mobile networks from 1G to 5G. 1G introduced analog cell phones in the 1980s with speeds up to 2.4kbps. 2G launched digital networks in the late 1980s supporting speeds up to 64kbps. 3G emerged in the late 1990s providing speeds from 125kbps to 2Mbps and supported more applications. 4G was developed in 2002 with theoretical speeds up to 1Gbps. 5G is being researched to provide incredible transmission speeds with unlimited call volumes and infinite data through advanced technologies like smart radios and wearable devices. Each generation brought improvements in speed and capabilities to support more advanced applications.
The document discusses the evolution of wireless networks from 1G to 5G. 1G networks were the first generation of cellular networks and used analog signals. 2G introduced digital cellular networks like GSM, which offered benefits over 1G like encrypted calls and greater efficiency. 3G networks brought internet access to mobile phones. 4G aims to provide wireless internet with speeds comparable to fixed broadband. 5G networks will integrate existing cellular and WiFi networks to provide universal wireless connectivity without limitations.
The document discusses OFDM (Orthogonal Frequency Division Multiplexing) for wireless communication. It introduces OFDM as a modulation technique that divides the available bandwidth into multiple orthogonal subcarriers. This allows for overlapping subchannels and improves spectral efficiency compared to conventional FDM. The document then covers OFDM system modeling, generation of subcarriers, fading effects, use of guard times and cyclic extensions to mitigate multipath interference, windowing techniques, and factors to consider when choosing OFDM system parameters.
The document provides an overview of 3GPP (3rd Generation Partnership Project), which is an industry collaboration that organizes and manages standards for mobile communications. It describes 3GPP's scope, organizational structure, specification groups, and the evolution of mobile standards from 1G to 4G/5G. Key points covered include 3GPP's responsibility for 2G, 3G, 4G and 5G standards; its organizational and market partners; and new features added in each 3GPP release.
The document discusses CDMA2000, a 3G cellular technology that provides an evolutionary upgrade path from 2G CDMA. It spreads signals across 1.25MHz of spectrum to transmit uniquely encoded signals simultaneously. CDMA2000 supports high-speed packet data through standards like 1X EV-DO that enable up to 2.4Mbps speeds. While it offers advantages like efficient spectrum use and support for advanced services, disadvantages include potential channel pollution from multiple signals and limited international roaming without multimode devices.
6G Training Course Part 7: 6G Technologies - Introduction3G4G
After our successful launch of '5G for Absolute Beginners' course (http://bit.ly/5Gbegins) in 2020, we decided to create an introductory training course on 6G Mobile Wireless Communications technology. The course is ready and the best way to navigate it is via the Free 6G Training page at: https://bit.ly/6Gintro - this will ensure that you have the latest version of each video and also the most recent version of the 6G technologies videos as and they are added.
In this part we will look at 6G Technologies. As this is a huge topic, we are only going to discuss the technologies at a very high level. Later on we will create more detailed presentations on 6G technologies. In this part we will look at some of the 6G technologies being proposed by other researchers, organisations, vendors and operators and create a summary of the 6G technologies that are being discussed. These technologies each merit their own little presentation that we hope to make in the future
This course is part of #Free6Gtraining initiative (https://www.free6gtraining.com/)
All our #3G4G5G slides and videos are available at:
Videos: https://www.youtube.com/3G4G5G
Slides: https://www.slideshare.net/3G4GLtd
6G and Beyond-5G Page: https://www.3g4g.co.uk/6G/
Free Training Videos: https://www.3g4g.co.uk/Training/
Free 6G Training Blog: https://www.free6gtraining.com/
Routing protocols are essential for wireless sensor networks to efficiently transmit collected sensor data to data sinks. The document discusses several challenges in designing routing protocols for wireless sensor networks and surveys different routing techniques including flat, hierarchical, and geographic routing. It provides LEACH and PEGASIS as examples of hierarchical routing protocols that use clustering and data aggregation to reduce energy consumption.
The document discusses the evolution of wireless technologies from 1G to 5G. It provides details on the key characteristics of each generation including speed increases over time from kilobits per second to gigabits per second. 5G is described as providing complete wireless communication with almost no limitations through very high transmission speeds. Example applications of 5G that are discussed include smart homes, healthcare, autonomous vehicles and more through its ability to support high bandwidth, low latency connections.
This document discusses optical time division multiplexing (OTDM) systems. It outlines some of the key challenges with OTDM, including nonlinearity in fibers causing signal-to-noise ratio degradation as the number of channels increases. It also discusses the components needed for an OTDM system, including ultra-short optical pulse generation and modulation at the transmitter, and optical clock extraction and demultiplexing at the receiver. Several approaches for OTDM demultiplexing are described, such as using cascaded modulators, nonlinear optical loop mirrors, or four wave mixing in a nonlinear medium.
2. wireless propagation models free space propagationJAIGANESH SEKAR
This document discusses wireless communication propagation mechanisms and propagation models. It explains that when a signal hits an obstacle, it can be reflected, diffracted, or scattered depending on the surface properties. Propagation models are used to predict the average received signal power and design wireless systems by characterizing radio wave propagation based on factors like frequency and distance. Small-scale fading models predict power fluctuations over short ranges, while large-scale models predict average power decreases over large distances between transmitter and receiver.
5G will enable new use cases by providing higher speeds, lower latency, and higher connection densities compared to 4G. It is being standardized by the 3GPP and ITU to meet the IMT-2020 requirements of enhanced mobile broadband, massive machine type communications, and ultra-reliable low latency communications. 5G networks will utilize new spectrum such as sub-6 GHz and millimeter wave bands to deliver multi-Gbps speeds and support the connectivity requirements of use cases like virtual and augmented reality, autonomous vehicles, smart cities, and industrial IoT.
Using Distributed Node-RED to build fog/edge applicationsNam Giang
Technology advancement has pushed computation to the network edge, paving the way for a class of IoT applications that leverage CPU, storage and communications in edge devices. Building these new IoT applications is not an easy task however. Two key challenges include: supporting the dynamic nature of the edge network and the context-dependent characteristics of application logic. In this paper we report our experience in building an edge computing platform that uses a distributed data flow programming model based on the popular open source Node-RED tool. We describe some of the challenges we faced as well as some novel solutions that were implemented in our platform. A new approach in applying the concept of exogenous coordination is also presented and shown to be necessary in building large scale IoT applications across the edge, fog and cloud.
A COMPREHENSIVE SECURE PROTOCOL FOR ALL D2D SCENARIOSijwmn
To fulfill two integral aims of abating cellular traffic and enhancing efficiency of cellular network, D2D is
considered as a novel channel of communication. This form of communication has introduced for 4th cellular
communication and enacts a significant role in the 5th generation. Four D2D communication scenarios
defined in the references, includes direct D2D and relaying D2D communication both with and without
cellular infrastructure. One of the major challenges addressing D2D protocols contributes to the fact that
they have one single secure protocol that can adapt to the four scenarios. In the current study, we propose a
secure D2D protocol based on ARIADNE. To authenticate and key agreement between Source and
Destination, we employ LTE-A AKA protocol, further for broadcast authentication between relaying nodes
TESLA was applied. In Contrary to the recent protocols, our proposed protocol has inconsiderable
computation overhead and trivial communication overhead than SODE and preserve many security
properties such as Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, and
Secure Routing Transmission. We check Authentication, Confidentiality, Reachability, and Secure Key
Agreement of the proposed protocol with ProVerif verification tools.
A COMPREHENSIVE SECURE PROTOCOL FOR ALL D2D SCENARIOSijwmn
To fulfill two integral aims of abating cellular traffic and enhancing efficiency of cellular network, D2D is
considered as a novel channel of communication. This form of communication has introduced for 4th cellular
communication and enacts a significant role in the 5th generation. Four D2D communication scenarios
defined in the references, includes direct D2D and relaying D2D communication both with and without
cellular infrastructure. One of the major challenges addressing D2D protocols contributes to the fact that
they have one single secure protocol that can adapt to the four scenarios. In the current study, we propose a
secure D2D protocol based on ARIADNE. To authenticate and key agreement between Source and
Destination, we employ LTE-A AKA protocol, further for broadcast authentication between relaying nodes
TESLA was applied. In Contrary to the recent protocols, our proposed protocol has inconsiderable
computation overhead and trivial communication overhead than SODE and preserve many security
properties such as Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, and
Secure Routing Transmission. We check Authentication, Confidentiality, Reachability, and Secure Key
Agreement of the proposed protocol with ProVerif verification tools.
Design and Impact of Spectrum Reuse Technologies in Large NetworksKonpalAli1
The spectrum available for wireless communication is limited and the demand in data rate and system capacity is ever-growing. In this regard, improving spectral-utilization is a core focus to cater the requirements of next generation networks. This talk will focus on three promising spectrum-reuse technologies: device-to-device (D2D), full-duplex and non-orthogonal multiple access (NOMA). Each of these significantly improves spectral efficiency and consequently data rate and throughput; however, the price paid is increased interference. Since each of these technologies allow multiple transmissions within a cell on a time-frequency resource-block, they result in interference within the cell (i.e., intracell interference). Additionally, due to the increased communication, they increase network interference from outside the cell under consideration (i.e., intercell interference) as well.
Real networks are becoming very dense; as a result, the impact of intercell interference coming from the entire network is significant. As such, using models that consider single-cell/few-cell scenarios result in misleading conclusions. Accurate modeling thus requires considering a large network. In this context, stochastic geometry is a powerful tool for analyzing random patterns of points such as those found in wireless networks. In this talk, we will discuss the use of stochastic geometry to model and analyze the deployment of the aforementioned spectrum reuse technologies in a large network. This gives insight into network performance, shedding light on the impact of deploying a certain technology in a real-world network. Additionally, it allows us to propose schemes for integrating such technologies, mode-selection, parameter-selection and resource-allocation that enhance the parameters of interest in the network such as data rate, coverage and secure communication.
Device-to-device (D2D) communications underlaying a cellular infrastructure has been proposed as a means of taking advantage of the physical proximity of communicating devices, increasing resource utilization, and improving cellular coverage. Relative to the traditional cellular methods, there is a need to design new peer discovery methods, physical layer procedures, and radio resource management algorithms that help realize the potential article we use the 3GPP Long Term Evolution system as a baseline for D2D design, review some of the key design challenges, and propose solution approaches that allow cellular devices and D2D pairs to share spectrum resources and thereby increase the spectrum and energy efficiency of traditional cellular networks. Sim- ulation results illustrate the viability of the proposed design.
Device to Device Communications will enable on cellular 4G/5G networks soon, There are many research aspects in D2D Communications,
Mode Selection
Network Coding
MIMO
Multi-Hop
the most complicated Interference scenarios are coming
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSijwmn
Device-to-Device (D2D) communication is a new technology that offer many advantages for the LTEadvanced
network such us wireless peer-to-peer services and higher spectral efficiency. It is also
considered as one of promising techniques for the 5G wireless communications system and used in so
many different fields such as network traffic offloading, public safety, social services and applications such
as gaming and military applications . The goal of this paper is to present advances on the current 3GPP
LTE-advanced system related to Device-to-Device (D2D). In this paper, we provide an overview of the
D2D types based on the communication spectrum of D2D transmission, namely Inband D2D
communication and Outband D2D communication. Then we present the advantages and disadvantages of
each D2D mode. Moreover, architecture and protocol enhancements for D2D communications under
LTE-A network are described.
This document summarizes a study on efficient resource allocation for device-to-device (D2D) communication underlying an LTE network. It describes the network model including Evolved Packet Core components. It also outlines the radio resource and access technologies used in LTE such as OFDMA. The document defines the problem of intelligently selecting shared radio blocks to improve network throughput. It presents the simulation methodology used to evaluate random and heuristic D2D resource assignment algorithms. The results demonstrate that a greedy heuristic algorithm improves network performance in terms of total throughput without harming the primary network.
The document discusses device-to-device (D2D) communication in cellular networks, which allows direct communication between mobile users without traversing the base station. D2D offers advantages like improved spectral efficiency and reduced delays. The feasibility of incorporating D2D into LTE-A networks is being studied. The document reviews literature on different approaches to D2D classification and implementation, addressing topics like interference management, power allocation, and device discovery challenges.
The document provides an overview of 4G and 5G mobile network architectures as well as an introduction to device-to-device (D2D) network technology. It describes the key features and components of 4G networks including the evolved packet core and how 5G networks aim to achieve much higher data rates and connectivity for many more devices. The document also outlines the benefits of D2D communication, how it can operate in both licensed and unlicensed spectrum, and some potential applications including multi-user cooperative communication and vehicle-to-vehicle networks.
This document discusses device-to-device (D2D) communication in LTE networks. It describes how D2D allows direct communication between user equipments by bypassing the base station, addressing issues like network coverage, congestion control, and public safety. The document outlines the D2D communication process, including synchronization, discovery, and communication modes. It also describes the ProSe D2D network architecture and direct discovery procedure. D2D communication in LTE aims to improve network coverage, offer last mile connectivity, control congestion, and enable public safety communication during emergencies or disasters.
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...amal algedir
This document discusses device-to-device (D2D) communication in heterogeneous networks (HetNets). It contains 3 key contributions:
1. Analyzing whether D2D communication can improve throughput in HetNets when small cells reuse the same spectrum as macro cells. A sequential max search algorithm is proposed for resource allocation.
2. Proposing ways to enhance energy efficiency in D2D-powered HetNets through dynamic mode selection, resource allocation, and power control. Both dedicated and reuse modes of D2D communication are considered.
3. Developing a stochastic analytical model to quantify the impact of LTE scheduler type on D2D communication in HetNets.
Analysis Of D2D Communication In 5G NetworkNicole Heredia
This document analyzes device-to-device (D2D) communication in 5G networks. D2D communication is seen as promising for providing low-latency, high-data rate services between devices in 5G networks. However, mobility poses challenges as latency could increase when control nodes exchange D2D information. The document proposes two mobility management solutions to minimize signaling overhead and latency in network-assisted D2D communications. It also discusses simulation assumptions considering dense deployment of small cells and D2D groups. The results show the proposed solutions can reduce signaling and improve latency by maximizing the time D2D users are under the same small cell control.
Chairman’s Notes of Agenda Item 6.2.5 LTE Device to Device Proximity ServicesYi-Hsueh Tsai
Focus on device to device discovery in network coverage (intra-cell and inter-cell) and communication in network coverage (intra-cell and inter-cell), in partial network coverage and outside network coverage. The communication part is targeted to apply only to public safety use. The partial network coverage and out of network coverage scenarios apply only to public safety use. The work will proceed from the starting point of the agreements and working assumptions reached during the study item as captured in TR 36.843.
No relaying, no standardized inter-cell coordination based on X2 or air interface, no out of network discovery in Release 12 and limited time to be spent on inter-frequency discovery.
Multi-operator D2D communication allows devices subscribed to different cellular operators to directly communicate. This introduces complexity as operators may not want to share network information. The document discusses multi-operator D2D discovery, mode selection, and spectrum allocation. For discovery, devices listen for messages on their home operator's spectrum. Mode selection algorithms for single operators do not directly apply and need to consider inter-operator interference without information sharing. A proposed algorithm relies on interference measurements reported to the home operator.
This document discusses routing strategies in delay tolerant networks (DTNs) using wireless sensor network (WSN) nodes for localization applications. It first provides background on WSNs and DTNs, and then reviews common DTN routing protocols like epidemic routing, PROPHET, spray and wait, and MaxProp. The aim of the dissertation is to propose a new routing protocol for DTNs using WSN nodes where GPS is unavailable. It discusses using a hybrid of knowledge-based and additional node-based routing. The document outlines simulating the proposed filtered flooding protocol in NS-2 to evaluate delivery ratio and delay for a mining activity scenario. Results show delivery ratio is high for small networks but decreases with more nodes, while delay is
The document discusses mobile ad-hoc networks (MANETs). It provides an introduction to MANETs and their history. It describes different routing protocols for MANETs including reactive, proactive, and hybrid protocols. It discusses some problems with MANETs and applications of MANETs such as for business meetings. It proposes a solution for secure data transmission in MANETs and concludes with a comparison of MANET routing protocols.
This document outlines the syllabus for an Internet of Things course. It covers 5 modules: basics of networking and IoT emergence, IoT sensing and actuation, IoT processing topologies and types, associated IoT technologies like cloud computing and agricultural IoT, and IoT case studies in areas like vehicular IoT, healthcare IoT, and IoT analytics. It details learning resources, assignments involving practical applications and coding, and intended course outcomes related to describing IoT components, classifying sensors and actuators, demonstrating IoT processing, and explaining associated technologies and application architectures.
An interconnected collection of autonomous computers is called a computer network. Networks allow computers to share resources like hardware, software, databases, and communicate with each other. The first network was ARPANET in 1969 which connected universities and defense organizations in the US. Later networks like NSFnet and the Internet improved capacity and connectivity. A network uses nodes, servers, network interface units, and types of networks can be LANs, MANs, or WANs depending on geographical reach. Networking evolved to improve sharing, reliability, and reduce costs.
The document discusses reducing interference in cellular networks. It describes that frequency division duplexing (FDD) and time division duplexing (TDD) are the main duplexing technologies used, but both have interference issues. It then introduces code division duplexing (CDD) which combines CDMA with a new set of "smart codes" applied to a TDD system. This allows a TDD system to eliminate all interference types. CDD is presented as a promising new 3G technology that simplifies network design and lowers costs by transitioning cellular networks from interference-limited to noise-limited environments.
Engineering at Lovely Professional University (LPU).pdfSona
LPU’s engineering programs provide students with the skills and knowledge to excel in the rapidly evolving tech industry, ensuring a bright and successful future. With world-class infrastructure, top-tier placements, and global exposure, LPU stands as a premier destination for aspiring engineers.
Lecture -3 Cold water supply system.pptxrabiaatif2
The presentation on Cold Water Supply explored the fundamental principles of water distribution in buildings. It covered sources of cold water, including municipal supply, wells, and rainwater harvesting. Key components such as storage tanks, pipes, valves, and pumps were discussed for efficient water delivery. Various distribution systems, including direct and indirect supply methods, were analyzed for residential and commercial applications. The presentation emphasized water quality, pressure regulation, and contamination prevention. Common issues like pipe corrosion, leaks, and pressure drops were addressed along with maintenance strategies. Diagrams and case studies illustrated system layouts and best practices for optimal performance.
Air pollution is contamination of the indoor or outdoor environment by any ch...dhanashree78
Air pollution is contamination of the indoor or outdoor environment by any chemical, physical or biological agent that modifies the natural characteristics of the atmosphere.
Household combustion devices, motor vehicles, industrial facilities and forest fires are common sources of air pollution. Pollutants of major public health concern include particulate matter, carbon monoxide, ozone, nitrogen dioxide and sulfur dioxide. Outdoor and indoor air pollution cause respiratory and other diseases and are important sources of morbidity and mortality.
WHO data show that almost all of the global population (99%) breathe air that exceeds WHO guideline limits and contains high levels of pollutants, with low- and middle-income countries suffering from the highest exposures.
Air quality is closely linked to the earth’s climate and ecosystems globally. Many of the drivers of air pollution (i.e. combustion of fossil fuels) are also sources of greenhouse gas emissions. Policies to reduce air pollution, therefore, offer a win-win strategy for both climate and health, lowering the burden of disease attributable to air pollution, as well as contributing to the near- and long-term mitigation of climate change.
This PPT covers the index and engineering properties of soil. It includes details on index properties, along with their methods of determination. Various important terms related to soil behavior are explained in detail. The presentation also outlines the experimental procedures for determining soil properties such as water content, specific gravity, plastic limit, and liquid limit, along with the necessary calculations and graph plotting. Additionally, it provides insights to understand the importance of these properties in geotechnical engineering applications.
Optimization of Cumulative Energy, Exergy Consumption and Environmental Life ...J. Agricultural Machinery
Optimal use of resources, including energy, is one of the most important principles in modern and sustainable agricultural systems. Exergy analysis and life cycle assessment were used to study the efficient use of inputs, energy consumption reduction, and various environmental effects in the corn production system in Lorestan province, Iran. The required data were collected from farmers in Lorestan province using random sampling. The Cobb-Douglas equation and data envelopment analysis were utilized for modeling and optimizing cumulative energy and exergy consumption (CEnC and CExC) and devising strategies to mitigate the environmental impacts of corn production. The Cobb-Douglas equation results revealed that electricity, diesel fuel, and N-fertilizer were the major contributors to CExC in the corn production system. According to the Data Envelopment Analysis (DEA) results, the average efficiency of all farms in terms of CExC was 94.7% in the CCR model and 97.8% in the BCC model. Furthermore, the results indicated that there was excessive consumption of inputs, particularly potassium and phosphate fertilizers. By adopting more suitable methods based on DEA of efficient farmers, it was possible to save 6.47, 10.42, 7.40, 13.32, 31.29, 3.25, and 6.78% in the exergy consumption of diesel fuel, electricity, machinery, chemical fertilizers, biocides, seeds, and irrigation, respectively.
Preface: The ReGenX Generator innovation operates with a US Patented Frequency Dependent Load Current Delay which delays the creation and storage of created Electromagnetic Field Energy around the exterior of the generator coil. The result is the created and Time Delayed Electromagnetic Field Energy performs any magnitude of Positive Electro-Mechanical Work at infinite efficiency on the generator's Rotating Magnetic Field, increasing its Kinetic Energy and increasing the Kinetic Energy of an EV or ICE Vehicle to any magnitude without requiring any Externally Supplied Input Energy. In Electricity Generation applications the ReGenX Generator innovation now allows all electricity to be generated at infinite efficiency requiring zero Input Energy, zero Input Energy Cost, while producing zero Greenhouse Gas Emissions, zero Air Pollution and zero Nuclear Waste during the Electricity Generation Phase. In Electric Motor operation the ReGen-X Quantum Motor now allows any magnitude of Work to be performed with zero Electric Input Energy.
Demonstration Protocol: The demonstration protocol involves three prototypes;
1. Protytpe #1, demonstrates the ReGenX Generator's Load Current Time Delay when compared to the instantaneous Load Current Sine Wave for a Conventional Generator Coil.
2. In the Conventional Faraday Generator operation the created Electromagnetic Field Energy performs Negative Work at infinite efficiency and it reduces the Kinetic Energy of the system.
3. The Magnitude of the Negative Work / System Kinetic Energy Reduction (in Joules) is equal to the Magnitude of the created Electromagnetic Field Energy (also in Joules).
4. When the Conventional Faraday Generator is placed On-Load, Negative Work is performed and the speed of the system decreases according to Lenz's Law of Induction.
5. In order to maintain the System Speed and the Electric Power magnitude to the Loads, additional Input Power must be supplied to the Prime Mover and additional Mechanical Input Power must be supplied to the Generator's Drive Shaft.
6. For example, if 100 Watts of Electric Power is delivered to the Load by the Faraday Generator, an additional >100 Watts of Mechanical Input Power must be supplied to the Generator's Drive Shaft by the Prime Mover.
7. If 1 MW of Electric Power is delivered to the Load by the Faraday Generator, an additional >1 MW Watts of Mechanical Input Power must be supplied to the Generator's Drive Shaft by the Prime Mover.
8. Generally speaking the ratio is 2 Watts of Mechanical Input Power to every 1 Watt of Electric Output Power generated.
9. The increase in Drive Shaft Mechanical Input Power is provided by the Prime Mover and the Input Energy Source which powers the Prime Mover.
10. In the Heins ReGenX Generator operation the created and Time Delayed Electromagnetic Field Energy performs Positive Work at infinite efficiency and it increases the Kinetic Energy of the system.
Power Point Presentation for Electrical Engineering 3-phase.pptAniket_1415
D2D - Device to Device Communication
1. D2D
Device to Device Communication
Aluno: Francisco Bento da Silva Neto
MO611 - Teleprocessamento e Redes
Professor: Nelson Fonseca, Ph.D
Instituto de Computação
2. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
3. Background
● Challenges for future wireless communication:
o Massive growth in the number of connected devices. (50 billion)
o Massive growth in traffic volume (1000x in 10 years) due to new
users / communicating machines
o Increasingly wide range of applications with varying requirements and
characteristics: Multi-Gbps in specific scenarios, Tens of MBps almost
everywhere, communicating machines
4. Background
● Needed enhancements to support future wireless communication:
o General enhancements applicable to a wide range of scenarios and use cases
o Enhancements specifically targeting small-cell/local-area deployments.
o Enhancements specifically targeting new use cases, such as machine-type
communication (MTC) and national security and public safety services (NSPS).
● LTE evolution: LTE Release 12 and beyond (LTE-B)
o Proximity Services (ProSe):
D2D discovery
D2D communication
6. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
7. ● Security
o The security features of WiFi and Bluetooth are much less robust than
those used in public cellular systems. They would not be adequate for
major public services and they would be unsuitable for public safety
applications.
● Independence from cellular networks
o WiFi and Bluetooth operate independently from cellular radio
technology such as LTE. Any form of device-to-device discovery based
on them would have to run in parallel with cellular radio operation,
which would be inefficient and would become a significant drain on
device batteries.
D2D vs Ad-hoc
8. ● Unlicensed spectrum
o WiFi and Bluetooth operate in unlicensed spectrum, without any
centralised control of usage or interference. This is not generally a
problem when usage densities are low, but it would become a major
limitation as proximity-based services proliferate. Throughput, range
and reliability would all suffer.
● Manual pairing
o WiFi and Bluetooth rely on manual pairing of devices to enable
communication between them, which would be a serious stumbling
block for autonomous, dynamic proximity-based services.
● Transmission distance and data transfer rate (see next slide)
D2D vs Ad-hoc
10. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
11. D2D Overview
● Devices communicates with each other without intermediate nodes
(Offloads traffic from the core network)
● Uses cellular spectrum (licensed band)
● Proximity of equipments provides:
o High bit rates / low delays
o Low energy consumption
● Radio resources may be simultaneously used by cellular and D2D links so
that the same spectral resource can be used more than once within the
same cell (reuse gain)
● Uses the same pre-existing cellular infrastructure: supports more services
and improves current services and applications
12. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
13. D2D Discovery
● Devices can discover the presence of other devices in their vicinity
● Proximity discovery is a natural trigger for direct communication
● Proximity discovery can be used as a standalone service and not trigger
communication (social networking)
● General requirements:
o Fast discovery
o Low energy consumption
o Minimize additional interference to the WAN and resource degradation
14. D2D Discovery: Methods
● D2D provides 2 methods of discovery:
● Network discovery (Radio)
o A device is able to discover and be discovered by other devices in
radio proximity
● User assisted discovery (Application Layer)
o A user of a service or social networking application is able to discover
and be discovered by other users of the same service or social
networking application
15. D2D Discovery:
Node/Peer discovery
● Before two devices can directly communicate with one another, they must
first discover that they are near each other
● Two peer devices need to meet in space, time and frequency
● No coordinated discovery: Peer discovery is a randomized procedure, in
which a device sends signals without any knowledge about the location of
the intended peer (energy consuming)
● Coordinated discovery: The network uses its knowledge of approximate
device locations to recognize devices which could benefit from D2D
communications. When a D2D pair has been found, the network
coordinates the time and frequency allocation for sending/scanning for
beacons
16. D2D Discovery:
Beacon
Sadly not this:
● Beacon: A known synchronization or reference signal sequence
○ Similar to secondary synchronization sequence in LTE or frequency
hopping sequence (FHS) in bluetooth
17. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
18. D2D Discovery:
Priori discovery
● Network (and/or devices themselves) detects D2D candidates before the
start of the communication session between the devices
● Extreme approach:
o Network assigns beacon resources to the devices
o Beacon are broadcast in the coverage area of the cell, so D2D
devices can readily find one another
● Alternative approach:
o Device willing to engage in D2D communication sends a request to the network
to indicate its interest
o Device can provide information about the specific service it is interested in.
Network will initiate the discovery process when a pair of devices are likely to
benefit from D2D communication (passive)
20. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
21. D2D Discovery:
Posteriori discovery
● Use case: Network realizes that two D2D enabled devices with an ongoing
communication session (cellular mode) are in the proximity of each other
● Does not provide the same flexibility of supporting localized services as
priori methods, but it is limited to offloading localized traffic
● Devices agree on a token that is unique to the already ongoing
communication (similar to HTTP_SESSION mechanics)
● Once token is established devices register the token at the serving eNB
(evolved Node B)
● Alternatively the eNB can analyze the source and destination IP addresses
to detect D2D pairs communicating within the same cell (same subnet)
23. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
24. ● Licensed band:
o Better interference avoidance under a controlled environment
o Ex: Femtocells / picocells work under LTE-A licensed band
● Classified in:
o Inband D2D:
Underlay
Overlay
o Outband D2D
Controlled
Autonomous
D2D communication
25. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
26. ● Communication occurs under licensed spectrum: Cellular spectrum is used
for both cellular link and D2D
● High control over cellular (licensed) spectrum
● Underlay:
o Cellular and D2D communication share the same radio resources
● Overlay:
o Cellular and D2D are given dedicated cellular resources (a cellular
resource is subtracted from cellular users)
● Underlay is more popular than overlay: probably due to its hight spectral
efficiency
D2D communication
Inband: Overview
27. ● Pros:
o Underlay D2D increase the spectral efficiency of cellular spectrum
o Any cellular device is capable of using inband
o QoS is easy because the cellular spectrum can be fully managed by
the eNB
o Transmission distance ~ 1km.
o Data rate ~ 1Gbps
● Cons
o Cellular resources might be wasted in overlay
o Interference mgmt among D2D and cellular transmission is very
challenging/complex
D2D communication
Inband: Pros and cons
28. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
29. ● Communication occurs under unlicensed spectrum
● Aims to eliminate the interference issue between D2D and cellular links
● Requires an extra interface, usually Wi-Fi direct, ZigBee or Bluetooth
● Classified in:
o Controlled
The control of the second interface is under the cellular network
● Similar to Android NFC / Android beam
o Autonomous
D2D controlled by the users: second interface is not under cellular control
● Transmission distance and data transfer rate is extremely lower than Inband
D2D communication
Outband: Overview
30. ● Pros:
o No interference with cellular communication (unlicensed spectrum)
o Users can have simultaneous cellular and D2D transmission
● Cons
o Cellular devices requires two wireless interfaces (e.g. LTE and WiFi)
o Power consumption of the extra interface (WiFi)
o Lower transmission distance
o Lower transmission data rate
D2D communication
Outband: Pros and cons
31. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
32. D2D security
1. Network access security:
o Security interactions between the user and access network, which
provides protection against attacks on the radio access link;
1. Network domain security:
o it enables the secure data/control signal exchange among network
elements, which provides protection against attacks on wire-line
network;
1. User domain security (3):
o it secures the access to the mobile station;
33. D2D security
4. Application domain security:
o it is an end-to-end security between the application on user equipment
and on servers;
4. Visibility and configuration security:
o the set of features controls the availability and configuration of certain
security service.
35. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
36. ● Two categories:
o Simple D2D: sender and receiver exchange data with each other
o Relay: D2D user forward data from and to other users
● Use cases examples:
● Local Data Service
Information sharing (bittorrent)
Mobile multiplayer gaming
Mobile advertising (proximity services)
Streaming services (IPTV, google chromecast, apple airplay)
Social (Tinder, Waze, Facebook)
Community services
D2D use cases
37. ● V2V - Vehicle to Vehicle communication:
o Collision avoidance system requires a very low latency for example to
coordinate braking between vehicles
o V2V can provide not only information about the nearest car in front,
but also from other cars within the communication range, including
traffic (waze ?)
● Group handover of multiple users (for example in a Bus)
o By using D2D the devices in a group inform each other about the
handover and its parameters with minimal signaling from the network
D2D use cases
38. ● Multiuser cooperative communication (MUCC)
o Benefited user (BU) is in an area with poor cellular signal
o Another user is in an area with good cellular signal. This user may
help BU to improve its signal and act as a supporting user (SU)
D2D use cases
39. ● D2D communications with network coding
o Users requesting the same content can form cooperative clusters to
achieve higher energy efficiency
o eNB transmits the content to the cluster heads
o Cluster heads multicasts the contents to the other devices within the
cluster through D2D links
o Eg: world cup games
o IPTV:
o Multicast of linear channels, Pay-Per-View, Video Recording
D2D use cases
40. ● Public safety (police, fire and ambulance services)
o Many of these organisations uses relatively old technology such as
TETRA system developed in the 90’s with limited capability
o US government has expressed desire to move to LTE for public safety
o Crucial requirement for these users is the ability to communicate with
each other outside of a mobile network (walkie talkie), which is not
supported by LTE, but is one of LTE D2D objectives
D2D use cases
41. ● Although basic requirements are set, details are being still
studied/developed
● Big impact of the new technologies proposed:
o D2D discovery
Good: Might be a key tool for social networking and other internet
apps
Bad: Privacy concerns, device battery consumption
o D2D communication:
Good: Offloading traffic, High data rate speeds
Bad: Interference / deterioration of existing services
Conclusion
43. Thank you!
Francisco Bento da Silva Neto, Jun 2014.
References:
●Shahid Mumtaz et al., "Odyssey of LTE-A D2D Communication:Tutorial Approach", IEEE
Communications Surveys and Tutorials, Dec. 2013
●Gábor et. al. “Design Aspects of Network Assisted Device to Device Communication”, IEEE
communication Magazine March 2012
●K. Doppler, M. P. Rinne, P. Janis, C. Ribeiro, and K.Hugl, “Device-to-Device Communications;
Functional Prospects for LTE-Advanced Networks”. IEEE International Conference on
Communications Workshops, 2009, Jun. 2009, pp.1– 6
●M. Hajiaghayi, C. Wijting, C. Ribeiro, M. T. Hajiaghayi, "Efficient and practical resource block
allocation for LTE-based D2D network via graph coloring", Springer Science+Business Media, New
York, 2013
●Alastair Brydon, "Opportunities and threats from LTE Device-to-Device (D2D) communication",
Unwired insight - The wireless blog, Feb. 2014