An overview about the new feature proposed for LTE Release 12 and beyond: Proximity Services (ProSe) / D2D.
It covers the D2D features: Discovery, Communication, Security and also shows some use-cases.
Presented at the National Webinar on ‘Recent Advancement of System Design Towards 5G Communication (RASDT5C 2021)’ held on 11th to 13th January 2021, organized by the Deptartment of Electronics and Communication Engineering, Haldia Institute of Technology.
NOTE: The slides contain the visual effects. So for complete information download the presentation and view it in slideshow mode.
Description of Non-orthogonal Multiple access in 5G networks Detailed discussion on downlink NOMA scenario and future challenges and trends.
Presented at the National Webinar on ‘Recent Advancement of System Design Towards 5G Communication (RASDT5C 2021)’ held on 11th to 13th January 2021, organized by the Deptartment of Electronics and Communication Engineering, Haldia Institute of Technology.
NOTE: The slides contain the visual effects. So for complete information download the presentation and view it in slideshow mode.
Description of Non-orthogonal Multiple access in 5G networks Detailed discussion on downlink NOMA scenario and future challenges and trends.
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
Presented by Andy Sutton, Principal Network Architect - Chief Architect’s Office, TSO, BT at IET "Towards 5G Mobile Technology – Vision to Reality" seminar on 25th Jan 2017
Shared with permission
In the last few decades, Mobile Wireless Communication networks have experienced a remarkable change. The mobile wireless Generation (G) generally refers to a change in the nature of the system, speed, technology, frequency, data capacity, latency etc.
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
This is a power point Presentation about wifi and the various standards of IEEE used for the transmission of data over the wireless network.
You must have encountered with term 802.11.a/b/g/n of your wireless network device.
This presentation will break the ice for your knowledge about those terms, their standards and how they get connected.
Let's Get Started.
Using Distributed Node-RED to build fog/edge applicationsNam Giang
Technology advancement has pushed computation to the network edge, paving the way for a class of IoT applications that leverage CPU, storage and communications in edge devices. Building these new IoT applications is not an easy task however. Two key challenges include: supporting the dynamic nature of the edge network and the context-dependent characteristics of application logic. In this paper we report our experience in building an edge computing platform that uses a distributed data flow programming model based on the popular open source Node-RED tool. We describe some of the challenges we faced as well as some novel solutions that were implemented in our platform. A new approach in applying the concept of exogenous coordination is also presented and shown to be necessary in building large scale IoT applications across the edge, fog and cloud.
A COMPREHENSIVE SECURE PROTOCOL FOR ALL D2D SCENARIOSijwmn
To fulfill two integral aims of abating cellular traffic and enhancing efficiency of cellular network, D2D is
considered as a novel channel of communication. This form of communication has introduced for 4th cellular
communication and enacts a significant role in the 5th generation. Four D2D communication scenarios
defined in the references, includes direct D2D and relaying D2D communication both with and without
cellular infrastructure. One of the major challenges addressing D2D protocols contributes to the fact that
they have one single secure protocol that can adapt to the four scenarios. In the current study, we propose a
secure D2D protocol based on ARIADNE. To authenticate and key agreement between Source and
Destination, we employ LTE-A AKA protocol, further for broadcast authentication between relaying nodes
TESLA was applied. In Contrary to the recent protocols, our proposed protocol has inconsiderable
computation overhead and trivial communication overhead than SODE and preserve many security
properties such as Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, and
Secure Routing Transmission. We check Authentication, Confidentiality, Reachability, and Secure Key
Agreement of the proposed protocol with ProVerif verification tools.
Universal mobile telecommunication System (UMTS) is actually the third generation mobile, which uses WCDMA. The Dream was that 2G and 2.5G systems are incompatible around the world.
-Worldwide devices need to have multiple technologies inside of them, i.e. tri-band phones, dual-mode phones
To develop a single standard that would be accepted around the world.
-One device should be able to work anywhere.
Increased data rate.
- Maximum 2048Kbps
UMTS is developed by 3GPP (3 Generation Partnership Project) a joint venture of several organization
3G UMTS is a third-generation (3G): broadband, packet-based transmission of text, digitized voice, video, multimedia at data rates up to 2 Mbps
Also referred to as wideband code division multiple access(WCDMA)
Allows many more applications to be introduce to a worldwide
Also provide new services like alternative billing methods or calling plans.
The higher bandwidth also enables video conferencing or IPTV.
Once UMTS is fully available, computer and phone users can be constantly attached to the Internet wherever they travel and, as they roam, will have the same set of capabilities.
Presented by Andy Sutton, Principal Network Architect - Chief Architect’s Office, TSO, BT at IET "Towards 5G Mobile Technology – Vision to Reality" seminar on 25th Jan 2017
Shared with permission
In the last few decades, Mobile Wireless Communication networks have experienced a remarkable change. The mobile wireless Generation (G) generally refers to a change in the nature of the system, speed, technology, frequency, data capacity, latency etc.
↓↓↓↓ Read More:
@ Kindly Follow my Instagram Page to discuss about your mental health problems-
-----> https://instagram.com/mentality_streak?utm_medium=copy_link
@ Appreciate my work:
-----> behance.net/burhanahmed1
Thank-you !
This is a power point Presentation about wifi and the various standards of IEEE used for the transmission of data over the wireless network.
You must have encountered with term 802.11.a/b/g/n of your wireless network device.
This presentation will break the ice for your knowledge about those terms, their standards and how they get connected.
Let's Get Started.
Using Distributed Node-RED to build fog/edge applicationsNam Giang
Technology advancement has pushed computation to the network edge, paving the way for a class of IoT applications that leverage CPU, storage and communications in edge devices. Building these new IoT applications is not an easy task however. Two key challenges include: supporting the dynamic nature of the edge network and the context-dependent characteristics of application logic. In this paper we report our experience in building an edge computing platform that uses a distributed data flow programming model based on the popular open source Node-RED tool. We describe some of the challenges we faced as well as some novel solutions that were implemented in our platform. A new approach in applying the concept of exogenous coordination is also presented and shown to be necessary in building large scale IoT applications across the edge, fog and cloud.
A COMPREHENSIVE SECURE PROTOCOL FOR ALL D2D SCENARIOSijwmn
To fulfill two integral aims of abating cellular traffic and enhancing efficiency of cellular network, D2D is
considered as a novel channel of communication. This form of communication has introduced for 4th cellular
communication and enacts a significant role in the 5th generation. Four D2D communication scenarios
defined in the references, includes direct D2D and relaying D2D communication both with and without
cellular infrastructure. One of the major challenges addressing D2D protocols contributes to the fact that
they have one single secure protocol that can adapt to the four scenarios. In the current study, we propose a
secure D2D protocol based on ARIADNE. To authenticate and key agreement between Source and
Destination, we employ LTE-A AKA protocol, further for broadcast authentication between relaying nodes
TESLA was applied. In Contrary to the recent protocols, our proposed protocol has inconsiderable
computation overhead and trivial communication overhead than SODE and preserve many security
properties such as Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, and
Secure Routing Transmission. We check Authentication, Confidentiality, Reachability, and Secure Key
Agreement of the proposed protocol with ProVerif verification tools.
A COMPREHENSIVE SECURE PROTOCOL FOR ALL D2D SCENARIOSijwmn
To fulfill two integral aims of abating cellular traffic and enhancing efficiency of cellular network, D2D is
considered as a novel channel of communication. This form of communication has introduced for 4th cellular
communication and enacts a significant role in the 5th generation. Four D2D communication scenarios
defined in the references, includes direct D2D and relaying D2D communication both with and without
cellular infrastructure. One of the major challenges addressing D2D protocols contributes to the fact that
they have one single secure protocol that can adapt to the four scenarios. In the current study, we propose a
secure D2D protocol based on ARIADNE. To authenticate and key agreement between Source and
Destination, we employ LTE-A AKA protocol, further for broadcast authentication between relaying nodes
TESLA was applied. In Contrary to the recent protocols, our proposed protocol has inconsiderable
computation overhead and trivial communication overhead than SODE and preserve many security
properties such as Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, and
Secure Routing Transmission. We check Authentication, Confidentiality, Reachability, and Secure Key
Agreement of the proposed protocol with ProVerif verification tools.
Design and Impact of Spectrum Reuse Technologies in Large NetworksKonpalAli1
The spectrum available for wireless communication is limited and the demand in data rate and system capacity is ever-growing. In this regard, improving spectral-utilization is a core focus to cater the requirements of next generation networks. This talk will focus on three promising spectrum-reuse technologies: device-to-device (D2D), full-duplex and non-orthogonal multiple access (NOMA). Each of these significantly improves spectral efficiency and consequently data rate and throughput; however, the price paid is increased interference. Since each of these technologies allow multiple transmissions within a cell on a time-frequency resource-block, they result in interference within the cell (i.e., intracell interference). Additionally, due to the increased communication, they increase network interference from outside the cell under consideration (i.e., intercell interference) as well.
Real networks are becoming very dense; as a result, the impact of intercell interference coming from the entire network is significant. As such, using models that consider single-cell/few-cell scenarios result in misleading conclusions. Accurate modeling thus requires considering a large network. In this context, stochastic geometry is a powerful tool for analyzing random patterns of points such as those found in wireless networks. In this talk, we will discuss the use of stochastic geometry to model and analyze the deployment of the aforementioned spectrum reuse technologies in a large network. This gives insight into network performance, shedding light on the impact of deploying a certain technology in a real-world network. Additionally, it allows us to propose schemes for integrating such technologies, mode-selection, parameter-selection and resource-allocation that enhance the parameters of interest in the network such as data rate, coverage and secure communication.
Device-to-device (D2D) communications underlaying a cellular infrastructure has been proposed as a means of taking advantage of the physical proximity of communicating devices, increasing resource utilization, and improving cellular coverage. Relative to the traditional cellular methods, there is a need to design new peer discovery methods, physical layer procedures, and radio resource management algorithms that help realize the potential article we use the 3GPP Long Term Evolution system as a baseline for D2D design, review some of the key design challenges, and propose solution approaches that allow cellular devices and D2D pairs to share spectrum resources and thereby increase the spectrum and energy efficiency of traditional cellular networks. Sim- ulation results illustrate the viability of the proposed design.
Device to Device Communications will enable on cellular 4G/5G networks soon, There are many research aspects in D2D Communications,
Mode Selection
Network Coding
MIMO
Multi-Hop
the most complicated Interference scenarios are coming
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSijwmn
Device-to-Device (D2D) communication is a new technology that offer many advantages for the LTEadvanced
network such us wireless peer-to-peer services and higher spectral efficiency. It is also
considered as one of promising techniques for the 5G wireless communications system and used in so
many different fields such as network traffic offloading, public safety, social services and applications such
as gaming and military applications . The goal of this paper is to present advances on the current 3GPP
LTE-advanced system related to Device-to-Device (D2D). In this paper, we provide an overview of the
D2D types based on the communication spectrum of D2D transmission, namely Inband D2D
communication and Outband D2D communication. Then we present the advantages and disadvantages of
each D2D mode. Moreover, architecture and protocol enhancements for D2D communications under
LTE-A network are described.
Chairman’s Notes of Agenda Item 6.2.5 LTE Device to Device Proximity ServicesYi-Hsueh Tsai
Focus on device to device discovery in network coverage (intra-cell and inter-cell) and communication in network coverage (intra-cell and inter-cell), in partial network coverage and outside network coverage. The communication part is targeted to apply only to public safety use. The partial network coverage and out of network coverage scenarios apply only to public safety use. The work will proceed from the starting point of the agreements and working assumptions reached during the study item as captured in TR 36.843.
No relaying, no standardized inter-cell coordination based on X2 or air interface, no out of network discovery in Release 12 and limited time to be spent on inter-frequency discovery.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
An Approach to Detecting Writing Styles Based on Clustering Techniquesambekarshweta25
An Approach to Detecting Writing Styles Based on Clustering Techniques
Authors:
-Devkinandan Jagtap
-Shweta Ambekar
-Harshit Singh
-Nakul Sharma (Assistant Professor)
Institution:
VIIT Pune, India
Abstract:
This paper proposes a system to differentiate between human-generated and AI-generated texts using stylometric analysis. The system analyzes text files and classifies writing styles by employing various clustering algorithms, such as k-means, k-means++, hierarchical, and DBSCAN. The effectiveness of these algorithms is measured using silhouette scores. The system successfully identifies distinct writing styles within documents, demonstrating its potential for plagiarism detection.
Introduction:
Stylometry, the study of linguistic and structural features in texts, is used for tasks like plagiarism detection, genre separation, and author verification. This paper leverages stylometric analysis to identify different writing styles and improve plagiarism detection methods.
Methodology:
The system includes data collection, preprocessing, feature extraction, dimensional reduction, machine learning models for clustering, and performance comparison using silhouette scores. Feature extraction focuses on lexical features, vocabulary richness, and readability scores. The study uses a small dataset of texts from various authors and employs algorithms like k-means, k-means++, hierarchical clustering, and DBSCAN for clustering.
Results:
Experiments show that the system effectively identifies writing styles, with silhouette scores indicating reasonable to strong clustering when k=2. As the number of clusters increases, the silhouette scores decrease, indicating a drop in accuracy. K-means and k-means++ perform similarly, while hierarchical clustering is less optimized.
Conclusion and Future Work:
The system works well for distinguishing writing styles with two clusters but becomes less accurate as the number of clusters increases. Future research could focus on adding more parameters and optimizing the methodology to improve accuracy with higher cluster values. This system can enhance existing plagiarism detection tools, especially in academic settings.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
1. D2D
Device to Device Communication
Aluno: Francisco Bento da Silva Neto
MO611 - Teleprocessamento e Redes
Professor: Nelson Fonseca, Ph.D
Instituto de Computação
2. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
3. Background
● Challenges for future wireless communication:
o Massive growth in the number of connected devices. (50 billion)
o Massive growth in traffic volume (1000x in 10 years) due to new
users / communicating machines
o Increasingly wide range of applications with varying requirements and
characteristics: Multi-Gbps in specific scenarios, Tens of MBps almost
everywhere, communicating machines
4. Background
● Needed enhancements to support future wireless communication:
o General enhancements applicable to a wide range of scenarios and use cases
o Enhancements specifically targeting small-cell/local-area deployments.
o Enhancements specifically targeting new use cases, such as machine-type
communication (MTC) and national security and public safety services (NSPS).
● LTE evolution: LTE Release 12 and beyond (LTE-B)
o Proximity Services (ProSe):
D2D discovery
D2D communication
6. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
7. ● Security
o The security features of WiFi and Bluetooth are much less robust than
those used in public cellular systems. They would not be adequate for
major public services and they would be unsuitable for public safety
applications.
● Independence from cellular networks
o WiFi and Bluetooth operate independently from cellular radio
technology such as LTE. Any form of device-to-device discovery based
on them would have to run in parallel with cellular radio operation,
which would be inefficient and would become a significant drain on
device batteries.
D2D vs Ad-hoc
8. ● Unlicensed spectrum
o WiFi and Bluetooth operate in unlicensed spectrum, without any
centralised control of usage or interference. This is not generally a
problem when usage densities are low, but it would become a major
limitation as proximity-based services proliferate. Throughput, range
and reliability would all suffer.
● Manual pairing
o WiFi and Bluetooth rely on manual pairing of devices to enable
communication between them, which would be a serious stumbling
block for autonomous, dynamic proximity-based services.
● Transmission distance and data transfer rate (see next slide)
D2D vs Ad-hoc
10. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
11. D2D Overview
● Devices communicates with each other without intermediate nodes
(Offloads traffic from the core network)
● Uses cellular spectrum (licensed band)
● Proximity of equipments provides:
o High bit rates / low delays
o Low energy consumption
● Radio resources may be simultaneously used by cellular and D2D links so
that the same spectral resource can be used more than once within the
same cell (reuse gain)
● Uses the same pre-existing cellular infrastructure: supports more services
and improves current services and applications
12. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
13. D2D Discovery
● Devices can discover the presence of other devices in their vicinity
● Proximity discovery is a natural trigger for direct communication
● Proximity discovery can be used as a standalone service and not trigger
communication (social networking)
● General requirements:
o Fast discovery
o Low energy consumption
o Minimize additional interference to the WAN and resource degradation
14. D2D Discovery: Methods
● D2D provides 2 methods of discovery:
● Network discovery (Radio)
o A device is able to discover and be discovered by other devices in
radio proximity
● User assisted discovery (Application Layer)
o A user of a service or social networking application is able to discover
and be discovered by other users of the same service or social
networking application
15. D2D Discovery:
Node/Peer discovery
● Before two devices can directly communicate with one another, they must
first discover that they are near each other
● Two peer devices need to meet in space, time and frequency
● No coordinated discovery: Peer discovery is a randomized procedure, in
which a device sends signals without any knowledge about the location of
the intended peer (energy consuming)
● Coordinated discovery: The network uses its knowledge of approximate
device locations to recognize devices which could benefit from D2D
communications. When a D2D pair has been found, the network
coordinates the time and frequency allocation for sending/scanning for
beacons
16. D2D Discovery:
Beacon
Sadly not this:
● Beacon: A known synchronization or reference signal sequence
○ Similar to secondary synchronization sequence in LTE or frequency
hopping sequence (FHS) in bluetooth
17. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
18. D2D Discovery:
Priori discovery
● Network (and/or devices themselves) detects D2D candidates before the
start of the communication session between the devices
● Extreme approach:
o Network assigns beacon resources to the devices
o Beacon are broadcast in the coverage area of the cell, so D2D
devices can readily find one another
● Alternative approach:
o Device willing to engage in D2D communication sends a request to the network
to indicate its interest
o Device can provide information about the specific service it is interested in.
Network will initiate the discovery process when a pair of devices are likely to
benefit from D2D communication (passive)
20. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
21. D2D Discovery:
Posteriori discovery
● Use case: Network realizes that two D2D enabled devices with an ongoing
communication session (cellular mode) are in the proximity of each other
● Does not provide the same flexibility of supporting localized services as
priori methods, but it is limited to offloading localized traffic
● Devices agree on a token that is unique to the already ongoing
communication (similar to HTTP_SESSION mechanics)
● Once token is established devices register the token at the serving eNB
(evolved Node B)
● Alternatively the eNB can analyze the source and destination IP addresses
to detect D2D pairs communicating within the same cell (same subnet)
23. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
24. ● Licensed band:
o Better interference avoidance under a controlled environment
o Ex: Femtocells / picocells work under LTE-A licensed band
● Classified in:
o Inband D2D:
Underlay
Overlay
o Outband D2D
Controlled
Autonomous
D2D communication
25. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
26. ● Communication occurs under licensed spectrum: Cellular spectrum is used
for both cellular link and D2D
● High control over cellular (licensed) spectrum
● Underlay:
o Cellular and D2D communication share the same radio resources
● Overlay:
o Cellular and D2D are given dedicated cellular resources (a cellular
resource is subtracted from cellular users)
● Underlay is more popular than overlay: probably due to its hight spectral
efficiency
D2D communication
Inband: Overview
27. ● Pros:
o Underlay D2D increase the spectral efficiency of cellular spectrum
o Any cellular device is capable of using inband
o QoS is easy because the cellular spectrum can be fully managed by
the eNB
o Transmission distance ~ 1km.
o Data rate ~ 1Gbps
● Cons
o Cellular resources might be wasted in overlay
o Interference mgmt among D2D and cellular transmission is very
challenging/complex
D2D communication
Inband: Pros and cons
28. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
29. ● Communication occurs under unlicensed spectrum
● Aims to eliminate the interference issue between D2D and cellular links
● Requires an extra interface, usually Wi-Fi direct, ZigBee or Bluetooth
● Classified in:
o Controlled
The control of the second interface is under the cellular network
● Similar to Android NFC / Android beam
o Autonomous
D2D controlled by the users: second interface is not under cellular control
● Transmission distance and data transfer rate is extremely lower than Inband
D2D communication
Outband: Overview
30. ● Pros:
o No interference with cellular communication (unlicensed spectrum)
o Users can have simultaneous cellular and D2D transmission
● Cons
o Cellular devices requires two wireless interfaces (e.g. LTE and WiFi)
o Power consumption of the extra interface (WiFi)
o Lower transmission distance
o Lower transmission data rate
D2D communication
Outband: Pros and cons
31. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
32. D2D security
1. Network access security:
o Security interactions between the user and access network, which
provides protection against attacks on the radio access link;
1. Network domain security:
o it enables the secure data/control signal exchange among network
elements, which provides protection against attacks on wire-line
network;
1. User domain security (3):
o it secures the access to the mobile station;
33. D2D security
4. Application domain security:
o it is an end-to-end security between the application on user equipment
and on servers;
4. Visibility and configuration security:
o the set of features controls the availability and configuration of certain
security service.
35. Agenda
● Background
● D2D vs Ad-hoc
● D2D overview
● D2D discovery
o Priori
o Posteriori
● D2D communication
o Inband
o Outband
● D2D security
● D2D use cases
● Conclusion
36. ● Two categories:
o Simple D2D: sender and receiver exchange data with each other
o Relay: D2D user forward data from and to other users
● Use cases examples:
● Local Data Service
Information sharing (bittorrent)
Mobile multiplayer gaming
Mobile advertising (proximity services)
Streaming services (IPTV, google chromecast, apple airplay)
Social (Tinder, Waze, Facebook)
Community services
D2D use cases
37. ● V2V - Vehicle to Vehicle communication:
o Collision avoidance system requires a very low latency for example to
coordinate braking between vehicles
o V2V can provide not only information about the nearest car in front,
but also from other cars within the communication range, including
traffic (waze ?)
● Group handover of multiple users (for example in a Bus)
o By using D2D the devices in a group inform each other about the
handover and its parameters with minimal signaling from the network
D2D use cases
38. ● Multiuser cooperative communication (MUCC)
o Benefited user (BU) is in an area with poor cellular signal
o Another user is in an area with good cellular signal. This user may
help BU to improve its signal and act as a supporting user (SU)
D2D use cases
39. ● D2D communications with network coding
o Users requesting the same content can form cooperative clusters to
achieve higher energy efficiency
o eNB transmits the content to the cluster heads
o Cluster heads multicasts the contents to the other devices within the
cluster through D2D links
o Eg: world cup games
o IPTV:
o Multicast of linear channels, Pay-Per-View, Video Recording
D2D use cases
40. ● Public safety (police, fire and ambulance services)
o Many of these organisations uses relatively old technology such as
TETRA system developed in the 90’s with limited capability
o US government has expressed desire to move to LTE for public safety
o Crucial requirement for these users is the ability to communicate with
each other outside of a mobile network (walkie talkie), which is not
supported by LTE, but is one of LTE D2D objectives
D2D use cases
41. ● Although basic requirements are set, details are being still
studied/developed
● Big impact of the new technologies proposed:
o D2D discovery
Good: Might be a key tool for social networking and other internet
apps
Bad: Privacy concerns, device battery consumption
o D2D communication:
Good: Offloading traffic, High data rate speeds
Bad: Interference / deterioration of existing services
Conclusion
43. Thank you!
Francisco Bento da Silva Neto, Jun 2014.
References:
●Shahid Mumtaz et al., "Odyssey of LTE-A D2D Communication:Tutorial Approach", IEEE
Communications Surveys and Tutorials, Dec. 2013
●Gábor et. al. “Design Aspects of Network Assisted Device to Device Communication”, IEEE
communication Magazine March 2012
●K. Doppler, M. P. Rinne, P. Janis, C. Ribeiro, and K.Hugl, “Device-to-Device Communications;
Functional Prospects for LTE-Advanced Networks”. IEEE International Conference on
Communications Workshops, 2009, Jun. 2009, pp.1– 6
●M. Hajiaghayi, C. Wijting, C. Ribeiro, M. T. Hajiaghayi, "Efficient and practical resource block
allocation for LTE-based D2D network via graph coloring", Springer Science+Business Media, New
York, 2013
●Alastair Brydon, "Opportunities and threats from LTE Device-to-Device (D2D) communication",
Unwired insight - The wireless blog, Feb. 2014