Device-to-Device (D2D) communication is a new technology that offer many advantages for the LTEadvanced
network such us wireless peer-to-peer services and higher spectral efficiency. It is also
considered as one of promising techniques for the 5G wireless communications system and used in so
many different fields such as network traffic offloading, public safety, social services and applications such
as gaming and military applications . The goal of this paper is to present advances on the current 3GPP
LTE-advanced system related to Device-to-Device (D2D). In this paper, we provide an overview of the
D2D types based on the communication spectrum of D2D transmission, namely Inband D2D
communication and Outband D2D communication. Then we present the advantages and disadvantages of
each D2D mode. Moreover, architecture and protocol enhancements for D2D communications under
LTE-A network are described.
This document discusses device-to-device (D2D) communications in cellular networks. It provides an introduction to D2D, outlines the advantages such as improved efficiency and performance, and challenges including interference management. The objectives of the project are to measure D2D performance with and without interference and compare using uplink and downlink resources. The document describes the simulation scenario and setup, which uses OFDM and Rayleigh fading. Results are presented and further work is proposed to expand the analysis to more complex scenarios.
Device to Device Communication in Cellular Networksaroosa khan
This document summarizes 5 research papers on device-to-device (D2D) communication in cellular networks. Paper 1 proposes a protocol for full duplex D2D communication and shows it improves cell capacity and throughput. Paper 2 provides a survey and taxonomy of over 100 papers on D2D communication and identifies open problems. Paper 3 proposes a distributed random access scheme for collision avoidance in D2D communication. Paper 4 analyzes interference coordination techniques for D2D communication underlying cellular networks. Paper 5 studies joint resource allocation to improve the energy efficiency of D2D communication.
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
Most real life networks are hybrid networks. A hybrid network combines the best features of two or more networks. In networking terminology, a hybrid network according to “Information Technology control and Audit” are reliable and versatile. They provide large numbers of connections and data transmission paths to users. These hybrid networks may be treated as network nodes for analysis purpose. The two radio access technologies (RATs) are considered with cellular/WLAN depending on whether it is voice/ data, video. For observing practical result, some setups are required in laboratory which includes interface from personal computer to mobile terminal and vice-versa. The network simulator (Ns-2) is used for analysis purpose. The results shows the parameters like energy good put, Bandwidth utilization, packet delivery ratio, energy good put and energy consumed are improved after using hybrid networks.
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...IJCNCJournal
With the current development of mobile communication services, people need personal communication of
high speed, excellent service, high quality and low latency,however, limited spectrum resources become
the most important factor to hamper improvement of cellular systems. As big amount of data traffic will
cause greater local consumption of spectrum resources, future networks are required to have appropriate
techniques to better support such forms of communication. D2D (Device-to-device) communication
technology in a cellular network makes full use of spectrum resources underlaying, reduces the load of the
base station, minimizes transmit power of the terminals and the base stations, thereby enhances the overall
throughput of the networks. Due to the use of multiplexing D2D UE (User equipment) resources and
spectrum, and the interference caused by the sharing of resources between adjacent cells, it has become a
major factor affecting coexisting of cellular subscribers and D2D users. When D2D communication
multiplexes the uplink resources, the base-stations are easily to be disturbed; when the downlink resources
are multiplexed, the users of downlink are susceptible to interference. In order to build a high-efficient
mobile network, we can meet the QoS requirements by controlling the power to suppress the interference
between the base station and a terminal user.
Interference aware resource allocation model for D2D under cellular network IJECEIAES
Device-to-Device communication (D2D) has emerged as an efficient communication model in future generation cellular network for offloading cellular traffic and enhance overall network performance. D2D communication aid in attaining better spectrum utilization, lower delay, and less energy consumption, which can well adapt to meet demand of higher transmission rate, larger network capacity. Further, enhances spectral efficiency by reutilizing resource. However, it may result in severe cross-tier interference and co-tier interference. Therefore, efficient interference modelling design are required to address performance degradation caused by the interferences. The existing model has focused on addressing interference considering D2D association operating on same cell with the cellular association. As a result, it incurs interference to the cellular user located in the same cell. However, practically D2D association in overlapping area will reutilize spectrum of multiple neighboring cells. As a result, it incurs interference in multiple cells. For overcoming research challenges, this work presented Interference Aware Resource Allocation (IARA) model for D2D under cellular network as a game theory model. This work consider a resource allocation game where base station as a contender for catering D2D resource needs under different assumptions. Experiment are conducted to evaluate performance of IARA. The outcome shows IARA attained significant performance improvement over state-of-art models in terms of sum rate (utility), successful packet transmission, revenue, and delay.
Spectral Efficient IDMA System Using Multi User DetectionIJSTA
This document discusses spectral efficient Interleave Division Multiple Access (IDMA) systems using multi-user detection. IDMA is presented as an alternative to CDMA that can overcome limitations like multiple access interference and intersymbol interference. IDMA uses user-specific interleaving along with iterative chip-by-chip detection to separate users and combat interference. This allows IDMA systems to support a large number of users independently of processing complexity. IDMA also enables asynchronous transmission without frame synchronization requirements. The document compares IDMA and CDMA techniques, explaining how IDMA differs in its use of interleaving for user separation rather than just coding gain.
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
This document summarizes a research paper that proposes using a Finite Horizon Markov Decision Process (FHMDP) to optimize Wi-Fi offloading in heterogeneous networks. The paper begins by explaining that existing Wi-Fi offloading approaches have limitations. It then proposes formulating the offloading problem as an FHMDP to minimize costs while meeting delay constraints. The paper describes the FHMDP model and algorithm, and argues it can improve offloading performance by reducing user contention and prioritizing high data rates. Simulation results show the FHMDP approach achieves lower communication costs compared to existing algorithms. In conclusion, the FHMDP is presented as an effective method for optimizing Wi-Fi offloading across cellular and Wi-Fi
This document proposes techniques to reduce interference in WCDMA networks through cell resizing. It begins with background on WCDMA and sources of interference. It then proposes classifying cells as normal, saturated or cooperative based on SNR measurements. Saturated cells trigger a cell resizing process where users are transferred to neighboring cooperative cells to balance load and cancel interference. Simulation results showed this approach reduces blocking probability and achieves optimal transmission rates with reduced delay.
This document discusses device-to-device (D2D) communications in cellular networks. It provides an introduction to D2D, outlines the advantages such as improved efficiency and performance, and challenges including interference management. The objectives of the project are to measure D2D performance with and without interference and compare using uplink and downlink resources. The document describes the simulation scenario and setup, which uses OFDM and Rayleigh fading. Results are presented and further work is proposed to expand the analysis to more complex scenarios.
Device to Device Communication in Cellular Networksaroosa khan
This document summarizes 5 research papers on device-to-device (D2D) communication in cellular networks. Paper 1 proposes a protocol for full duplex D2D communication and shows it improves cell capacity and throughput. Paper 2 provides a survey and taxonomy of over 100 papers on D2D communication and identifies open problems. Paper 3 proposes a distributed random access scheme for collision avoidance in D2D communication. Paper 4 analyzes interference coordination techniques for D2D communication underlying cellular networks. Paper 5 studies joint resource allocation to improve the energy efficiency of D2D communication.
Analysis of Handoff techniques used for hybrid networks: cellular/WLAN IJORCS
Most real life networks are hybrid networks. A hybrid network combines the best features of two or more networks. In networking terminology, a hybrid network according to “Information Technology control and Audit” are reliable and versatile. They provide large numbers of connections and data transmission paths to users. These hybrid networks may be treated as network nodes for analysis purpose. The two radio access technologies (RATs) are considered with cellular/WLAN depending on whether it is voice/ data, video. For observing practical result, some setups are required in laboratory which includes interface from personal computer to mobile terminal and vice-versa. The network simulator (Ns-2) is used for analysis purpose. The results shows the parameters like energy good put, Bandwidth utilization, packet delivery ratio, energy good put and energy consumed are improved after using hybrid networks.
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...IJCNCJournal
With the current development of mobile communication services, people need personal communication of
high speed, excellent service, high quality and low latency,however, limited spectrum resources become
the most important factor to hamper improvement of cellular systems. As big amount of data traffic will
cause greater local consumption of spectrum resources, future networks are required to have appropriate
techniques to better support such forms of communication. D2D (Device-to-device) communication
technology in a cellular network makes full use of spectrum resources underlaying, reduces the load of the
base station, minimizes transmit power of the terminals and the base stations, thereby enhances the overall
throughput of the networks. Due to the use of multiplexing D2D UE (User equipment) resources and
spectrum, and the interference caused by the sharing of resources between adjacent cells, it has become a
major factor affecting coexisting of cellular subscribers and D2D users. When D2D communication
multiplexes the uplink resources, the base-stations are easily to be disturbed; when the downlink resources
are multiplexed, the users of downlink are susceptible to interference. In order to build a high-efficient
mobile network, we can meet the QoS requirements by controlling the power to suppress the interference
between the base station and a terminal user.
Interference aware resource allocation model for D2D under cellular network IJECEIAES
Device-to-Device communication (D2D) has emerged as an efficient communication model in future generation cellular network for offloading cellular traffic and enhance overall network performance. D2D communication aid in attaining better spectrum utilization, lower delay, and less energy consumption, which can well adapt to meet demand of higher transmission rate, larger network capacity. Further, enhances spectral efficiency by reutilizing resource. However, it may result in severe cross-tier interference and co-tier interference. Therefore, efficient interference modelling design are required to address performance degradation caused by the interferences. The existing model has focused on addressing interference considering D2D association operating on same cell with the cellular association. As a result, it incurs interference to the cellular user located in the same cell. However, practically D2D association in overlapping area will reutilize spectrum of multiple neighboring cells. As a result, it incurs interference in multiple cells. For overcoming research challenges, this work presented Interference Aware Resource Allocation (IARA) model for D2D under cellular network as a game theory model. This work consider a resource allocation game where base station as a contender for catering D2D resource needs under different assumptions. Experiment are conducted to evaluate performance of IARA. The outcome shows IARA attained significant performance improvement over state-of-art models in terms of sum rate (utility), successful packet transmission, revenue, and delay.
Spectral Efficient IDMA System Using Multi User DetectionIJSTA
This document discusses spectral efficient Interleave Division Multiple Access (IDMA) systems using multi-user detection. IDMA is presented as an alternative to CDMA that can overcome limitations like multiple access interference and intersymbol interference. IDMA uses user-specific interleaving along with iterative chip-by-chip detection to separate users and combat interference. This allows IDMA systems to support a large number of users independently of processing complexity. IDMA also enables asynchronous transmission without frame synchronization requirements. The document compares IDMA and CDMA techniques, explaining how IDMA differs in its use of interleaving for user separation rather than just coding gain.
Depiction Optimization of Overdue Wi-Fi Offloading in Heterogeneous SystemsIJASRD Journal
This document summarizes a research paper that proposes using a Finite Horizon Markov Decision Process (FHMDP) to optimize Wi-Fi offloading in heterogeneous networks. The paper begins by explaining that existing Wi-Fi offloading approaches have limitations. It then proposes formulating the offloading problem as an FHMDP to minimize costs while meeting delay constraints. The paper describes the FHMDP model and algorithm, and argues it can improve offloading performance by reducing user contention and prioritizing high data rates. Simulation results show the FHMDP approach achieves lower communication costs compared to existing algorithms. In conclusion, the FHMDP is presented as an effective method for optimizing Wi-Fi offloading across cellular and Wi-Fi
This document proposes techniques to reduce interference in WCDMA networks through cell resizing. It begins with background on WCDMA and sources of interference. It then proposes classifying cells as normal, saturated or cooperative based on SNR measurements. Saturated cells trigger a cell resizing process where users are transferred to neighboring cooperative cells to balance load and cancel interference. Simulation results showed this approach reduces blocking probability and achieves optimal transmission rates with reduced delay.
Multi-Criteria Handoff Decision Algorithms In Wireless Networksiosrjce
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) aims to cover innovative topics to research findings to trends analysis on Mobile Computing and Application related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives
EVOLUTION OF WIRELESS MOBILE COMMUNICATION NETWORKS AND FUTURE OF CELLULAR MA...cscpconf
This document discusses the evolution of mobile communication networks from 2G to 4G. It describes the progression from GSM to GPRS/EDGE and UMTS networks, which improved data transmission rates. LTE networks using OFDMA are described as an important evolutionary step providing higher spectral efficiency and end user data rates exceeding 100 Mbps. The future of 4G mobile systems is predicted to focus on seamlessly integrating existing wireless technologies like GSM, WiFi, and Bluetooth.
This document is A.Anthony Praveen Thilak's dissertation submitted to Birla Institute of Technology and Science in partial fulfillment of an M.S. degree in Telecommunication and Software Engineering. The dissertation was supervised by Belal Shamim of Tech Mahindra Limited, where the work was carried out. The dissertation examines digital subscriber line (DSL) technologies for next generation broadband and proposes that G.SHDSL is well-suited as a stable, sustainable technology that can provide high-speed, symmetrical bandwidth to both business and residential customers.
The document discusses the internship experience of an engineering student at PTCL, covering concepts learned in transmission, switching, MDF and DSL departments during a 6 week internship. It provides detailed information on the technologies, equipment, and processes within these departments, along with findings and recommendations from the internship.
IRJET- Multicast Device-to-Device Communication underlaying WPCNsIRJET Journal
The document presents a study on multicast device-to-device (D2D) communication underlying wireless powered communication networks (WPCNs). It proposes a joint optimization of time scheduling and power control to maximize the sum throughput of D2D multicast groups. The problem is formulated as a mixed integer nonlinear program. Simulation results show the proposed scheme outperforms TDMA and omnidirectional energy transfer schemes, achieving higher throughput especially at lower circuit power consumption and shorter transmitter-receiver distances. The sum throughput also increases with the number of antennas at the power station.
This document presents a comparative analysis of vertical handoff in IEEE 802.11 WLAN and CDMA networks. It discusses vertical handoff strategies and methods, and related work on handoff performance analysis in 802.11 networks. The paper then presents an existing vertical handoff algorithm between WLAN and CDMA networks, and defines variables used to determine handoff delay and throughput. Simulation results are shown comparing throughput and handoff delay for real-time and non-real-time services under different conditions in a network modeled based on WLAN and CDMA technologies.
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
To provide seamless internet connectivity anywhere at any time to the mobile users, there is a strong demand for the integration of wireless access networks for all-IP based Next Generation Networks (NGN). The Wireless Local Area Network (WLAN) is capable of providing high data rate at low cost. However, its services are limited to a small geographical area. Universal Mobile Telecommunications System (UMTS) networks provide global coverage, however, cost is high and the provided data rate do not fulfill the requirements of bandwidth intensive applications. By integrating these two promising technologies; UMTS and WLAN several benefits can be achieved, i.e., load balancing, extension of coverage area, better Quality of Service (QoS), improved security features, etc. Therefore, the integration of these two technologies can provide ubiquitous connectivity and high data rate at low cost to wireless clients. In this paper different integration mechanisms of UMTS and WLAN are investigated. More precisely, an integrated mechanism for the integration of UMTS and WLAN based on two different variations of tight coupling, i.e., interconnecting WLAN with Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) is designed and analyzed. The simulated results reveal that the GGSN-WLAN integration performance is better than the SGSN-WLAN integration for all the applied applications and measurement parameters.
LNCS 5448 - A First Look at Media Conferencing Traffic in the ...Videoguy
This document summarizes a study analyzing media conferencing traffic in a large, globally connected enterprise network. The key findings are:
1) Endpoints on wireless networks experience poorer call quality due to higher packet loss rates and burstiness compared to wired networks.
2) Users connecting over VPNs or from home experienced significantly higher packet loss rates than those on the internal enterprise network.
3) Calls with DiffServ QoS priority markings rarely experienced packet loss rates over 2%, a threshold above which call quality is noticeably degraded.
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
The document analyzes the performance of six TCP congestion control algorithms (BIC, Cubic, Compound, Vegas, Reno, and Westwood) on mobile ad hoc networks (MANETs) using network simulator 2 (NS2). Simulation results show that the Vegas algorithm provided better and more stable throughput than the other algorithms over the entire simulation time, both with and without node mobility. While BIC achieved the highest throughput after 75 seconds, Vegas was the only algorithm that maintained almost constant throughput from the start to end of the 200 second simulations. Therefore, the document concludes that Vegas is the most suitable algorithm for MANET scenarios.
5G wireless networks aim to support connections for at least 100 billion devices with speeds up to 10 GB/s while providing extremely low latency. Key concepts of 5G include supporting simultaneous connections across multiple access technologies, using cognitive radio to transfer data over multiple paths concurrently, and realizing a true integrated network consisting of heterogeneous tiers. Challenges include addressing high data volumes through techniques like massive MIMO and resolving issues like pilot contamination. 5G is expected to enable technologies like device-to-device communication, software defined cellular networks, and machine-to-machine communication to realize a wireless world with unlimited connectivity.
1) The document discusses 4G communication architecture and its ability to support social networking. It describes technologies used in 4G like adaptive modulation and coding, adaptive hybrid ARQ, MIMO and OFDM that provide high speeds and quality of service.
2) The architecture of social networks is explained as having three layers: an application interface, middleware for services, and infrastructure. 4G networks can flexibly support social networking by allowing users to connect through various networks.
3) 4G is concluded to be well-suited to effectively construct social networking by integrating different networks and providing hardware, infrastructure, and services to social network members.
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIDES Editor
Seamless interoperability between two dissimilar
networks requires handoff from one network to the other.
Such handoffs are known as vertical handoffs. Vertical handoff
introduces a shift in the approach to handoffs. It deals with
handoffs between dissimilar networks, such as from an access
point to a base station or vice versa. The integration of diverse
but complementary cellular and wireless technologies in the
next generation of wireless communication systems requires
the design of intelligent vertical handoff decision algorithms
to enable mobile users to seamlessly switch network access
and experience uninterrupted service continuity anywhere
and anytime. This paper provides a vertical handoff decision
algorithm that enables wireless access network selection at a
mobile terminal. Example shows that our proposed vertical
handover algorithm is able to determine the best access
network.
A Study of Protocols for Grid Computing EnvironmentCSCJournals
This document summarizes a study of communication protocols for grid computing environments. It discusses the limitations of TCP for high bandwidth-delay networks and the need for new protocols to efficiently transfer bulk data across long distances. It categorizes various protocols that have been proposed into TCP-based, UDP-based, and application-layer protocols and evaluates them based on their operation, congestion control, throughput, fairness and other factors. The document also outlines issues in designing high performance protocols for grid computing and reviews several TCP variants and reliable transport protocols developed to improve performance over high-speed networks.
This document discusses a broadband network system for factory automation. It begins with introducing broadband networks and their ability to transmit multiple signals simultaneously using a wide range of frequencies. It then discusses how broadband networks can support new data transmission needs for personal computing, video conferencing, and entertainment video. The document goes on to discuss wireless sensor networks (broadband networks) and their potential to provide new paradigms for factory automation by integrating sensing, control, computation and communication at each node to form a mesh network. It emphasizes how standardization is important for commercial success of using broadband networks for factory automation applications.
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...IDES Editor
This document summarizes a research paper that proposes a new dynamic fragment allocation algorithm for distributed database systems. The algorithm incorporates time constraints of database accesses, a volume threshold, and the volume of data transmitted between sites over time to dynamically reallocate fragments based on changing access patterns. It aims to migrate fragments to sites that consistently transfer the most data to/from that fragment over recent time intervals. This is intended to improve performance by minimizing data transmission costs as access patterns change. Key factors like the volume threshold, time interval duration, and consistency threshold regulate how frequently fragments are reallocated.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This document summarizes and analyzes secure multi-party negotiation protocols for electronic payments in mobile computing. It presents a framework for secure multi-party decision protocols using lightweight implementations. The main focus is on synchronizing security features to avoid agreement manipulation and reduce user traffic. The paper describes negotiation between an auctioneer and bidders, showing multiparty security is better than existing systems. It analyzes the performance of encryption algorithms like ECC, XTR, and RSA for use in the multiparty negotiation protocols.
The document provides an overview of the network architecture of 5G mobile technology. It discusses that 5G will require fundamental changes to the network architecture to meet goals of high data rates, capacity, and low latency. This includes employing technologies like dense networks, massive MIMO, and mmWave spectrum. The 5G network architecture will be more flexible and intelligent through the use of software defined networking, virtualization, and cloud computing. It will also need to support different service types like enhanced mobile broadband, massive machine-type communications, and ultra-reliable communications. Research challenges remain in developing new air interface designs, signaling protocols, and spectrum sharing to fully realize the potential of 5G networks.
1) The document discusses reducing vertical handover latency in heterogeneous networks consisting of WLAN and 3G to improve quality of service for voice and video streaming.
2) It proposes using an enhanced hybrid scheme combining bidirectional Stream Control Transmission Protocol (Bi-mSCTP) with Mobile IP to further reduce handover latency and packet loss during handovers.
3) This approach aims to allow users to receive services continuously with minimal packet loss, analyzing the performance of the Bi-mSCTP hybrid scheme for real-time traffic like voice and video.
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
Wireless communications is the fastest growing segment of the communications industry. Everyone
wants the quality of services anytime & anywhere. Wireless networks can integrate various heterogeneous radio
access technologies as GSM, WLAN, Wimax etc. WiMAX is an IP based, wireless broadband access technology
that provides performance similar to 802.11/Wi-Fi networks with the coverage and QOS (quality of service) of
cellular networks. WiMAX is also an acronym meaning "Worldwide Interoperability for Microwave Access
(WiMAX). The main promise of interconnecting these heterogeneous networks is to provide high performance in
achieving a high data rate and support real time applications. These services require various networks (such as
CDMA2000 and Wireless LAN) to be integrated into IP-based networks, which further require a seamless
vertical handoff to 4th generation wireless networks. When a mobile host (MH) changes its point of attachment,
its IP address gets changed. MH should be able to maintain all the existing connections using the new IP
address. This process of changing a connection from one IP address to another one in IP network is called
handoff. Vertical handoff is switching from one network to another while maintaining the session. Vertical
Handoff (VHO) is a major concern for different heterogeneous networks. VHO can be user requested or based
on some criteria already designed by the researcher of that particular algorithm. The main objective is to
implement efficient & effective handoff scheme between two heterogeneous network ie. 802.11 WLAN &
CDMA
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
Device-to-device (D2D) communications underlaying a cellular infrastructure has been proposed as a means of taking advantage of the physical proximity of communicating devices, increasing resource utilization, and improving cellular coverage. Relative to the traditional cellular methods, there is a need to design new peer discovery methods, physical layer procedures, and radio resource management algorithms that help realize the potential article we use the 3GPP Long Term Evolution system as a baseline for D2D design, review some of the key design challenges, and propose solution approaches that allow cellular devices and D2D pairs to share spectrum resources and thereby increase the spectrum and energy efficiency of traditional cellular networks. Sim- ulation results illustrate the viability of the proposed design.
Mobile network connectivity analysis for device to device communication in 5...IJECEIAES
Since long term evolved release 14 (LTE R14), the device to device (D2D) communications have become a promising technology for in-band or outband mobile communication networks. In addition, D2D communications constitute an essential component of the fifth-generation mobile network (5G). For example, to improve capability communication, reduce the power dissipation, reduce latency within the networks and implement new applications and services. However, reducing the congestion in D2D communications and improving the mobile network connectivity are the essential problems to propose these new applications or services. This paper presents new solutions to reduce the congestion of devices around a base station and improve the performance of the D2D network; in terms of the number of connected devices or user equipment (UE). The simulation results show that our proposed solution can improve the network capacity by doubling the number of connected devices (or UE) and reducing the congestion. For this reason, our proposition makes it possible to reduce the financial cost by reducing the cost of deploying equipment. For example, instead of using two base stations, we can use only one station to connect the same number of devices.
Multi-Criteria Handoff Decision Algorithms In Wireless Networksiosrjce
IOSR Journal of Mobile Computing & Application (IOSR-JMCA) aims to cover innovative topics to research findings to trends analysis on Mobile Computing and Application related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives
EVOLUTION OF WIRELESS MOBILE COMMUNICATION NETWORKS AND FUTURE OF CELLULAR MA...cscpconf
This document discusses the evolution of mobile communication networks from 2G to 4G. It describes the progression from GSM to GPRS/EDGE and UMTS networks, which improved data transmission rates. LTE networks using OFDMA are described as an important evolutionary step providing higher spectral efficiency and end user data rates exceeding 100 Mbps. The future of 4G mobile systems is predicted to focus on seamlessly integrating existing wireless technologies like GSM, WiFi, and Bluetooth.
This document is A.Anthony Praveen Thilak's dissertation submitted to Birla Institute of Technology and Science in partial fulfillment of an M.S. degree in Telecommunication and Software Engineering. The dissertation was supervised by Belal Shamim of Tech Mahindra Limited, where the work was carried out. The dissertation examines digital subscriber line (DSL) technologies for next generation broadband and proposes that G.SHDSL is well-suited as a stable, sustainable technology that can provide high-speed, symmetrical bandwidth to both business and residential customers.
The document discusses the internship experience of an engineering student at PTCL, covering concepts learned in transmission, switching, MDF and DSL departments during a 6 week internship. It provides detailed information on the technologies, equipment, and processes within these departments, along with findings and recommendations from the internship.
IRJET- Multicast Device-to-Device Communication underlaying WPCNsIRJET Journal
The document presents a study on multicast device-to-device (D2D) communication underlying wireless powered communication networks (WPCNs). It proposes a joint optimization of time scheduling and power control to maximize the sum throughput of D2D multicast groups. The problem is formulated as a mixed integer nonlinear program. Simulation results show the proposed scheme outperforms TDMA and omnidirectional energy transfer schemes, achieving higher throughput especially at lower circuit power consumption and shorter transmitter-receiver distances. The sum throughput also increases with the number of antennas at the power station.
This document presents a comparative analysis of vertical handoff in IEEE 802.11 WLAN and CDMA networks. It discusses vertical handoff strategies and methods, and related work on handoff performance analysis in 802.11 networks. The paper then presents an existing vertical handoff algorithm between WLAN and CDMA networks, and defines variables used to determine handoff delay and throughput. Simulation results are shown comparing throughput and handoff delay for real-time and non-real-time services under different conditions in a network modeled based on WLAN and CDMA technologies.
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
To provide seamless internet connectivity anywhere at any time to the mobile users, there is a strong demand for the integration of wireless access networks for all-IP based Next Generation Networks (NGN). The Wireless Local Area Network (WLAN) is capable of providing high data rate at low cost. However, its services are limited to a small geographical area. Universal Mobile Telecommunications System (UMTS) networks provide global coverage, however, cost is high and the provided data rate do not fulfill the requirements of bandwidth intensive applications. By integrating these two promising technologies; UMTS and WLAN several benefits can be achieved, i.e., load balancing, extension of coverage area, better Quality of Service (QoS), improved security features, etc. Therefore, the integration of these two technologies can provide ubiquitous connectivity and high data rate at low cost to wireless clients. In this paper different integration mechanisms of UMTS and WLAN are investigated. More precisely, an integrated mechanism for the integration of UMTS and WLAN based on two different variations of tight coupling, i.e., interconnecting WLAN with Serving GPRS Support Node (SGSN) and Gateway GPRS Support Node (GGSN) is designed and analyzed. The simulated results reveal that the GGSN-WLAN integration performance is better than the SGSN-WLAN integration for all the applied applications and measurement parameters.
LNCS 5448 - A First Look at Media Conferencing Traffic in the ...Videoguy
This document summarizes a study analyzing media conferencing traffic in a large, globally connected enterprise network. The key findings are:
1) Endpoints on wireless networks experience poorer call quality due to higher packet loss rates and burstiness compared to wired networks.
2) Users connecting over VPNs or from home experienced significantly higher packet loss rates than those on the internal enterprise network.
3) Calls with DiffServ QoS priority markings rarely experienced packet loss rates over 2%, a threshold above which call quality is noticeably degraded.
VEGAS: Better Performance than other TCP Congestion Control Algorithms on MANETsCSCJournals
The document analyzes the performance of six TCP congestion control algorithms (BIC, Cubic, Compound, Vegas, Reno, and Westwood) on mobile ad hoc networks (MANETs) using network simulator 2 (NS2). Simulation results show that the Vegas algorithm provided better and more stable throughput than the other algorithms over the entire simulation time, both with and without node mobility. While BIC achieved the highest throughput after 75 seconds, Vegas was the only algorithm that maintained almost constant throughput from the start to end of the 200 second simulations. Therefore, the document concludes that Vegas is the most suitable algorithm for MANET scenarios.
5G wireless networks aim to support connections for at least 100 billion devices with speeds up to 10 GB/s while providing extremely low latency. Key concepts of 5G include supporting simultaneous connections across multiple access technologies, using cognitive radio to transfer data over multiple paths concurrently, and realizing a true integrated network consisting of heterogeneous tiers. Challenges include addressing high data volumes through techniques like massive MIMO and resolving issues like pilot contamination. 5G is expected to enable technologies like device-to-device communication, software defined cellular networks, and machine-to-machine communication to realize a wireless world with unlimited connectivity.
1) The document discusses 4G communication architecture and its ability to support social networking. It describes technologies used in 4G like adaptive modulation and coding, adaptive hybrid ARQ, MIMO and OFDM that provide high speeds and quality of service.
2) The architecture of social networks is explained as having three layers: an application interface, middleware for services, and infrastructure. 4G networks can flexibly support social networking by allowing users to connect through various networks.
3) 4G is concluded to be well-suited to effectively construct social networking by integrating different networks and providing hardware, infrastructure, and services to social network members.
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIDES Editor
Seamless interoperability between two dissimilar
networks requires handoff from one network to the other.
Such handoffs are known as vertical handoffs. Vertical handoff
introduces a shift in the approach to handoffs. It deals with
handoffs between dissimilar networks, such as from an access
point to a base station or vice versa. The integration of diverse
but complementary cellular and wireless technologies in the
next generation of wireless communication systems requires
the design of intelligent vertical handoff decision algorithms
to enable mobile users to seamlessly switch network access
and experience uninterrupted service continuity anywhere
and anytime. This paper provides a vertical handoff decision
algorithm that enables wireless access network selection at a
mobile terminal. Example shows that our proposed vertical
handover algorithm is able to determine the best access
network.
A Study of Protocols for Grid Computing EnvironmentCSCJournals
This document summarizes a study of communication protocols for grid computing environments. It discusses the limitations of TCP for high bandwidth-delay networks and the need for new protocols to efficiently transfer bulk data across long distances. It categorizes various protocols that have been proposed into TCP-based, UDP-based, and application-layer protocols and evaluates them based on their operation, congestion control, throughput, fairness and other factors. The document also outlines issues in designing high performance protocols for grid computing and reviews several TCP variants and reliable transport protocols developed to improve performance over high-speed networks.
This document discusses a broadband network system for factory automation. It begins with introducing broadband networks and their ability to transmit multiple signals simultaneously using a wide range of frequencies. It then discusses how broadband networks can support new data transmission needs for personal computing, video conferencing, and entertainment video. The document goes on to discuss wireless sensor networks (broadband networks) and their potential to provide new paradigms for factory automation by integrating sensing, control, computation and communication at each node to form a mesh network. It emphasizes how standardization is important for commercial success of using broadband networks for factory automation applications.
Synthesis of Non-Replicated Dynamic Fragment Allocation Algorithm in Distribu...IDES Editor
This document summarizes a research paper that proposes a new dynamic fragment allocation algorithm for distributed database systems. The algorithm incorporates time constraints of database accesses, a volume threshold, and the volume of data transmitted between sites over time to dynamically reallocate fragments based on changing access patterns. It aims to migrate fragments to sites that consistently transfer the most data to/from that fragment over recent time intervals. This is intended to improve performance by minimizing data transmission costs as access patterns change. Key factors like the volume threshold, time interval duration, and consistency threshold regulate how frequently fragments are reallocated.
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
This document summarizes and analyzes secure multi-party negotiation protocols for electronic payments in mobile computing. It presents a framework for secure multi-party decision protocols using lightweight implementations. The main focus is on synchronizing security features to avoid agreement manipulation and reduce user traffic. The paper describes negotiation between an auctioneer and bidders, showing multiparty security is better than existing systems. It analyzes the performance of encryption algorithms like ECC, XTR, and RSA for use in the multiparty negotiation protocols.
The document provides an overview of the network architecture of 5G mobile technology. It discusses that 5G will require fundamental changes to the network architecture to meet goals of high data rates, capacity, and low latency. This includes employing technologies like dense networks, massive MIMO, and mmWave spectrum. The 5G network architecture will be more flexible and intelligent through the use of software defined networking, virtualization, and cloud computing. It will also need to support different service types like enhanced mobile broadband, massive machine-type communications, and ultra-reliable communications. Research challenges remain in developing new air interface designs, signaling protocols, and spectrum sharing to fully realize the potential of 5G networks.
1) The document discusses reducing vertical handover latency in heterogeneous networks consisting of WLAN and 3G to improve quality of service for voice and video streaming.
2) It proposes using an enhanced hybrid scheme combining bidirectional Stream Control Transmission Protocol (Bi-mSCTP) with Mobile IP to further reduce handover latency and packet loss during handovers.
3) This approach aims to allow users to receive services continuously with minimal packet loss, analyzing the performance of the Bi-mSCTP hybrid scheme for real-time traffic like voice and video.
Implementation of Vertical Handoff Algorithm between IEEE 802.11 WLAN & CDMA ...IOSR Journals
Wireless communications is the fastest growing segment of the communications industry. Everyone
wants the quality of services anytime & anywhere. Wireless networks can integrate various heterogeneous radio
access technologies as GSM, WLAN, Wimax etc. WiMAX is an IP based, wireless broadband access technology
that provides performance similar to 802.11/Wi-Fi networks with the coverage and QOS (quality of service) of
cellular networks. WiMAX is also an acronym meaning "Worldwide Interoperability for Microwave Access
(WiMAX). The main promise of interconnecting these heterogeneous networks is to provide high performance in
achieving a high data rate and support real time applications. These services require various networks (such as
CDMA2000 and Wireless LAN) to be integrated into IP-based networks, which further require a seamless
vertical handoff to 4th generation wireless networks. When a mobile host (MH) changes its point of attachment,
its IP address gets changed. MH should be able to maintain all the existing connections using the new IP
address. This process of changing a connection from one IP address to another one in IP network is called
handoff. Vertical handoff is switching from one network to another while maintaining the session. Vertical
Handoff (VHO) is a major concern for different heterogeneous networks. VHO can be user requested or based
on some criteria already designed by the researcher of that particular algorithm. The main objective is to
implement efficient & effective handoff scheme between two heterogeneous network ie. 802.11 WLAN &
CDMA
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...ijcseit
96% market share of existing Smart Grid network installations is wireless mesh networks [1]. The paper starts by justifying the selection of WMNs as opposed to any other communication technology based on quantifying the bandwidth/latency/QoS constraints of a number of Smart Grid applications. The main objective of this paper, however, is to discuss some optimization techniques that found in the literature and can be implemented to overcome some of the challenges currently being faced by WMNs deployment in Smart Grid’s NANs. Hybrid WMN (HWMN) is proposed as an optimization on the topology level to leverage WMNs convergence. Distributed Autonomous Data Routing DADR, multigate and diversity routing are optimizations on the protocol level to minimize the down time of WMNs. Cognitive Radio is investigated as an optimization on the physical level. The paper also explores the feasibility of using Wireless Software Defined Networks WSDN to improve the overall visibility and manageability of WMNs
Device-to-device (D2D) communications underlaying a cellular infrastructure has been proposed as a means of taking advantage of the physical proximity of communicating devices, increasing resource utilization, and improving cellular coverage. Relative to the traditional cellular methods, there is a need to design new peer discovery methods, physical layer procedures, and radio resource management algorithms that help realize the potential article we use the 3GPP Long Term Evolution system as a baseline for D2D design, review some of the key design challenges, and propose solution approaches that allow cellular devices and D2D pairs to share spectrum resources and thereby increase the spectrum and energy efficiency of traditional cellular networks. Sim- ulation results illustrate the viability of the proposed design.
Mobile network connectivity analysis for device to device communication in 5...IJECEIAES
Since long term evolved release 14 (LTE R14), the device to device (D2D) communications have become a promising technology for in-band or outband mobile communication networks. In addition, D2D communications constitute an essential component of the fifth-generation mobile network (5G). For example, to improve capability communication, reduce the power dissipation, reduce latency within the networks and implement new applications and services. However, reducing the congestion in D2D communications and improving the mobile network connectivity are the essential problems to propose these new applications or services. This paper presents new solutions to reduce the congestion of devices around a base station and improve the performance of the D2D network; in terms of the number of connected devices or user equipment (UE). The simulation results show that our proposed solution can improve the network capacity by doubling the number of connected devices (or UE) and reducing the congestion. For this reason, our proposition makes it possible to reduce the financial cost by reducing the cost of deploying equipment. For example, instead of using two base stations, we can use only one station to connect the same number of devices.
Analysis Of D2D Communication In 5G NetworkNicole Heredia
This document analyzes device-to-device (D2D) communication in 5G networks. D2D communication is seen as promising for providing low-latency, high-data rate services between devices in 5G networks. However, mobility poses challenges as latency could increase when control nodes exchange D2D information. The document proposes two mobility management solutions to minimize signaling overhead and latency in network-assisted D2D communications. It also discusses simulation assumptions considering dense deployment of small cells and D2D groups. The results show the proposed solutions can reduce signaling and improve latency by maximizing the time D2D users are under the same small cell control.
A bipartite graph based proportional fair scheduling strategy to improve thr...IJECEIAES
The fifth-generation wireless communication is expected to provide a huge amount of capacity to cater to the need of an increasing number of mobile consumers, which can be satisfied by device-to-device (D2D) communication. Reusing the cellular user’s resources in an efficient manner helps to increase the spectrum efficiency of the network but it leads to severe interference. The important point in reusing cellular user resources is that D2D communication should not affect the cellular user’s efficiency. After achieving this requirement, the focus is now turned toward the allocation of resources to D2D communication. This resource allocation strategy is to be designed in such a way that it will not affect communication among the cellular user (CU). This scheme improves various performance objectives. This paper aims at designing a proportional fair resource allocation algorithm based on the bipartite graph which maintains the quality of service (QoS) of CUs while providing D2D communication. This algorithm can be merged with any other scheme of resource allocation for improving QoS and adopting changing channels. In this scheme, a D2D pair can be allocated with one or more than one resource blocks. The MATLAB simulations analyze the performance of the proposed scheme.
D2D communication for spectral efficiency improvement and interference reduct...journalBEEI
Device-to-device (D2D) communication system plays an extremely important role in fulfilling the demands of fourth generation (4G) and fifth generation (5G) technologies. 4G technology cannot meet high data demands. The D2D communication system is believed to provide major improvements in resource usage, energy efficiency, and overall throughput, which are the main demands for the 5G network. Some of the main issues in the D2D communication system involve spectrum efficiency and interference. Although many studies have been conducted on spectrum efficiency improvement and interference reduction, the issues still remain. A study should be conducted to obtain a better understanding of the D2D communication system and to develop a D2D scheme with efficient spectrum utilization and interference reduction. Many survey papers have been published on these issues, but the fundamental concepts behind the D2D communication system require investigation. In this study, we investigated and analyzed the fundamental concepts behind the D2D communication system to develop an efficient D2D resource allocation scheme with reduced interference.
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...IJCNCJournal
The access part of all cellular network’s generation suffers from common concerns related to dead spots (zones that are not covered by the network) and hot spots (zones where the number of users is higher compared to network resources). During the last decade, lots of research proposals have tried to overcome cellular problems through multi-hop D2D architecture, which is a new paradigm allowing the direct communication between devices in cellular network to enhance network performances and improve user QoS. In this paper, we propose a multi-hop D2D architecture based on the OLSR protocol to extend cellular coverage. Cell-OLSR, which is the proposed adaptation of OLSR for our architecture, allows the exchange of cellular parameters between nodes to choose the best proxy device to forward data to the cellular base station (BS).
The document provides an overview of 4G and 5G mobile network architectures as well as an introduction to device-to-device (D2D) network technology. It describes the key features and components of 4G networks including the evolved packet core and how 5G networks aim to achieve much higher data rates and connectivity for many more devices. The document also outlines the benefits of D2D communication, how it can operate in both licensed and unlicensed spectrum, and some potential applications including multi-user cooperative communication and vehicle-to-vehicle networks.
Efficient radio resource allocation scheme for 5G networks with device-to-devi...IJECEIAES
A vital technology in the next-generation cellular network is device-to-device (D2D) communication. Cellular user enabled with D2D communication provides high spectral efficiency and further increases the coverage area of the cell, especially for the end-cell users and blind spot areas. However, the implementation of D2D communication increases interference among the cellular and D2D users. In this paper, we proposed a radio resource allocation (RRA) algorithm to manage the interference using fractional frequency reuse (FFR) scheme and Hungarian algorithm. The proposed algorithm is divided into three parts. First, the FFR scheme allocates different frequency bands among the cell (inner and outer region) for both the cellular and the D2D users to reduce the interference. Second, the Hungarian weighted bipartite matching algorithm is used to allocate the resources to D2D users with the minimum total system interference, while maintaining the total system sum rate. The cellular users share the resources with more than one D2D pair. Lastly, the local search technique of swapping is used for further allocation to minimize the interference. We implemented two types of assignments, fair multiple assignment, and restricted multiple assignment. We compared our results with existing algorithms which verified that our proposed algorithm provides outstanding results in aspects like interference reduction and system sum rate. For restricted multiple assignment, 60-70% of the D2D users are allocated in average cases.
This document discusses device-to-device (D2D) communication in LTE networks. It describes how D2D allows direct communication between user equipments by bypassing the base station, addressing issues like network coverage, congestion control, and public safety. The document outlines the D2D communication process, including synchronization, discovery, and communication modes. It also describes the ProSe D2D network architecture and direct discovery procedure. D2D communication in LTE aims to improve network coverage, offer last mile connectivity, control congestion, and enable public safety communication during emergencies or disasters.
This document discusses device-to-device (D2D) communication in 5G networks. It covers several applications of D2D communication such as vehicular communication, public safety, disaster relief, millimeter wave communication, handover and mobility issues, unmanned aerial vehicles, internet of things, and its potential role in 6G networks. Some key points include: D2D can improve capacity and latency in 5G; it supports applications like vehicular communication, proximity services and public safety; challenges include interference management and handover procedures for mobile D2D pairs.
Markovian Queueing Model for Throughput Maximization in D2D-Enabled Cellular ...IJECEIAES
Device-to-Device (D2D) communication has been considered a key enabling technol- ogy that can facilitate spectrum sharing in 4G and 5G cellular networks. In order to meet the high data rate demands of these new generation cellular networks, this paper considers the optimization of available spectrum resource through dynamic spectrum access. The utilization of continuous-time Markov chain (CTMC) model for efficient spectrum access in D2D-enabled cellular networks is investigated for the purpose of determining the impact of this model on the capacity improvement of cellular networks. The paper considers the use of CTMC model with both queueing and non-queueing cases called 13-Q CTMC and 6-NQ CTMC respectively with the aim of improving the overall capacity of the cellular network under a fairness constraint among all users. The proposed strategy consequently ensures that spectrum access for cellular and D2D users is optimally coordinated by designing optimal spectrum access probabilities. Numerical simulations are performed to observe the impact of the proposed Markovian queueing model on spectrum access and consequently on the capacity of D2D-enabled cellular networks. Results showed that the proposed 13-Q CTMC provide a more spectrumefficient sharing scheme, thereby enabling better network performances and larger capabilities to accommodate more users.
A COMPREHENSIVE SECURE PROTOCOL FOR ALL D2D SCENARIOSijwmn
To fulfill two integral aims of abating cellular traffic and enhancing efficiency of cellular network, D2D is
considered as a novel channel of communication. This form of communication has introduced for 4th cellular
communication and enacts a significant role in the 5th generation. Four D2D communication scenarios
defined in the references, includes direct D2D and relaying D2D communication both with and without
cellular infrastructure. One of the major challenges addressing D2D protocols contributes to the fact that
they have one single secure protocol that can adapt to the four scenarios. In the current study, we propose a
secure D2D protocol based on ARIADNE. To authenticate and key agreement between Source and
Destination, we employ LTE-A AKA protocol, further for broadcast authentication between relaying nodes
TESLA was applied. In Contrary to the recent protocols, our proposed protocol has inconsiderable
computation overhead and trivial communication overhead than SODE and preserve many security
properties such as Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, and
Secure Routing Transmission. We check Authentication, Confidentiality, Reachability, and Secure Key
Agreement of the proposed protocol with ProVerif verification tools.
A COMPREHENSIVE SECURE PROTOCOL FOR ALL D2D SCENARIOSijwmn
To fulfill two integral aims of abating cellular traffic and enhancing efficiency of cellular network, D2D is
considered as a novel channel of communication. This form of communication has introduced for 4th cellular
communication and enacts a significant role in the 5th generation. Four D2D communication scenarios
defined in the references, includes direct D2D and relaying D2D communication both with and without
cellular infrastructure. One of the major challenges addressing D2D protocols contributes to the fact that
they have one single secure protocol that can adapt to the four scenarios. In the current study, we propose a
secure D2D protocol based on ARIADNE. To authenticate and key agreement between Source and
Destination, we employ LTE-A AKA protocol, further for broadcast authentication between relaying nodes
TESLA was applied. In Contrary to the recent protocols, our proposed protocol has inconsiderable
computation overhead and trivial communication overhead than SODE and preserve many security
properties such as Authentication, Authorization, Confidentiality, Integrity, Secure Key Agreement, and
Secure Routing Transmission. We check Authentication, Confidentiality, Reachability, and Secure Key
Agreement of the proposed protocol with ProVerif verification tools.
Traffic management inside software-defined data centre networkingjournalBEEI
In recent years, data centre (DC) networks have improved their rapid exchanging abilities. Software-defined networking (SDN) is presented to alternate the impression of conventional networks by segregating the control plane from the SDN data plane. The SDN presented overcomes the limitations of traditional DC networks caused by the rapidly incrementing amounts of apps, websites, data storage needs, etc. Software-defined networking data centres (SDN-DC), based on the open-flow (OF) protocol, are used to achieve superior behaviour for executing traffic load-balancing (LB) jobs. The LB function divides the traffic-flow demands between the end devices to avoid links congestion. In short, SDN is proposed to manage more operative configurations, efficient enhancements and further elasticity to handle massive network schemes. In this paper the opendaylight controller (ODL-CO) with new version OF 1.4 protocol and the ant colony optimization algorithm is proposed to test the performance of the LB function using IPv6 in a SDN-DC network by studying the throughput, data transfer, bandwidth and average delay performance of the networking parameters before and after use of the LB algorithm. As a result, after applying the LB, the throughput, data transfer and bandwidth performance increased, while the average delay decreased.
Quality of service performances of video and voice transmission in universal ...journalBEEI
The universal mobile telecommunications system (UMTS) has distinct benefits in that it supports a wide range of quality of service (QoS) criteria that users require in order to fulfill their requirements. The transmission of video and audio in real-time applications places a high demand on the cellular network, therefore QoS is a major problem in these applications. The ability to provide QoS in the UMTS backbone network necessitates an active QoS mechanism in order to maintain the necessary level of convenience on UMTS networks. For UMTS networks, investigation models for end-to-end QoS, total transmitted and received data, packet loss, and throughput providing techniques are run and assessed and the simulation results are examined. According to the results, appropriate QoS adaption allows for specific voice and video transmission. Finally, by analyzing existing QoS parameters, the QoS performance of 4G/UMTS networks may be improved.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...IRJET Journal
This document provides an overview of the evolution of 5G networks and technologies, security schemes, and multiple access schemes used in mobile communications. It discusses the challenges faced by existing 4G networks in handling increased data usage and more devices. 5G is presented as the next generation technology aimed to support data rates up to 10Gbps, latency of 1ms, widespread coverage and availability, and reduced energy consumption. The document reviews key 5G concepts and radio network evolution. It also summarizes two security protocols - EPS-AKA and J-PAKE - and compares multiple access schemes such as OFDMA and SC-FDMA used for uplink transmission. In concluding, the document states that 5G will revolutionize mobile communication
The document discusses device-to-device (D2D) communication in cellular networks, which allows direct communication between mobile users without traversing the base station. D2D offers advantages like improved spectral efficiency and reduced delays. The feasibility of incorporating D2D into LTE-A networks is being studied. The document reviews literature on different approaches to D2D classification and implementation, addressing topics like interference management, power allocation, and device discovery challenges.
This presentation provides an overview of advanced telecom technologies, including digital switching principles, fiber optics communication, mobile communication principles like GSM and CDMA, broadband DSL technologies, intelligent networks, ISDN, and next generation networks. It was presented by Ashish Nandan to the Department of Electronics and Communication Engineering at Future Institute of Engineering and Management.
Energy efficient power control for device to device communication in 5G netw...IJECEIAES
Next generation cellular networks require high capacity, enhanced efficiency of energy and guaranteed quality of service (QoS). To reach these goals, device-to device (D2D) communication is a candidate technologie for future 5th Generation especially applications that require the reuse, the hop and the proximity gain. The present paper studies the energy efficient power control for the uplink of an OFDMA (orthogonal frequency-division multiple access) system composed of both regular cellular users and device-to-device (D2D) pairs. First, we analyze and model mathematically the prerequisites for D2D communications and classical cellular links in terms of minimum rate and maximum power requirement. Second, we use fractional programming in order to convert the initial problem into a concave one and we apply non-cooperative game theory in order to characterize the equilibrium. Then, we got the solution of the problem from the results of a water-filling power allocation. Moreover, we employ a distributed design for power allocation by means of three methods: a) Theory of fractional programming b) Closed form expression (the novelty is the use of Wright Omega function). c) Inverse water filling. Finally, simulations in both static and dynamic channel setting are realized to demontrate the enhanced gain in term of EE, SE (spectral efficiency) and time of execution of the iterative algorithm (Dinkelbach) than the closed form algorithms.
Similar to DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKS (20)
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
UiPath Test Automation using UiPath Test Suite series, part 6
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKS
1. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 1, February 2016
DOI : 10.5121/ijwmn.2016.8102 11
DEVICE-TO-DEVICE (D2D) COMMUNICATION
UNDER LTE-ADVANCED NETWORKS
Magri Hicham1
, Noreddine Abghour2
and Mohammed Ouzzif1
1
RITM Research Lab,ESTC , Hassan II University ,Casablanca, Morocco
2
FSAC, Hassan II University,Casablanca, Morocco
ABSTRACT
Device-to-Device (D2D) communication is a new technology that offer many advantages for the LTE-
advanced network such us wireless peer-to-peer services and higher spectral efficiency. It is also
considered as one of promising techniques for the 5G wireless communications system and used in so
many different fields such as network traffic offloading, public safety, social services and applications such
as gaming and military applications . The goal of this paper is to present advances on the current 3GPP
LTE-advanced system related to Device-to-Device (D2D). In this paper, we provide an overview of the
D2D types based on the communication spectrum of D2D transmission, namely Inband D2D
communication and Outband D2D communication. Then we present the advantages and disadvantages of
each D2D mode. Moreover, architecture and protocol enhancements for D2D communications under
LTE-A network are described.
KEYWORDS
D2D;LTE-advanced;Inband D2D;Outband D2D;3GPP;5G.
1. INTRODUCTION
In recent years, exponential growth of wireless communication and data traffic , high demands for
broadband mobile wireless communications and the emergence of new wireless multimedia
applications and services are constituted the key drivers to the development of the Long Term
Evolution-Advanced (LTE-A) network.
One of the main challenges of LTE-advanced is to recover the local-area services and enhance
spectrum efficiency.To achieve those goals technical capabilities are required. Device to Device
(Device to Device (D2D) communications is new technology that offer wireless peer-to-peer
services and improve spectrum utilisation in LTE-advanced network [1][2]. D2D
communications was initially proposed in cellular network as a new paradigm to enhance
network performance.
The motivation for D2D come directly from the user requirements and D2D communications will
serve specific future needs. These needs include new types of short range services and data
intensive short range applications[3]. The emergence of context-aware and multimedia
applications have constituted the motivation of using D2D technology.D2D communications will
allow new types of services such multimedia downloading, video streaming, online gaming and
peer-to-peer (P2P) file sharing.
2. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 1, February 2016
12
D2D communication refers to technology that enable the communication between multiple D2D
devices or users without having base station or intermediary devices on a network [4] . This
makes D2D communication a key technology to solve some problems such as coverage and
interference management .It increase also spectrum utilisation and capacity and enhance network
performance and throughput .Differing from the Bluetooth and WiFi-direct, we categorize the
D2D communication in cellular network based on the spectrum in which D2D communications
occurs. Thus, D2D communication can occur on cellular system and in this case called Inband
D2D or can occur in unlicensed spectrum and is called Outband D2D . The motivation of
choosing inband communications is usually the high control over licensed spectrum.
In D2D communications the cellular network can handle phone calls and internet data traffic
without additional networks load from the promotional material. However, there are many
complexities of setting up and to deploy D2D communications in LTE advanced networks. These
challenges and complexities include:
• D2D devices cause interference to the cellular users which affect the performance of the
network devices.
• D2D communications define new QoS requirements that must be addressed.
Hence, LTE-advanced present two techniques of D2D communications that use Session
Initiation Protocol (SIP) and Internet Protocol (IP).These techniques have the benefit of providing
the control over the D2D connectivity to the operator. The integration of D2D communications in
LTE-A must take into account LTE-A interfaces and network elements.
While the need for physical layer backward capability imposes the D2D devices to utilize for
their links the current structure of the spectrum resources [5].
2. CLASSIFICATION OF D2D COMMUNICATION
D2D communication in cellular network can be categorized into both Inband D2D and Outband
D2D based on the spectrum in which D2D communications occurs [6]. D2D communications is
divided into two modes or categories called ' Inband underlay mode ' when the D2D
communications use the cellular resources and spectrum and ' Inband overlay mode 'when
cellular resources are allocated for the two D2D end devices that communicate directly (eg,
Figure.1) .
High control over licensed spectrum is the key motivating factor for choosing the Inband D2D
communication. In other hand , the main motivation of using Outband D2D communications is
the capacity to eliminate the interference between D2D links.Furthermore , Outband D2D
communications is faced with a lot of challenges in the coordination between different bands.
Figure.1 .Classification of D2D communication
In this section, we provide a formal definition for each category of D2D communication and an
overview to advantages and disadvantages of each D2D mode.
3. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 1, February 2016
13
2.1. Inband Communication
The motivation for choosing inband communication is the high control over licensed spectrum.
[2][3][7], Results show that QoS provisioning had lot of requirements by the consideration of the
uncontrollability of interference in the unlicensed spectrum . In [3],the feasibility of D2D
communications and its impacts in licensed spectrum are studied by simulation and analysis of
different scenarios and authors show that by tolerating the increase of interference in licensed
spectrum the D2D communication will be possible .
To improve the spectrum efficiency the D2D inband can reuse the time and frequency ressources
by d2D users (i.e Underlay) or allocating time and frequency resources occupied by D2D users
(i.e overlay) [8]. Under this, Inband communications can be divided into underlay and overlay
categories.
The most disadvantage of inband D2D is the interference caused by D2D users to cellular
communications .This interference can be mitigated by introducing high complexity resource
allocation methods, which increase the computational overhead of the eNB of D2D users.
2.1.1. Undelay Inband D2D mode
In underlay inband mode, cellular and D2D communications share the same radio resources. To
date, most of the papers in literature are dedicated to D2D communications underlaying cellular
network [9] [10] [11].
Underlay inband can improve and enhance the performance of different targets such as
spectrum efficiency, energy efficiency,and cellular coverage by the use of different techniques
including diversity techniques,interference reduction ,resource allocation and by using nework
coding [12][13][14][15],[16],[17].The papers, [14], [18] and [19] adopt more advanced
mathematical techniques than the others.
The [20][21] works define and propose new algorithms and interference management strategy
to achieve overall capacity enhancement and to solve mode selection problem in cellular
networks and D2D systems .Another method is proposed in [22]. The computational complexity
of the above mentioned method is higher but it is better than those proposed in [20][21].
To improve the system performance of D2D cellular system with QoS / power constraints,
advanced techniques are required. These techniques include stochastic optimization, nonlinear
programming, and integer optimization [23][24].
Several research papers have an interest in resolving interference problems in D2D
communication underlaying cellular networks [25][26][29].In [26] paper and using numerical
results authors discuss different problems sush as interference management , Optimization of
Transmission Power and throughput maximization of D2D communications in the case of the
coexistence of many D2D users and one cellular user .An interference avoidance scheme and
system model is proposed in [27] . This scheme is based on overhearing the received signal
power of cellular UEs .New management method is presented in [28] to enhance the overall
capacity of cellular networks and device-to-device (D2D) systems. The integration of D2D
communication in a LTE-Advanced network is discussed in [29]. In the same way, authors
propose different mechanism such as D2D communication session setup and management
procedures. Another scheme is given in [25] to manage the interference between D2D
communications and cellular network . In [30], authors propose a network controlled algorithm
with low computation complexity to efficiently maximize the reuse of cellular network spectrum
and to minimize system capacity.
Finally, by allowing underlying direct D2D communications, LTE-advanced mobile network can
offers several advantages such as low end-to-end latency and high spectral efficiency.
4. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 1, February 2016
14
2.1.2. Overlay Inband D2D mode
In this mode, cellular and D2D are given dedicated cellular resources and those cellular resources
are subtracted from cellular users in order to eliminate interference for the D2D communications
on cellular transmissions [31][32][33]. In [33], a BS-assisted scheduling and D2D power control
was proposed in order to reduce D2D interference. The authors of [31] and [32] focus on relaying
use-case of D2D. Specifically, [32] proposes to use the BS as a backup transmitter for D2D
transmission and [31] use multiple D2D users as relays for multicasting. The performance of the
proposed methods and algorithms in [31] and [32] are given under the low complexity which
makes them practical for real scenarios. On the other side, propose a network controlled
algorithm to maximize the cellular network spectrum reuse and to provide high performance for
D2D users .
2.2. Outband D2D communication
Nowadays , Outband D2D communication is attracting the attention of many researchers .In
this category , D2D communication is performed in the unlicensed spectrum such as ISM 2.4G
which made the interference between D2D and cellular communications impossible.On the other
hand, Outband D2D my suffer from the uncontrolled nature of unlicensed spectrum. To exploit
the unlicensed spectrum it is necessary to have another extra interface that implements WIFI-
Direct ,Zig Bee or Bluetooth[34][35][36].
The coordination between two different bands for achieving Outband D2D communication has
a lot of challenges because in most cases the D2D communications occur in the above
mentioned extra interface [8] . Outband D2D communication can be classified into two
categories or modes depend on the occurrence of the second interface .These modes are called
controlled mode when the second interface in under cellular network or autonomous when D2D
control is done by users and the occurrence of the second interface is not under cellular
network. There are also several literatures that refer to Outband D2D communications. In
[37][38] works ,energy efficiency and throughput performance are boosted by the use of gaming
theory and clustering. The works in [39][23][40] and [41] aim to improve the performance of
content distribution. Forthermore , authors of the [41] paper provide an evaluation of QoS
parameters such as delay and traffic load . Simulation results shows that the D2D architecture
proposed and simulated in this work provide delay and traffic load performance enhancement .
2.2.1. D2D Outband communications: Controlled mode
In this category of D2D communications, all the literature propose to use the cellular network
advanced management features to control D2D communication in order to improve the efficiency
and reliability of D2D communications and to improve also the system performance in terms of
throughput, power efficiency and multicast.
The authors of [42] and [43] papers discuss how D2D communications can be one of the key
issues of the improvement of energy efficiency and throughput. They propose a novel scheme
based on users cooperation and provide an analytical model to evaluate throughput and power
consumption for the proposed scheme.
The work in [41] introduces a protocol that focuses on D2D communications using LTE and
Wifi-Direct. The authors elaborate on required modification for messaging and signalling
procedures of LTE and WiFi Direct technologies. The D2D communication paradigm can be
implemented on LTE infrastructure by using the Wifi Direct and without making a major change
in LTE protocols .
5. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 1, February 2016
15
2.2.2. D2D Outband communications: Autonomous mode
Nowadays, there are very few works on this category. Autonomous D2D communication is
motivated by reducing the overhead of cellular network. This category does not require any
changes at the BS (eNB) and can be deployed easily. The authors of [41] assume that the BS
(eNB) does not always have traffic to send to all users at any time. They depict a scenario with
two users, u1 and u2 that being served by one BS. They formulated the problem of choosing the
optimal dispatching policy as a Markov decision process and studied is properties. Simulation
results showed in [41] demonstrated that by considering the above mentioned approach delay
performance can be improved and the major performance requirements is to increase power
expenditure .
2.3. Advantages and disadvantages of the different types of D2D communications
Nowadays, Outband communications is attracting more and more attention. With the arrival of
new smartphones and new mobile devices in phone market , device will be capable to
implement Outband D2D schemes. Some researchers provides an overview of the advantages and
disadvantages of Outband D2D communications . They are putting high hopes and are seeing it
as the alternative to inbnd D2D communication category .
A brief look of advantages and disadvantages of of Inband D2D and Outband D2D
communications are given in the following tables :
Table 1. Advantages and disadvantages of Inband D2D communication
Advantages of Inband D2D Disadvantages of Inband D2D
• Underlay D2D increases the spectral
efficiency of cellular spectrum by exploiting
the spatial diversity.
• QoS management is easy by reason of
entirely controlled by eNBs .
• The possibility of using Inband D2D
communication on any mobile equipement .
• Challenging control of level of
interference.
• No possibility for D2D and cellular
simultaneous transmission.
• High complication of resource
allocation procedure and power
control
Table 2. Advantages and disadvantages of Outband D2D communication
Advantages of Outband D2D Disadvantages of Outband D2D
• Easier resource allocation.
• Possibility of simultaneous occurrence of
D2D and cellular users.
• None interference between D2D and
cellular subscribers.
• None necessary to devote cellular
resources to D2D spectrum
• Necessary to decode and to encode
packets
• D2D communication only used by
LTE and WiFi radio interfaces
• Need of the efficient power
management
6. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 1, February 2016
16
3. D2D ARCHITECTURE MODEL AND REQUIREMENTS IN LTE-A
NETWORKS
LTE-advanced technology was the first platform that implements D2D communications. In June
2012, 3GPP was started a workshop about LTE Release 12 standardization that include new
steps for D2D communication scenario and use to to introduce new services in LTE-
A[53].Integrity and high standards of D2D communications such as LTE Proximity service
(ProSe) was discussed at the RAN 58 meeting [44][45] in Demeber 2012.
D2D use case and D2D communication requirements are given in [45] paper .An overview of
D2D Proximity Services standardization in 3GPP LTE is given on workshop presented by
Michael Gundlach at the European Conference on Networks and Communications (EUCNC) on
June 2014.
[46] discussed the scenarios and requirements for D2D discovery and provided several
considerations on discovery issues. Proposals about scenarios and requirements are presented.
The D2D/ProSe functionality are in the first integrated in LTE Release 12 .Literature about
ProSe is divided into two parts,called D2D discovery and D2D communication.
With proximity discovery or D2D discovery, users can discover other users that are in the
proximity. Using E-UTRA, this process identifies that a UE is in proximity of another [45].
The D2D communication can be directlty between UEs by the use of the proximity discovery to
reduce the need for manual interaction or via eNBs.
The direct communication between UEs can be also etablish without using proximity discovery
function.In cellular network, direct communication is integrated with a cellular network and is
naturally preceded by network supported proximity discovery.
The 3GPP system enablers for ProSe consists of the following functionalities :
• EPC-level ProSe Discovery
• ProSe direct discovery models.
• ProSe direct communication Modes.
• UE-to-Network relay or UE-to-UE relay.
Architectural enhancements for the EPC core network are necessery in order to facilitate D2D
and cellular inks coexistence and for best D2D integration in LTE-A mobile networks .
An overview of architectural and protocol enhancements for the D2D integration in LTE-
Advanced system is given in [48] .The paper describe also procedures and services used by
D2D devices to discover each other .
7. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 1, February 2016
17
Figure 2. D2D communication architecture under LTE-A network
As depicted in Figure 2., The D2D system architecture under LTE-A consists of a number of new
entities that are required for D2D communication. These entities are as follows:
ProSe App Server: It implements the ProSe capability for building the application functionality.It
is responsible to determinate if the registration of UEs can be accepted or not and to activate
ProSe actions such as ProSe discovery for a specific application. The ProSe application in the
UE (ProSe) communicates with the ProSe Application Server via the application layer reference
point PC1 [53][49].
ProSe UE App: This entity is responsible for building the application functionality. The ProSe
UE App communicate and discover other ProSe UEs by means of the PC5 interface [50] .It is
used by different services such as Public Safety or media application in order to get the requests
and find buddies in proximity .
The ProSe Function is responsible of the different network actions to achieve ProSe requirements
and it is used also to provide network services such as authorization, authentication, and data
handling . The ProSe Function provides also the necessary charging and security functionality for
usage of ProSe via the EPC.
The D2D communication architecture under LTE-A network defines 7 new interfaces to
interconnect the new entities . These interfaces are called PC1, PC2, PC3, PC4, PC5, PC6 and
PC7(Table 3).
The major roles of ProSe Fonction are given as follows:
• Provisioning (via the Direct Provisioning Function - DPF) Direct Provisioning Function
(DPF) is used to provision the UE with necessary parameters in order use ProSe direct
services. For direct communication used for Public Safety DPF is also used to provision
the UE with parameters that are needed when the UE is not "served by E-UTRA".
8. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 1, February 2016
18
• Direct discovery management (via the Direct Discovery Name Management Function)
:Direct Discovery Name Management Function is used for open Prose Direct Discovery
to allocate and process the mapping of ProSe Applications IDs and ProSe Application
Codes used in ProSe Direct Discovery. It uses ProSe related subscriber data stored in
HSS for authorisation for each discovery request. It also provides the UE with the
necessary security material in order to protect discovery messages transmitted over the
air.
• EPC discovery (via the EPC-level Discovery ProSe Function ):EPC-level Discovery
ProSe Function has a reference point towards the Application Server (PC2), towards
other ProSe Functions (PC6), towards the HSS (PC4a) and the UE (PC3).
Figure 3. UE to ProSe Function Interface
Figure 4. : Control Plane for PC4a Interface
9. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 1, February 2016
19
Table 3. Interfaces and Reference Points for D2D architecture under LTE-A Networks
4. CONCLUSIONS
Device-to-device (D2D) communications is seen as new paradigm that will be implemented in
the next generations of mobile networks to provide high performance in cellular network,
improving coverage, provide spectral efficiency ,high data rates and offer new peer-to-peer
services with QoS guarantees .
Interface Description
PC1 It is the interface between the UE ProSe application and the ProSe Application
Server. It is used to provide the level signalling requirements definition .
PC2
PC3
It is the interface between the ProSe Application Server and the ProSe Function.
It is used to define the interaction between ProSe Application Server and ProSe
functionality [47]. the ProSe Function use this interface to supports EPC-level
discovery by the following functionalities.:
• Storage of a list of applications that are authorized to use EPC-level ProSe
Discovery.
• Exchange of signalling with 3rd party Application Servers for application
registration and identifier mapping.
The reference point between the UE and the ProSe Function (Figure.3) it is based on
IP protocol and used for the ProSe Direct Discovery authorisation and to define the
authorisation policy per PLMN for ProSe Direct Discovery and communication
between UE and ProSe Function.
PC4a
PC5 .
PC6
PC7
The reference point between the HSS and ProSe Function .It is responsible to
manage the subscription information and access authorisation for ProSE Direct
Discovery and ProSE Direct Communication . More details on procedures, message
parameters and protocol specifications of this interface are given in The [52]
document. The PC4a interface is based on Diameter protocol. Over The PC4a
interface, Diameter messages over the PC4a interface shall make use of SCTP IETF
RFC 4960 (Figure.4).
ProSe UEs are interconnected with each other by means of PC5 interface that is
based on “ProSE protocol” that is used for handling ProSe Direct Discovery[51].
The reference point between two ProSe Functions located in different PLMNs .This
interface is used for the ProSe service and ProSe Direct Discovery requests
authorization [49].
Interconnected the visited ProSe Function and the home ProSe Function .It is used to
control ProSE service authorisation in the home ProSe Function.
11. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 1, February 2016
21
[16] B. Zhou, H. Hu, S.-Q. Huang, and H.-H. Chen, “Intracluster deviceto- device relay algorithm with
optimal resource utilization,” IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2315–
2326, Jun. 2013.
[17] X. Bao, U. Lee, I. Rimac, and R. R. Choudhury, “DataSpotting: offloading cellular traffic via
managed device-to-device data transfer at data spots,” ACM SIGMOBILE Mobile Computing and
Communications Review, vol. 14, no. 3, pp. 37–39, 2010.
[18] X. Chen, L. Chen, M. Zeng, X. Zhang, and D. Yang, “Downlink resource allocation for device-to-
device communication underlaying cellular networks,” in Proceedings of IEEE PIMRC, 2012, pp.
232–237
[19] M. Ji, G. Caire, and A. F. Molisch, “Wireless device-to-device Caching networks: Basic principles
and system performance,”arXiv preprintarXiv:1305.5216, 2013.
[20] H. Min, J. Lee, S. Park, and D. Hong, “Capacity enhancement of an interference limited area for
device-to-device uplink underlaing cellular networks,” IEEE Transactions on Wireles
Communications, vol. 10, no. 12, pp. 3995–4000, December 2011.
[21] G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Mikls,and Z. Turnyi, “Design aspects of
network assisted device-to- device communications,” IEEE Communications Magazine, vol. 50, no.
3, pp.170–177, 2012.
[22] R. Zhang, X. Cheng, L. Yang, and B. Jiao, “Interference-aware Graph based resource sharing for
device-to-device communications underlaying cellular networks,” in Proceedings of IEEE WCNC,
2013, pp. 140–145.
[23] J. C. Li, M. Lei, and F. Gao, “Device-to-device (D2D) Communication in MU-MIMO cellular
networks,” in Proceedings of IEEE GLOBE COM,2012, pp. 3583–3587.
[24] N. Golrezaei, A. F. Molisch, and A. G. Dimakis, “Base-station assisted device-to-device
communications for high-throughput wire less video networks,” in Proceedings of IEEE ICC, 2012,
pp. 7077–7081.
[25] Bin Guo, Shaohui Sun, Qiubin Gao “Interference Management for D2D Communications Underlying
Cellular Networks at Cell Edge” ICWMC 2014 .
[26] S. Shalmashi, G. Miao, and S. Ben Slimane, “Interference management for multiple device-to-device
communications underlaying cellular networks,” IEEE International Symposium on Personal Indoor
and Mobile Radio Communications (PIMRC), 2013, pp. 223-227.
[27] J. Shin, J. P. Choi, and J.-W. Choi , “An autonomous interference avoidance scheme for D2D
communications through frequency overhearing,” International Conference on ICT Convergence
(ICTC), 2013, pp. 1074-1075.
[28] H. Min, and J. Lee, “Capacity Enhancement Using an Interference Limited Area for Device-to-
Device Uplink Underlaying Cellular Networks,” IEEE Transactions on Wireless Communications,
vol. 10, no. 12, Dec. 2011, pp. 3995-4000.
[29] K. Doppler, M Rinne, C. Wijiting, C. B. Ribeiro, and K. Hugl, “Device-to-Device Communication as
an Underlay to LTE-Advanced Networks,” Communications Magazine, IEEE, vol. 47, no. 12,
Dec. 2009, pp 42-49. Copyright
[30] Ji Lianghai Klein, A. ; Kuruvatti, N. ; Schotten, H.D “System Capacity Optimization Algorithm for
D2D Underlay Operation “Communications Workshops (ICC), 2014 IEEE.
[31] B. Zhou, H. Hu, S.-Q. Huang, and H.-H. Chen, “Intracluster deviceto-device relay algorithm with
optimal resource utilization,” IEEE Transactions on Vehicular Technology, vol. 62, no. 5, pp. 2315–
2326, Jun. 2013.
[32] J. C. Li, M. Lei, and F. Gao, “Device-to-device (D2D) communication in MU-MIMO cellular
networks,” in Proceedings of IEEE GLOBECOM,2012, pp. 3583–3587.
[33] G. Fodor, E. Dahlman, G. Mildh, S. Parkvall, N. Reider, G. Mikls, and Z. Turnyi, “Design aspects of
network assisted device-to-device communications,” IEEE Communications Magazine, vol. 50, no. 3,
pp. 170–177, 2012.
[34] W. ALLIANCE, “Wi-Fi Peer-to-Peer (P2P) Specification v1. 1,” WI-FI ALLIANCE
SPECIFICATION, vol. 1, pp. 1–159, 2010
[35] Z. Alliance, “Zigbee specification,” Document 053474r06, Version, vol. 1, 2006.
[36] S. Bluetooth, “Bluetooth specification version 1.1,” Available HTTP: http://www. bluetooth. com,
2001
[37] A. Asadi and V. Mancuso, “Energy efficient opportunistic uplink Packet forwarding in hybrid
wireless networks,” in Proceedings of the fourth international conference on Future energy systems,
2013.
12. International Journal of Wireless & Mobile Networks (IJWMN) Vol. 8, No. 1, February 2016
22
[38] On the compound impact of opportunistic scheduling and D2D communications in cellular networks,
Accepted for publication in ACM MSWIM, 2013.
[39] C. Xu, L. Song, Z. Han, D. Li, and B. Jiao, “Resource allocation using a reverse iterative
combinatorial auction for device-to-device underay cellular networks,” in Proceedings of IEEE
GLOBECOM, 2012, pp. 4542–4547.
[40] A. Asad , V.Mancuso” On the compound impact of opportunistic scheduling and D2D
communications in cellular networks”, Accepted for publication in ACM MSWIM, 2013.
[41] A. Asad , V.Mancuso” “WiFi Direct and LTE D2D in action,” Accepted for publication in IEEE
Wireless Days, 2013.
[42] N. Golrezaei, A. G. Dimakis, and A. F. Molisch, “Device-to-device collaboration through distributed
storage,” in Proceedings of IEEE GLOBECOM, 2012, pp. 2397–2402.
[43] A. Asadi and V. Mancuso, “Energy efficient opportunistic uplink packet forwarding in hybrid
wireless networks,” in Proceedings of the fourth international conference on Future energy systems,
2013, pp. 261–262.
[44] R1-132861. Final report of 3GPP TSG RAN WG1 #73 v1.0.0, August 2013.
[45] 3GPP TR 22.803 v12.1.0, “Feasibility study for proximity services (ProSe)” 2013
[46] R1-132115, “Discussions on LTE device to device communication”, ZTE, May 2013
[47] 3GPP TS 29.343 V12.1.0 (2014-12), “Proximity-services (ProSe) function to ProSe application server
aspects (PC2)”; Stage 3 (Release 12).
[48] B.Raghothaman, E. Deng, R. Pragada, G. Sternberg, T. Deng, and K.Vanganuru, “Architecture and
protocols for LTE-based device to device communication,” in Proc. IEEE Int. Conf. Computing,
Networking Communications, San Diego, CA, Jan. 2013, pp. 895–899.
[49] 3GPP TS 23.303 version 12.2.0 Release 12, Proximity-based services (ProSe); Stage.2. ETSI TS 123
303 V12.2.0. 2014-09.
[50] Athul Prasad, Andreas Kunz, Genadi Velev, Konstantinos Samdanis, and JaeSeung Song , Energy
Efficient D2D Discovery for Proximity Services in 3GPP LTE-Advanced Networks. IEEE vehicular
technology magazine ,December 2014.
[51] 3GPP TS 24.334: "Proximity-services (Prose) User Equipment (UE) to Proximity-services (ProSe)
Function aspects (PC3); Stage 3".June2014
[52] 3GPP TS 29.344 V12.3.0 (2015-06), Proximity-services (ProSe) Function to Home Subscriber Server
(HSS) aspects; Stage 3 (Release 12), June 2015.
[53] S. Mumtaz and J. Rodriguez (eds.), Smart Device to Smart Device Communication, DOI:
10.1007/978-3-319-04963-2_1,Springer International Publishing Switzerland 2014.
Authors
Mr. Margi Hicham ,He received the engineer degree in Telecommunication systems
from The National Institute of Posts and Telecommunications (INPT) in Rabat, Morocco
in 2011.He is currently working toward the Ph.D. degree at RITM Research Lab,ESTC
,Hassan II University ,Casablanca, Morocco. His research interests include Network
Science, Wireless Ad hoc Networks and Sensor Networks. . His current research interests
include cognitive radio systems, cooperative (relay) communications,D2D
communications ,LTE-A and 5G wireless communications.
Mr . Noreddine Abghour ,He is currently associate professor in the Faculty of Science of
Hassan II University, Morocco. He received his Ph.D. degree from Institut National
Polytechnique de Toulouse (France) in 2004. His research mainly deals with
authorization schemes in distributed computing systems, and Currently, his research
interests concern the problems related to the Mobile Communication Systems and Cloud
Computing.
Mr. Mohammed Ouzzif, He is an associate Professor at the University Hassan II of
Casablanca. He earned a PHD in the field of the specification and verification of
distributed systems at the University Mohammed V in Rabat. Currently, his research
interests concern the problems related to the wireless sensor networks and big data in the
context of smart cities.