1) The document discusses proximity-based services and direct device-to-device communication as key technologies for public safety networks.
2) It outlines various use cases for proximity services and notes technical challenges around discovery, synchronization, and interference coordination.
3) The document reviews 3GPP's progress in standardizing proximity services and notes key public safety requirements around direct communication, relaying, and service continuity that 3GPP is working to address in releases 12-14.
An overview about the new feature proposed for LTE Release 12 and beyond: Proximity Services (ProSe) / D2D.
It covers the D2D features: Discovery, Communication, Security and also shows some use-cases.
D2D (Device To Device) Communications - 5G Training - Tonex TrainingBryan Len
Length: 2 Days
D2D Communications Training | 5G Device to Device Communications. D2D Communications Training, Device-to-Device (D2D) correspondence training covers the radio technology that empowers devices to discuss straightforwardly with one another with no extra network foundation.
5G application situations incorporate nearness based administrations, ads, neighborhood trade of data, vehicle-to-vehicle (v2v), open wellbeing support and some more.
Learn about :
Overview of D2D communications
Description of spectrum calculations in D2D communications
Architecture of D2D communications
What are the features of D2D
Radio resource management in D2D communications
Description of multi-hop communications
Overview of applications of D2D communications
Course designed for :
Telecom engineer
Engineers with telecom experience
Engineers with telecom & IT experience
Anyone who wants to learn 5G technology
For students who wish to enhance their skills
For anyone interested in learning
For anyone who wants to work in this domain
For professionals those who wants to upgrade their skills
For professionals who wants to upgrade skills from 3G/4G to 5G technology
Anyone who wants to learn how D2D works with 5G
Course outline:
D2D communications
Spectrum allocation in D2D communications
D2D communication architecture
D2D communication features part 1
D2D communications features part 2
D2D from 4G to 5G
RRM in D2D
Multihop communications
Propagation and neighbor discovery
Applications
IOT in 5G
Request more information regarding D2D - Device to device communications 5G training. Visit tonex.com for course and workshop detail.
D2D (Device To Device) Communications - 5G Training - Tonex Training
https://www.tonex.com/d2d-communications-5g-training/
Intelligent Device TO Device Communication Using IoTIJCERT
Internet is becoming the most intrinsic part of the human life. There are many users of the internet but the devices will be the main users in the Internet of Things (IoT). These devices communicate with each other efficiently and gather the information to transfer the data to particular device. The quality of this information depends on how smart the devices are. IoT coverage is very wide and consists of the things or devices connected in network like camera, android phones, sensors etc. Once all these devices are connected with each other, they are capable of processing smartly and satisfying basic needs of environment. Thus the communication between the devices is achieved using various technologies and devices.
An overview about the new feature proposed for LTE Release 12 and beyond: Proximity Services (ProSe) / D2D.
It covers the D2D features: Discovery, Communication, Security and also shows some use-cases.
D2D (Device To Device) Communications - 5G Training - Tonex TrainingBryan Len
Length: 2 Days
D2D Communications Training | 5G Device to Device Communications. D2D Communications Training, Device-to-Device (D2D) correspondence training covers the radio technology that empowers devices to discuss straightforwardly with one another with no extra network foundation.
5G application situations incorporate nearness based administrations, ads, neighborhood trade of data, vehicle-to-vehicle (v2v), open wellbeing support and some more.
Learn about :
Overview of D2D communications
Description of spectrum calculations in D2D communications
Architecture of D2D communications
What are the features of D2D
Radio resource management in D2D communications
Description of multi-hop communications
Overview of applications of D2D communications
Course designed for :
Telecom engineer
Engineers with telecom experience
Engineers with telecom & IT experience
Anyone who wants to learn 5G technology
For students who wish to enhance their skills
For anyone interested in learning
For anyone who wants to work in this domain
For professionals those who wants to upgrade their skills
For professionals who wants to upgrade skills from 3G/4G to 5G technology
Anyone who wants to learn how D2D works with 5G
Course outline:
D2D communications
Spectrum allocation in D2D communications
D2D communication architecture
D2D communication features part 1
D2D communications features part 2
D2D from 4G to 5G
RRM in D2D
Multihop communications
Propagation and neighbor discovery
Applications
IOT in 5G
Request more information regarding D2D - Device to device communications 5G training. Visit tonex.com for course and workshop detail.
D2D (Device To Device) Communications - 5G Training - Tonex Training
https://www.tonex.com/d2d-communications-5g-training/
Intelligent Device TO Device Communication Using IoTIJCERT
Internet is becoming the most intrinsic part of the human life. There are many users of the internet but the devices will be the main users in the Internet of Things (IoT). These devices communicate with each other efficiently and gather the information to transfer the data to particular device. The quality of this information depends on how smart the devices are. IoT coverage is very wide and consists of the things or devices connected in network like camera, android phones, sensors etc. Once all these devices are connected with each other, they are capable of processing smartly and satisfying basic needs of environment. Thus the communication between the devices is achieved using various technologies and devices.
Device to Device Communications will enable on cellular 4G/5G networks soon, There are many research aspects in D2D Communications,
Mode Selection
Network Coding
MIMO
Multi-Hop
the most complicated Interference scenarios are coming
Presentation that explores the specific requirements 5G has to deliver in order to support the next generation of VR and AR experiences.
https://www.qualcomm.com/invention/extended-reality
Overview of wireless and mobile technologies.
Advances in signal processing technologies are a technological driver for wireless technologies. Different technologies like 3G (WAN), WLAN (LAN), Bluetooth (PAN) and WiMAX (MAN) target different applications and markets. Since most of the frequency spectrum is still regulated in the different countries, newer technologies aim for non-regulated bands such as the 2.4GHz and 5GHz ISM bands.
In order to fully exploit untethered operation, wireless devices are fitted with roaming and handover protocols like 802.11r or Mobile IP. Layer 2 protocols typically provide faster handover but are restricted to specific link layer protocols. Layer 3 or higher protocols like Mobile IP are independent of the link layer thus work across heterogeneous networks.
How Can CoMP Extend 5G NR to High Capacity & Ultra-Reliable Communications?Qualcomm Research
The next industrial revolution, sometimes referred to as Industry 4.0, is already ongoing, fueled by technology advancements in big data, automation and cyber physical systems. To achieve their full potential, these new processes and operating models require high-performance connectivity. Ultra-reliable low latency communication (URLLC) is a new set of 5G NR capabilities, expected for 3GPP Release 16, that can enable operators and enterprises to address a diverse range of high-performance industrial use-cases. This webinar will investigate 5G NR, including the support for private industrial networks and URLLC capabilities. Using the "factory of the future" concept as an example, it will show how 5G NR can help to transform industrial IoT by making it more dynamic, flexible and adaptable to market demand.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
UNIT IV WIRELESS SENSOR NETWORKS (WSNS) AND MAC PROTOCOLS 9 Single node architecture: hardware and software components of a sensor node - WSN Network architecture: typical network architectures-data relaying and aggregation strategies -MAC layer protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based MAC- IEEE 802.15.4.
Enabling the rise of the smartphone: Chronicling the developmental history at...Qualcomm Research
Today’s smartphones are a marvel of modern technology — handheld devices with vast computing power, incredible multimedia and AI capabilities, and blazing fast data rates that support mobile browsing, social media interaction, and more. From humble beginnings as a cellphone focused purely on voice communication, the capability and functionality of modern smartphones have advanced tremendously. This presentation chronicles Qualcomm’s role in the rise of the smartphone from its initial beginnings to becoming the largest computing platform in the world. It includes:
- Key technology developments that led to today’s smartphones
- The role of Moore’s Law in driving new innovations and additional integration into mobile processors
- Qualcomm’s critical role in advancing the smartphone’s capabilities through groundbreaking innovations and key technology developments
Accelerating the mobile ecosystem expansion in the 5G Era with LTE Advanced ProQualcomm Research
5G will connect virtually everything around us to transform a wide range of industries — manufacturing, automotive, logistics, and many more, and we are on track to make 5G NR — the global 5G standard — a commercial reality by 2019. However, this first phase of 5G mainly focuses on enhanced mobile broadband services, which will contribute to part of the total projected $12T 5G economy. 5G NR will continue to evolve in Release 16 and beyond to further expand 5G’s reach to new devices, services, and ecosystem players.
So, do we have to wait until 2020+ for the next phase of 5G NR before we can start enabling new mobile use cases?
LTE Advanced Pro will fill the gap and is continuing to evolve to bring new capabilities and efficiencies. Check out this presentation for:
• Gigabit LTE: anchoring the 5G mobile experience now with over 45 commercial networks globally. Our 3rd gen chipset — the Qualcomm Snapdragon X24 can deliver up to 2 Gbps.
• LTE IoT: starting to connect the massive IoT today, and its continued evolution will be fully leveraged by 5G NR IoT in Rel-16+.
• C-V2X: establishing the foundation for enhanced safety use cases in Rel-14 and a continued 5G NR C-V2X evolution for future autonomous vehicles.
• Private networks: delivering an optimized solution for the industrial IoT, and establishing the foundation to private 5G NR networks that will enable new use cases.
Next generation tech trend for global critical communication standardYi-Hsueh Tsai
Today commercial cellular networks and dedicated public safety systems are two separate technology families for providing terrestrial wide-area wireless communications. With NPSTC, TCCA and ETSI Technical Committee TETRA supporting LTE there is now a clear global consensus that it will be the global standard for next generation broadband public safety networks. In order to provide the best service to both communities, they are establishing common technical standards offers advantages to both communities. Work underway in Release 12 of 3GPP LTE standards will enhance LTE to meet public safety application requirements. The public safety community gets access to the economic and technical advantages generated by the scale of commercial cellular networks, and the commercial cellular community gets the opportunity to address parts of the public safety market as well as gaining enhancements to their systems that have interesting applications to consumers and businesses. Developing the ecosystem also requires each country and user community to develop the right government policy, commercial environment and spectrum plan. Those plans and works are undertaken outside 3GPP’s technical standards area.
Device to Device Communications will enable on cellular 4G/5G networks soon, There are many research aspects in D2D Communications,
Mode Selection
Network Coding
MIMO
Multi-Hop
the most complicated Interference scenarios are coming
Presentation that explores the specific requirements 5G has to deliver in order to support the next generation of VR and AR experiences.
https://www.qualcomm.com/invention/extended-reality
Overview of wireless and mobile technologies.
Advances in signal processing technologies are a technological driver for wireless technologies. Different technologies like 3G (WAN), WLAN (LAN), Bluetooth (PAN) and WiMAX (MAN) target different applications and markets. Since most of the frequency spectrum is still regulated in the different countries, newer technologies aim for non-regulated bands such as the 2.4GHz and 5GHz ISM bands.
In order to fully exploit untethered operation, wireless devices are fitted with roaming and handover protocols like 802.11r or Mobile IP. Layer 2 protocols typically provide faster handover but are restricted to specific link layer protocols. Layer 3 or higher protocols like Mobile IP are independent of the link layer thus work across heterogeneous networks.
How Can CoMP Extend 5G NR to High Capacity & Ultra-Reliable Communications?Qualcomm Research
The next industrial revolution, sometimes referred to as Industry 4.0, is already ongoing, fueled by technology advancements in big data, automation and cyber physical systems. To achieve their full potential, these new processes and operating models require high-performance connectivity. Ultra-reliable low latency communication (URLLC) is a new set of 5G NR capabilities, expected for 3GPP Release 16, that can enable operators and enterprises to address a diverse range of high-performance industrial use-cases. This webinar will investigate 5G NR, including the support for private industrial networks and URLLC capabilities. Using the "factory of the future" concept as an example, it will show how 5G NR can help to transform industrial IoT by making it more dynamic, flexible and adaptable to market demand.
https://www.ijmst.com/
IJMST Volume 1 Issue 1, Manuscript 4
As the popularity of mobile devices and wireless networks significantly increased over the
past years. The wireless adhoc network has now become one of the most vibrant and active
fields of communication and networking research. These networks are a new generation of
networks offering unrestricted mobility without any underlying infrastructure. As their
principle application is in disastrous environments, security is critical. Various challenges are
faced in the adhoc environment, mostly due to the resource poorness of these networks. One
man confront in the design of these networks is their vulnerability to security attacks. The
solutions for conventional networks are usually not sufficient to provide efficient adhoc
operations. Just because of its wireless nature of communication and lack of any security
infrastructure raise several security problems and threats.
In this paper, we briefly review the threats an adhoc network faces and the security goals to
be achieved. Moreover, it also presents existing security schemes used in wireless adhoc
networks in order to handle security threats.
UNIT IV WIRELESS SENSOR NETWORKS (WSNS) AND MAC PROTOCOLS 9 Single node architecture: hardware and software components of a sensor node - WSN Network architecture: typical network architectures-data relaying and aggregation strategies -MAC layer protocols: self-organizing, Hybrid TDMA/FDMA and CSMA based MAC- IEEE 802.15.4.
Enabling the rise of the smartphone: Chronicling the developmental history at...Qualcomm Research
Today’s smartphones are a marvel of modern technology — handheld devices with vast computing power, incredible multimedia and AI capabilities, and blazing fast data rates that support mobile browsing, social media interaction, and more. From humble beginnings as a cellphone focused purely on voice communication, the capability and functionality of modern smartphones have advanced tremendously. This presentation chronicles Qualcomm’s role in the rise of the smartphone from its initial beginnings to becoming the largest computing platform in the world. It includes:
- Key technology developments that led to today’s smartphones
- The role of Moore’s Law in driving new innovations and additional integration into mobile processors
- Qualcomm’s critical role in advancing the smartphone’s capabilities through groundbreaking innovations and key technology developments
Accelerating the mobile ecosystem expansion in the 5G Era with LTE Advanced ProQualcomm Research
5G will connect virtually everything around us to transform a wide range of industries — manufacturing, automotive, logistics, and many more, and we are on track to make 5G NR — the global 5G standard — a commercial reality by 2019. However, this first phase of 5G mainly focuses on enhanced mobile broadband services, which will contribute to part of the total projected $12T 5G economy. 5G NR will continue to evolve in Release 16 and beyond to further expand 5G’s reach to new devices, services, and ecosystem players.
So, do we have to wait until 2020+ for the next phase of 5G NR before we can start enabling new mobile use cases?
LTE Advanced Pro will fill the gap and is continuing to evolve to bring new capabilities and efficiencies. Check out this presentation for:
• Gigabit LTE: anchoring the 5G mobile experience now with over 45 commercial networks globally. Our 3rd gen chipset — the Qualcomm Snapdragon X24 can deliver up to 2 Gbps.
• LTE IoT: starting to connect the massive IoT today, and its continued evolution will be fully leveraged by 5G NR IoT in Rel-16+.
• C-V2X: establishing the foundation for enhanced safety use cases in Rel-14 and a continued 5G NR C-V2X evolution for future autonomous vehicles.
• Private networks: delivering an optimized solution for the industrial IoT, and establishing the foundation to private 5G NR networks that will enable new use cases.
Next generation tech trend for global critical communication standardYi-Hsueh Tsai
Today commercial cellular networks and dedicated public safety systems are two separate technology families for providing terrestrial wide-area wireless communications. With NPSTC, TCCA and ETSI Technical Committee TETRA supporting LTE there is now a clear global consensus that it will be the global standard for next generation broadband public safety networks. In order to provide the best service to both communities, they are establishing common technical standards offers advantages to both communities. Work underway in Release 12 of 3GPP LTE standards will enhance LTE to meet public safety application requirements. The public safety community gets access to the economic and technical advantages generated by the scale of commercial cellular networks, and the commercial cellular community gets the opportunity to address parts of the public safety market as well as gaining enhancements to their systems that have interesting applications to consumers and businesses. Developing the ecosystem also requires each country and user community to develop the right government policy, commercial environment and spectrum plan. Those plans and works are undertaken outside 3GPP’s technical standards area.
New Services and Markets Technology Enablers (SMARTER) - LTE Relese 13+ and r...Yi-Hsueh Tsai
3GPP Overview
TSG Plenary Status
Progress and content of SA1 5G Study Item - SMARTER
- Introduction and Status
- Radio Interface Technology definition
- Time Delay analysis
- Use Cases and Summary
RAN workshop on 5G Chairman Summary
- Use Cases & Services
- New radio
- 5G Time Line and Phasing
- Next steps
NGMN Alliance’ 5G Use Cases
LTE Release 13 and SMARTER – Road Towards 5GYi-Hsueh Tsai
3GPP Overview
TSG Plenary Status
RAN workshop on 5G
SA1 5G SMARTER
Radio Interface Technology definition
Time Delay analysis
Four New Building Block Study Items for 5G
Enhanced Mobile Broadband
Massive Internet of Things
Critical Machine Communications (ultra-reliable and low latency)
Network operation (including Migration and Interworking)
Capabilities of Future IMT systems
Conclusions
3GPP LTE-A Standardisation in Release 12 and Beyond - Jan 2013 Eiko Seidel, C...Eiko Seidel
Quite some time ago major improvements have been made to LTE with LTE-Advanced as part of 3GPP Release 10. Unquestionably, LTE-A will be the leading global 4G standard fulfilling the defined ITU-R requirements [1] on IMT-Advanced such as peak data rates beyond 1Gbps. While further enhancements to LTE-Advanced have just been completed in 3GPP Release 11, the new technology trends become visible to serve the continuously growing traffic demand. This White Paper, based on Nomor’s attendance of 3GPP, provides an outlook on 3GPP standardisation for the forthcoming years. Besides a summary of general trends and a projected release schedule, it includes an overview of the work and study items of Release 12 in the Radio Working Groups. New key technologies that Release 12 will address are: Small Cell Enhancements, a New Carrier Type, 3D-MIMO Beamforming, Machine-Type-Communication, LTE-WiFi Integration at radio level and Public Safety incl. Device-to-Device communication. While the completion of Release 12 is expected mid of 2014, deployments might be seen around the end of 2015 and later. NoMoR is active in different related research projects and offers consultancy services for related research, standardisation, simulation, early prototyping and technology training.
This presentation is for the people who are interested in mobile release and specifications announced by 3GPP every year, presentation cover all release up to release 12.
Performance Analysis of WiMAX and LTE Using NS-2IJERA Editor
The increasing use of wireless devices and in particular smart phones has resulted the need for greater capacity
and higher speed than the existing network technologies. Hence, LTE (Long Term Evolution) and WiMAX
(Worldwide Interoper- ability for Microwave Access) became the two leading technologies. Services are
increasingly shifting from voice to data and from circuit-switched to packet-switched ones. Battle between LTE
and WiMAX technologies is already heating up with WiMAX being ahead due to availability of standards
through IEEE 802.16 and is up and running but lacks in substantial roll out plans due to cost. The targets for
LTE indicate bandwidth increases as high as 100 Mbps on the downlink, and up to 50 Mbps on the uplink.
However, this potential increase in bandwidth is just a small part of the overall improvement LTE aims to
provide. This study illustrates the model and representation of LTE links and traffics using NS-2 network
simulator and observation of TCP performance investigated. The Evaluation of the network performance with
TCP is mainly based on congestion window behavior, throughput, average delay and lost packet.
3GPP Overview
TSG Plenary Status for 5G
New Services and Markets Technology Enablers
Architecture for Next Generation System
Next Generation Radio Access Technology
TSG Plenary Status for LTE-Advanced Pro
References
S1 154010 Summary of CEPT Report 52 regarding BDA2GCYi-Hsueh Tsai
1.Background
2.Harmonisationpossibilities-Broadband DA2GC
3.Broadband Direct Air To Ground Communications
- DA2GCS (2x10 MHz for FDD operation)
- DA2GCS (20 MHz for TDD operation)
4.Compatibility/sharing scenarios for DA2GC
- Definitions for Broadband DA2GC (ECC Report 214)
- BDA2GC RL/FL in the frequency band 1900-1920 MHz
- BDA2GC RL/FL in the frequency band 2010-2025 MHz
5.Conclusion
S1-153199 Use Case and Requirements for DA2GCYi-Hsueh Tsai
According to ITU-R M.2282-0, a broadband Direct-Air-to-Ground Communications (DA2GC) system constitutes an application for various types of telecommunication services, such as Internet access and mobile multimedia services, during flights. The connection with the flight passengers’ user terminals on board aircraft is realized by already available mobile communication systems on board aircraft. The main application field would be Air Passenger Communications (APC). In addition, a broadband DA2GC system could also support Airline Administrative Communications services (AAC) and thus improve aircraft operation, resulting, in particular, in reduced Operational Expenditure (OPEX) for the airlines. Safety-relevant communications such as Air Traffic Control (ATC) and related services are not intended to be covered. The 5G technology should bring the same broadband wireless access capability for on-board network access to the airlines, and provide almost the same experience in the air that you have at home.
Quantum Entanglement - Cryptography and CommunicationYi-Hsueh Tsai
1. Introduction 2. Quantum Entanglement 3. Quantum Cryptography - Quantum Key Distribution 4. Physical Limit for E2E Time Delay - Speed of Light 5. Shorten E2E Delay - Faster-Than-Light Communication 6. Conclusions
To improve communication security, quantum cryptography could be considered. 2. To shorten E2E delay, technology regarding Faster-ThanLight (FTL) communication is required.
Use Case and Requirements for Broadband Direct Air to Ground Communications (...Yi-Hsueh Tsai
According to ITU-R M.2282-0, a broadband Direct-Air-to-Ground Communications (DA2GC) system constitutes an application for various types of telecommunication services, such as Internet access and mobile multimedia services, during flights. The connection with the flight passengers’ user terminals on board aircraft is realized by already available mobile communication systems on board aircraft. The main application field would be Air Passenger Communications (APC). In addition, a broadband DA2GC system could also support Airline Administrative Communications services (AAC) and thus improve aircraft operation, resulting, in particular, in reduced Operational Expenditure (OPEX) for the airlines. Safety-relevant communications such as Air Traffic Control (ATC) and related services are not intended to be covered. In the past, Boring flights with a slow Internet connection or no connection at all are over. 5G technology should be able provide a reliable Internet connection on aircrafts, making it possible to surf the Web, make phone VOIP calls, or even watch a streaming movie while you’re in flight.
Report of the LTE breakout session (NB-IoT) by Mediatek Inc. (Session Chair)Yi-Hsueh Tsai
7.16 WI: Narrowband IOT
(NB_IOT-Core; leading WG: RAN1; started: Sep. 15; target: Mar. 16; WID: RP-151621)
Time budget: N/A
Overall: At this meeting we need to determine the scope of the work. Which parts of LTE TSes to be reused, which parts are not applicable, which parts need change. Identification of issues and candidate solutions. The mindset should be that Requirements in TR 45.820 shall be fulfilled.
SMARTER Building Block: enhanced Mobile BroadBand (eMBB)Yi-Hsueh Tsai
Start new building block study item for the identified use case group: enhanced Mobile BroadBand (eMBB)
to identify and document the key families of use cases and their consolidated potential requirements
to capture desired system requirements and capabilities
The target for the completion of this building block study item is March 2016.
Use Cases and Requirements for Isolated EUTRAN OperationYi-Hsueh Tsai
When an emergency, disaster or any tremendous unexpected events occurs, communications infrastructure play an essential role. In many critical incident related scenarios, the terrestrial infrastructure might be seriously compromised and cannot guarantee reliable communications for rescue teams. A network architecture combining aerial and terrestrial base station with wireless backhaul links can provide rapidly deployable, resilient and flexible mobile networks, comprising innovative components, advanced functionalities for broadband applications. It can ensure the continued ability to communicate between Public Safety officers on the ground, even though they may be moving in and out of LTE network coverage or out of network coverage completely, will be of the utmost importance. For non-public safety usage, Figure 2 depicts an experimental network architecture supporting direct Air-to-Ground Communication.
3GPP TR 22.885 study on LTE support for V2X servicesYi-Hsueh Tsai
The vehicular communication in this study, referred to as Vehicle-to-Everything (V2X), contains the following three different types:
- Vehicle to Vehicle (V2V) Communications
- Vehicle to Infrastructure (V2I) Communications
- Vehicle to Pedestrian (V2P) Communications
Public safety ue assisted positioning use case (s1-151007)Yi-Hsueh Tsai
This use case describes when an emergency call is initiated, the caller's accurate location is obtained. When a Public Safety Officer approaches the emergency caller, the caller's latest accurate location is obtained with assistance by the Officer’s UE.
Automotive Use Cases for LTE-based V2X Study ItemYi-Hsueh Tsai
V2X communication has several scenarios, where each scenario may have different goals and different requirements. V2X includes the following cases:
V2V – vehicle to vehicle.
V2I – Vehicle to infrastructure.
V2P/V2B/V2M – Vehicle to other road users as Pedestrians, Bikes and Motorcycles.
The pace of LTE network deployment is accelerating all over the world, which enables more and more advanced services and Internet applications making use of the inherent benefits of LTE such as higher data rate, lower latency and enhanced coverage, etc. Widely deployed LTE based infrastructure provides the opportunity for the vehicle industry to realize the concept of ‘connected car’. By providing a vehicle access into the LTE network infrastructure, a vehicle can be connected to the Internet and other vehicles so that a broad range of existing or new services can be envisaged for the vehicle industry and the mobile industry as well.
Importantly, Proximity Service (ProSe) introduced in Release 12 will also provide functionalities to implement V2X services. Furthermore, LTE-based broadcast services such as PWS and eMBMS could provide additional functionalities for V2X services. It can be considered that some services will rely on wide-area network access which may be provided by GSM, UMTS, or by LTE.
This study proposes to document V2X use cases and assess the applicability of LTE technology to meet the operator, end-user and automotive industry expectations.
Treaty of Peace with Japan
Signed at San Francisco, 8 September 1951
Initial entry into force*: 28 April 1952
Note: Neither the Republic of China nor the People's Republic of China were invited to the San Francisco Peace Conference, and neither were parties to the San Francisco Treaty. The Republic of China concluded a separate Treaty of Peace with Japan in 1952.
SFPT signing
Prime Minister Yoshida Shigeru of Japan, surrounded by senior members of the Japanese delegation, signs the peace treaty on 8 September 1951.
green_line.gif (209 bytes)
TREATY OF PEACE WITH JAPAN
WHEREAS the Allied Powers and Japan are resolved that henceforth their relations shall be those of nations which, as sovereign equals, cooperate in friendly association to promote their common welfare and to maintain international peace and security, and are therefore desirous of concluding a Treaty of Peace which will settle questions still outstanding as a result of the existence of a state of war between them;
WHEREAS Japan for its part declares its intention to apply for membership in the United Nations and in all circumstances to conform to the principles of the Charter of the United Nations; to strive to realize the objectives of the Universal Declaration of Human Rights; to seek to create within Japan conditions of stability and well-being as defined in Articles 55 and 56 of the Charter of the United Nations and already initiated by post-surrender Japanese legislation; and in public and private trade and commerce to conform to internationally accepted fair practices;
WHEREAS the Allied Powers welcome the intentions of Japan set out in the foregoing paragraph;
THE ALLIED POWERS AND JAPAN have therefore determined to conclude the present Treaty of Peace, and have accordingly appointed the undersigned Plenipotentiaries, who, after presentation of their full powers, found in good and due form, have agreed on the following provisions:
V2X communication is the passing of information from a vehicle to any entity that may affect the vehicle, and vice versa. This information exchange can be used for a host of safety, mobility and environmental applications to include driver assistance and vehicle safety , speed adaptation and warning, emergency response, safety, traveller information, navigation, traffic operations and demand management, personal navigation, commercial fleet planning and payment transactions. There is significant societal benefit and commercial value to delivering safety, mobility and convenience applications that rely on V2X.
1. LTE in Unlicensed Spectrum
Supported Spectrum for Global Solution
Requirements Across the Regions in 5GHz Spectrum
2. Licensed-Assisted Access using LTE
Carrier Aggregation or Dual Connectivity
Releases 13 Draft Timeline
3. Summary of Licensed-Assisted Access
Potential deployment scenarios
4. Proximity-based Services - LTE Direct
Use cases for Proximity-based Services
LTE Direct in Unlicensed Spectrum
5. Conclusion
Single antenna, in-band STR is coming.
Janus is a centralized STR MAC that uses communication rounds and explicitly schedules all frame transmissions.
Full duplex promises a 100% throughput gain, Janus provides a 150% throughput gain.
Full duplex networks can benefit from more centralized MAC algorithms and protocols.
3GPP workshop on LTE in unlicensed spectrum (chairman summary)Yi-Hsueh Tsai
This document is my synthesis of the workshop contributions and discussion, hoping that it can help companies achieve convergence in follow-up discussions on this subject
The document discusses the main deployment options and requirements emerging from the discussion
The point here is not to note every single variant that was mentioned! Options or requirements that did not receive enough attention can be discussed offline among interested companies, and if consensus emerges around them, they can be later captured in future SI proposals
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Future tech trend for public safety proximity-based service
1. ProSe Public Safety 國際發展趨勢
(Future Tech Trend for Public Safety -
Proximity-based Service)
Institute for Information Industry
Speaker: Yi-Hsueh Tsai
2013/10/08
2. Outlines
1. Introduction
a) Use cases for Proximity-based Service
b) Technical Challenges
c) Tentative 3GPP roadmap and progress for ProSe
2. Standards for critical communications
a) Critical communications for wide range of users
b) Using commercial cellular for Public Safety
c) 700 MHz Band for US Public Safety
3. Public Safety Requirements and Standards
a) 3GPP public safety work items
b) 3GPP public safety standards availability
4. Legacy coexistence and migration strategies
BB system introduction and coexistence
5. Conclusion
3. Introduction
WLAN D2D
WAN +
WLAN D2D
D2D multicast
(groupcast)
D2D link
Pico cell
D2D link
Pico cell
WAN D2D
Source: 3GPP & Intel
4. Use cases for Proximity-based Service
Restricted discovery
describes a basic scenario
for ProSe discovery.
Mary’s UE
John’s UE
Peter’s UE
Proximity
Open discovery describes
a case in which an UE
discover another UE
without permission by the
discoverable UE.
Advertisement
Interactive discovery
5. Public SafetyNon Public Safety
Use cases for Proximity-based Service
星巴克咖啡[今日特價]
四人同行,一人免費!
今日星巴克咖啡四人同行,
一人免費,有誰要一起購
買?
我要1杯!
我要1杯!
我要2杯!
Yes Sir!
Group Report
請注意!2樓有多名受困及受傷
民眾,請加派人力支援!
個人災害
回報表單
6. Use cases for Proximity-based Service
3GPP D2D
Initial Focus
Within network
coverage
Outside network
coverage
Discovery
Non public safety & public
safety requirements
Public safety only
Direct
Communication
At least public safety
requirements
Public safety only
eNBs
LTE R12
GRRAN/UTRAN
pre-R12 LTE
In network
coverage
Out of network
coverage
Partial network
coverage
Communication type:
– Unicast
– Groupcast
– Broadcast
– UE relay
Source: 3GPP & Qualcomm
7. Technical Challenges
UE
eNB
Discovery of UEs
Identification of a certain UE in its proximity in a battery efficient way
Synchronization and measurement of channels from UEs
Receive over UL resource (or transmit over DL resource)
D2D Tx timing relative to UL/DL cellular channel Tx/Rx timing
Maintenance of dual connectivity
One link with eNB, the other with UE(s)
Mitigation of in-band emission
Group communication, relaying, security, privacy, etc.
Control of D2D links
Scheduling of individual D2D transmission and high-level control
Coordination of interference
Maximization of spatial reuse without causing serious interference
Single or multiple-operator scenarios
Charging, accounting, security, privacy, etc.
WLAN incorporation
Source: 3GPP & LG
8. Tentative 3GPP roadmap for ProSe
Source: 3GPP & NEC
2013 2014 20152012 2016+
SA1 Feasibility
Stage1
SA2/3 Feasib
Stage2
SA/CT Stage3
RAN Feasibility
RAN Stage3
Stage1
Stage2
RAN Stage3
SA/CT Stage3
ProSe work in RAN1 is too
big to fit in current Rel12
timescales. RAN2 work partly
depending on RAN1 progress
CT work not well identified
yet, need stable stage 2 first
Release 12
Release 14
Release 13
Some requirements and
features will most likely be
delayed to Release 13. It is
very unlikely that Release
12 will be extended.
9. 3GPP progress for ProSe
• The work follows the usual 3GPP path:
– First, a « Study Item » delivers « Technical Report », delivering
a feasibility assessment and collecting proposed solutions
– Second, a « Work Item » delivers « Technical Specs »
Work Item Completion Status
SA1 part (Use cases & Requirements) – TR phase 100% Completed
SA1 part (Use cases & Requirements) – TS phase 100% Completed
SA2 part (System Design) – TR phase 35% Ongoing
SA2 part (System Design) – TS phase 0% Ongoing
SA3 part (Security) – TR phase 10% Ongoing
Overall RAN 25% Ongoing
RAN1 part (Air Interface Physical Layer) 30% Ongoing
RAN2 part (Air Interface protocols) 10% Ongoing
RAN4 part (Radio Performance) 0% Ongoing
10. Standards for critical communications
• Standards used for commercial cellular and critical
communications have historically been separate
• New interest today in adapting LTE
for critical communication and
public safety applications
• 3GPP is working in collaboration
with the critical communication
industry to deliver standards
Public Warning System
(EMTEL & 3GPP)
Digital Mobile Radio
(ERM TG DMR)
Non-voice
Communication
(3GPP & EMTEL)
Maritime Distress and
Safety System
(ERM TG26)
TETRA
(TETRA)Priority use of public
network
(3GPP) Satellite emergency
communication
(SES SatEC)
eCall
(ESG & 3GPP)
Mobile broadband system
(MESA & RRS WG4)
Enhanced caller location
(E2NA, EMTEL, MSG,
BRAN & CABLE)
Public Safety
Source: ETSI
11. Critical communications for wide range of users
An open standard where the focus is on meeting the critical
communications needs of public safety and security agencies
and an increasingly wide range of other market sectors.
Government
Oil & Gas
Transport & logistics
Utilities
Commercial & Industrial
Manufacturing
12. Commitment and 3GPP Cooperation
National Public Safety Telecommunications Council
Spectrum and US$7bn funding for LTE-based national US
public safety network at 700MHz
Started standards process in 3GPP
Tetra + Critical Communications Association
Committed to LTE for broadband critical communication systems
Requirements & Technical Input
LTE Enhancements
• Preserve strengths of LTE while also adding
features needed for public safety
• Maximize the technical commonality between
commercial and public safety aspects
Cellular
Industry
Source: 3GPP SA Chair
13. Using commercial cellular for Public Safety
LTE provides numerous benefits that make it attractive for partnerships
between jurisdictions, and between public and private organizations.
Experts predict there will be
more partnerships as more
public safety agencies begin
moving forward with
deployments.
Financial benefits as shown in
right figure, it is dramatically
more cost-effective to build a
network as part of a public-
private partnership rather
than on a standalone basis.
Source: Bell Labs
-10%
14. Using commercial cellular for Public Safety
In the US, it is
expected that FirstNet
will select an Internet
Packet Exchange (IPX)
provider to handle the
connectivity between
the NPSBN and the
various commercial
networks with whom
NPBSN creates
roaming agreements.
When roaming onto commercial networks, it may be desirable to route
certain traffic locally in the commercial LTE network.
Source: NPSTC
NPBSN
Commercial LTE
15. 700 MHz Band for US Public Safety
• 700 MHz D Block to be reallocated to public safety
• FCC will facilitate transition of public safety broadband
spectrum to FirstNet
A
Multiple
Licensees
B
AT&T
(most of
US)
C
AT&T
(most of
US)
D
AT&T
(acquired
from
Qualcomm)
E
Multiple
Licensees
A
Multiple
Licensees
B
AT&T
(most of
US)
C
AT&T
(most of
US)
698 704 710 716 722 728 734 740 746
Ch 52 Ch 53 Ch 54 Ch 55 Ch 56 Ch 57 Ch 58 Ch 59
Ch 60 Ch 61 Ch 62 Ch 63 Ch 64 Ch 65 Ch 66 Ch 67 Ch 68 Ch 69
DTV
A Block Guard Band
(Access Spectrum,
Pegasus, etc.)
B Block Guard
Band (Vacant)
C
Verizon
746 768 798 806769 775757 776758 799787
PSBB PSNB C
Verizon
PSBB PSNB
805788
800
MHz
FirstNet License
Lower
700 MHz
Band
Upper 700 MHz Band
Source: FCC
16. First Responder Network Authority
• The ‘Middle Class Tax Relief and Job Creation Act of 2012’ directs
First Responder Network Authority (FirstNet), a new entity within
NTIA, to establish a single nationwide, interoperable public safety
broadband network.
• First Responder Interoperability Board will develop recommended
technical requirements to ensure nationwide interoperability, based on
the LTE standard.
http://www.ntia.doc.gov/category/firstnet
Source: FirstNet
17. Public Safety Requirements and Standards
Public safety imposes unique
requirements that cannot all
be satisfied with LTE
standards that are available
today. An example of such a
requirement is Mission
Critical Voice, which
includes Push to Talk (PTT),
off-network operation, and a
variety of related functions.
• As LTE standards continue to evolve, and organizations such as
FirstNet participate in the 3GPP standards processes to drive desired
capabilities, more of the public safety requirements can be satisfied
with products based on these standards.
e.g. certain
priority &
QoS feature
e.g. eMBMS
e.g. mission
critical
voice
Source: NPSTC
18. 3GPP public safety work items
Work Item
3GPP
Release
Work Item
Document
Study on Resilient E-UTRAN Operation
for Public Safety (FS_REOPS)
13 SP-130240
Proximity-based Services Specification
(ProSe)
12
SP-130030
RP-122009
Group Communication System Enablers
for LTE (GCSE_LTE)
12 SP-130326
Public Safety Broadband High Power
User Equipment for Band 14 for Region 2
11 RP-120362
Source: 3GPP
19. Proximity-based Services
Allow devices in close proximity to communicate directly
1. Reduce network load
2. Increase capacity in given bandwidth
3. Allow communication in areas without network coverage
Network
Cell
Site
Current LTE
Communication Path
Network
Cell
Site
Direct
Discovery &
Communication
Locally Routed UE Relay
Cell
Site
Network
Assisted
Discovery
20. Key Components for Public Safety
(B) Direct 1:many E-UTRA Communication out of coverage
(D) Direct 1:many E-UTRA Communication in E-UTRAN coverage
– NPSBN Users may be outside of the range of the fixed network, such as first responders
in a rural area assisting in a response to a plane crash or police officers inside a
residence responding to a domestic issue.
– Off-network voice communications must be immediately accessible to users in the
absence of the NPSBN.
(H) UE to NW Relay
(I) Service Continuity
(F) ProSe-assisted
WLAN Direct
(ext1) RAN
support
(ext2) SA3
specification
(D) Direct 1:many
E-UTRA Comm.,
in coverage
(C) Direct 1:1
E-UTRA Comm.,
in coverage
(E) ProSe Comm
Path via eNB
(A) Direct 1:1
E-UTRA Comm.,
out of coverage
(B) Direct 1:many
E-UTRA Comm.,
out of coverage
(G) UE to UE Relay
(H) UE to NW Relay
– We use this often to extend vehicle-
based coverage footprint to handheld
devices, e.g., to guarantee availability
when responding to life-critical
incidents within a building.
– Also key to public safety, we would like
this to be included in R12 if a solution
can be found that does not add too
much complexity to the rest of the work. Source: 3GPP & UK Home Office & US DoC
21. Group Communication System Enablers
• Enable efficient group communication
1. Dynamic groups with mobile users and
dispatchers
2. Support for floor control (e.g. push to talk)
3. Large groups (perhaps up to 5000)
4. Low latency to add users, obtain channels
• Group call application is separate
from the 3GPP system enablers
1. Application layer: group management, floor
control decisions, legacy interoperability
2. LTE layer: mobility, service continuity,
radio efficiency
3. Joint: performance, service interaction
Group Call
application
sever
Cell
Site
Dispatcher
Group Call Enabled
LTE Network
Group Members UE Relay
G.C. Network Application
3GPP LTE Network Layers
Network API
G.C. Network Application
3GPP LTE Network Layers
Network API
22. Essential core components for Release 12
(A) Group Management
– Any aspects of this required to
make core functionality work.
(B) Group Communications
(F) Service Continuity
– Service will not be usable without
this.
(H) Resource Efficiency
– Planned or unplanned major incidents may require group communications within a
very large group in a small geographic area - requires good radio resource
efficiency.
(E) User Interaction
– Some aspects only; related to performance, immediate updating of group
membership, all members receiving transmissions at the same time.
(A) Group Management
(B) Group Comm (TX,RX)
(H) Resource Efficiency (I) Roaming Scenarios
(J) High Availability
(C) Geographic Scope
(ext2) RAN
support
(ext3) SA3
specification
(ext1) SA2/
ProSe support
(F) Service Continuity
(G) UE to NW Relay
(D) Floor Control
(E) User Interaction
?
(K) Inter-
working
(L) UE-AS
Open
Interface
Source: 3GPP & UK Home Office & US DoC
23. Resilient E-UTRAN Operation
Isolated E-UTRAN can be formed following:
1. An Outage event within the infrastructure network
2. Deployment of Mobile Command Posts (MCPs)
• 1 or more eNB(s)
• Transport connection between eNBs
• Backhaul
• Local EPC functions at eNB
• Restoration of coverage for the
group of eNBs
• Security between UE and eNB
• Security between eNBs
• Offer similar services seen prior to
• Outage event
Isolated E-UTRAN
Outage in the
Infrastructure
Network
Mobile
Command
Post
24. Release 12 draft standards and schedule
WG Document Title Date
SA1 TR 22.803 Study on Proximity-based Services 2011/09~2013/01
SA1
TS 22.115
TS 22.278
Service aspects; Charging and billing
Service requirements for the Evolved Packet System (EPS)
2012/12~2013/06
SA2 TR 23.703 Study on architecture enhancements to support Proximity Services 2012/12~2013/09
SA3 TR 33.8xy Study on security issues to support Proximity Services 2013/03~2014/03
RAN1
RAN2
TR 36.843
Feasibility Study on LTE Device to Device Proximity Services -
Radio Aspects
2012/12~2014/03
SA1 TS 22.468 Group Communication System Enablers for LTE 2012/06~2013/12
SA2 TR 23.768
Study on architecture enhancements to support Group
Communication System Enablers for LTE
2013/02~2013/09
WG Document Title Date
SA1 TR 22.897 Study on Resilient E-UTRAN Operation for Public Safety 2013/07~2014/06
Release 13 draft standards and schedule
3GPP standards availability
Source: 3GPP
25. Legacy coexistence and migration strategies
• The legacy coexistence is for the LTE network to interwork
with P25/TETRA voice and low data-rate services. This
Source: Alcatel-Lucent & TCCA
interworking enables
interoperability and also
provides the necessary
migration path from
P25/TETRA with an
LTE overlay to a
mission-critical LTE
network running all
mission critical services.
TETRA,
TETRAPOL,
etc. PMR/LMR
networks
Non Mission
Critical data
(commercial
LTE)
Mission
Critical Data
(Private LTE)
Mission
Critical Voice
(Private LTE)
Single sign-on services (security) Communications
services - including PMR/LMR applications
Subscriber & group management, group calls, etc.
Cloud - based Applications including
Control Room Applications
1 2 3 4
TIME / STAGE
Mission Critical voice
services Until LTE
readiness & maturity
Upgrade Learn Build Migrate
Strategic: requires
spectrum for private LTE
Using commercial
3G/4G carriers
26. BB system introduction and coexistence
Source: Cassidian
More advanced configurations are also considered such as the presence
of Narrowband (NB) signals in the bandwidth of Broadband (BB)
signal. In this case, it is necessary to excise the BB spectrum, on the
channels where NB signals are present in order to limit the
interferences from BB to NB systems. In practice, this would mean to
shut down the LTE
Resource blocks (RBs)
on which NB signals
are present. Such
configuration could
increase importantly the
spectrum efficiency of
PMR systems mixing
NB and BB.
27. Conclusions
• Use cases for Proximity-based Service
– Public Safety vs Non Public Safety
– Communication type: Unicast, Groupcast, Broadcast, UE relay
• 3GPP has started work on public safety standards
– The Public Safety eco-system has pushed for standardization of
their requirements to start in 3GPP
– Meet market needs in an interoperable manner
– Technical participation in Release 12 is needed
• LTE based public safety networks
– Use common off the shelf technology
– Improve on existing capabilities with broadband and multimedia
• Legacy coexistence and migration strategies
– BB system introduction and coexistence
28. Reference
1. D2D standardization status in 3GPP (http://www.ict-ras.eu/index.php/meetings)
2. Evolution of 3GPP LTE-Advanced Standard toward 5G
(http://www.netmanias.com/bbs/view.php?id=cshareforum_mobile&no=364)
3. http://www.3gpp.org/Public-Safety
4. http://www.3gpp.org/Public-Safety-LTE-gains-momentum
5. Public safety LTE: A How-to Guide
(http://criticalcommunicationsworld.com/wp-content/uploads/tetra11/14691-
Alcatel-Lucent_How-to-guide_LTE-for-Public-Safety_Global_edition_EN.pdf)
6. http://gcn.com/Articles/2013/04/08/Why-LTE-is-the-next-generation-in-
wireless.aspx?Page=2
7. http://www.radioresourcemag.com/onlyonline.cfm?OnlyOnlineID=400
8. http://www.3gpp.org/TCCA-Joins-3GPP-for-critical-work