SlideShare a Scribd company logo
Device-to-Device Communications
for National Security and Public
Safety
Presented by: Guided by:
SHYAM A NAIR Mrs. D VIJAYALAKSHMI
1BI11EC102 ASSISTANT PROFESSOR
Dept. of ECE, BIT
Contents
 INTRODUCTION
 NATIONAL SECURITY AND PUBLIC SAFETY SCENARIOS AND REQUIREMENTS
 SOLUTION APPROACH BASED ON CLUSTERING AND D2D COMMUNICATIONS
 ALGORITHM DESCRIPTION
 BENEFITS OF D2D COMMUNICATIONS
 CONCLUSION
INTRODUCTION
 D2D comm is a peer to peer link which does not use the cellular network
infrastructure, but enables LTE based devices to communicate directly with
one another when they are in close proximity.
 D2D comm has been proposed as an underlay to LTE networks
 Key Requirement for NSPS to provide access to cellular services when
infrastructure is available and to support local services even if a subset or
all of the network nodes become dysfunctional due to public disaster or
emergency situations.
 Advantages of D2D comm include the proximity, reuse, and hop gains that
ultimately improve the spectral and energy efficiency of the system
 A common aspect of cellular-assisted and -controlled short-range
communications technologies, is that they rely on the availability and
involvement of the cellular infrastructure.
 Recognizing the importance of the public safety community and the need for
NSPS type of broadband services, the 3GPP has started to study the
scenarios, requirements, and technology enablers related to NSPS.
NATIONAL SECURITY AND PUBLIC SAFETY
SCENARIOS AND REQUIREMENTS
Requirements for NSPS communication are:
 Robustness- Ability to communicate irrespective of the presence or absence
of a fixed infrastructure
 Group Communication- Push-to-talk type of communication, typically not
supported in traditional cellular systems but highly desirable
 Data Rates- On par with mobile broadband
 Energy efficiency and Extended battery lifetime
Figure 1:-Examples of NSPS scenarios in which rescue personnel,
including officers with public safety UEs, must be able to
communicate in situations in which the cellular BS may provide only
partial network coverage.
Stand alone operation:
 Stand-alone D2D communication refers to the case when network coverage
is not available or the BS cannot establish a connection under its coverage
area
 The 3GPP is currently considering the requirements and roles of public safety
user equipments (PS UEs) in various NSPS scenarios
 Stand-alone operation is clearly required for situations without network
coverage, but in situations in which there is (partial) network coverage, the
network can provide assistance in order to increase the overall performance
FIGURE 2:- A key requirement for NSPS and PPDR systems is to cope
with dynamic transitions between situations in which network
coverage is available (left) and in which network coverage is not
available (right).
SOLUTION APPROACH BASED ON
CLUSTERING AND D2D COMMUNICATIONS
THE CONCEPT OF CLUSTERING
NSPS solution be based on network-assisted underlay D2D communication
solutions in such a way that, in the absence of network coverage, PS UEs take
over some of the functionality of the network.
The following UE roles are introduced:
 Cluster Head(CH)
 Synchronization Source(SS)
 Radio Resource Management (RRM) Information Source (IS)
 Slave
FIGURE 3. Examples of the cluster head, synchronization source, and
radio resource management information source entities in a
geographical area with partial cellular network coverage ((a) and
(b)) or without network coverage (c).
SYNCHRONIZATION AND RADIO RESOURCE
MANAGEMENT
 All UEs within the same cell have the same time reference, although this may
not hold for UEs in different cells.
 With clear similarity to cellular LTE, NSPS-enabled UEs must be able to search
for clusters in their proximity and eventually synchronize to the most suitable
one.
 CHs broadcast synchronization signals similarly to how LTE BSs transmit
signals.
 Naturally, whenever a cellular network is detected, the UE associates with it
with higher priority than with clusters.
 When both the transmitter and receiver are associated with the same cell or
cluster, they are immediately able to communicate synchronously.
 A less trivial scenario occurs when the receivers are not in coverage of the
same cell or cluster of the transmitter.
 In such cases, the transmitter may temporarily take the CH role, limited to
the duration of the data transmission and to the interested receivers, and
provide local synchronization to its receivers.
CLUSTER HEAD ELECTION
Some examples of when CH-capable UEs may start acting as CHs include:
 A PS UE that is out of BS and CH coverage
 A PS UE that senses that another UE is out of coverage and needs a CH to
which it can connect
 A PSUE that moves out of the coverage of a BS and CHs and elects itself as CH
FIGURE 4. Performance metrics of interest in cluster based
communications: percentage of UEs out of CH coverage (top),
the time needed for organizing clusters (bottom).
ALGORITHM DESCRIPTION
Clustering procedure consists of two phases: CH selection and cluster formation
(grouping).
 PHASE 1-CH SELECTION
 During this phase, each PSUE continuously broadcasts beacons containing its
identifier and its predefined capability metric using a single PDR.
 The capability metric is precomputed using a weighting function that combines
the device capabilities such as maximum transmit power, battery level, and
availability of network coverage.
 Every device, when receiving and successfully decoding a beacon, stores the
identifier of the sender and the corresponding metric.
 The devices having the highest metrics identify themselves as CHs, while the
remaining PSUEs with lower metrics identify themselves as slaves.
 PHASE 2-CLUSTER FORMATION (GROUPING)- Each non-CH device selects the
appropriate CH and associates with it
 CH-Driven: Only CHs continue broadcasting beacons. Has the advantage of
reducing the number of active devices reducing the collision probability.
 Hybrid: Every PSUE broadcasts beacons. UEs that receive these beacons select the
strongest PSUE and sends a notification. Upon receiving such a notification signal, a
PS UE that is not selected as CH in Phase1 becomes a CH. Supports cluster
reconfigurations by reselecting CHs, which increases the probability of a device
being covered by a cluster.
BENEFITS OF D2D COMMUNICATIONS
 Data rates: Devices may be remote from cellular infrastructure and may
therefore not be able to support high data rate transmission that may be
required.
 Reliable communications: LTE Device to Device can be sued to Devices
communicate locally with each other to provide high reliable
communications.
 Instant communications: As the D2D communications does not rely on the
network infrastructure the devices could be used for instant communications.
 Use of licensed spectrum: Unlike other device to device systems, LTE uses
licensed spectrum and this enables the frequencies used to be less subject to
interference.
 Interference reduction: By not having to communicate directly with a base
station, fewer links are required reducing the overall level of interference.
 Power saving : If two devices in close proximity communicate then lower
transmission power levels are required.
CONCLUSION
 There is a growing interest in providing broadband telecommunication
services in national security and public safety situations.
 A key aspect for LTE-based NSPS is to take advantage of the fixed
infrastructure when available in order to further enhance the performance.
 The proposed concept extends situations in which the cellular coverage is
partially or completely missing.
 The interplay between the cellular elements, radio resource management, as
well as quality of service, mobility, and security aspects in evolving require
further research.
MY PPt

More Related Content

What's hot

D2D - Device to Device Communication
D2D - Device to Device CommunicationD2D - Device to Device Communication
D2D - Device to Device Communication
Francisco Bento da Silva Neto
 
Device to device communication
Device to device communicationDevice to device communication
Device to device communication
mohammad dabibi
 
Device to Device communication
Device to Device communicationDevice to Device communication
Device to Device communication
Sharu Sparky
 
Seminar report
Seminar reportSeminar report
Seminar report
Koshy Geoji
 
Comm-seminar
Comm-seminarComm-seminar
Comm-seminar
Ahmed Hilal
 
3 4 b4-g_workshop_d2d_based_comm_v2
3 4 b4-g_workshop_d2d_based_comm_v23 4 b4-g_workshop_d2d_based_comm_v2
3 4 b4-g_workshop_d2d_based_comm_v2
ssk
 
D2D Communication Research Project Help
D2D Communication  Research Project HelpD2D Communication  Research Project Help
D2D Communication Research Project Help
Network Simulation Tools
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
vicent123
 
Handover for 5G Networks using Fuzzy Logic: A Review
Handover for 5G Networks using Fuzzy Logic: A ReviewHandover for 5G Networks using Fuzzy Logic: A Review
Handover for 5G Networks using Fuzzy Logic: A Review
AI Publications
 
Future tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based serviceFuture tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based service
Yi-Hsueh Tsai
 
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless NetworksMulti-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
iosrjce
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
Salahuddin Jokhio
 
Introduction to MANETs
Introduction to MANETsIntroduction to MANETs
Introduction to MANETs
Pradeep Kumar TS
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
Vivek Maurya
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
RMK ENGINEERING COLLEGE, CHENNAI
 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
IJAEMSJORNAL
 
Text compression
Text compressionText compression
Text compression
krishnagd22
 
AD-HOC NETWORK
AD-HOC NETWORKAD-HOC NETWORK
AD-HOC NETWORK
Harin Veera
 
Lecture 3 4. prnet
Lecture 3 4. prnetLecture 3 4. prnet
Lecture 3 4. prnet
Chandra Meena
 
29 88-96
29 88-9629 88-96
29 88-96
idescitation
 

What's hot (20)

D2D - Device to Device Communication
D2D - Device to Device CommunicationD2D - Device to Device Communication
D2D - Device to Device Communication
 
Device to device communication
Device to device communicationDevice to device communication
Device to device communication
 
Device to Device communication
Device to Device communicationDevice to Device communication
Device to Device communication
 
Seminar report
Seminar reportSeminar report
Seminar report
 
Comm-seminar
Comm-seminarComm-seminar
Comm-seminar
 
3 4 b4-g_workshop_d2d_based_comm_v2
3 4 b4-g_workshop_d2d_based_comm_v23 4 b4-g_workshop_d2d_based_comm_v2
3 4 b4-g_workshop_d2d_based_comm_v2
 
D2D Communication Research Project Help
D2D Communication  Research Project HelpD2D Communication  Research Project Help
D2D Communication Research Project Help
 
Manet ns2
Manet ns2Manet ns2
Manet ns2
 
Handover for 5G Networks using Fuzzy Logic: A Review
Handover for 5G Networks using Fuzzy Logic: A ReviewHandover for 5G Networks using Fuzzy Logic: A Review
Handover for 5G Networks using Fuzzy Logic: A Review
 
Future tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based serviceFuture tech trend for public safety proximity-based service
Future tech trend for public safety proximity-based service
 
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless NetworksMulti-Criteria Handoff Decision Algorithms In Wireless Networks
Multi-Criteria Handoff Decision Algorithms In Wireless Networks
 
Wireless communication & adhoc networks
Wireless communication & adhoc networksWireless communication & adhoc networks
Wireless communication & adhoc networks
 
Introduction to MANETs
Introduction to MANETsIntroduction to MANETs
Introduction to MANETs
 
Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)Adhoc networks notes by divya (rnsit)
Adhoc networks notes by divya (rnsit)
 
It6601 mobile computing unit 4
It6601 mobile computing unit 4It6601 mobile computing unit 4
It6601 mobile computing unit 4
 
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future NetworksFuzzy Based Vertical Handoff Decision Controller for Future Networks
Fuzzy Based Vertical Handoff Decision Controller for Future Networks
 
Text compression
Text compressionText compression
Text compression
 
AD-HOC NETWORK
AD-HOC NETWORKAD-HOC NETWORK
AD-HOC NETWORK
 
Lecture 3 4. prnet
Lecture 3 4. prnetLecture 3 4. prnet
Lecture 3 4. prnet
 
29 88-96
29 88-9629 88-96
29 88-96
 

Similar to MY PPt

A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
cscpconf
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
IOSR Journals
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
inventionjournals
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
IJCNCJournal
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
IDES Editor
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
ijsrd.com
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
ijassn
 
Cellular systems and infrastructure base wireless network
Cellular systems and infrastructure base wireless networkCellular systems and infrastructure base wireless network
Cellular systems and infrastructure base wireless network
University of Science & Technology, Beijing
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
nanocdac
 
B05630814
B05630814B05630814
B05630814
IOSR-JEN
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
ijsrd.com
 
H010524049
H010524049H010524049
H010524049
IOSR Journals
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
ijsrd.com
 
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSA RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
IAEME Publication
 
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSA RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
IAEME Publication
 
Ijcnc050209
Ijcnc050209Ijcnc050209
Ijcnc050209
IJCNCJournal
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
KGunasekaran1
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
IOSR Journals
 
1410
14101410
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
ijdpsjournal
 

Similar to MY PPt (20)

A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc NetworksA Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
A Review on - Comparative Study of Issues in Cellular, Sensor and Adhoc Networks
 
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi  Hop TransmissionEnergy Minimization in Wireless Sensor Networks Using Multi  Hop Transmission
Energy Minimization in Wireless Sensor Networks Using Multi Hop Transmission
 
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
A Comprehensive Study on Vehicular Ad-Hoc Delay Tolerant Networking for Infra...
 
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
A Cooperative Approach to Extend Cellular Coverage via D2D Architecture based...
 
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor NetworksSpread Spectrum Based Energy Efficient Wireless Sensor Networks
Spread Spectrum Based Energy Efficient Wireless Sensor Networks
 
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
Energy Efficient LEACH protocol for Wireless Sensor Network (I-LEACH)
 
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor NetworkA QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
A QoI Based Energy Efficient Clustering for Dense Wireless Sensor Network
 
Cellular systems and infrastructure base wireless network
Cellular systems and infrastructure base wireless networkCellular systems and infrastructure base wireless network
Cellular systems and infrastructure base wireless network
 
WIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKSWIRELESS SENSOR NETWORKS
WIRELESS SENSOR NETWORKS
 
B05630814
B05630814B05630814
B05630814
 
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACHBased on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
Based on Heterogeneity and Electing Probability of Nodes Improvement in LEACH
 
H010524049
H010524049H010524049
H010524049
 
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor NetworkAggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
AggreLEACH: Enhance Privacy Preserving in Wireless Sensor Network
 
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSA RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
 
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETSA RELATIVE STUDY ON CELLULAR, WSN AND MANETS
A RELATIVE STUDY ON CELLULAR, WSN AND MANETS
 
Ijcnc050209
Ijcnc050209Ijcnc050209
Ijcnc050209
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
1410
14101410
1410
 
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
REDUCING HANDOVER DELAY BY PRESELECTIVE SCANNING USING GPS
 

MY PPt

  • 1. Device-to-Device Communications for National Security and Public Safety Presented by: Guided by: SHYAM A NAIR Mrs. D VIJAYALAKSHMI 1BI11EC102 ASSISTANT PROFESSOR Dept. of ECE, BIT
  • 2. Contents  INTRODUCTION  NATIONAL SECURITY AND PUBLIC SAFETY SCENARIOS AND REQUIREMENTS  SOLUTION APPROACH BASED ON CLUSTERING AND D2D COMMUNICATIONS  ALGORITHM DESCRIPTION  BENEFITS OF D2D COMMUNICATIONS  CONCLUSION
  • 3. INTRODUCTION  D2D comm is a peer to peer link which does not use the cellular network infrastructure, but enables LTE based devices to communicate directly with one another when they are in close proximity.  D2D comm has been proposed as an underlay to LTE networks  Key Requirement for NSPS to provide access to cellular services when infrastructure is available and to support local services even if a subset or all of the network nodes become dysfunctional due to public disaster or emergency situations.
  • 4.  Advantages of D2D comm include the proximity, reuse, and hop gains that ultimately improve the spectral and energy efficiency of the system  A common aspect of cellular-assisted and -controlled short-range communications technologies, is that they rely on the availability and involvement of the cellular infrastructure.  Recognizing the importance of the public safety community and the need for NSPS type of broadband services, the 3GPP has started to study the scenarios, requirements, and technology enablers related to NSPS.
  • 5. NATIONAL SECURITY AND PUBLIC SAFETY SCENARIOS AND REQUIREMENTS Requirements for NSPS communication are:  Robustness- Ability to communicate irrespective of the presence or absence of a fixed infrastructure  Group Communication- Push-to-talk type of communication, typically not supported in traditional cellular systems but highly desirable  Data Rates- On par with mobile broadband  Energy efficiency and Extended battery lifetime
  • 6. Figure 1:-Examples of NSPS scenarios in which rescue personnel, including officers with public safety UEs, must be able to communicate in situations in which the cellular BS may provide only partial network coverage.
  • 7. Stand alone operation:  Stand-alone D2D communication refers to the case when network coverage is not available or the BS cannot establish a connection under its coverage area  The 3GPP is currently considering the requirements and roles of public safety user equipments (PS UEs) in various NSPS scenarios  Stand-alone operation is clearly required for situations without network coverage, but in situations in which there is (partial) network coverage, the network can provide assistance in order to increase the overall performance
  • 8. FIGURE 2:- A key requirement for NSPS and PPDR systems is to cope with dynamic transitions between situations in which network coverage is available (left) and in which network coverage is not available (right).
  • 9. SOLUTION APPROACH BASED ON CLUSTERING AND D2D COMMUNICATIONS
  • 10. THE CONCEPT OF CLUSTERING NSPS solution be based on network-assisted underlay D2D communication solutions in such a way that, in the absence of network coverage, PS UEs take over some of the functionality of the network. The following UE roles are introduced:  Cluster Head(CH)  Synchronization Source(SS)  Radio Resource Management (RRM) Information Source (IS)  Slave
  • 11. FIGURE 3. Examples of the cluster head, synchronization source, and radio resource management information source entities in a geographical area with partial cellular network coverage ((a) and (b)) or without network coverage (c).
  • 12. SYNCHRONIZATION AND RADIO RESOURCE MANAGEMENT  All UEs within the same cell have the same time reference, although this may not hold for UEs in different cells.  With clear similarity to cellular LTE, NSPS-enabled UEs must be able to search for clusters in their proximity and eventually synchronize to the most suitable one.  CHs broadcast synchronization signals similarly to how LTE BSs transmit signals.  Naturally, whenever a cellular network is detected, the UE associates with it with higher priority than with clusters.
  • 13.  When both the transmitter and receiver are associated with the same cell or cluster, they are immediately able to communicate synchronously.  A less trivial scenario occurs when the receivers are not in coverage of the same cell or cluster of the transmitter.  In such cases, the transmitter may temporarily take the CH role, limited to the duration of the data transmission and to the interested receivers, and provide local synchronization to its receivers.
  • 14. CLUSTER HEAD ELECTION Some examples of when CH-capable UEs may start acting as CHs include:  A PS UE that is out of BS and CH coverage  A PS UE that senses that another UE is out of coverage and needs a CH to which it can connect  A PSUE that moves out of the coverage of a BS and CHs and elects itself as CH
  • 15. FIGURE 4. Performance metrics of interest in cluster based communications: percentage of UEs out of CH coverage (top), the time needed for organizing clusters (bottom).
  • 16. ALGORITHM DESCRIPTION Clustering procedure consists of two phases: CH selection and cluster formation (grouping).  PHASE 1-CH SELECTION  During this phase, each PSUE continuously broadcasts beacons containing its identifier and its predefined capability metric using a single PDR.  The capability metric is precomputed using a weighting function that combines the device capabilities such as maximum transmit power, battery level, and availability of network coverage.  Every device, when receiving and successfully decoding a beacon, stores the identifier of the sender and the corresponding metric.  The devices having the highest metrics identify themselves as CHs, while the remaining PSUEs with lower metrics identify themselves as slaves.
  • 17.  PHASE 2-CLUSTER FORMATION (GROUPING)- Each non-CH device selects the appropriate CH and associates with it  CH-Driven: Only CHs continue broadcasting beacons. Has the advantage of reducing the number of active devices reducing the collision probability.  Hybrid: Every PSUE broadcasts beacons. UEs that receive these beacons select the strongest PSUE and sends a notification. Upon receiving such a notification signal, a PS UE that is not selected as CH in Phase1 becomes a CH. Supports cluster reconfigurations by reselecting CHs, which increases the probability of a device being covered by a cluster.
  • 18. BENEFITS OF D2D COMMUNICATIONS  Data rates: Devices may be remote from cellular infrastructure and may therefore not be able to support high data rate transmission that may be required.  Reliable communications: LTE Device to Device can be sued to Devices communicate locally with each other to provide high reliable communications.  Instant communications: As the D2D communications does not rely on the network infrastructure the devices could be used for instant communications.  Use of licensed spectrum: Unlike other device to device systems, LTE uses licensed spectrum and this enables the frequencies used to be less subject to interference.  Interference reduction: By not having to communicate directly with a base station, fewer links are required reducing the overall level of interference.  Power saving : If two devices in close proximity communicate then lower transmission power levels are required.
  • 19. CONCLUSION  There is a growing interest in providing broadband telecommunication services in national security and public safety situations.  A key aspect for LTE-based NSPS is to take advantage of the fixed infrastructure when available in order to further enhance the performance.  The proposed concept extends situations in which the cellular coverage is partially or completely missing.  The interplay between the cellular elements, radio resource management, as well as quality of service, mobility, and security aspects in evolving require further research.