SlideShare uma empresa Scribd logo
1 de 23
Baixar para ler offline
A survey on Device-to-Device
Communication
Kuldeep Narayan Singh
30-Jan-15 1A survey on Device-to-Device Communication
Table of Content
• Background and Introduction..
• Classification and Promises of D2D
• D2D Vs Ad-hoc
• Challenges
• Applications
• Conclusion
30-Jan-15 2A survey on Device-to-Device Communication
1. Background and Introduction
Key Challenges
• global mobile data traffic increased (81% in 2013)[1]
• Increase in mobile data traffic 2 times/year[1]
• 1000x by 2020 and 100,000x by 2030[1]
• Current infrastructure unable to handle this huge traffic[1]
Figure 1: growth in mobile data traffic
(in EB/month)[1]
Figure 2: Future key challenges[2]
30-Jan-15 3A survey on Device-to-Device Communication
1. Background and Introduction
Affects of increase in mobile data traffic
• User QoS decreases[2]
• User experiences network congestion
• Cost Increases[2]
• CAPEX Increases
• OPEX Increases
• Revenue Decoupling
Figure 3: Data-Revenue-vs.-Cost-Decouple-graph[3]
30-Jan-15 4A survey on Device-to-Device Communication
1. Background and Introduction
Technologies Introduced for NW performance enhancement
Figure 7: Device to Device
Comm.[2]
Figure 5: Adv. Small Cells[2]
Figure 6: Interference
Management[2]
Figure 4: Adv. MIMO/BF[2]
30-Jan-15 5A survey on Device-to-Device Communication
1. Background and Introduction
Device-to-Device Communication
• Direct Communication without Base Station
• Key Motivation
• Offload Core Network Traffic
• New Comm. Paradigm to Support Public Safety
Figure 8: Conventional network and offloaded network(with D2D)[2]
30-Jan-15 6A survey on Device-to-Device Communication
2. Classification and Promises of D2D
Classification of D2D Technology[5]
1. Inband D2D
• Operates in cellular band
1.1 Network Assisted D2D 1.2 No Network Assisted D2D
Figure 9: D2D with network
assisted in licensed band[5]
Figure 10: D2D without network
assisted in licensed band[5]
Network Assisted
• N/W providers have control over D2D.
• Most recommended scenario in D2D
• Could reduce energy consumption and
better cellular resource management
No Network Assisted
• N/W providers have limited or no control
• Comm. Without network deployment
• Similar work as Terrestrial Trunked
Radio(TETRA)
•Useful in national security and public safety
30-Jan-15 7A survey on Device-to-Device Communication
2. Classification and Promises of D2D
Classification of D2D Technology[7]
1. Network Assisted D2D
1.1.a Underlay 1.2.b Overlay
Figure 11: Schematic Representation of overlay and underlay Inband D2D[5]
Underlay
• Increase spectral efficiency by
utilizing Spatial Diversity
• Many algorithms have been
proposed. [7] Use uplink for D2D. [8]
Use mode selection.
Overlay
• A dedicated resource for D2D
• Reduces the concern of interference
• More focus on resource allocation to
avoid wastage of resource
30-Jan-15 8A survey on Device-to-Device Communication
2. Classification and Promises of D2D
Classification of D2D Technology[5]
Inband D2D Advantages and Disadvantages
Advantages:
• QoS Guaranteed.
• Transmission Distance~ 1KM, Max Data Rate: 1Gbps
• No need of new interface.
Disadvantage:
• Challenge to handle D2D and Cellular interference.
• Complex algorithm for resource allocation
30-Jan-15 9A survey on Device-to-Device Communication
2. Classification and Promises of D2D
Classification of D2D Technology[5]
2. Outband D2D
•.Operates in ISM(Licensed Free Band)
• Could be
• Network Controlled
• Autonomous
Figure 11: D2D without network
assisted in licensed band [2]
Figure 12: Schematic representation
of out of band D2D[6]
30-Jan-15 10A survey on Device-to-Device Communication
2. Classification and Promises of D2D
Classification of D2D Technology
Advantages and Disadvantages of Out Band D2D[7]
Advantages:
• No interference issue b/w cellular and D2D
• No need of recourse allocation.
• simultaneous D2D and cellular communication
Disadvantages:[7]
• Unlicensed band interference uncontrollable
• Two interfaces required
• Not power efficient, Low Tx. Distance and Data Rate.
30-Jan-15 11A survey on Device-to-Device Communication
2. Classification and Promises of D2D
Promises of Device-to-Device Communication[2]
1. Proximity services
• High Data Rate and Low delays
• low energy consumption
2. Increase spectrum efficiency
• D2D and cellular on same spectrum
3. Extend Cellular Coverage
4. Quality of Service Guaranteed
5. Economical
• Uses the pre-existing cellular infrastructure
6. Public Safety and National Security
• Replace the old TETRA technology with improved LTE-A D2D
technology
30-Jan-15 12A survey on Device-to-Device Communication
3. D2D Vs Other Technologies
Issues with Ad-hoc technologies[4]
1. Security
• Much less than cellular system.
• Not suitable for Public Safety Application.
2. Unlicensed Spectrum
• No central control of interference.
3. Not suitable for high user density
• Throughput, Reliability and Range Suffer
4. Manual Pairing
• Not Suitable for Autonomous, Dynamic Proximity Services
5. Less Power Efficient
• Runs parallel with cellular More battery drain
30-Jan-15 13A survey on Device-to-Device Communication
3. D2D Vs Ad-hoc
Difference to Ad-hoc
Parameters D2D Ad-hoc
(Wi-Fi, Bluetooth etc)
Frequency band Licensed band LTE-A ISM band
Max. Transmission
Dist.
1000m 10-200m
Max. Data Rate 1Gbps 24-250 Mbps
Security Robust less; Not suitable for
Public safety
Expenses CAPEX: No cost as
user using the same
terminal
OPEX: Very less in
terms of battery use
CAPEX: No cost as
user using the same
terminal
OPEX: Very less in
terms of battery use
30-Jan-15 14A survey on Device-to-Device Communication
4. Challenges
Major Technical in D2D[5]
1. Interference Management – especially in the case of underlay D2D
2. Power Allocation – Proper regulation needed to avoid interference
3. Resource Allocation – Critical issue in Inband D2D
4. Optimal Peer Discovery Methods
Centralized or Distributed
4. Modulation Format
• OFDM or SC-FDMA?
5. Channel Management
6. Energy Consumption
30-Jan-15 15A survey on Device-to-Device Communication
4. Challenges
Major Business Challenges in D2D[5]
1. D2D between devices subscribed to different operators
– Which spectrum to use (for direct communication)?
2. Lawful interception
– How to monitor direct communication?
3. Charging
– How to perform (content-based) charging?
– How to charge if D2D communication is supported w/o NW
coverage?
4. Privacy, Security, Authentication etc…
30-Jan-15 16A survey on Device-to-Device Communication
4. Applications
Application and Use cases of D2D [4]
1.Local voice traffic
• Offload voice traffic from BS
• Example: In conferences exchange
voice traffic without BS
2.Local Data Services
• Content sharing
• Streaming services
• Mobile Multiplayer gaming
Figure: Offloading voice traffic in different
scenario[4]
Figure: Local data sharing D2D[4]
30-Jan-15 17A survey on Device-to-Device Communication
4. Applications
Application and Use cases of D2D [5]
3.Multiuser Cooperative Comm.(MUCC)
• The user in good coverage may help
(Benefited user )BU to improve its signal
and act as a supporting user (SU)
4. Vehicle to Vehicle communication
• Requires very low latency
• Provides information about the nearest
car in front including traffic.
Figure: D2D in Multiuser cooperative
communication(MUCC)[4]
Figure: D2D in V2V scenario[4]
30-Jan-15 18A survey on Device-to-Device Communication
4. Applications
Application and Use cases of D2D [5]
5. Public safety (police, fire and ambulance services)
• Still uses old Technologies like TETRA
• Key Motivation: Move public safety to a new level(LTE)
30-Jan-15 19A survey on Device-to-Device Communication
Figure: Public safety scenario in D2D[3]
5. Conclusion
30-Jan-15 20A survey on Device-to-Device Communication
• Provided survey on D2D based on available literature.
• Types of D2D Communication[2]
• Inband (Underlay, Overlay)
• Outband (Controlled, Autonomous )
•Discussed Major Technical and Business Issues.
•Interference control, Resource management, Pricing etc.
• Applications
•Public Safely, Offloading etc.
•Survey shows D2D is still immature.[1]
•Still numerous open challenges.
References
[1] http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-
networking-index-vni/white_paper_c11-520862.html
[2] Smart Direct LTE Communication Shahid Mumtaz.
[3] http://wirelesshabitat.eu/archives/104
[4] http://www.slideshare.net/fransiscobento1/d2d-device-to-device-
communication?next_slideshow=1
[5] A Survey on Device-to-Device Communication in Cellular Networks Arash
Asadi, Student Member, IEEE, Qing Wang, Student Member, IEEE, and
Vincenzo Mancuso, Member, IEEE
[6] A Survey on Device-to-Device Communication in Cellular Networks: Arash
Asadi, Student Member, IEEE, Qing Wang, Student Member, IEEE, and
Vincenzo Mancuso, Member, IEEE
[7] B. Kaufman and B. Aazhang, “Cellular networks with an overlaid device to
device network,” in Proceedings of Asilomar Conference on Signals, Systems
and Computers, 2008, pp. 1537–1541.
30-Jan-15 21A survey on Device-to-Device Communication
3. D2D Vs M2M
Difference to M2M
M2M (Machine to Machine) / MTC (Machine Type Com.) (3GPP TR 22.368) Definition: M2M/MT
Communication is a form of data communication between entities that do not necessarily
need human interaction.
30-Jan-15 22A survey on Device-to-Device Communication
D2D M2M
Describes connectivity
services
Defines a class of
devices & is application
oriented
Main target Discovery and local
communication
Data exchange between
machines / infrastructure
Type of device Not defined (arbitrary) Machine
Number of devices Typically two or a few Typically many
Location Proximity Not defined (arbitrary)
Communication Between devices (D2D) Typically many to one (N
terminals to 1 server;
machine to infrastructure)
Potential Future Work
• Theoretical Work
– mathematical tools and optimization techniques - very limited
• Architecture
– very little work explaining the required architecture in order to
support D2D communications in cellular networks[5]
• Application
– First introduced for relay now have lots of applications: P2P,
Multicasting, Cellular Offloading etc.
– Could have more application especially in social networking,
location-aware services
• Performance analysis
– Studies are still far from reality
30-Jan-15 A survey on Device-to-Device Communication 23

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Wireless Channels Capacity
Wireless Channels CapacityWireless Channels Capacity
Wireless Channels Capacity
 
Small scale fading
Small scale fadingSmall scale fading
Small scale fading
 
Ofdma Basics
Ofdma BasicsOfdma Basics
Ofdma Basics
 
Multi Carrier Modulation OFDM & FBMC
Multi Carrier Modulation OFDM & FBMCMulti Carrier Modulation OFDM & FBMC
Multi Carrier Modulation OFDM & FBMC
 
Chap 5 (small scale fading)
Chap 5 (small scale fading)Chap 5 (small scale fading)
Chap 5 (small scale fading)
 
LTE ADVANCED PPT
LTE ADVANCED PPTLTE ADVANCED PPT
LTE ADVANCED PPT
 
5G Interview Questions: 50 Questions on Spectrum
5G Interview Questions: 50 Questions on Spectrum5G Interview Questions: 50 Questions on Spectrum
5G Interview Questions: 50 Questions on Spectrum
 
Handoff
HandoffHandoff
Handoff
 
Introduction to 3G technology
Introduction to 3G technologyIntroduction to 3G technology
Introduction to 3G technology
 
Dect
DectDect
Dect
 
Lte Presentation.Ppt
Lte Presentation.PptLte Presentation.Ppt
Lte Presentation.Ppt
 
Introduction To Cellular Networks
Introduction To Cellular NetworksIntroduction To Cellular Networks
Introduction To Cellular Networks
 
Lte(long term evolution) 4G LTE
Lte(long term evolution) 4G LTELte(long term evolution) 4G LTE
Lte(long term evolution) 4G LTE
 
Outdoor propagatiom model
Outdoor propagatiom modelOutdoor propagatiom model
Outdoor propagatiom model
 
6 g tecnology
6 g tecnology6 g tecnology
6 g tecnology
 
MIMO in 15 minutes
MIMO in 15 minutesMIMO in 15 minutes
MIMO in 15 minutes
 
3G Technology
3G Technology 3G Technology
3G Technology
 
4 g LTE, LTE Advance
4 g LTE, LTE Advance 4 g LTE, LTE Advance
4 g LTE, LTE Advance
 
LTE Architecture
LTE ArchitectureLTE Architecture
LTE Architecture
 
Propagation Models
Propagation ModelsPropagation Models
Propagation Models
 

Destaque

Enable device to-device communications underlaying networks
Enable device to-device communications underlaying networksEnable device to-device communications underlaying networks
Enable device to-device communications underlaying networksMansour Naslcheraghi
 
An overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standardAn overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standardssk
 
Enabling D2D communication in mmWave 5G networks
Enabling D2D communication in mmWave 5G networks Enabling D2D communication in mmWave 5G networks
Enabling D2D communication in mmWave 5G networks Bayar shahab
 
Wifi direct technology a technical report
Wifi direct technology   a technical reportWifi direct technology   a technical report
Wifi direct technology a technical reportAngelos Alevizopoulos
 
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKS
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSDEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKS
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSijwmn
 
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...IJCNCJournal
 
Device to Device Communication in Cellular Networks
Device to Device Communication in Cellular NetworksDevice to Device Communication in Cellular Networks
Device to Device Communication in Cellular Networksaroosa khan
 
DCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2DDCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2Drudndccn
 
5G - A New Era Of Communication
5G - A New Era Of Communication5G - A New Era Of Communication
5G - A New Era Of CommunicationSachin Tripathi
 
Modelling D2D Communications in Cellular Access Networks via Coupled Processors
Modelling D2D Communications in Cellular Access Networks via Coupled ProcessorsModelling D2D Communications in Cellular Access Networks via Coupled Processors
Modelling D2D Communications in Cellular Access Networks via Coupled ProcessorsInstitute of Information Systems (HES-SO)
 
Our porfolio in educational technology2
Our porfolio in educational technology2Our porfolio in educational technology2
Our porfolio in educational technology2Salido Noel
 
5G the Future of next Generation of communication
5G the Future of next Generation of communication5G the Future of next Generation of communication
5G the Future of next Generation of communicationKarthik U
 
5G Communication (Full Video: https://www.youtube.com/watch?v=ICE2BGbQ_14)
5G Communication (Full Video: https://www.youtube.com/watch?v=ICE2BGbQ_14)5G Communication (Full Video: https://www.youtube.com/watch?v=ICE2BGbQ_14)
5G Communication (Full Video: https://www.youtube.com/watch?v=ICE2BGbQ_14)T. E. BOGALE
 
Transceiver design for single-cell and multi-cell downlink multiuser MIMO sys...
Transceiver design for single-cell and multi-cell downlink multiuser MIMO sys...Transceiver design for single-cell and multi-cell downlink multiuser MIMO sys...
Transceiver design for single-cell and multi-cell downlink multiuser MIMO sys...T. E. BOGALE
 

Destaque (18)

Enable device to-device communications underlaying networks
Enable device to-device communications underlaying networksEnable device to-device communications underlaying networks
Enable device to-device communications underlaying networks
 
An overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standardAn overview of D2D in 3GPP LTE standard
An overview of D2D in 3GPP LTE standard
 
Enabling D2D communication in mmWave 5G networks
Enabling D2D communication in mmWave 5G networks Enabling D2D communication in mmWave 5G networks
Enabling D2D communication in mmWave 5G networks
 
MY PPt
MY PPtMY PPt
MY PPt
 
Wifi direct technology a technical report
Wifi direct technology   a technical reportWifi direct technology   a technical report
Wifi direct technology a technical report
 
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKS
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKSDEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKS
DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKS
 
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
GAME THEORY BASED INTERFERENCE CONTROL AND POWER CONTROL FOR D2D COMMUNICATIO...
 
Device to Device Communication in Cellular Networks
Device to Device Communication in Cellular NetworksDevice to Device Communication in Cellular Networks
Device to Device Communication in Cellular Networks
 
DCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2DDCCN 2016 - Tutorial 3 - QoS for D2D
DCCN 2016 - Tutorial 3 - QoS for D2D
 
5G - A New Era Of Communication
5G - A New Era Of Communication5G - A New Era Of Communication
5G - A New Era Of Communication
 
Modelling D2D Communications in Cellular Access Networks via Coupled Processors
Modelling D2D Communications in Cellular Access Networks via Coupled ProcessorsModelling D2D Communications in Cellular Access Networks via Coupled Processors
Modelling D2D Communications in Cellular Access Networks via Coupled Processors
 
Our porfolio in educational technology2
Our porfolio in educational technology2Our porfolio in educational technology2
Our porfolio in educational technology2
 
Small cell for 5 g
Small cell for 5 gSmall cell for 5 g
Small cell for 5 g
 
Comm-seminar
Comm-seminarComm-seminar
Comm-seminar
 
5G the Future of next Generation of communication
5G the Future of next Generation of communication5G the Future of next Generation of communication
5G the Future of next Generation of communication
 
Seminar report
Seminar reportSeminar report
Seminar report
 
5G Communication (Full Video: https://www.youtube.com/watch?v=ICE2BGbQ_14)
5G Communication (Full Video: https://www.youtube.com/watch?v=ICE2BGbQ_14)5G Communication (Full Video: https://www.youtube.com/watch?v=ICE2BGbQ_14)
5G Communication (Full Video: https://www.youtube.com/watch?v=ICE2BGbQ_14)
 
Transceiver design for single-cell and multi-cell downlink multiuser MIMO sys...
Transceiver design for single-cell and multi-cell downlink multiuser MIMO sys...Transceiver design for single-cell and multi-cell downlink multiuser MIMO sys...
Transceiver design for single-cell and multi-cell downlink multiuser MIMO sys...
 

Semelhante a A survey on Device-to-Device Communication

IRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud ComputingIRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud ComputingIRJET Journal
 
D2D communication for spectral efficiency improvement and interference reduct...
D2D communication for spectral efficiency improvement and interference reduct...D2D communication for spectral efficiency improvement and interference reduct...
D2D communication for spectral efficiency improvement and interference reduct...journalBEEI
 
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...IRJET Journal
 
Secure Cloud Computing
Secure Cloud ComputingSecure Cloud Computing
Secure Cloud ComputingIRJET Journal
 
Emergency Communications and Disaster Mangment.pptx
Emergency Communications and Disaster Mangment.pptxEmergency Communications and Disaster Mangment.pptx
Emergency Communications and Disaster Mangment.pptxnitin_009
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesOllie Whitehouse
 
Data Dissemination in Software Defined Vehicular Ad hoc Network: A Review
Data Dissemination in Software Defined Vehicular Ad hoc Network: A ReviewData Dissemination in Software Defined Vehicular Ad hoc Network: A Review
Data Dissemination in Software Defined Vehicular Ad hoc Network: A ReviewIRJET Journal
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksIRJET Journal
 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfFernando Velez Varela
 
Autovation_2012_Slide_Template_Norman FINAL_Post Conference
Autovation_2012_Slide_Template_Norman FINAL_Post ConferenceAutovation_2012_Slide_Template_Norman FINAL_Post Conference
Autovation_2012_Slide_Template_Norman FINAL_Post ConferenceJeffrey Norman
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...ijccsa
 
IRJET- Multicast Device-to-Device Communication underlaying WPCNs
IRJET- Multicast Device-to-Device Communication underlaying WPCNsIRJET- Multicast Device-to-Device Communication underlaying WPCNs
IRJET- Multicast Device-to-Device Communication underlaying WPCNsIRJET Journal
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesIRJET Journal
 
Front-End Intelligence
Front-End IntelligenceFront-End Intelligence
Front-End IntelligenceJudy T Raj
 
Network barometer report 2014
Network barometer report 2014Network barometer report 2014
Network barometer report 2014Mūniū Karanja
 
A Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing EnvironmentA Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing EnvironmentCSCJournals
 
A survey on software defined networking
A survey on software defined networkingA survey on software defined networking
A survey on software defined networkingredpel dot com
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...IRJET Journal
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksIRJET Journal
 

Semelhante a A survey on Device-to-Device Communication (20)

IRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud ComputingIRJET- Advantages of Mobile Cloud Computing
IRJET- Advantages of Mobile Cloud Computing
 
D2D communication for spectral efficiency improvement and interference reduct...
D2D communication for spectral efficiency improvement and interference reduct...D2D communication for spectral efficiency improvement and interference reduct...
D2D communication for spectral efficiency improvement and interference reduct...
 
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
A Review: Evolution of 5G, Security and Multiple Access schemes in Mobile Com...
 
Secure Cloud Computing
Secure Cloud ComputingSecure Cloud Computing
Secure Cloud Computing
 
Emergency Communications and Disaster Mangment.pptx
Emergency Communications and Disaster Mangment.pptxEmergency Communications and Disaster Mangment.pptx
Emergency Communications and Disaster Mangment.pptx
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
 
Data Dissemination in Software Defined Vehicular Ad hoc Network: A Review
Data Dissemination in Software Defined Vehicular Ad hoc Network: A ReviewData Dissemination in Software Defined Vehicular Ad hoc Network: A Review
Data Dissemination in Software Defined Vehicular Ad hoc Network: A Review
 
Performance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined NetworksPerformance Analysis of Wireless Trusted Software Defined Networks
Performance Analysis of Wireless Trusted Software Defined Networks
 
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdfTheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
TheimplementationofSoftwareDefinedNetworkinginenterprisenetworks.pdf
 
Autovation_2012_Slide_Template_Norman FINAL_Post Conference
Autovation_2012_Slide_Template_Norman FINAL_Post ConferenceAutovation_2012_Slide_Template_Norman FINAL_Post Conference
Autovation_2012_Slide_Template_Norman FINAL_Post Conference
 
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
Security Issues in Cloud Computing Solution of DDOS and Introducing Two-Tier ...
 
IRJET- Multicast Device-to-Device Communication underlaying WPCNs
IRJET- Multicast Device-to-Device Communication underlaying WPCNsIRJET- Multicast Device-to-Device Communication underlaying WPCNs
IRJET- Multicast Device-to-Device Communication underlaying WPCNs
 
Wireless
WirelessWireless
Wireless
 
Analysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and MethodologiesAnalysis of Cloud Computing Security Concerns and Methodologies
Analysis of Cloud Computing Security Concerns and Methodologies
 
Front-End Intelligence
Front-End IntelligenceFront-End Intelligence
Front-End Intelligence
 
Network barometer report 2014
Network barometer report 2014Network barometer report 2014
Network barometer report 2014
 
A Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing EnvironmentA Study of Protocols for Grid Computing Environment
A Study of Protocols for Grid Computing Environment
 
A survey on software defined networking
A survey on software defined networkingA survey on software defined networking
A survey on software defined networking
 
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...An Enhanced Technique for Network Traffic Classification with unknown Flow De...
An Enhanced Technique for Network Traffic Classification with unknown Flow De...
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
 

A survey on Device-to-Device Communication

  • 1. A survey on Device-to-Device Communication Kuldeep Narayan Singh 30-Jan-15 1A survey on Device-to-Device Communication
  • 2. Table of Content • Background and Introduction.. • Classification and Promises of D2D • D2D Vs Ad-hoc • Challenges • Applications • Conclusion 30-Jan-15 2A survey on Device-to-Device Communication
  • 3. 1. Background and Introduction Key Challenges • global mobile data traffic increased (81% in 2013)[1] • Increase in mobile data traffic 2 times/year[1] • 1000x by 2020 and 100,000x by 2030[1] • Current infrastructure unable to handle this huge traffic[1] Figure 1: growth in mobile data traffic (in EB/month)[1] Figure 2: Future key challenges[2] 30-Jan-15 3A survey on Device-to-Device Communication
  • 4. 1. Background and Introduction Affects of increase in mobile data traffic • User QoS decreases[2] • User experiences network congestion • Cost Increases[2] • CAPEX Increases • OPEX Increases • Revenue Decoupling Figure 3: Data-Revenue-vs.-Cost-Decouple-graph[3] 30-Jan-15 4A survey on Device-to-Device Communication
  • 5. 1. Background and Introduction Technologies Introduced for NW performance enhancement Figure 7: Device to Device Comm.[2] Figure 5: Adv. Small Cells[2] Figure 6: Interference Management[2] Figure 4: Adv. MIMO/BF[2] 30-Jan-15 5A survey on Device-to-Device Communication
  • 6. 1. Background and Introduction Device-to-Device Communication • Direct Communication without Base Station • Key Motivation • Offload Core Network Traffic • New Comm. Paradigm to Support Public Safety Figure 8: Conventional network and offloaded network(with D2D)[2] 30-Jan-15 6A survey on Device-to-Device Communication
  • 7. 2. Classification and Promises of D2D Classification of D2D Technology[5] 1. Inband D2D • Operates in cellular band 1.1 Network Assisted D2D 1.2 No Network Assisted D2D Figure 9: D2D with network assisted in licensed band[5] Figure 10: D2D without network assisted in licensed band[5] Network Assisted • N/W providers have control over D2D. • Most recommended scenario in D2D • Could reduce energy consumption and better cellular resource management No Network Assisted • N/W providers have limited or no control • Comm. Without network deployment • Similar work as Terrestrial Trunked Radio(TETRA) •Useful in national security and public safety 30-Jan-15 7A survey on Device-to-Device Communication
  • 8. 2. Classification and Promises of D2D Classification of D2D Technology[7] 1. Network Assisted D2D 1.1.a Underlay 1.2.b Overlay Figure 11: Schematic Representation of overlay and underlay Inband D2D[5] Underlay • Increase spectral efficiency by utilizing Spatial Diversity • Many algorithms have been proposed. [7] Use uplink for D2D. [8] Use mode selection. Overlay • A dedicated resource for D2D • Reduces the concern of interference • More focus on resource allocation to avoid wastage of resource 30-Jan-15 8A survey on Device-to-Device Communication
  • 9. 2. Classification and Promises of D2D Classification of D2D Technology[5] Inband D2D Advantages and Disadvantages Advantages: • QoS Guaranteed. • Transmission Distance~ 1KM, Max Data Rate: 1Gbps • No need of new interface. Disadvantage: • Challenge to handle D2D and Cellular interference. • Complex algorithm for resource allocation 30-Jan-15 9A survey on Device-to-Device Communication
  • 10. 2. Classification and Promises of D2D Classification of D2D Technology[5] 2. Outband D2D •.Operates in ISM(Licensed Free Band) • Could be • Network Controlled • Autonomous Figure 11: D2D without network assisted in licensed band [2] Figure 12: Schematic representation of out of band D2D[6] 30-Jan-15 10A survey on Device-to-Device Communication
  • 11. 2. Classification and Promises of D2D Classification of D2D Technology Advantages and Disadvantages of Out Band D2D[7] Advantages: • No interference issue b/w cellular and D2D • No need of recourse allocation. • simultaneous D2D and cellular communication Disadvantages:[7] • Unlicensed band interference uncontrollable • Two interfaces required • Not power efficient, Low Tx. Distance and Data Rate. 30-Jan-15 11A survey on Device-to-Device Communication
  • 12. 2. Classification and Promises of D2D Promises of Device-to-Device Communication[2] 1. Proximity services • High Data Rate and Low delays • low energy consumption 2. Increase spectrum efficiency • D2D and cellular on same spectrum 3. Extend Cellular Coverage 4. Quality of Service Guaranteed 5. Economical • Uses the pre-existing cellular infrastructure 6. Public Safety and National Security • Replace the old TETRA technology with improved LTE-A D2D technology 30-Jan-15 12A survey on Device-to-Device Communication
  • 13. 3. D2D Vs Other Technologies Issues with Ad-hoc technologies[4] 1. Security • Much less than cellular system. • Not suitable for Public Safety Application. 2. Unlicensed Spectrum • No central control of interference. 3. Not suitable for high user density • Throughput, Reliability and Range Suffer 4. Manual Pairing • Not Suitable for Autonomous, Dynamic Proximity Services 5. Less Power Efficient • Runs parallel with cellular More battery drain 30-Jan-15 13A survey on Device-to-Device Communication
  • 14. 3. D2D Vs Ad-hoc Difference to Ad-hoc Parameters D2D Ad-hoc (Wi-Fi, Bluetooth etc) Frequency band Licensed band LTE-A ISM band Max. Transmission Dist. 1000m 10-200m Max. Data Rate 1Gbps 24-250 Mbps Security Robust less; Not suitable for Public safety Expenses CAPEX: No cost as user using the same terminal OPEX: Very less in terms of battery use CAPEX: No cost as user using the same terminal OPEX: Very less in terms of battery use 30-Jan-15 14A survey on Device-to-Device Communication
  • 15. 4. Challenges Major Technical in D2D[5] 1. Interference Management – especially in the case of underlay D2D 2. Power Allocation – Proper regulation needed to avoid interference 3. Resource Allocation – Critical issue in Inband D2D 4. Optimal Peer Discovery Methods Centralized or Distributed 4. Modulation Format • OFDM or SC-FDMA? 5. Channel Management 6. Energy Consumption 30-Jan-15 15A survey on Device-to-Device Communication
  • 16. 4. Challenges Major Business Challenges in D2D[5] 1. D2D between devices subscribed to different operators – Which spectrum to use (for direct communication)? 2. Lawful interception – How to monitor direct communication? 3. Charging – How to perform (content-based) charging? – How to charge if D2D communication is supported w/o NW coverage? 4. Privacy, Security, Authentication etc… 30-Jan-15 16A survey on Device-to-Device Communication
  • 17. 4. Applications Application and Use cases of D2D [4] 1.Local voice traffic • Offload voice traffic from BS • Example: In conferences exchange voice traffic without BS 2.Local Data Services • Content sharing • Streaming services • Mobile Multiplayer gaming Figure: Offloading voice traffic in different scenario[4] Figure: Local data sharing D2D[4] 30-Jan-15 17A survey on Device-to-Device Communication
  • 18. 4. Applications Application and Use cases of D2D [5] 3.Multiuser Cooperative Comm.(MUCC) • The user in good coverage may help (Benefited user )BU to improve its signal and act as a supporting user (SU) 4. Vehicle to Vehicle communication • Requires very low latency • Provides information about the nearest car in front including traffic. Figure: D2D in Multiuser cooperative communication(MUCC)[4] Figure: D2D in V2V scenario[4] 30-Jan-15 18A survey on Device-to-Device Communication
  • 19. 4. Applications Application and Use cases of D2D [5] 5. Public safety (police, fire and ambulance services) • Still uses old Technologies like TETRA • Key Motivation: Move public safety to a new level(LTE) 30-Jan-15 19A survey on Device-to-Device Communication Figure: Public safety scenario in D2D[3]
  • 20. 5. Conclusion 30-Jan-15 20A survey on Device-to-Device Communication • Provided survey on D2D based on available literature. • Types of D2D Communication[2] • Inband (Underlay, Overlay) • Outband (Controlled, Autonomous ) •Discussed Major Technical and Business Issues. •Interference control, Resource management, Pricing etc. • Applications •Public Safely, Offloading etc. •Survey shows D2D is still immature.[1] •Still numerous open challenges.
  • 21. References [1] http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual- networking-index-vni/white_paper_c11-520862.html [2] Smart Direct LTE Communication Shahid Mumtaz. [3] http://wirelesshabitat.eu/archives/104 [4] http://www.slideshare.net/fransiscobento1/d2d-device-to-device- communication?next_slideshow=1 [5] A Survey on Device-to-Device Communication in Cellular Networks Arash Asadi, Student Member, IEEE, Qing Wang, Student Member, IEEE, and Vincenzo Mancuso, Member, IEEE [6] A Survey on Device-to-Device Communication in Cellular Networks: Arash Asadi, Student Member, IEEE, Qing Wang, Student Member, IEEE, and Vincenzo Mancuso, Member, IEEE [7] B. Kaufman and B. Aazhang, “Cellular networks with an overlaid device to device network,” in Proceedings of Asilomar Conference on Signals, Systems and Computers, 2008, pp. 1537–1541. 30-Jan-15 21A survey on Device-to-Device Communication
  • 22. 3. D2D Vs M2M Difference to M2M M2M (Machine to Machine) / MTC (Machine Type Com.) (3GPP TR 22.368) Definition: M2M/MT Communication is a form of data communication between entities that do not necessarily need human interaction. 30-Jan-15 22A survey on Device-to-Device Communication D2D M2M Describes connectivity services Defines a class of devices & is application oriented Main target Discovery and local communication Data exchange between machines / infrastructure Type of device Not defined (arbitrary) Machine Number of devices Typically two or a few Typically many Location Proximity Not defined (arbitrary) Communication Between devices (D2D) Typically many to one (N terminals to 1 server; machine to infrastructure)
  • 23. Potential Future Work • Theoretical Work – mathematical tools and optimization techniques - very limited • Architecture – very little work explaining the required architecture in order to support D2D communications in cellular networks[5] • Application – First introduced for relay now have lots of applications: P2P, Multicasting, Cellular Offloading etc. – Could have more application especially in social networking, location-aware services • Performance analysis – Studies are still far from reality 30-Jan-15 A survey on Device-to-Device Communication 23