Device-to-device

Last updated

Device-to-Device (D2D) communication in cellular networks is defined as direct communication between two mobile users without traversing the Base Station (BS) or core network. D2D communication is generally non-transparent to the cellular network and it can occur on the cellular frequencies (i.e., inband) or unlicensed spectrum (i.e., outband).

Contents

In a traditional cellular network, all communications must go through the BS even if communicating parties are in range for proximity-based D2D communication. Communication through BS suits conventional low data rate mobile services such as voice call and text messaging in which users are seldom close enough for direct communication. However, mobile users in today's cellular networks use high data rate services (e.g., video sharing, gaming, proximity-aware social networking) in which they could potentially be in range for direct communications (i.e., D2D). Hence, D2D communications in such scenarios can greatly increase the spectral efficiency of the network. The advantages of D2D communications go beyond spectral efficiency; they can potentially improve throughput, energy efficiency, delay, and fairness. [1] [2]

Data delivery in non-cooperative D2D communication

Existing data delivery protocols in D2D communications mainly assume that mobile nodes willingly participate in data delivery, share their resources with each other, and follow the rules of underlying networking protocols. Nevertheless, rational nodes in real-world scenarios have strategic interactions and may act selfishly for various reasons (such as resource limitations, the lack of interest in data, or social preferences). [3]

D2D applications

D2D Communications is used for

  1. Local Services: In local service, user data is directly transmitted between the terminals and doesn't involves network side, e.g. social media apps, which are based on proximity service.
  2. Emergency communications: In case of natural disasters like hurricanes, earthquakes etc., the traditional communication network may not work due to the damage caused. Ad hoc network can be established via D2D which could be used for such communication in such situations.
  3. IoT Enhancement: By combining D2D with Internet of things (IoT), a truly interconnected wireless network will be created. Example of D2D-based IoT enhancement is vehicle-to-vehicle (V2V) communication in the Internet of Vehicles (IoV). When running at high speeds, a vehicle can warn nearby vehicles in D2D mode before it changes lanes or slows down. [4]

See also

Related Research Articles

<span class="mw-page-title-main">Telecommunications network</span> Network for communications over distance

A telecommunications network is a group of nodes interconnected by telecommunications links that are used to exchange messages between the nodes. The links may use a variety of technologies based on the methodologies of circuit switching, message switching, or packet switching, to pass messages and signals.

<span class="mw-page-title-main">Wireless</span> Transfer of information or power that does not require the use of physical wires

Wireless communication is the transfer of information (telecommunication) between two or more points without the use of an electrical conductor, optical fiber or other continuous guided medium for the transfer. The most common wireless technologies use radio waves. With radio waves, intended distances can be short, such as a few meters for Bluetooth or as far as millions of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples of applications of radio wireless technology include GPS units, garage door openers, wireless computer mouse, keyboards and headsets, headphones, radio receivers, satellite television, broadcast television and cordless telephones. Somewhat less common methods of achieving wireless communications involve other electromagnetic phenomena, such as light and magnetic or electric fields, or the use of sound.

Wireless sensor networks (WSNs) refer to networks of spatially dispersed and dedicated sensors that monitor and record the physical conditions of the environment and forward the collected data to a central location. WSNs can measure environmental conditions such as temperature, sound, pollution levels, humidity and wind.

Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time in an authentication protocol. It is a default mode of authentication in some protocols and optional in others (TLS).

In computer networking, linear network coding is a program in which intermediate nodes transmit data from source nodes to sink nodes by means of linear combinations.

Vehicular ad hoc networks (VANETs) are created by applying the principles of mobile ad hoc networks (MANETs) – the spontaneous creation of a wireless network of mobile devices – to the domain of vehicles. VANETs were first mentioned and introduced in 2001 under "car-to-car ad-hoc mobile communication and networking" applications, where networks can be formed and information can be relayed among cars. It was shown that vehicle-to-vehicle and vehicle-to-roadside communications architectures will co-exist in VANETs to provide road safety, navigation, and other roadside services. VANETs are a key part of the intelligent transportation systems (ITS) framework. Sometimes, VANETs are referred as Intelligent Transportation Networks. They are understood as having evolved into a broader "Internet of vehicles". which itself is expected to ultimately evolve into an "Internet of autonomous vehicles".

A wireless ad hoc network (WANET) or mobile ad hoc network (MANET) is a decentralized type of wireless network. The network is ad hoc because it does not rely on a pre-existing infrastructure, such as routers or wireless access points. Instead, each node participates in routing by forwarding data for other nodes. The determination of which nodes forward data is made dynamically on the basis of network connectivity and the routing algorithm in use.

Radio resource management (RRM) is the system level management of co-channel interference, radio resources, and other radio transmission characteristics in wireless communication systems, for example cellular networks, wireless local area networks, wireless sensor systems, and radio broadcasting networks. RRM involves strategies and algorithms for controlling parameters such as transmit power, user allocation, beamforming, data rates, handover criteria, modulation scheme, error coding scheme, etc. The objective is to utilize the limited radio-frequency spectrum resources and radio network infrastructure as efficiently as possible.

A wide variety of different wireless data technologies exist, some in direct competition with one another, others designed for specific applications. Wireless technologies can be evaluated by a variety of different metrics of which some are described in this entry.

The Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communications networks. The Internet of things encompasses electronics, communication, and computer science engineering. "Internet of things" has been considered a misnomer because devices do not need to be connected to the public internet; they only need to be connected to a network and be individually addressable.

In radio, cooperative multiple-input multiple-output is a technology that can effectively exploit the spatial domain of mobile fading channels to bring significant performance improvements to wireless communication systems. It is also called network MIMO, distributed MIMO, virtual MIMO, and virtual antenna arrays.

<span class="mw-page-title-main">MIMO</span> Use of multiple antennas in radio

In radio, multiple-input and multiple-output (MIMO) is a method for multiplying the capacity of a radio link using multiple transmission and receiving antennas to exploit multipath propagation. MIMO has become an essential element of wireless communication standards including IEEE 802.11n, IEEE 802.11ac, HSPA+ (3G), WiMAX, and Long Term Evolution (LTE). More recently, MIMO has been applied to power-line communication for three-wire installations as part of the ITU G.hn standard and of the HomePlug AV2 specification.

User-in-the-Loop (UIL) refers to the notion that a technology can improve a performance objective by engaging its human users. The idea can be applied in various technological fields. UIL assumes that human users of a network are among the smartest but also most unpredictable units of that network. Furthermore, human users often have a certain set of (input) values that they sense. Both elements of smart decision-making and observed values can help towards improving the bigger objective.

Multi-access edge computing (MEC), formerly mobile edge computing, is an ETSI-defined network architecture concept that enables cloud computing capabilities and an IT service environment at the edge of the cellular network and, more in general at the edge of any network. The basic idea behind MEC is that by running applications and performing related processing tasks closer to the cellular customer, network congestion is reduced and applications perform better. MEC technology is designed to be implemented at the cellular base stations or other edge nodes, and enables flexible and rapid deployment of new applications and services for customers. Combining elements of information technology and telecommunications networking, MEC also allows cellular operators to open their radio access network (RAN) to authorized third parties, such as application developers and content providers.

Wi-Fi 6, or IEEE 802.11ax, is an IEEE standard from the Wi-Fi Alliance, for wireless networks (WLANs). It operates in the 2.4 GHz and 5 GHz bands, with an extended version, Wi-Fi 6E, that adds the 6 GHz band. It is an upgrade from Wi-Fi 5 (802.11ac), with improvements for better performance in crowded places. Wi-Fi 6 covers frequencies in license-exempt bands between 1 and 7.125 GHz, including the commonly used 2.4 GHz and 5 GHz, as well as the broader 6 GHz band.

<span class="mw-page-title-main">Vehicle-to-everything</span> Communication between a vehicle and any entity that may affect the vehicle

Vehicle-to-everything (V2X) is communication between a vehicle and any entity that may affect, or may be affected by, the vehicle. It is a vehicular communication system that incorporates other more specific types of communication as V2I (vehicle-to-infrastructure), V2N (vehicle-to-network), V2V (vehicle-to-vehicle), V2P (vehicle-to-pedestrian), V2D (vehicle-to-device).

Cellular V2X (C-V2X) is a 3GPP standard for V2X applications such as self-driving cars. It is an alternative to 802.11p, the IEEE specified standard for V2V and other forms of V2X communications.

RF CMOS is a metal–oxide–semiconductor (MOS) integrated circuit (IC) technology that integrates radio-frequency (RF), analog and digital electronics on a mixed-signal CMOS RF circuit chip. It is widely used in modern wireless telecommunications, such as cellular networks, Bluetooth, Wi-Fi, GPS receivers, broadcasting, vehicular communication systems, and the radio transceivers in all modern mobile phones and wireless networking devices. RF CMOS technology was pioneered by Pakistani engineer Asad Ali Abidi at UCLA during the late 1980s to early 1990s, and helped bring about the wireless revolution with the introduction of digital signal processing in wireless communications. The development and design of RF CMOS devices was enabled by van der Ziel's FET RF noise model, which was published in the early 1960s and remained largely forgotten until the 1990s.

<span class="mw-page-title-main">Aerial base station</span>

An Aerial base station (ABS), also known as unmanned aerial vehicle (UAV)-mounted base station (BS), is a flying antenna system that works as a hub between the backhaul network and the access network. If more than one ABS is involved in such a relaying mechanism the so-called fly ad-hoc network (FANET) is established. FANETs are an aerial form of wireless ad hoc networks (WANET)s or mobile ad hoc networks (MANET)s.

<span class="mw-page-title-main">IoT Forensics</span> Branch of digital forensics

IoT Forensics is a branch of Digital forensics that has the goal of identifying and extracting digital information from devices belonging to the Internet of things field, using a forensically sound and legally acceptable process.

References

  1. Asadi, Arash; Wang, Qing; Mancuso, Vincenzo (24 April 2014). "A Survey on Device-to-Device Communication in Cellular Networks". IEEE Communications Surveys & Tutorials. 16 (4): 1801–1819. arXiv: 1310.0720 . doi:10.1109/COMST.2014.2319555. S2CID   3330461.
  2. Zhang, Yanru; Pan, Erte; Song, Lingyang; Saad, Walid; Dawy, Zaher; Han, Zhu (2015). "Social Network Aware Device-to-Device Communication in Wireless Networks". IEEE Transactions on Wireless Communications. 14 (1): 177–190. doi:10.1109/TWC.2014.2334661. S2CID   206825789.
  3. Jedari, Behrouz; Xia, Feng; Ning, Zhaolong (2018). "A Survey on Human-Centric Communications in Non-Cooperative Wireless Relay Networks". IEEE Communications Surveys & Tutorials. 20 (2): 914–944. arXiv: 2008.04651 . doi:10.1109/COMST.2018.2791428. S2CID   44112053.
  4. "TELCOMA GLOBAL | D2D: Device to device communications". telcomaglobal.com. Retrieved 2018-09-13.