A Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme
|
|
|
- Georgiana Reed
- 9 years ago
- Views:
Transcription
1 A Study of Network assisted Device-to- Device Discovery Algorithms, a Criterion for Mode Selection and a Resource Allocation Scheme ANASTASIOS THANOS KTH Information and Communication Technology Master of Science Thesis Stockholm, Sweden 2013 TRITA-ICT-EX-2013:116
2 Abstract Device-to-Device (D2D) communications is a term used to describe the new technology that allows two devices to communicate with each other directly, without using the base stations or the access points of the network infrastructure. D2D communication leads to better network performance for a number of reasons. Among the challenges of D2D communications are, the discovery of a new D2D communication pair, a criterion for mode selection and the optimum resource allocation for the new D2D pair. The discovery process of the new D2D pair includes transmissions of a number of messages that will provide the network with all the necessary information which will be used by the mode selection criterion and determine whether the new pair will use D2D or traditional cellular communication. The possibility of Network Assited Device-to-Device Communication, underlaying a cellular network is deliberated in this paper. Specifically, two discovery algorithms are developped, one Centralized, Fully-Network Dependent discovery algorithm and a second Semi-Centralized, Semi-Network Dependent discovery algorithm are introduced and a comparative analysis of both is performed and presented. The criteria used for the evaluation of the Discovery Algorithms are time efficiency and signal overhead. The results show that the second algorithm is faster in discovering new D2D pairs and requires minimum number of message exchanges. Moreover, the second algorithm is more efficient than the first one, in case that the new pair is found not to be D2D. In addition, the importance of a Selection Criterion that allows the enodeb to decide whether traditional Cellular or D2D Communication between a pair of devices should be used is addressed. An optimum criterion, in terms of maximizing the total achieved throughput, is suggested and results are analyzed and evaluated. Results show that the proposed criterion is effective in performing mode selection for the new pair. Results are present in many different scenarios in order to provide generalizability to the new criterion. i
3 Acknowledgements I would like to thank my supervisor, Dr. Guowang Miao for his useful advice and the guidance he offered me during the course of this thesis. ii
4 Contents Abstract Contents List of Figures List of Acronyms i ii iv v 1 Introduction Background Information and Motivation Major Challenges of D2D Communication and Problem Formulation Related Work Thesis Structure Device Discovery In D2D Communications D2D Communication in Cellular Networks Discovery Algorithms Centralized, Fully Network Dependent Device Discovery Algorithm Semi-Centralized, Semi-Network Dependent Device Discovery Algorithm Aspects of Device Discovery Algorithms Transmission Probability during the Discovery Phase Estimation of Waiting Time During Transmission of Discovery Messages Role of the Network in Device Discovery in D2D Communications Criterion for Mode Selection and Resource Allocation for D2D Communications Critetion for Mode Selection Orthogonal Resources Available in Network Orthogonal Resources not Available in Network Comments on the criterion for mode selection iii
5 CONTENTS iv 3.2 Resource Allocation in D2D Communication Method for Estimation of the Path Gains Resource Allocation in Different Scenarios Conclusion Simulation Environment and Tools Introduction to the Simulation Environment User Distribution Channel Model Network Resources Simulation Environment for Device Discovery Algorithms Simulation Environment for Mode Selection Criterion and Resource Allocation Scheme Simulation Tool Parameters Used in Simulations Simulation Results D2D Device Discovery Algorithms Comparison Between Proposed Discovery Algorithms Comparison Between Analytical and Adaptive Transmission Probaability Models Criterion for Mode Selection and Resource Allocation One New D2D Pair Two New D2D Pairs Conclusion and Discussion Summary and Discussion Contribution Future Work Bibliography 51
6 List of Figures 1.1 D2D communication in a cellular network Centralized, Fully Network Dependent Discovery Algorithm Semi-Centralized, Semi-Network Dependent Discovery Algorithm Two pairs in discovery phase New D2D pair when orthogonal resources are available New D2D pair when no extra orthogonal resources are available New D2D pair when no extra orthogonal resources are available and 2 cellular users exist in the cell New D2D pair when no extra orthogonal resources are available and 2 cellular users exist in the cell New D2D pair when no extra orthogonal resources are available and 1 cellular with 1 D2D pair exist in the cell Scenario 1. Three cellular pairs exist in the cell and one new D2D pair arrives Scenario 1. Three cellular pairs exist in the cell and two new D2D pairs arrives Scenario 1. Two cellular and one D2D pairs exist in the cell and one new D2D pair arrives CDF of Total Time Needed to Discover two and four new D2D pairs, using adaptive 1 Transmission Probability N 5.2 Comparison between Adaptive and Analytical Transmission Probability, for two and four new D2D pairs Ratio of Sum Throughput of Cell with New D2D Pair over Sum Throughput of Cell wthout it, for all four Scenarios Comparison of Sum Throughput of the Cell after new D2D pair arrives, with Sum Throughput of the Cell before the New D2D Pair arrives, for all four Scenarios Ratio of Sum Throughput of Cell with New D2D Pairs over Sum Throughput of Cell wthout them, for all four Scenarios Comparison of Sum Throughput of the Cell after two new D2D pairs arrive, with Sum Throughput of the Cell before the New D2D Pairs arrives, for all four Scenarios v
7 List of Acronyms 3GPP Third Generation Partnership Project BS Base Station CDF Cumulative Distribution Function CU Cellular User D2D Device-to-Device LTE Long Term Evolution LTE-A Long Term Evolution Advanced OFDM Orthogonal Frequency Division Multiplexing SINR Signal to Interference-plus-Noise Ratio TDMA Time Division Multiple Access UE User Equipment WLAN Wireless Local Area Network vi
8 Chapter 1 Introduction In Chapter 1, an introduction to D2D communication is provided. More specifically, background information on D2D communication as an underlay to cellular networks is presented and the motivation that led to the investigation of this new technology is explained. Moreover, the challenges of D2D communication are analyzed and finally, the problems that will be the main investigation subject of this thesis are formulated. 1.1 Background Information and Motivation The increasing number of devices that connect to cellular networks and the constant need for higher data rates, higher system capacity and increased spectrum efficiency have been the major challenges of the development of Third Generation Partnership Project (3GPP) Long Term Evolution (LTE). Furthermore, the usage of local area networks (WLANs) has increased a lot in recent years, providing local area services with unlicensed bands. Well-known systems that utilize the above technology are the WiFi and the Bluetooth. The drawback of these systems is that interference is uncoordinated and the possibility of deploying a technology that provides local area communication in a licensed band, in which interference could be controlled and coordinated by the network operator, is extremely attractive [1]. Realization of the above challenges has led 3GPP to introduce a new component for the LTE-Advanced system, that will provide a solid solution to the above challenges. This new component is Device-to-Device communications [2]. In traditional, cellular networks, UEs communicate by relaying information through the base station, requiring one uplink, from the sending UE to the base station, and one downlink, from the base station to the receiving UE. D2D communication enables UEs to communicate directly using one bidirectional D2D link. Figure 1.1 illustrates D2D communication in a cellular network. D2D communication is a very promising technology, since it will increase the total network performance, offering a number of advantages to traditional 1
9 CHAPTER 1. INTRODUCTION 2 Figure 1.1: D2D communication in a cellular network. cellular networks. First of all, it utilizes the proximity between the communicating devices, allowing them to achieve higher data rates while having lower power consumption, at the same time. Furthermore, it enables devices to reuse the same network resources, achieving higher resource utilization. Finally, the possibility of using one link only rather than using an uplink and a downlink when communicating via the base station, offers an obvious hop gain in communications [3]. D2D communication utilizes licensed bands of spectrum, which offers many advantages, in contrast to using unlicensed bands. The main advantage of this, is that it allows interference coordination by the network, which will result in higher Signal-to-Interference-plus-Noise-Ratio (SINR) at the receiver. However, the resource allocation for D2D communication has been a topic of discussion among many researchers all over the world. 1.2 Major Challenges of D2D Communication and Problem Formulation The first major challenge of D2D communication is Device Discovery. During the discovery phase, UEs try to discover the presence of other UEs they want to communicate with. After discovering the presence of other UEs, they are considered D2D candidates. Two different schemes that identify when two UEs are D2D candidates have been proposed, a-priori scheme, in which D2D candidates are detected before the UEs start communicating, a-posteriori scheme, in which D2D candidates are detected during their communication phase as cellular pair. In an a-priori scheme, beacon transmissions by the UEs are necessary in order to determine if they are D2D candidates [3]. A lot of discovery algorithms that perform Device Discovery in ad hoc networks have been proposed and
10 CHAPTER 1. INTRODUCTION 3 the possibility of aplying those algorithms to cellular networks has been a topic of investigation for many researchers. However, it is clear that in cellular networks, device discovery should be assisted by the network, as it offers better control of the whole process. Network assisted device discovery that uses a- priori scheme is considered in the current thesis. Specifically, two network assisted device discovery algorithms are proposed, analyzed and compared. During the course of the current study, we will refer to these algorithms as Centralized, Fully-Network Dependent and Semi-Centralized, Semi-Network Dependent algorithm respectively. The algorithm analysis and presentation will be performed in following chapters. The second major challenge of D2D communication is the criterion for mode selection. The word mode refers to cellular or D2D communication mode. A criterion that allows the network to decide whether a new communication pair is cellular or D2D is proposed, simulated, analyzed and evaluated in the current thesis. The application of the criterion for mode selection makes it necessary to provide the network with information about the channel between the D2D candidates. This information is provided via probe signals that are transmitted during the discovery phase. The third major challenge of D2D communication is the resource allocation to D2D pairs. An important issue of resource allocation is the usage of uplink or downlink resources. Downlink resources have an advantage, compared to uplink resources, and two of the most important reasons are the following, the power transmitted by the enodeb is much higher than the one transmitted by the device, which would result in high interference level at all D2D devices, if downlink resources were assigned, the interference caused by the D2D users, using the uplink resources, at the enodeb will be small, especially if the device is located at the cell edge, This thesis focuses on reusing the uplink resources of the network and proposes a method to identify the better cellular pairs that the D2D pair will share resources with. The above process of finding the best cellular pairs to share resources with the D2D pair is called pairing. 1.3 Related Work D2D communication has been a major topic of investigation by many researchers, in recent years. In the currect section, the related work that has been conducted so far in the fields of investigation of this thesis are presented. In the first part of this section, the related work in device discovery process is presented. As mentioned before, device discovery is the process that will determine if two UEs that want to establish a connection are D2D candidates. In [2], an introduction to this process is presented. Both a centralized
11 CHAPTER 1. INTRODUCTION 4 and a distributed approach are briefly analyzed and different levels of network involvement are introduced. Moreover, the definition of a beacon signal that should be used by the devices is presented. In [4], the Dynamic Source Routing (DSR) protocol presents solutions on route and neighbor discovery in ad-hoc networks. The possibility of applying the DSR protocol as a solution for D2D link discovery is analyzed briefly in [5], whereas in [6] and [7], a modified version of DSR protocol, named D2DR protocol, that takes into consideration interference in the existing network, which consists of cellular users. In these papers, the networks resources are considered to be shared among cellular and D2D users in a non-orthogonal way. More specifically, it is assumed that cellular users occupy orthogonal channels whereas D2D users utilize the same resources as cellular users, causing interference in both cellular and D2D links. The proposed algorithm, D2DR, regulates transmitted power by D2D devices in order to minimize interference caused in cellular links. Three device discovery algorithms that apply in ad-hoc networks are also presented in [8]. These solutions consider only ad-hoc networks but the third algorithm presents a solution in which a network leader is elected. This solution could be extended to support device discovery in cellular networks, in which the role of the network leader is assigned to the base station. In the criterion for mode selection part, many different mode selection schemes have been proposed. In [9] a mode selection scheme based on SINR targets and bounds for them is presented. This criterion assumes that the link gains between all the devices are known and the ultimate goal is to satisfy the SINR targets. The results are also compared with the case that only the link gain between the D2D UEs is taken into consideration and is compared with the optimum criterion that was initially proposed. Almost all criteria for mode selection take into account a power controll scheme and they refer to maximizing the SINR of all links that exist in the cell and the new D2D link. Also, in most cases it is assumed that the paths between the devices are known, or can be known via the transmisssion of probe messages. A lot of work has also been conducted regarding the resource allocation and the sharing schemes between cellular and D2D users. One of the main concerns is whether the D2D links should use orthogonal or non-orthogonal resources with the cellular links. In [10], with respect to maximizing the throughput of the cell, many resource allocation schemes are presented and evaluated. It is proven that a non-orthogonal resource allocation scheme is more favorable, compared to the others. 1.4 Thesis Structure In the current section, the structure of the thesis report is presented. In chapter 1, an introduction to D2D communication, the major challenges of ongoing research and the work that has been conducted so far are presented. In chapter 2, the research on device discovery in D2D communication is discussed.
12 CHAPTER 1. INTRODUCTION 5 The two proposed algorithms are analyzed and explained. In chapter 3, the criterion for mode selection between cellular and D2D modes is introduced and analyzed. Furthermore, the resource allocation scheme and pairing process are described as well. In chapter 4, the simulation methods and environment are introduced. In chapter 5, the final results and the findings of the current thesis are presented and evaluated. In chapter 6, finally, the conclusion is discussed and the importance of the results is evaluated.
13 Chapter 2 Device Discovery In D2D Communications In chapter 2, the Device Discovery process for D2D communication is examined. As mentioned in the previous chapter, the device discovery process will determine if a new pair that request resources for communication is a D2D candidate pair. Two discovery algorithms are presented, analyzed and compared in this chapter. 2.1 D2D Communication in Cellular Networks The traditional cellular way of communication between two UEs is performed by relaying information through the base station. The base station is responsible for controlling and performing all the processes in an area that is served by the cellular system. In cellular networks, each base station is responsible for a fraction of the total serving area, including the UEs that exist in that specific area. Communication in wireless networks has changed rapidly over the recent years, creating a constant need for evolution in the field of wireless communications. New and different traffic demands have emerged recently, which led to the need for more flexible wireless networks that will comply to the their needs. D2D communication is a strong example of this as it allows the cellular network to adapt to the different needs of the devices and lead to more efficient ways of communication that will increase the total network performance. D2D communication utilizes the proximity between the communicating UEs. If the distance between the UEs satisfies the proximity criterion, then the two UEs are D2D candidates. Being D2D candidates alone does not mean that they will be a D2D pair. However this is the first step of the D2D discovery process. The final decision will depend on the criterion for mode selection, which will take into consideration other aspects of the cellular network, such as the distance between the new pair and the existing pairs in the cell, the available resources, etc. 6
14 CHAPTER 2. DEVICE DISCOVERY IN D2D COMMUNICATIONS 7 At this point, it is important to define the two different stages of D2D communication. The first stage is composed by the discovery of D2D candidates, the application of the mode selection criterion and the allocation of resources to the new D2D pair. The second phase is the actual communication phase of the two UEs. Device Discovery Phase In device discovery phase, a UE that wants to communicate with another UE has to be discovered by the base station and discover the receiving UE as well. The discovery phase inludes a number of messages that have to be exchanged between the the UEs and between the UEs and the base station. These messages will provide the network with information about the link between the UEs and the links between the UEs and the base station, respectively. After the new pair has been determined to be D2D candidate pair, the criterion for mode selection is applied. This criterion will determine if the new communication pair can exchange information in D2D mode. If the result of the mode selection criterion states that it is not beneficial for the new pair to be D2D, cellular mode is assigned. If the new pair satisfies all the criteria for D2D communication, D2D mode is assigned. Then, the network has the responsibility of assigning resources to the new pair. Resource assignment is the final stage of the discovery phase. After that, discovery phase is completed. D2D Communication Phase After completing the discovery phase, the UEs that compose the new D2D pair, may start exchanging information. Now the new pair is an integrated part of the cell and exchanges information through a bidirectional link, without relaying information through the base station. 2.2 Discovery Algorithms In the current section, two discovery algorithms are presented, based on the information described in [2]. In general, two different approaches may be used to enable device discovery. These approaches may be summarized in the following, Centralized Approach. In centralized approach, a UE informs the base station about its intention to communicate with another UE. Then the base station orders some message exchanges between the devices, in order to acquire information about the link between them. Distributed Approach. In distributed approach, a UE that wants to communicate with another UE, broadcasts probe messages, which are received by other UEs. Then it informs the base station about the results of its inquiry and the base station makes the final decision.
15 CHAPTER 2. DEVICE DISCOVERY IN D2D COMMUNICATIONS 8 In every case, different levels of network involvement are defined. The whole process can either be strictly or loosely controlled by the base station. However, it is important to mention that only network assisted device discovery processes are considered in the current thesis. This is because the base station can apply interference coordination and make the whole process more efficient and provide significantly better results. In the following sections, the two proposed discovery algorithms are presented. For this chapter, as well as for the rest of the thesis, we will refer to these algorithms as Centralized, Fully-Network Dependent and Semi- Centralized, Semi-Network Dependent algorithms, respectively. Furthermore, we will define a criterion for successful discovery of D2D candidates. This criterion may be summarized in the following sentences, A link discovery is considered to be successfull when all the following criteria are satisfied for each and every link, the sender device knows the ID of the receiving device, the receiving device knows the ID of the sender device and that the sender wants to communicate with it, the new pair satisfies the proximity criterion Centralized, Fully Network Dependent Device Discovery Algorithm The first algorithm uses the centralized approach. The whole process is initiated and fully controlled by the base station. Fully controlled means that each message transmission is ordered by the base station. At this point, it is important to mention that the discovery of UEs is a process that involves transmission of messages in between the UEs and also between the UEs and the base station. It is important to define the content of this messages. The detailed content of the messages is beyond the scope of this thesis, however, a brief description is provided. First of all, a discovery message should include the identity of an entity, in this case the identity of the UE. This is important during the message exchanges, so that the communicating parts can be identified. Moreover, the discovery message should work as a reference message that will allow the network to make an estimation about the path between the communicating entities. This can be done by defining technical characteristics of the message, such as the tranmsitting power of the UE. This thesis uses the transmitting power as a reference for path estimation. Now, the description of the first algorithm may be presented. Figure 2.1 provides a visualized representation of the the steps that should be followed
16 CHAPTER 2. DEVICE DISCOVERY IN D2D COMMUNICATIONS 9 Figure 2.1: Centralized, Fully Network Dependent Discovery Algorithm. during the discovery process. For the rest of the thesis, we will assume that UE1 is the UE that initiates the communication process. Therefore, it is called sending UE. The UE that is the second member of the communication pair and is the one which does not initiate the communication process, will be referred to as receiving UE. In table 2.1, a detailed representation of the steps of the algorithm is presented. We can see that the first message is send by the UE that wants to communicate with another UE. This message is sent to the base station. The UE does not know if D2D mode will be assigned or not. Upon the reception of this message, the base station needs to investigate if the new communication pair is D2D candidate. Therefore, it responds to UE 1 and instructs it to send a discovery message to UE 2. The base station also instructs UE 2 to listen for this discovery message, sent from UE 1. In the third step of the algorithm, UE 1 sends the discovery message to UE 2. If the UEs are in proximity with each other, the discovery message will be correctly received by UE 2. Correct reception depends on the level of the SINR at UE 2. For this reason, a certain threshold value for the SINR at UE 2 should defined. Let g ij denote the path gain between the transmitter i and
17 CHAPTER 2. DEVICE DISCOVERY IN D2D COMMUNICATIONS 10 Algorithm 1: Step 1: Step 2: Step 3: Step 4: Step 5: Step 6: Step 7: Centralized, Fully Network Dependent Device Discovery Algorithm Sender UE transmits message to base station, requesting communication with another UE. Base Station orders the sending UE to send a discovery message to the receiving UE and orders the receiving UE to listen for this message. Sending UE sends discovery message to the receiving UE. If receiving UE receives the discovery message, it reports the value of the received SINR back to the Base Station. Base Station instructs both devices to listen for interference by existing users. Sending and receiving UEs report the values of interference they received from existing users to the Base Station. Base Station applies Mode Selection Criterion, instructs both UEs to initiate D2D communication and assigns resources to them. Table 2.1: Centralized, Fully Network Dependent Discovery Algorithm. the receiver j. Also, let P i denote the transmission power of UE 1 and γ D2D be the SINR threshold value for the discovery messages. The discovery message transmitted by UE 1 to UE 2 will be correctly received if, g ij P i N 0 γ D2D (2.1) where N 0 is additive, white Gaussian Noise. In the fourth step of the algorithm, if UE2 correctly receives the discovery message, it reports the received value of the SINR to the base station. The base station knows that the transmitted power by UE1 is set to a reference, predefined value. This allows the base station to make an estimation about the path between UE 1 and UE 2. After the base station receives this message, it orders both UEs to listen for interference by existing cellular UEs. This process is of high importance for the application of the criterion for mode selection, which will be analyzed later. However, it is important to mention that listening for interference from UE 1 and UE 2 allows an estimation of the interference between the new D2D pair and the existing pairs in the cell. This process is briefly described at this point, but it will be further analyzed in the following chapter of the current thesis. However, it is important to understand that the messages exchanged during this initial discovery process are substantial for the whole D2D communication process. After the listening for interference by UE 1 and UE 2 is over, both devices report the received values to the base station. This will provide the base station with an estimation of the path gain between existing and new devices. Finally, upon the reception of these messages, the base station applies the mode selection criterion. The output of this criterion will determine whether the new pair will be D2D or not.
18 CHAPTER 2. DEVICE DISCOVERY IN D2D COMMUNICATIONS 11 At this point, it is noteworthy to say that the analysis of the discovery algorithms will focus on the actual transmitted messages and not the acknowledgements, which are sent by the receiver of the message, to verify the correct reception of the transmitted message to the transmitter. This is beyond the focus of this thesis. However, it is assumed that another channel exists for the tranmission of acknowledgements. Furthermore, step 3 of the algorithm is repeated by the tranmsitter UE 1 in case of failure. However, the number of retransmissions is limited and is defined using a probabilistic model, which will be presented later on. Advantages and Disadvantages of the First Algorithm Among the advantages that the first algorithm offers, is the network involvement, which, as it was mentioned in the beginning of this chapter, is beneficial for the network as it offers interference estimation and coordination. Moreover, the message exchanges between the UEs allow the base station to make an estimation about the path between the new pair that requests communication. Furthermore, the messages sent by UE 1 and UE 2 to the base station, allow interference estimation that will be created by the new D2D pair to the existing cellular pairs of the cell. Finally, the step during which UE 1 and UE 2 listen for interference by the existing cellular pairs, allows the base station to make an estimation about the interference that will be caused to the existing cellular pairs by the new D2D pair. It should be mentioned that among the existing pairs of the cell, D2D pairs might already exist. However, this will be analyzed further in the next chapter of the current thesis. The disadvantage of the first algorithm is that it requires a large number of message exchanges between the entities of the network. Also, the base station does not need to make any estimation about the path gain between UE 2 and it, as this path is not taken into consideration for interference estimation and coordination. It could be said that this message is redundant Semi-Centralized, Semi-Network Dependent Device Discovery Algorithm This algorithm is the second discovery algorithm that is proposed by the current thesis. it is called Semi-Centralized Semi-Network dependent because the discovery process is initiated by the mobile and performend without notifying the base station, in the beginning of it. Figure 2.2 offers a visualized representation of the algorithm. The same principles apply on the second algorithm, as they where described in the first one. Table 2.2 provides a better description of the different steps that are included in the second algorithm.
19 CHAPTER 2. DEVICE DISCOVERY IN D2D COMMUNICATIONS 12 Figure 2.2: Semi-Centralized, Semi-Network Dependent Discovery Algorithm. Algorithm 1: Semi-Centralized, Semi-Network Dependent Discovery Algorithm. Step 1: Sending UE transmits discovery message to UE 2. Step 2: If receiving UE receives the discovery message, it reports the value of the received SINR back to UE 1. Step 3: Sending UE reports the SINR value to the Base Station and informs it about the communication intention with UE 2. Step 4: Base Station instructs both devices to listen for interference by existing users. Step 5: Sending and receiving UEs report the values of interference they received from existing users to the Base Station. Step 6: Base Station applies Mode Selection Criterion, instructs both UEs to initiate D2D communication and assigns resources to them. Table 2.2: Semi-Centralized, Semi-Network Dependent Discovery Algorithm.
20 CHAPTER 2. DEVICE DISCOVERY IN D2D COMMUNICATIONS 13 In the first step of the algorithm, UE 1 initiates the discovery process by sending the discovery message directly to UE 2. Like in the first algorithm, if the message is received correctly by UE 2, it responds to UE 1 with the received SINR value, in the second step. It is clear that, during these two initial steps of the algorithm, the process is independent, as it does not involve any interaction with the base station. It should be stated that, if there is a failure during the transmission of the first or the second message, retransmissions occur. The number of retransmissions, though, is limited and predefined. In the third step of the algorithm, UE 1 reports the received SINR value to the base station. This message to the base station offers two advantages. First, the path gain between UE 1 and UE 2 is estimated and, secondly, the path gain between UE 1 and the base station is estimated as well. After this step, the algorithm behaviour is exactly the same as the first one. The base station instructs both UEs to listen for interference and then report the received interference values back to the base station. Finally, the base station applies the mode selection criterion and the resultl determines whether the new communication pair will be D2D or not. Advantages and Disadvantages of the Second Algorithm The advantages of this algorithm are similar to the advantages of the first one. Through the exchange of the messages between the UEs and between the UEs and the base station, an estimation about the path gains is provided to the base station. During the listening for interference, an estimation about the received interference at the new D2D pair is accomplished. The interference that will be caused by the new pair to the existing cellular pairs in the cell is estimated by the message sent from UE 1 to the base station. Another advantage of the second algorithm, when compared to the first one, is that it requires one message transmission less. This is because the UE that initiates the discovery process does not send to the base station at first, but directly to the second UE. Another advantage is that the information provided by the first algorithm concerning the path gain between UE 2 and the base station, is neglected, as it is redundant. Finally, another advantages of the second algorithm is that it is faster when the two new UEs are not D2D candidates, as it is discovered during the transmission of the first message. The disadvantage of the second algorithm is that it requires the receiving UE to listen for transmissions by other devices, which is far from being energy efficient. 2.3 Aspects of Device Discovery Algorithms In this section we will refer to some technical aspects of the device discovery process. The first of them is the transmission probability of the UEs that are involved in the discovery process. The transmission probability defines when
21 CHAPTER 2. DEVICE DISCOVERY IN D2D COMMUNICATIONS 14 N The number of communication links that need to be discovered. Γ i The SINR value for link i. γ i The SINR threshold for link i. p success Probability of successful transmission in one time slot, for all users. p (k) capture Probability of satisfying the SINR threshold in case of collision between k users. R The cell radius. r i the distance of UE i from the cell center. r ij The distance between UE i and UE j. α The path loss exponent. P i The transmission power of UE i. Table 2.3: Parameter explanation. and how often should the device transmit during the discovery process. An analytical model is presented, but before that an introduction to the network model is provided. The second aspect of the discovery process is the waiting time. The waiting time defines the time a transmitting device should wait before it declares a failure in the process. A failure means that the discovery message is not received by the receiving UE. This parameter is really important during the third steps of the first algorithm and during the first and the second steps of the second algorithm. An analytical model is provided as well in this case Transmission Probability during the Discovery Phase Before talking about the transmission probability the devices should use during the discovery phase, it is substantial to make a brief introdusction of the network model that is taken into consideration for the development of the analytical model. Network Model For the purposes of investigating the transmission probability, a TDMA-based model is assumed, in which each UE transmits in every time slot with a probability of transmission p t. In table 2.3, the reader may find the explanation of all parameters that are used in the calculations that follow. The transmission model is based on ALOHA model, in which each device transmits in the beginning of each time slot, with a certain probability. It is assumed that for every pair of UEs, only one transmission, either by UE 1 or UE 2, takes place. That is the reason why N denotes the number of links and not the number of devices.
22 CHAPTER 2. DEVICE DISCOVERY IN D2D COMMUNICATIONS 15 Collisions are a significant part of the message transmisssions during the discovery phase. A message can be received correctly in the following case, If there are no collisions at the same slot, which means the message is the only one transmitted. If there are collisions but the SINR threshold, γ i, is satisfied. In the following of this section, the annotation P r[...] will be used, which denotes the probability of an event. Optimum Transmission Probability Estimation Based on the previous analysis, we can say that the probability of a successful reception of a message in one time slot, for all UEs is given by the following. p success =P r[no collision] + P r[only one collision] p (2) capture P r[there are k collisions] p (k+1) capture (2.2) For every case, the probability of having k collisions, is given by the following formula, ( ) N P r[k collisions] = p k t (1 p t ) N k (2.3) k Also, the probability of satisfying the SINR threshold when k+1 users transmit in the same time slot, is given by the following formula. p (k+1) capture = P r[γ 1 γ 1 ] + P r[γ 2 γ 2 ] P r[γ k+1 γ k+1 ] (2.4) In equation 2.4, it can be seen that the probability of capture is the sum of probabilities of every user satisfying the SINR threshold value. Now, it is time to provide some analysis for that probability. The probability of satisfying the SINR threshold is different for the case UE transmits to the base station and different for transmissions to other devices. In figure 2.3, we can see two new D2D pairs that are in the discovery phase. Let s assume that UE 3 transmits to the base station and UE 1 transmits to UE 2. Then, the probability for capture will be the sum of the prpobabilities that both devices satisfy their threshold values. These probabilities i.i.d. and also it is assumed that the SINR threshold can only take positive values, which means that it is impossible to be satisfied more than one device at one time slot. For UE 3, if we assume that all UEs use the same transmission power during the discovery process, that probability is given by the following formula, c P 3 r3 P r[γ 3 γ 3 ] = P r[ α c P 1 = R 0 r α 1 γ 3 ] = P r[( r 1 ) α 1 γ 3 ] = P r[r 3 r 1 γ 3 α ] r 3 P r[r 3 r 1 γ 3 1 α ] f(r1 )dr 1 (2.5)
23 CHAPTER 2. DEVICE DISCOVERY IN D2D COMMUNICATIONS 16 Figure 2.3: Two pairs in discovery phase. where f(r 1 ) is the Probability density function of r 1, the distance of UE 1 from the base station. That distance is assumed to be uniformly distributed over the cell area, which in fact complies with the rules of Uniform Circular Distribution. The same analysis can be done for UE 1, giving the probability of capture for the UE 1 - UE 2 pair, c P 1 r1 P r[γ 1 γ 1 ] = P r[ α c P 3 = r32 α 2R 0 γ 1 ] = P r[( r 32 ) α 1 γ 1 ] = P r[r 1 r 32 γ 1 α ] r 1 P r[r 1 r 32 γ 1 1 α ] f(r32 )dr 32 (2.6) In this case, UE 1 transmits a discovery message to UE 2. UE 3 transmits a discovery message to the base station, causing interference at UE 2. The distance between UE 3 and UE 2 is assumed to be uniformly distributed. However, the distribution of the distance is approximated as uniform distribution between 0 and 2R. If there are more than two users transmitting at the same time slot, then the probability of satisfying the SINR threshold value for UE 3 would be more complicated. P r[γ 3 γ 3 ] = P r[ = R R 0 0 R... 0 c P 3 r3 α k c P i i=1 ri α P r[ γ 3 ] c P 3 r3 α k c P i i=1 ri α γ 3 ] f(r 2 )f(r 3 )...f(r k )dr 2 dr 3...dr k (2.7) The same calculation apply for UE 1. It can be seen that the calculation of the optimum transmission probability can be rather complicated. However, at
24 CHAPTER 2. DEVICE DISCOVERY IN D2D COMMUNICATIONS 17 this point, we may try to approximate the optimum transmission probability by taking into consideration only up to the case where 1 collision takes place, during the discovery messages transmissions. Using this approximation, the probability of having a successful transmission in one time slot is given by the following formula. p success =P r[no collision] + P r[only one collision] p (2) capture (2.8) It is very difficult to estimate if the two transmissions that caused the collision, were transmissions to the base station or another UE. However, bacause of the nature of the algorithms, it is more probable that each UE will transmit to another UE. This is the message between the UEs of the same D2D pair, that is used to provide an estimation about the path gain between them. So, for the purpose of the current thesis concerning the optimum transmission probability estimation, it is assumed that colliding UEs are transmitting to the receiving UE of the D2D pair. The optimum transmission probability is the one that maximizes Estimation of Waiting Time During Transmission of Discovery Messages In the following section, an estimation of the waiting time the UEs should use for when transmitting to another UE is attempted. The waiting time is very important for the discovery process. If a UE sends to another UE and does not receive an acknowledgement, then it will retransmit the message. However, a certain limit has to be set to the retransmissions. This limit is given by the waiting time. For the sake of simplicity, we will neglect the capture effect and assume that a successful transmission in one time slot, for one UE only, is given by the following formula, p success = N p t (1 p t ) N 1 (2.9) Let s denote now X, a random variable that shows the number of successful transmissions of one UE. The CDF of X will be, k ( ) n P r[x k] = p i success (1 p success ) n i (2.10) i i=0 in n slots. We need exactly one correct transmission for every UE. The probability for that, is, P r[x 1] = 1 P r[x = 0] = 1 (1 p success ) n (2.11) If we choose to satisfy 2.11 with a probability of 0.95 or higher, replacing this value to 2.11 gives, P r[x 1] 0.95 n ln 0.05 ln (1 p success ) (2.12)
25 CHAPTER 2. DEVICE DISCOVERY IN D2D COMMUNICATIONS 18 The result of 2.12 gives the number of time slots a UE should wait, after transmitting the first discovery message to another UE. During this waiting time, if there is no correct reception of the discovery message, the UE retransmits it. After the waiting time is over and no discovery message has been received correctly, the UE declares a failure in the process and the new pair is no D2D candidate anymore Role of the Network in Device Discovery in D2D Communications As it was mentioned in the beginning of this chapter, device discovery is an important part of D2D communications since it determines if two communicating UEs can be D2D. The analysis performed so far in this chapter, focuses on the D2D candidates. After determining that two UEs are D2D candidates, a mode selection criterion has to be applied, which will determine if the new UEs will finally be D2D. The transmission probability of UEs is also an important part of device discovery. It is an indication of how often a UE that wants to be discovered, should transmit. The transmission probability is assumed to be defined by the network, at all times. Moreover, the network provides all the necessary information to devices. This necessary information include synchronization, information on the total load of the cell, information on the dynamic transmission probability and, finally, information about the waiting time. The role of the network in significant in D2D discovery process. Another important part of the discovery process, is the listening for interference by existing users. Although its significance is not very clear to the reader up to this point, it will become clear in the following chapters of this thesis. During the listening for interference time, no transmission of discovery messages is assumed. If there is more than one D2D pair that needs to be discovered, all of them have to finish the initial steps of the algorithm, as they were described in section 2.2, and then listen for interference by existing users. This implies that, if a pair completes the process before the other, it has to wait until both pairs are at the same step of the algorithm. Collisions are a main problem of the discovery process, in case more than one new D2D pair exists. In order to avoid collisions with existing users, it is assumed that a separate channel exists, that D2D UEs use during the discovery process. Furthermore, collisions may take place if only one new D2D pair exists in the cell. The steps of the algorithms in which collisions may appear, are the steps during which both the sending UE, as well as the receiving UE report the interference measurements to the base station. It can be assumed that both UEs can be scheduled by the network to transmit their measurements in different time slots. However, for the purposes of this thesis, it is assumed that both UEs transmit to the base station using half the transmission probability assigned by the network. In order to explain that,
26 CHAPTER 2. DEVICE DISCOVERY IN D2D COMMUNICATIONS 19 let s assume that the optimum transmission probability of every device, is set by the network to p t. When the devices reach this point of the algorithm, they will use a transmission probability of pt 2.
27 Chapter 3 Criterion for Mode Selection and Resource Allocation for D2D Communications In chapter 3, a criterion for mode selection is presented. Mode refers to the type of commuication that will be utilized by a pair of UEs. This type of communication can be either cellular or D2D. Moreover, a study on resource allocation is presented in this chapter. Specifically, resource sharing schemes with existing pairs in the cell, are introduced and analyzed. Although readers may assume that mode selection and resource allocation are two different concepts, they are in fact very related and dependent. Resource allocation is always considered when deciding on whether a new pair of UEs should be D2D or cellular. 3.1 Critetion for Mode Selection Many different criteria have been suggested by researchers that study D2D communications. At this point, it is assential to refer to two different scenarios that might apply in the case which a new D2D candidate pair is requesting resources. The first case is when there are available orthogonal resources in the network. In this case, the D2D pair may utilize those orthogonal resources and do not cause interference to existing cellular pairs. The second case is when there are no orthogonal resources available in the network. This means that the new D2D pair has to share resources with an existing cellular pair. In both cases, the proposed criterion for mode selection, may be summarized in the following statement. A new communication pair that is a D2D candidate pair, will be assigned D2D mode of communication, if the Total Sum Throughput of the cell, when using D2D mode, is higher than any other possible case. 20
28 CHAPTER 3. CRITERION FOR MODE SELECTION AND RE- SOURCE ALLOCATION 21 Figure 3.1: New D2D pair when orthogonal resources are available. For better understanding of the above criterion, it is essential to see how it applies in both cases that were mentioned above Orthogonal Resources Available in Network Figure 3.1 depicts a new pair of UEs that are in the mode selection part of the discovery phase. Let g i denote the path gain between UE i and the base station. Also, let g ij denote the path gain between UE i and UE j Now, let Γ i denote the SINR value of UE i at the base station and Γ ij denote the SINR value of UE i at receiver UE j. Using the Shannon s formula for throughput, we can calculate the throughputs for each link. Let R i and R ij denote the throughputs, for each of the above cases respectively. Furthermore, let P i be the transmission power of UE i and N the additive, white Gaussian noise. Γ 1 = g 1 P 1 N, Γ 12 = g 12 P 1 (3.1) N and R 1 = cw log 2 (1 + Γ 1 ) R 12 = cw log 2 (1 + Γ 12 ) (3.2) The application of the criterion for mode selection suggests that, if R 12 R 1, then D2D mode is assigned to the new pair. Else, cellular mode is assigned Orthogonal Resources not Available in Network Figure 3.2 illustrates a new D2D pair that is in the mode assignment part of the discovery phase, when no extra orthogonal resources are available in the network for assignment. In this case, the new D2D pair has to share resources with an existing cellular pair, causing interference to and accepting
29 CHAPTER 3. CRITERION FOR MODE SELECTION AND RE- SOURCE ALLOCATION 22 Figure 3.2: New D2D pair when no extra orthogonal resources are available. interference from it. The same description for the parameters used in the previous subsection, applies here as well. We assume that uplink resources are utilized for D2D communication. This means that the D2D transmitter will cause interference in the uplink of the cellular user and the cellular user will cause interference in D2D receiver. That is why the cellular downlink is ommitted in this representation of the cell realization. The SINRs for the cellular and the D2D link will be, Γ 1 = g 1 P 1 g 3 P 3 + N, Γ 34 = g 34 P 3 g 14 P 1 + N (3.3) respectively. The throughput for every link is given by the following equations. R 1 = cw log 2 (1 + Γ 1 ) R 34 = cw log 2 (1 + Γ 34 ) (3.4) The SINR and the throughput of the cellular link, without considering the new D2D pair is given by the following equations. Γ 1 = g 1 P 1 N, Ŕ 1 = cw log 2 (1 + Γ 1 ) (3.5) The application of the criterion for mode selection indicates that, if R 1 +R 34 Ŕ 1, then D2D mode is assigned to the new pair. Else, the new pair is not accepted. This means that the call would be dropped and the new pair would be in outage Comments on the criterion for mode selection The main purpose of the criterion introduced at this chapter is to increase the sum throughput of the cell. This was also part of the motivation that led researchers investigate D2D communications. However, it may be noted
30 CHAPTER 3. CRITERION FOR MODE SELECTION AND RE- SOURCE ALLOCATION that, in the case which no extra orthogonal network resources are available, the criterion looks strict, as it will lead to not accepting the new D2D pair. The criterion may be applied with more loose acceptance, with respect to increasing the capacity of the cell, by accepting a less increase in the total sum throughput of the cell. For the purpose of the current thesis, the second case in which no extra orthogonal resources are available will be used as a scenario for the following analysis. More specifically, it will be shown that the criterion may be applied for different realizations of the existing pairs and for different numbers of new D2D pairs that request resources. This analysis will be presented in rest of this thesis. 3.2 Resource Allocation in D2D Communication The resource allocation problem in D2D communication, copes with the question on which resources should be assigned to the new D2D pair. In the case which extra orthogonal resources are available in the network, the problem has actually a simple solution, as, if the criterion for mode selection indicates that the new pair should be D2D, then orthogonal, uplink resources are assigned to it. The situation becomes more complicated in the case that no extra orthogonal resources are available in the cell. This means that the only option for the new D2D pair is to share resources with an existing cellular pair. The complication of the problem lies in the interference that will be caused by the new D2D pair to the existing cellular user, and the interference caused by the cellular user to the new D2D pair. An estimation of the interference is mandatory in this situaton, otherwise, severe interference might be created in the cell, degrading the network performance in total. The contribution of the current thesis to this problem, is the proposal of a way to estimate interference. This became clear during the description of the discovery algorithms, as it was mentioned that new D2D UEs spend some time listening for interference from existing users. Figure 3.3 depicts a cell with 1 new D2D pair and 2 cellular users, each one belonging to a separate cellular pair. The downlink of the cellular communication links is ommitted, for the reasons that were mentioned in the previous section. The analysis for throughput calculations is similar to the one that was presented in the previous section. First, it is assumed that the new D2D pair shares resources with UE 1. In this case, UE 3 will create interference in the uplink of the cellular user. 23 Γ 1 = g 1 P 1 g 3 P 3 + N, Γ 34 = g 34 P 3 g 14 P 1 + N (3.6)
31 CHAPTER 3. CRITERION FOR MODE SELECTION AND RE- SOURCE ALLOCATION 24 Figure 3.3: New D2D pair when no extra orthogonal resources are available and 2 cellular users exist in the cell. and R 1 = cw log 2 (1 + Γ 1 ) R 34 = cw log 2 (1 + Γ 34 ) (3.7) Now, if the criterion for mode selection is applied, it will determine if the D2D pair can share resources with UE 1. Moreover, we assume that the D2D pair shares resources with the UE 2. In this case, the throughput calculations are as follows. Γ 2 = g 2 P 2 g 3 P 3 + N, Γ 34 = g 34 P 3 g 24 P 1 + N (3.8) and R 2 = cw log 2 (1 + Γ 2 ) R 34 = cw log 2 (1 + Γ 34 ) (3.9) Again, the application of the criterion for mode selection will determine if the new D2D pair can shares resources with UE 2. Now, the following possible options are defined. The criterion indicates that only one of the two cellular links can share resources with the new D2D pair. The criterion indicates that both cellular links may be used to share resources with the new D2D pair. The criterion indicates that none of the cellular links can share resources with the D2D pair. In the first case, the D2D pair will share resources with the cellular pair for which the criterion is satisfied. In the second case, there are two options.
32 CHAPTER 3. CRITERION FOR MODE SELECTION AND RE- SOURCE ALLOCATION 25 Figure 3.4: New D2D pair when no extra orthogonal resources are available and 2 cellular users exist in the cell. The first option is to choose the cellular user for which the sum throughput of the cell is maximized. The second option is to share the resources of both users. This option will offer the highest sum throughput of the cell, as it utilize more bandwidth for the D2D pair. In the last case, since there are no extra orthogonal resources available in the network, the new D2D pair will be in outage. The calculations performed above, assume that perfect knowledge of all the path gains between the UEs and between the UEs and the base station is obtained. However, this is far from being realistic. A method to estimate the path gains is proposed in the current thesis. The method description is provided in th following section Method for Estimation of the Path Gains Let s assume that the cell realization is described in figure 3.4. The new D2D pair consists of UE 3 and UE 4. During the discovery process of this pair, a number of messages where exchanged. It has been mentioned that the transmited power by each UE, during the discovery phase, is set to a reference, known value. This allows the estimation of the path gains for the links. The message that is transmitted from UE 3 to the base station, provides an estimation of g 3. The message transmitted from UE 3 to UE 4 or vice versa, provides an estimation for g 34. The remaining unknown path gains now are g 14 and g 24. The reader may recall that, during the discovery phase, both UE 3 and UE 4 listen for interference, after the exchange of the initial messages. In this case, the interference that UE 3 and UE 4 listen, in the first slot will be as follows. I (1) 3 = g 13 P 1 I (1) 4 = g 14 P 1 (3.10)
33 CHAPTER 3. CRITERION FOR MODE SELECTION AND RE- SOURCE ALLOCATION 26 Figure 3.5: New D2D pair when no extra orthogonal resources are available and 1 cellular with 1 D2D pair exist in the cell. respectively. The interference that UE 3 and UE 4 listen, in the second slot will be as follows. I (2) 3 = g 23 P 2 I (2) 4 = g 24 P 2 (3.11) Listening for interference from UE 3 is not necessary in the current realization. However, it is necessary for other realizations that will be presented later on. This process, allows now the estimation of interference that will be caused to the D2D link, and more specifically to UE 4, by each cellular user. This means that we can estimate with accuracy g 14 and g 24. It is easily understood, that for the above realization of the cell, estimation of all path gains is possible and fairly accurate. However, this is not always the case. A D2D pair might already exist in the cell, sharing resources with another cellular UE. The estimation of path gains gets more complicated now. Let s assume now that the cell realization is depicted in figure 3.5. In this case, a D2D pair alreasy exists in the cell, sharing resources with the cellular pair. The new D2D pair will create interference to both the cellular pair and the receiver of the D2D pair. What is more, the receiver of the new D2D pair will receive interference from both the cellular user and the D2D transmitter. In this case, the interference that UE 3 and UE 4 listen, in the every slot will be as follows. I (1) 3 = g 13 P 1 + g 23 P 2 I (1) 4 = g 14 P 1 + g 24 P 2 (3.12) The interference that will be caused to the new D2D pair can be estimated with accuracy as it is the total interference that UE 4 listens. Although we can not make an assumption about the path gains g 14 and g 24 separately, we can estimate the total interference that the new D2D pair will suffer. Concerning the interference the new D2D pair will create in the cellular user, it can be
34 CHAPTER 3. CRITERION FOR MODE SELECTION AND RE- SOURCE ALLOCATION Scenario 1: Three cellular pairs exist in the cell. Scenario 2: Two cellular and 1 D2D pairs exist in the cell. The D2D pair already shares resources with one or both of the cellular pairs. Scenario 3: One cellular and 2 D2D pairs exist in the cell. The D2D pairs already share resources with the cellular pair. Scenario 4: Three D2D pairs exist in the cell sharing the same resources with each other. Table 3.1: Description of Different scenarios of existing pairs in the cell. 27 estimated by the discovery message sent to the base station. This means that an accurate estimation of g 3 may be provided. The most difficult task is to estimate the path gain between the new D2D pair and the existing one. At this point, reader may understand the significance of letting the transmitter of the new D2D pair listen for interference. The following assumption is made. The sending UE of a new D2D pair will approximately create to existing D2D pairs, as much interference as it receives from them. In this case, the total interference that UE 3 receives during the discovery process, is given by equation We will make the assumption that the average value of that interference is Ī = 1 2 I(1) 3 (3.13) This is the estimation of interference that UE 3 will cause to UE 5, which in turn provides an estimation about the path gain g Resource Allocation in Different Scenarios This section describes how is resource allocation implemented for different scenarios. In fact, four different scenarios concerning the existing users in the cell are described. All scenarios are summarized in table 3.1. In every possible scenario, one or two new D2D pairs may arrive at the same time in the cell. In every possible scenario, the maximization of the sum throughput is taken into consideration. This means that a pair may reuse resources from all existing links, if possible. In every case, an existing link is chosen to share resources with only, if it offers a higher utilization of the resources assigned to it. The disadvantage of that, is that, in the case of 2 new pairs for example, if one of the new pairs offers higher utilization in all links, only that pair is chosen and the second one is in outage, although it could be supported, resulting to not as high sum throughput, as in the the first case.
35 CHAPTER 3. CRITERION FOR MODE SELECTION AND RE- SOURCE ALLOCATION 28 Figure 3.6: Scenario 1. Three cellular pairs exist in the cell and one new D2D pair arrives. Scenario 1 In this scenario, it is assumed that 3 cellular pairs exist in the cell. Figure 3.6 displays this scenario. Because only uplink resources are taken into consideration, only the transmitters of the cellular pair are displayed. These are UE 1, UE 2 and UE 3. The new D2D pair consists of UE 4 and UE 5. For every cellular link, the SINR and the throughput, before the new D2D pair arrives, are as follows. Γ i = g i P i N, Ŕ i = cw log 2 (1 + Γ i ) (3.14) Resource sharing between the new D2D pair and cellular pair i leads to the following SINR and throughput calculations. and Γ i = g i P i g 4 P 4 + N, Γ 45 = g 45 P 4 g i5 P i + N (3.15) R i = cw log 2 (1 + Γ i ) R 45 = cw log 2 (1 + Γ 45 ) (3.16) The criterion indicates that, for every existing cellular pair i, if R i + R 45 Ŕi, then the new D2D pair can share resources with. It is pretty straightforward that the new D2D pair can share resources with one, two or all three cellular pairs simultaneously. This will lead to sum throughput maximization. Let s assume now that 2 new D2D pairs arrive in the cell. This scenario is depicted in figure 3.7. In this case, the SINR and throughput calculations for every cellular pair i, are given in equations 3.4. Also, the same calculation after the introduction of one new D2D pair as in equations 3.15, apply. The question now is what
36 CHAPTER 3. CRITERION FOR MODE SELECTION AND RE- SOURCE ALLOCATION 29 Figure 3.7: Scenario 1. Three cellular pairs exist in the cell and two new D2D pairs arrives. will happen if a second D2D pair arrives at the same time with the first one. If both D2D pairs share the resources of the same cellular user, the SINR and throughput calculations are as follows. and g i P i Γ i = g 4 P 4 + g 6 P 6 + N, Γ 45 = g 67 P 6 Γ 67 = g i7 P i + g 47 P 4 + N g 45 P 4 g i5 P i + g 65 P 6 + N R i = cw log 2 (1 + Γ i ) R 45 = cw log 2 (1 + Γ 45 ) (3.17) R 67 = cw log 2 (1 + Γ 67 ) (3.18) The path gains g 65 and g 47, which are the path gains between the new D2D pairs are unknown. However, during the discovery phase of the new D2D pairs, message transmissions take place by the new UEs. It is assumed that the receiving UE of every new D2D pair gains knowledge about those paths through these message transmissions. For the purposes of the current thesis, it is assumed that these path gains are estimated with accuracy by new D2D pairs. It is impotrant to mention that, during the initial discovery phase, a separate channel is used for discovery. This means that only transmissions from the new D2D UEs occur in this channel. This allows the accurate estimation of the previously mentioned path gains. Application of the criterion for mode selection in the case where two new D2D pairs arrive indicates that, if R i +R 45 +R 67 R i +R 45 and R i +R 45 +R 67 R i + R 67 and of course R i + R 45 + R 67 Ŕi, then both new pairs may share resources with the cellular pair. Else, the pair which offers higher throughput of
37 CHAPTER 3. CRITERION FOR MODE SELECTION AND RE- SOURCE ALLOCATION 30 Figure 3.8: Scenario 1. Two cellular and one D2D pairs exist in the cell and one new D2D pair arrives. the cell is chosen. This criterion is very strict in this case too, as if throughput maximization is more favorable with one pair only, for all links i, then only that D2D pair is chosen. A different rule could be applied, allowing both new D2D pairs share resources with cellular pairs, offering the advantage of adding one more D2D pair in the cell and accepting a lower, but still more efficient resource sharing. For the purpose of this thesis, a strict criterion is applied, achieving throughput maximization that way. Scenario 2 In scenario 2, there are two cellular and one D2D pairs in the cell and one new D2D pair arrives. The existing D2D pair already shares resources with one or both cellular pairs. Figure 3.8 displays this scenario. Like in the previous scenario, only the transmitters of the cellular pairs are displayed. UE 1 and UE 2 are the two cellular pairs and UE 5 - UE 6 is the D2D pair that exists in the cell, sharing resources with UE 1. UE 3 - UE 4 is the new D2D pair that arrives in the cell. The SINR and throughput calculations for the existing pairs, before the new D2D pair arrives are as follows. Γ 1 = g 1 P 1 g 5 P 5 + N, Γ 56 = g 56 P 5 g 16 P 1 + N and Γ 2 = g 2 P 2 N (3.19) R 1 = cw log 2 (1 + Γ 1 ) R 56 = cw log 2 (1 + Γ 56 ) R 2 = cw log 2 (1 + Γ 2 ) (3.20)
38 CHAPTER 3. CRITERION FOR MODE SELECTION AND RE- SOURCE ALLOCATION When the new D2D pair arrives, it can share resources with UE 1 or UE 2 or both. If it shares resources with UE 1, it will have to share with D2D pair as well. Furthermore, in scenario 1, each cellular link was utilizing W bandwidth. This means that the total available bandwidth in the cell is 3W. In scenario 2, each of the cellular pairs utilizes a bandwidth of 3 W. The SINR 2 and throughput calculations, after the introduction of the new pair, are as follows. and Γ 1 = g 1 P 1 g 5 P 5 + g 3 P 3 + N, Γ 56 = Γ 2 = g 2 P 2 N Γ 34 = g 34 P 3 g 14 P 1 + g 54 P 5 + N g 56 P 5 g 16 P 1 + g 36 P 3 + N R 1 = c 3 2 W log 2(1 + Γ 1 ) R 56 = c 3 2 W log 2(1 + Γ 56 ) 31 (3.21) R 2 = c 3 2 W log 2(1 + Γ 2 ) R 34 = c 3 2 W log 2(1 + Γ 32 ) (3.22) If the application of the criterion for mode selection indicates that sharing resources with UE 1 leads to maximization of the sum throughput, then new D2D pair will share resources with UE 1. For UE 2, the same calculations apply, but this time, interference to and from the existing D2D pair are not considered, as it shares resources only with UE 1. If the criterion for mode selection indicates that higher utilization of the resourcees of UE 2 may be achieved if they are shared with new D2D pair, then the new D2D pair will also share resources with UE 2. It is straightforward that the new D2D pair may share resources with both UE 1 and UE 2. For the case that two new D2D pairs arrive simultaneously in the cell, the analysis performed for the same case of criterion one combined with the one presented here is considered to be sufficient. Scenario 3 In scenario 3, it is assumed that 1 cellular pair exists in the cell, sharing resources with two existing D2D pairs, simultaneously. The new D2D pair has to share resources with that cellular pair, accepting interference from and causing interference to all the existing pairs in the cell. Both the analysis for the SINR and the throughput calculations are similar to those presented for criterion 2. The differences may be located in the throughput calculations, as in this scenario, the cellular pair will utilize all resources available in the network. This means that the total bandwidth utilized by the existing cellular pair will be 3W. The same bandwidth will be utilized by the new pair or pairs, in the case which two new D2D pairs arrive at the same time in the cell.
39 CHAPTER 3. Scenario 4 CRITERION FOR MODE SELECTION AND RE- SOURCE ALLOCATION In this scenario, three D2D pairs exist in the cell and no cellular par is present. All D2D pairs utilize the same resources, 3W, causing interference to each other. The new D2D pair has to share resources with all existing D2D pairs, simultaneously. The same thing stands for the case which two new D2D pairs arrive in the cell at the same time. The analysis performed for the previous scenarios is considered to be sufficient Conclusion In chapter 3, the criterion for mode selection and a resource allocation scheme were presented. Moreover, a method to estimate the path gains between all the UEs and between the UEs and the base station were suggested. The resource allocation scheme was analyzed for a number of different simulation scenarios. The scenarios are considered to be realistic, although scenario four is unprobable. However, the analysis for all scenarios strengthens the validity of the the scheme and offers a sense of generalizability. in the chapter 5, simulation results are presented and analyzed for every possible scenario. 32
40 Chapter 4 Simulation Environment and Tools In chapter 4, the simulation environment that was created for the purposes of the current thesis is presented. It is important to mention that, although the basic simulation is the same for the transmission probability and the mode selection criterion with the resource allocation scheme, some different details are applied. In the course of this chapter, the general simulation environment will be presented in the first section and then the details for each of the different topics of investigation. 4.1 Introduction to the Simulation Environment A single cell environment is simulated in this thesis. The cell is assumed to be circular with radius R. The base station is located in the center of the cell User Distribution Users are uniformly distributed over the cell area, following a Circular Uniform Distribution. Two different types of users are considered, Cellular Users (CU) and Device-to-Device (D2D) Users. Cellular users communicate using one uplink and one downlink channel, relaying information through the base station. D2D users communicate using one bidirectional link only, utilizing the uplink resources Channel Model The proposed channel model is presented in [11]. It describes different path loss calculation models for cellular and D2D links. 33
41 CHAPTER 4. SIMULATION ENVIRONMENT AND TOOLS 34 Path Loss Model for Cellular Links For the traditional, cellular links, which are the links between the enodeb and the devices, the path loss model is described as follows, LOS = 22log 10 (d) log 10 (f/5) (db) (4.1) NLOS = 36.7log 10 (d) log 10 (f/5) (db) (4.2) The final path loss calculation is done using the following formula, L cell = α LOS + (1 α) NLOS + χ cell (db) (4.3) where, α = min(d/10, 1) (1 exp( d/36)) + exp( d/36) (4.4) Path Loss Model for D2D Links For the D2D links, which are the links between devices only, the path loss is calculated using the following formulas, LOS = 16.9log 10 (d) log 10 (f/5) (db) (4.5) NLOS = 40log 10 (d/1000) + 30log 10 (f 1000) + 49 (db) (4.6) The final path loss calculation is given from the following formula, L D2D = α enb L OS + (1 α) NLOS + χ D2D (db) (4.7) where, 1, if d 4 α = exp( (d 4)/3), if 4 < d < 60 0, if d 60 (4.8) In the formulas presented, for both cellular and D2D links, LOS and N LOS are the Line-of-Sight and Non-Line-of-Sight signal attenuation, respectively, the distance d between the communicating edges of the link is calculated in meters (m), the frequency of the carrier signal f is calculated in GHz and α is the probability of LOS. In the scope of the simulations of the effect of shadow fading, the variable χ, which is log-normally distributed, is added to the final path loss calculations. For the cellular links, this variable is denoted as χ cell and has a mean of 0 db and variance of 3 db. For the D2D links, it is denoted as χ D2D and has a mean of 0 db and variance of 8 db.
42 CHAPTER 4. SIMULATION ENVIRONMENT AND TOOLS Network Resources In all the simulation scenarios, it is assumed that no extra orthogonal resources are available iin the network. This means that the new D2D pair has to share resources with existing pairs in the cell, otherwise the new pair is assumed to be in outage. Furthermore, aplink resources are utilized. 4.2 Simulation Environment for Device Discovery Algorithms In this part, the discovery algorithms are compared in terms of time. Time here means the total time slots needed to complete the process, for each algorithm. The new pairs are dropped in the cell area, following a uniform distribution over it. This means that the new pair is D2D pair, only for a fraction of the total repeats of the algorithm. The results presented, are only for the case the new pair is actually a D2D pair. At this point, it is important to say that the simulation is run 100, 000 times in order to provide sufficient statistical accuracy. Moreover, simulation results about on the study of optimum transmission probability are provided. The same environment is created and simulated. The optimum transmission probability is compared with the simle adaptive 1, where N is the number of new pairs. It is called adaptive because, during N the execution of the algorithm, if a pair is discovered, it is removed and the transmisssion probability increases, as N decreases. 4.3 Simulation Environment for Mode Selection Criterion and Resource Allocation Scheme In this case, users are again dropped in the cell area, following a uniform distribution. However, for the existing users, there are a number of different scenarios. This means that there are some restrictions in the user distribution, in order to satisfy the needs for all scenarios. For the new D2D pair, the distribution is uniform. Again, the new pair is D2D only for a fraction of the total number of simulations. The results are presented only for this fraction of the total number of simulations. 4.4 Simulation Tool In order to simulate the cell environment, Matlab is used to generate the it.
43 CHAPTER 4. SIMULATION ENVIRONMENT AND TOOLS Parameters Used in Simulations In table 4.1, the values for the parameters used in the simulations performed are presented. Parameters Cellular Layout Cell Radius Noise Factor Device Transmitting Power in Cellular Mode Device Transmitting Power in D2D Mode Transmitting Power of Reference Signal during Discovery SINR Threshold for Cellular UEs γ CELL SINR Threshold for D2D UEs γ D2D Tota Celll Bandwidth Values Single Cell 400m 104 dbm 21 dbm 15 dbm 21 dbm 10 db 5 db 6 M Hz Table 4.1: Values of Simulation Parameters.
44 Chapter 5 Simulation Results In chapter 5, the results of the simulations are presented. First of all, the comparison of the two discovery algorithms introduced in chapter 3 is performed, with respect to the total amount of time needed to discover D2D pairs. Furthermore, a comparison between the transmission probability that was developed in chapter 3 as well and the adaptive 1, where N is the number of D2D pairs to be discovered, is presented, with respect to time. In the N second part of this chapter, the effectiveness of the mode selection criterion, that was proposed in chapter 4, is presented, discussed and analyzed. Finally, the result of the resource allocation scheme on the total throughput of the cell is discussed. 5.1 D2D Device Discovery Algorithms In this section, the comparison between the two proposed discovery algorithms, in terms of time needed to discover D2D pairs, is presented. Moreover, the comparison between the analytical model for the transmission probability of the UEs and adaptive 1, in terms of time needed to discover D2D pairs, is N presented Comparison Between Proposed Discovery Algorithms In this section a comparison between the discovery algorithms is presented for two and four new D2D pairs. The presentation of the simulation results for more than four new D2D pairs is not necessary as it is highly unlikeable that more D2D pairs will appear simultaneously in the cell, requesting D2D connection. Figure 5.1 illustrates the comparison between the two proposed algorithms, for two and four new D2D pairs that participate in the discovery process. At this point, it is essential to remind the names of the two algorithms. The first one is the Centralized, Fully-Network Dependent Algorithm and the second is the Semi-Centralized, Semi-Network Dependent Algorithm. 37
45 CHAPTER 5. SIMULATION RESULTS 38 Figure 5.1: CDF of Total Time Needed to Discover two and four new D2D pairs, using adaptive 1 Transmission Probability N
46 CHAPTER 5. SIMULATION RESULTS 39 In both parts of figure 5.1, the CDF of the total number of time slots needed to discover D2D pairs is presented. The cyan line represents the time needed, if no collisions are allowed and the transmission of every message is scheduled by the base station, in different time slots, for the first discovery algorithm. The red line represents the same case for the second discovery algorithm. The blue line represents the CDF of the total number of time slots needed to discover D2D pairs, if collisions take place during the discovery process. In this case, the base station does not schedule UEs in different time slots, for the first algorithm. Every UE transmits with a certain transmission probability, which is defined by the base station. The magenta line represents the same thing for the second algorithm. The figure on the top of the page is for two new D2D pairs and the figure on the bottom of the page is for four new D2D pairs. From the top figure, it is clear that the second algorithm provides better results in the discovery process than the first one. This is because, in the second discovery algorithm, the first discovery message is transmitted directly to the receiving UE of the D2D pair, without first requesting permission from the base station. Another advantage of the second algorithm is that, if the new pair of UEs is not actually a D2D pair, it is realized by the first message transmission, whereas in the first algorithm, some initial message transmissions will occur. In the second figure, the superiority in performance, of the second algorithm becomes more obvious. Furthermore, another observation in the upper figure is that, if UEs are allowed to transmit with a certain transmission probability, in the beginning of each slot, the performance of the discovery process is degraded, compared to having the base station schedule the transmissions of the UEs, avoiding collisions. However, the advantage of the using a certain transmission probability by the UEs is more obvious in the lower figure. It is clear that higher time efficiency is achieved if done so. The difference is augmented if more D2D pairs participate in the discovery process Comparison Between Analytical and Adaptive Transmission Probaability Models In this section, a comparison between the analytical and the adaptive models for the transmission probability is presented. As a reminder to the reader, the analytical model for the transmission probability was developed and presented in chapter 3. The adaptive model for the transmission probability could be sufficiently described by the expression 1, where N is the number of D2D N pairs that take part in the discovery process. It should be mentioned that both the adaptive and the analytical models adapt dynamic behaviour of the transmission probability, which means that, if a D2D pair completes the discovery process before others, it is removed by the process and the transmission probability increases accordingly. Figure 5.2 displays the comparison between those models, in terms of total
47 CHAPTER 5. SIMULATION RESULTS 40 Figure 5.2: Comparison between Adaptive and Analytical Transmission Probability, for two and four new D2D pairs.
48 CHAPTER 5. SIMULATION RESULTS 41 time needed to discover D2D pairs, for 2 and for 4 new D2D pairs. The cyan line represents the total number of time slots needed to discover the D2D pairs, using the transmission probability provided by the analytical model, for the first algorithm. The red line displays the same thing for the second algorithm. The blue represents the total number of slots needed to discover all D2D pairs, using the adaptive model for the transmission probability, for the first algorithm. The magenta line represents the same thing for the second algorithm. The figure in the upper part of the page is for two new D2D pairs and the figure in the bottom part of the page is for four new D2D pairs. From the figure on the upper part of the page, it is obvious that the analytical model for the transmission probability provides better results, in terms of time.that difference is more obvious in the bottom figure, which depicts the case with four new D2D pairs. That difference will be augmented for higher number of new D2D pairs that take part in the discovery process. However, it is improbable that more D2D pairs will participate in the discovery process simultaneously. Another important result to note, is that the analytical model provides even better results for the second algorithm, in comparison to the first algorithm. This happens because, during the analysis in chapter 3, it was assumed that messages that collide are discovery messages intended for other D2D UEs and not the base station. This provides a better approximation, especially for the second algorithm, in which two message transmissions from the sending to the receiving UE of the same D2D pair are necessary. 5.2 Criterion for Mode Selection and Resource Allocation In this section, the effectiveness of the proposed criterion for mode selection is evaluated. The evaluation depends on if the criterion leads in higher sum throughput in the cell. Moreover, the sum throughput of the cell, using the criterion, is presented and compared to the sum throughput of the cell, before the new pair or pairs arrive. The results are presented for one and two new D2D pairs, for all possible scenarios, which were presented and analyzed in chapter One New D2D Pair Figure 5.3 depicts the effectiveness of the criterion for mode selection. In order to evaluate the its effectiveness, we use the ratio of the sum throughput of the cell with the new pair over the sum throughput of the cell without it. In order to make it more clear for the reader, the ratio is presented in equation 5.1 Ratio = Sum Throughput of cell with the new D2D Pair Sum Throughput of cell without the new D2D Pair (5.1)
49 CHAPTER 5. SIMULATION RESULTS 42 (a) Scenario 1 (b) Scenario 2 (c) Scenario 3 (d) Scenario 4 Figure 5.3: Ratio of Sum Throughput of Cell with New D2D Pair over Sum Throughput of Cell wthout it, for all four Scenarios.
50 CHAPTER 5. SIMULATION RESULTS 43 The results presented in Figure 5.3 indicate that the criterion for mode selection is extremely accurate for scenario one, in which three cellular pairs exist in the cell when the new D2D pair arrives. This is because the part of the discovery process in which both the transmitting and the receiving UEs of the new D2D pair listen for interference, allows very accurate interference estimation at the D2D receiver. Moreover, the base station knows exactly how much interference is caused to the existing cellular pairs, by the new D2D pair, as the interference is caused in the uplink of the cellular pair, and the base station can estimate the path gain between the new D2D pair and itself. For scenario two, in which two existing cellular and one D2D pair exist in the cell, the criterion makes wrong estimation for a small percentage (less than 5 %) of the total cases. The same applies for scenario three, in which one cellular and two D2D pairs exist in the cell, only in this case the percentage is a little bit higher (approximately 7 %). The criterion is evaluated as adequate in both scenarios, as it provides promising results for 95 % and 93 % of the cases. The reason for not providing accurate results for all the cases, is that, when one or two D2D pairs exist in the cell sharing resources with an existing cellular pair, although the estimation of the interference that will be caused to the new D2D pair is accurate, it is very difficult to predict the interference the new D2D pair will cause to existing D2D pairs. The estimation provided in chapter 3, for the interference caused by the new D2D pair to existing D2D pairs is not sufficient. For the last scenario, scenario four, in which only three D2D pairs exist in the cell, sharing the same resources, the behaviour of the criterion is inadequate. For almost 50 % of the cases, the criterion fails to provide an accurate estimation. This happens because only D2D pairs exist in the cell and, as mentioned before, the estimation does not provide adequate results, concerning the interference the new D2D pair will cause to existing D2D pairs. Figure 5.4 illustrates the total sum throughput of all pairs in the cell when one new D2D pair arrives, in comparison with the sum throughput of the cell without the new D2D pair. The results are derived by applying the suggested mode selection criterion. The first thing to notice is that resource utilization increases when more D2D pairs exist in the cell. This means that higher throughput is achieved that way because the same resources are reused by existing D2D pairs and cellular pairs. Moreover, highest resource utilization is achieved when three cellular pairs exist in the cell, as it is depicted in figure 5.4 (a), because we have perfect estimation of the interference that will be caused to the existing cellular users, by the new D2D pair and vice versa. The sum throughput also increases in scenarios two and three, as the interference estimation was adequate. In scenario four, depicted in the figure 5.4 (d), the sum throughput of the cell is deeply affected by inaccurate interference estimation, leading to strong degradation of it.
51 CHAPTER 5. SIMULATION RESULTS 44 (a) Scenario 1 (b) Scenario 2 (c) Scenario 3 (d) Scenario 4 Figure 5.4: Comparison of Sum Throughput of the Cell after new D2D pair arrives, with Sum Throughput of the Cell before the New D2D Pair arrives, for all four Scenarios.
52 CHAPTER 5. SIMULATION RESULTS Two New D2D Pairs In this section, the analysis of the criterion for mode selection is presented for all four scenarios, when two new D2D pairs arrive in the cell. Moreover, the throughput analysis presented here is similar to the previous one. Figure 5.5 depicts the effectiveness of the criterion for mode selection, using the ratio of equation 5.1 as an evaluation tool. As it was mentioned in the case which one new pair arrives in the cell, the proposed criterion for mode selection offers extremely accurate results, in scenario one in which three cellular pairs exist in the cell. The reasons for that were explained for the case of one new D2D pair. The behaviour of the criterion for scenarios two and three is the same as in the case of one new D2D pair as well. The reason why the same behaviour is observed, is that cellular users still exist in the cell, providing accurate prediction of the interference at cellular links. Also, the interference caused at the new D2D pairs can be estimated correctly, by allowing the receiving UEs of the new D2D pairs listen for interference. What is worth to observe is that, in scenario four, in which only D2D pairs exist in the cell, sharing all the resources of the network, the behaviour of the criterion is better. A possible explanation to that, is that there are two new pairs in the cell, providing two different estimations of the interference that will be caused in the existing D2D pairs. However, the criterion is not adequate, because in most cases, D2D mode for the new pairs is not applied. It could be said that it is a safe option, but not a sufficient one. In figure 5.6, the comparison between the sum throughput of the cell, including the new D2D pairs, with the sum throughput of the cell without them, is presented. The same observation like in the case of one new D2D pair, concerning the better utilization of the total resources, when more D2D pairs exist in the cell, can be made here as well. It should be mentioned that only the cases in which both new D2D pairs are accepted by the criterion, simultaneously, are presented in the figures. It can be observed that, in the first three scenarios, the sum throughput of the cell is increased, as the criterion for mode selection provides accurate estimation of the interference caused by new D2D pairs to existing pairs and vice versa. For the last scenario, in which 3 D2D pairs exist in the cell, the results show an increase in the sum throughput, in contrast to the same scenario for one new D2D pair. As it was mentioned before, the criterion provides a better estimation, as more measurements for interference are reported to the base station. However, the criterion is a safe option and is not adequate, which makes the results insufficient for evaluating the effect in sum throughput of the cell.
53 CHAPTER 5. SIMULATION RESULTS 46 (a) Scenario 1 (b) Scenario 2 (c) Scenario 3 (d) Scenario 4 Figure 5.5: Ratio of Sum Throughput of Cell with New D2D Pairs over Sum Throughput of Cell wthout them, for all four Scenarios.
54 CHAPTER 5. SIMULATION RESULTS 47 (a) Scenario 1 (b) Scenario 2 (c) Scenario 3 (d) Scenario 4 Figure 5.6: Comparison of Sum Throughput of the Cell after two new D2D pairs arrive, with Sum Throughput of the Cell before the New D2D Pairs arrives, for all four Scenarios.
55 Chapter 6 Conclusion and Discussion In chapter 6, a summary of the final results is presented. Moreover, an evaluation of the discovery algorithms, the transmission probability for the discovery phase, the criterion for mode selection and the resource allocation is performed. Furthermore, the findings of the current thesis are presented and their contribution is analyzed. Finally, suggestions about future work, that could be based on the results of the current thesis is provided. 6.1 Summary and Discussion The first part of the current thesis consists of the two proposed discovery algorithms, the Centralized, Fully-Network Dependent Algorithm and the Semi- Centralized, Semi-Network Dependent Algorithm. Results show that the second algorithm is more efficient than the first, as it succeeds in discovering the new D2D pairs faster. Moreover, it is more efficient in the case that a pair is not actually a D2D one, as it stops the D2D discovery process in the first message, whereas the first algorithm needs some message transmissions, before doing so. The difference in performance of the two discovery algorthms is higher when more D2D pairs participate in the discovery process. The comparison results were expected, as the second algorithm behaves in a more decentalized way, ommitting initial message transmissions to the base station. The second part of this thesis, was the study of the optimum transmisssion probability. An analytical model was developed and present. This model was compared to a simple one, which is referred to as adaptive. Results show that the analytical model provides better results, in terms of time needed to discover D2D pairs. Results are confirmed by both discovery algortihms. Another observation was that the analytical model for the transmisssion probability is more efficient with the second algorithm. Results were expected, as an SINR threshold is taken into account when collisions take place, for correct message reception. The analytical model utilizes this threshold whereas the adaptive model does not. Moreover, the analytical model is more efficient with the second algorithm, because among the assumptions made for the calculation of 48
56 CHAPTER 6. CONCLUSION AND DISCUSSION 49 the transmission probability, it was assumed that when two UEs participate in a collision, the message transmissions were intended for other UEs and not the base station. The third part of the thesis was the study of a criterion for mode selection. Results show that the criterion is extremely accurate in the scenario which three cellular pairs exist in the cell. Moreover, it is considered adequate for the scenarios which include cellular and D2D pairs existing in the cell and sharing resources. However, the criterion is not effective when only D2D pairs exist in the cell. The reasons for that were analyzed in chapter 5. A better estimation of the interference caused by new D2D pairs to existing cellular and D2D pairs and vice versa would improve the behaviour of the criterion a lot. The results were expected for all scenarios. Especially for the last scenario, the estimation of the interference is very difficult and needs improvement. The last part of the thesis was the resource allocation. it was assumed that new D2D pairs could utilize as many resources as possible from the cell, sharing them with existing pairs. Results show that it is possible and it offers high resource utilization. The results were combined with the criterion for mode selection. The performance of this resource allocation is higher when cellular users only exist in the cell. 6.2 Contribution The contribution of the current thesis is summarized below. 1. Two D2D discovery algorithms were defined, using information for existing work, analyzed and compared. A suggestion in favor of one of them is made. 2. An analytical model for the transmission probability of UEs during the discovery phase was developed and compared with the adaptive one. 3. One criterion for mode selection was proposed and presented. Simulations for different scenarios were presented and evaluated. 4. A method for estimating interference caused by new D2D pairs to existing ones and vice versa is proposed and analyzed. This method is evaluated through a number of simulations, for different scenarios. 5. A resource allocation scheme is presented and evaluated through a number of simulations for different simulation scenarios. 6.3 Future Work The current thesis uses a number of simulations for different scenarios in order to evaluate the performance of the all topics of investigaation. The simulation
57 CHAPTER 6. CONCLUSION AND DISCUSSION 50 environment includes a single cell only. It would be a good suggestion to perform the simulations in an environment with multiple cells. Moreover, it is assumed that the links between entities in the network suffer from slow fading. It would very interesting to evalluate the results, including fast fading. Furthermore, in the criterion for mode selection and the resource allocation scheme, no protection for the existing links is provided. The ultimate goal was the sum throughput maximization without taking into consideration a minimum CoS for the existing users. An imporvement could be made, by including this protection. Finally, the scheme for interference estimation could be further improved, to provide more accurate results.
58 Bibliography [1] K. Doppler et al., Device-to-Device Communication as an Underlay to LTE-Advanced Networks, IEEE Communications Magazine, vol. 47, pp , December [2] Lei Lei and Zhangdui Zhong, C. Lin and X. Shen, Operator controlled device-to-device communications in LTE-advanced networks, IEEE Wireless Communications, vol. 19, pp , June [3] G. Fodor et al., Design aspects of network assisted device-to-device communications, IEEE Communications Magazine, vol. 50, pp , March [4] D. B. Johnson and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, IEEE Trans. on Mobile Computing, vol. 353, pp ,1996. [5] B. Kaufman and B. Aazhang, Cellular Networks with an Overlaid Device to Device Network, Asilomar Conference, Pacific Grove, California, November [6] B. Kaufman, B. Aazhang, J. Lilleberg, Interference Aware Link Discovery for Device to Device Communication, Asilomar Conference, Pacific Grove, California, November [7] B. Kaufman, J. Lilleberg, B. Aazhang, Spectrum Sharing Scheme Between Cellular Networks and Ad-Hoc Device to Device Networks, accepted for publishing in IEEE Transactions on Wireless Communications, February [8] S. I. Ahamed, M. Zulkernine and S. Anamanamuri, A dependable device discovery approach for pervasive computing middleware, preceedings of the First International Conference on Availability, Reliability and Security (ARES 06), April [9] S. Hakola et al., Device-To-Device (D2D) Communication in Cellular Network - Performance Analysis of Optimum and Practical Communication Mode Selection, IEEE Wireless Communications and Networking Conference (WCNC),
59 BIBLIOGRAPHY 52 [10] C. Yu, K. Doppler, C. B. Ribeiro and O. Tirkkonen, Resource Sharing Optimization for Device-to-Device Communication Underlaying Cellular Networks, IEEE Transactions on Wireless Communications, vol. 10, No. 8, August [11] S. Hakola and H. Xing, The investigation of power control schemes for a device-to-device communication integrated into OFDMA cellular system, 2010 IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), pp , September 2010.
60 TRITA-ICT-EX-2013:116
Design Aspects of Network Assisted Device-to-Device Communications
ACCEPTED FROM OPEN CALL Design Aspects of Network Assisted Device-to-Device Communications Gábor Fodor, Erik Dahlman, Gunnar Mildh, Stefan Parkvall, Norbert Reider, György Miklós, and Zoltán Turányi, Ericsson
Bluetooth voice and data performance in 802.11 DS WLAN environment
1 (1) Bluetooth voice and data performance in 802.11 DS WLAN environment Abstract In this document, the impact of a 20dBm 802.11 Direct-Sequence WLAN system on a 0dBm Bluetooth link is studied. A typical
CS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
Multihopping for OFDM based Wireless Networks
Multihopping for OFDM based Wireless Networks Jeroen Theeuwes, Frank H.P. Fitzek, Carl Wijting Center for TeleInFrastruktur (CTiF), Aalborg University Neils Jernes Vej 12, 9220 Aalborg Øst, Denmark phone:
Inter-Cell Interference Coordination (ICIC) Technology
Inter-Cell Interference Coordination (ICIC) Technology Dai Kimura Hiroyuki Seki Long Term Evolution (LTE) is a promising standard for next-generation cellular systems targeted to have a peak downlink bit
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse
Packet Queueing Delay in Wireless Networks with Multiple Base Stations and Cellular Frequency Reuse Abstract - Cellular frequency reuse is known to be an efficient method to allow many wireless telephone
1 Lecture Notes 1 Interference Limited System, Cellular. Systems Introduction, Power and Path Loss
ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2015 1 Lecture Notes 1 Interference Limited System, Cellular Systems Introduction, Power and Path Loss Reading: Mol 1, 2, 3.3, Patwari
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols
Behavior Analysis of TCP Traffic in Mobile Ad Hoc Network using Reactive Routing Protocols Purvi N. Ramanuj Department of Computer Engineering L.D. College of Engineering Ahmedabad Hiteishi M. Diwanji
- Cognitive Radio (CR) technology is a promising emerging technology that enables a more efficient usage of
An Asynchronous Neighbor Discovery Algorithm for Cognitive Radio Networks Short Paper Chanaka J. Liyana Arachchige, S. Venkatesan and Neeraj Mittal Erik Jonsson School of Engineering and Computer Science
Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY
CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2000 1x EVDO and LTE Systems
ICWMC 211 : The Seventh International Conference on Wireless and Mobile Communications An Interference Avoiding Wireless Network Architecture for Coexistence of CDMA 2 1x EVDO and LTE Systems Xinsheng
Smart Mobility Management for D2D Communications in 5G Networks
Smart Mobility Management for D2D Communications in 5G Networks Osman N. C. Yilmaz, Zexian Li, Kimmo Valkealahti, Mikko A. Uusitalo, Martti Moisio, Petteri Lundén, Carl Wijting Nokia Research Center Nokia
Evolution in Mobile Radio Networks
Evolution in Mobile Radio Networks Multiple Antenna Systems & Flexible Networks InfoWare 2013, July 24, 2013 1 Nokia Siemens Networks 2013 The thirst for mobile data will continue to grow exponentially
Figure 1: cellular system architecture
Question 1: (30 marks) Consider a FDM cellular system with 120 cites, a frequency reuse factor of N=12, and 900 overall two-way channels. Omni-directional antennas are used: Figure 1 shows some of the
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks
IRMA: Integrated Routing and MAC Scheduling in Multihop Wireless Mesh Networks Zhibin Wu, Sachin Ganu and Dipankar Raychaudhuri WINLAB, Rutgers University 2006-11-16 IAB Research Review, Fall 2006 1 Contents
Interference Management: From Autonomous to Closely Coordinated Approaches
Technische Universität München Lehrstuhl für Kommunikationsnetze Prof. Dr.-Ing. J. Eberspächer VDE/ITG Fachgruppe 5.2.4 Workshop Darmstadt 2010 Interference Management and Cooperation Strategies in Communication
How To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
Frequency Assignment in Mobile Phone Systems
Konrad-Zuse-Zentrum für Informationstechnik Berlin Takustraße 7 D-14195 Berlin-Dahlem Germany MARTIN GRÖTSCHEL Frequency Assignment in Mobile Phone Systems ZIB-Report 00-58 (Dezember 2000) Frequency Assignment
Full Duplex Device-to-Device Communication in Cellular Networks
Full Duplex Device-to-Device Communication in Cellular Networks Samad Ali Email: [email protected] Nandana Rajatheva Email: [email protected] Matti Latva-aho Email: [email protected] Abstract In this paper
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
LTE Evolution for Cellular IoT Ericsson & NSN
LTE Evolution for Cellular IoT Ericsson & NSN LTE Evolution for Cellular IoT Overview and introduction White Paper on M2M is geared towards low cost M2M applications Utility (electricity/gas/water) metering
VOICE OVER WI-FI CAPACITY PLANNING
VOICE OVER WI-FI CAPACITY PLANNING Version 1.0 Copyright 2003 Table of Contents Introduction...3 Wi-Fi RF Technology Options...3 Spectrum Availability and Non-Overlapping Wi-Fi Channels...4 Limited
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment
An Algorithm for Automatic Base Station Placement in Cellular Network Deployment István Törős and Péter Fazekas High Speed Networks Laboratory Dept. of Telecommunications, Budapest University of Technology
A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System
A Novel Decentralized Time Slot Allocation Algorithm in Dynamic TDD System Young Sil Choi Email: [email protected] Illsoo Sohn Email: [email protected] Kwang Bok Lee Email: [email protected] Abstract
Wireless LAN Concepts
Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied
A! Aalto University Comnet
NETS2020 Project Task #2.3: Self-organization in Dynamic Networks Olav Tirkkonen, Jyri Hämäläinen 1 Content Subtask #2.3.1: Convergence of Distributed Network Algorithms: The project outcome Subtask #2.3.2:
Inter-cell Interference Mitigation Reduction in LTE Using Frequency Reuse Scheme
International Journal of Scientific and Research Publications, Volume 5, Issue 8, August 2015 1 Inter-cell Interference Mitigation Reduction in LTE Using Frequency Reuse Scheme Rupali Patil 1, R.D.Patane
Algorithms for Interference Sensing in Optical CDMA Networks
Algorithms for Interference Sensing in Optical CDMA Networks Purushotham Kamath, Joseph D. Touch and Joseph A. Bannister {pkamath, touch, joseph}@isi.edu Information Sciences Institute, University of Southern
GSM Frequency Planning with Band Segregation for the Broadcast Channel Carriers
GSM Frequency Planning with Band Segregation for the Broadcast Channel Carriers F. Galliano (1), N.P. Magnani (1), G. Minerva (1), A. Rolando (2), P. Zanini (3) (1) CSELT - Via G. Reiss Romoli, 274 - Torino
On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2
On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com
CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0
LoRaWAN What is it? A technical overview of LoRa and LoRaWAN Technical Marketing Workgroup 1.0 November 2015 TABLE OF CONTENTS 1. INTRODUCTION... 3 What is LoRa?... 3 Long Range (LoRa )... 3 2. Where does
Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks
Performance of Symmetric Neighbor Discovery in Bluetooth Ad Hoc Networks Diego Bohman, Matthias Frank, Peter Martini, Christoph Scholz Institute of Computer Science IV, University of Bonn, Römerstraße
ECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
Lecture 1. Introduction to Wireless Communications 1
896960 Introduction to Algorithmic Wireless Communications Lecture 1. Introduction to Wireless Communications 1 David Amzallag 2 May 25, 2008 Introduction to cellular telephone systems. How a cellular
A Network Simulation Tool to Generate User Traffic and Analyze Quality of Experience for Hybrid Access Architecture
A Network Simulation Tool to Generate User Traffic and Analyze Quality of Experience for Hybrid Access Architecture Oscar D. Ramos-Cantor, Technische Universität Darmstadt, [email protected],
LTE-Advanced Carrier Aggregation Optimization
Nokia Networks LTE-Advanced Carrier Aggregation Optimization Nokia Networks white paper LTE-Advanced Carrier Aggregation Optimization Contents Introduction 3 Carrier Aggregation in live networks 4 Multi-band
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight
TEC Voice services over Adaptive Multi-user Orthogonal Sub channels An Insight HP 4/15/2013 A powerful software upgrade leverages quaternary modulation and MIMO techniques to improve network efficiency
MAC Algorithms in Wireless Networks
Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS
RESOURCE ALLOCATION FOR INTERACTIVE TRAFFIC CLASS OVER GPRS Edward Nowicki and John Murphy 1 ABSTRACT The General Packet Radio Service (GPRS) is a new bearer service for GSM that greatly simplify wireless
Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 9 Cellular Telephone Networks Specific Instructional Objectives At the end of this lesson, the student will be able to: Explain the operation of Cellular
NetworkPathDiscoveryMechanismforFailuresinMobileAdhocNetworks
Global Journal of Computer Science and Technology: E Network, Web & Security Volume 14 Issue 3 Version 1.0 Year 2014 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.
CHAPTER 12 PRACTICE SET Questions Q12-1. The answer is CSM/CD. a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. Q12-3. The answer
Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks
Priority-Based Congestion Control Algorithm for Cross-Traffic Assistance on LTE Networks Lung-Chih Tung, You Lu, Mario Gerla Department of Computer Science University of California, Los Angeles Los Angeles,
LTE on Shared Bands (LEONARD)
LTE on Shared Bands (LEONARD) Kari Rikkinen TEKES TRIAL seminar 15.02.2012 Renesas Mobile Corporation Department name 2012/3/28 Rev. 0.00 2010 Renesas Mobile Corporation. All rights reserved. 00000-A Introduction
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Scheduling and capacity estimation in LTE. Olav Østerbø, Telenor CD (Corporate Development) ITC-23, September 6-8, 2011, San Francisco
Scheduling and capacity estimation in LTE Olav Østerbø, Telenor CD (Corporate Development) Agenda Introduction Obtainable bitrate as function of SINR Radio channel propagation model Radio signal fading
Technical and economical assessment of selected LTE-A schemes.
Technical and economical assessment of selected LTE-A schemes. Heinz Droste,, Darmstadt Project Field Intelligent Wireless Technologies & Networks 1 Mobile Networks enabler for connected life & work. Textbox
APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM
152 APPENDIX 1 USER LEVEL IMPLEMENTATION OF PPATPAN IN LINUX SYSTEM A1.1 INTRODUCTION PPATPAN is implemented in a test bed with five Linux system arranged in a multihop topology. The system is implemented
Cooperative Techniques in LTE- Advanced Networks. Md Shamsul Alam
Cooperative Techniques in LTE- Advanced Networks Md Shamsul Alam Person-to-person communications Rich voice Video telephony, video conferencing SMS/MMS Content delivery Mobile TV High quality video streaming
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols
Formal Measure of the Effect of MANET size over the Performance of Various Routing Protocols Er. Pooja Kamboj Research Scholar, CSE Department Guru Nanak Dev Engineering College, Ludhiana (Punjab) Er.
Christian Bettstetter. Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks
Christian Bettstetter Mobility Modeling, Connectivity, and Adaptive Clustering in Ad Hoc Networks Contents 1 Introduction 1 2 Ad Hoc Networking: Principles, Applications, and Research Issues 5 2.1 Fundamental
CDMA Network Planning
CDMA Network Planning by AWE Communications GmbH www.awe-com.com Contents Motivation Overview Network Planning Module Air Interface Cell Load Interference Network Simulation Simulation Results by AWE Communications
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE
ADHOC RELAY NETWORK PLANNING FOR IMPROVING CELLULAR DATA COVERAGE Hung-yu Wei, Samrat Ganguly, Rauf Izmailov NEC Labs America, Princeton, USA 08852, {hungyu,samrat,rauf}@nec-labs.com Abstract Non-uniform
LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
LTE Performance and Analysis using Atoll Simulation
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 9, Issue 6 Ver. III (Nov Dec. 2014), PP 68-72 LTE Performance and Analysis using Atoll Simulation
COMPATIBILITY STUDY FOR UMTS OPERATING WITHIN THE GSM 900 AND GSM 1800 FREQUENCY BANDS
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) COMPATIBILITY STUDY FOR UMTS OPERATING WITHIN THE GSM 900 AND GSM 1800 FREQUENCY
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido
From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11
A Short Look on Power Saving Mechanisms in the Wireless LAN Standard Draft IEEE 802.11 Christian Röhl, Hagen Woesner, Adam Wolisz * Technical University Berlin Telecommunication Networks Group {roehl,
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,
Introduction to Wide-Area WiFi. AfNOG 2009 Wireless Tutorials Cairo
Introduction to Wide-Area WiFi AfNOG 2009 Wireless Tutorials Cairo Wireless networking protocols The 802.11 family of radio protocols are commonly referred to as WiFi. 802.11a supports up to 54 Mbps using
Evolution of the Air Interface From 2G Through 4G and Beyond
Evolution of the Air Interface From 2G Through 4G and Beyond Presentation to IEEE Ottawa Section / Alliance of IEEE Consultants Network (AICN) - 2nd May 2012 Frank Rayal BLiNQ Networks/ Telesystem Innovations
EETS 8316 Wireless Networks Fall 2013
EETS 8316 Wireless Networks Fall 2013 Lecture: WiFi Discovery, Powersave, and Beaconing http://lyle.smu.edu/~skangude/eets8316.html Shantanu Kangude [email protected] Discovery and Beaconing Discovery?
ECE 333: Introduction to Communication Networks Fall 2002
ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols
Introduction to Clean-Slate Cellular IoT radio access solution. Robert Young (Neul) David Zhang (Huawei)
Introduction to Clean-Slate Cellular IoT radio access solution Robert Young (Neul) David Zhang (Huawei) Page 11 Introduction and motivation There is a huge opportunity for Mobile Network Operators to exploit
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1
Load Balancing and Resource Reservation in Mobile Ad-Hoc Networks 1 Gautam Chakrabarti Sandeep Kulkarni Department of Computer Science and Engineering Michigan State University Abstract To ensure uninterrupted
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks *
An Efficient QoS Routing Protocol for Mobile Ad-Hoc Networks * Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwj oeshanyang.ac.kr Abstract. To satisfy the user requirements
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
Lecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
What s so smart about Smart-hopping?
What s so smart about Smart-hopping? A closer look at some of the key technology decisions behind the IntelliVue Smart-hopping WMTS band Introduction The IntelliVue Smart-hopping WMTS band opens up a world
Analysis of Immunity by RF Wireless Communication Signals
64 PIERS Proceedings, Guangzhou, China, August 25 28, 2014 Analysis of Immunity by RF Wireless Communication Signals Hongsik Keum 1, Jungyu Yang 2, and Heung-Gyoon Ryu 3 1 EletroMagneticwave Technology
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
Dynamic Load Balance Algorithm (DLBA) for IEEE 802.11 Wireless LAN
Tamkang Journal of Science and Engineering, vol. 2, No. 1 pp. 45-52 (1999) 45 Dynamic Load Balance Algorithm () for IEEE 802.11 Wireless LAN Shiann-Tsong Sheu and Chih-Chiang Wu Department of Electrical
Using TEMS Pocket. Johan Montelius
Using TEMS Pocket Johan Montelius Introduction In this laboration you will get acquainted with the TEMS Pocket tool. You will examine both the Monaco network and a commercial network. Since this is your
Deployment of Multi-layer TDMA Cellular Network with Distributed Coverage for Traffic Capacity Enhancement
Deployment of Multi-layer TDMA Cellular Network with Distributed Coverage for Traffic Capacity Enhancement Jérôme Brouet, Patrick Charrière, Vinod Kumar* Armelle Wautier, Jacques Antoine** *Alcatel, Corporate
System Design in Wireless Communication. Ali Khawaja
System Design in Wireless Communication Ali Khawaja University of Texas at Dallas December 6, 1999 1 Abstract This paper deals with the micro and macro aspects of a wireless system design. With the growing
Energy Optimal Routing Protocol for a Wireless Data Network
Energy Optimal Routing Protocol for a Wireless Data Network Easwar Vivek Colloborator(s): Venkatesh Ramaiyan, Srikrishna Bhashyam Department of Electrical Engineering, Indian Institute of Technology, Madras.
Voice Service Support over Cognitive Radio Networks
Voice Service Support over Cognitive Radio Networks Ping Wang, Dusit Niyato, and Hai Jiang Centre For Multimedia And Network Technology (CeMNeT), School of Computer Engineering, Nanyang Technological University,
Multi-Dimensional OFDMA Scheduling in a Wireless Network with Relay Nodes
Multi-Dimensional OFDMA Scheduling in a Wireless Network with Relay Nodes Reuven Cohen Guy Grebla Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel Abstract LTE-advanced
GSM VOICE CAPACITY EVOLUTION WITH VAMOS Strategic White Paper
GSM VOICE CAPACITY EVOLUTION WITH VAMOS Strategic White Paper Table of contents VAMOS increases your GSM voice capacity at minimum investment / 1 Take the full benefit of VAMOS / 1 Standard aspects / 1
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan
Energy Efficiency of Load Balancing in MANET Routing Protocols
Energy Efficiency of Load Balancing in MANET Routing Protocols Sunsook Jung, Nisar Hundewale, Alex Zelikovsky Abstract This paper considers energy constrained routing protocols and workload balancing techniques
Chapter 6: Conclusion
Chapter 6: Conclusion In this research we have designed the bandwidth optimization control protocol to manage the proposed Dual-bandwidth data path for the CDMA2000-WLAN integrated network. The user s
Location management Need Frequency Location updating
Lecture-16 Mobility Management Location management Need Frequency Location updating Fig 3.10 Location management in cellular network Mobility Management Paging messages Different paging schemes Transmission
Delivering 4x4 MIMO for LTE Mobile Devices. March 2014. SkyCross Dual imat 4x4 MIMO Technology for LTE. Introduction
Delivering 4x4 MIMO for LTE Mobile Devices SkyCross Dual imat 4x4 MIMO Technology for LTE March 2014 Introduction With the rise of low-cost smartphones on the horizon, creating differentiation by leveraging
Device-to-Device Communication as an Underlay to LTE-Advanced Networks
TOPICS IN RADIO COMMUNICATIONS Device-to-Device Communication as an Underlay to LTE-Advanced Networks Klaus Doppler, Mika Rinne, Carl Wijting, Cássio B. Ribeiro, and Klaus Hugl, Nokia Research Center ABSTRACT
MIMO Antenna Systems in WinProp
MIMO Antenna Systems in WinProp AWE Communications GmbH Otto-Lilienthal-Str. 36 D-71034 Böblingen [email protected] Issue Date Changes V1.0 Nov. 2010 First version of document V2.0 Feb. 2011
Lecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
Collision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
VoIP-Kapazität im Relay erweiterten IEEE 802.16 System
VoIP-Kapazität im Relay erweiterten IEEE 802.16 System 21. ComNets-Workshop Mobil- und Telekommunikation Dipl.-Ing. Karsten Klagges ComNets Research Group RWTH Aachen University 16. März 2012 Karsten Klagges
4G LTE Opportunities & Challenges in DTT arena
4G LTE Opportunities & Challenges in DTT arena DigiTAG Workshop Istanbul 14-15 November 2013 Stan Baaijens, CEO Funke 1 Why 4G LTE (Long Term Evolution) The unrelenting growth of smartphone and tablet
Cloud Radios with Limited Feedback
Cloud Radios with Limited Feedback Dr. Kiran Kuchi Indian Institute of Technology, Hyderabad Dr. Kiran Kuchi (IIT Hyderabad) Cloud Radios with Limited Feedback 1 / 18 Overview 1 Introduction 2 Downlink
