Межмашинное взаимодействие D2D в сетях LTE
The paper is conducted the research and development of methods of interaction and methods of detection of mobile devices on the wireless networks of LTE using D2D (device-to-device) of interaction, and methods of routing of a traffic is conducted
In this work, we propose an approach to deploy and manage resources in a surveillance system, based on cellular technologies. In such a system, on one hand, the data from CCTV cameras should be reliably delivered with as higher quality as possible within several seconds after they were generated to enable near real-time surveillance. On the other hand, the Web traffic, which is generated in public cellular networks shall be delivered with the same quality as if there were no CCTV at all. In the paper, we propose an approach of how to design such a system based on the 5G technology and how to organize transmission to satisfy the described requirements and provide near-optimal quality of the generated video.
Device-to-device (D2D) communication is one of the most promising innovations in the next-generation wireless ecosystem, which improves the degrees of spatial reuse and creates novel social opportunities for users in proximity. As standardization behind network-assisted D2D technology takes shape, it becomes clear that security of direct connectivity is one of the key concerns on the way to its ultimate user adoption. This is especially true when a personal user cluster (that is, a smartphone and associated wearable devices) does not have a reliable connection to the cellular infrastructure. In this paper, we propose a novel framework that embraces security of geographically proximate user clusters. More specifically, we employ game-theoretic mechanisms for appropriate user clustering taking into account both spatial and social notions of proximity. Further, our information security procedures implemented on top of this clustering scheme enable continuous support for secure direct communication even in case of unreliable/unavailable cellular connectivity. Explicitly incorporating the effects of user mobility, we numerically evaluate the proposed framework by confirming that it has the potential to substantially improve the resulting system-wide performance.
hot topic recently attracted much interest in 3GPP community is ultra reliable low latency communications. While specific protocols for such type of communications are under development, in this paper we evaluate how well we can meet strict quality of service requirements in the current LTE/LTE-Advanced networks. Specifically, we design a new two-step radio resource management algorithm for reliable low latency communications. At the first step, the algorithm forms a high-priority group of users which can be reliably served within the given delay budget. At the second step, the algorithm solves a linear optimization problem and allocates resource blocks to meet quality of service requirements at least for the users from the high-priority group. With simulations, we show that the proposed algorithm outperforms existing ones in terms of goodput, PLR and the number of satisfied users.
Driven by the unprecedented increase of mobile data traffic, D2D communications technology is rapidly moving into the mainstream of the 5G networking landscape. While D2D connectivity originally emerged as a technology enabler for public safety services, it is likely to remain at the heart of the 5G ecosystem by spawning a wide diversity of proximate applications and services. In this work, we argue that the widespread adoption of the direct communications paradigm is unlikely without embracing the concepts of trust and social-aware cooperation between end users and network operators. However, such adoption remains conditional on identifying adequate incentives that engage humans and their connected devices in a plethora of collective activities. To this end, the mission of our research is to advance the vision of social-aware and trusted D2D connectivity, as well as to facilitate its further adoption. We begin by reviewing the various types of underlying incentives with the emphasis on sociality and trust, discuss these factors specifically for humans and for networked devices (machines), and also propose a novel framework allowing construction of much needed incentive-aware D2D applications. Our supportive system-level performance evaluations suggest that trusted and social-aware direct connectivity has the potential to decisively augment network performance. We conclude by outlining the future perspectives of its development across the research and standardization sectors.
Today, direct contacts between users are being facilitated by the network-assisted device-to-device (D2D) technology, which employs the omnipresent cellular infrastructure for the purposes of control to facilitate advanced mobile social applications. Together with its undisputed benefits, this novel type of connectivity creates new challenges in constructing meaningful proximity-based services with high levels of user adoption. They call for a comprehensive investigation of user sociality and trust factors jointly with the appropriate technology enablers for secure and trusted D2D communications, especially in the situations where cellular control is not available or reliable at all times. In this paper, we study the crucial aspects of social trust associations over proximity-based direct communications technology, with a primary focus on developing a comprehensive proof-of-concept implementation. Our recently developed prototype delivers rich functionality for dynamic management of security functions in proximate devices, whenever a new device joins a secure group of users or an existing one leaves it. To characterize the behavior of our implemented demonstrator, we evaluate its practical performance in terms of computation and transmission delays from the user perspective. In addition, we outline a research roadmap leveraging our technology-related findings to construct a holistic user perspective behind dynamic, social-aware, and trusted D2D applications and services.