Review on Device-to-Device Communication in Cellular based Network Systems

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    In a traditional cellular-network based system, the devices are not allowed to be interconnected directly in the certified mobile bandwidth, and all communications are carried out via the base station (BS). At present, device terminal broadcasting allows devices in the distributed network to act as transmitting relays to each other and reach a massive ad hoc network of networks that is different from the previous cellular architecture that faces technical challenges. Therefore, this article explores the application of a cellular-based two-layer network system that includes a base station (BS) cellular layer, such as cellular-to-device communication and communication between devices. In the proposed two-tier cellular-based network system, user data is transmitted through other users' devices to implement the privacy protection that is lacking in prior communication between devices in cellular systems. To ensure a negligible impact on the performance of current communication between devices, a two-layer network is assimilated to autonomous interference management schemes and associated resource allocation schemes. The findings from this review provide an overview of the major challenges in two-tier networks and propose a two-tier cellular-based system in which user data is routed through other users' devices to implement privacy protection.

     

     


  • Keywords


    data-to-data communication; cellular-to-device communications; network communications; celluar bases system; two-tier network.

  • References


      [1] M. Hicham, N. Abghour and M. Ouzzif, “DEVICE-TO-DEVICE (D2D) COMMUNICATION UNDER LTE-ADVANCED NETWORKS,” International Journal of Wireless & Mobile Networks (IJWMN), vol. 8, 2016, pp. 11-22.

      [2] D. Feng, L. Lu, Y. Yuan-Wu, G.Y. Li, G. Feng and S. Li, “Device-to-device communications underlaying cellular networks,” IEEE Transactions on Communications,vol. 61, 2013, pp.3541-3551.

      [3] M. N. Tehrani, M. Uysal and H. Yanikomeroglu, “Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions,” IEEE Communications Magazine, vol. 52, 2014, pp.86-92.

      [4] T. Bansal, K. Sundaresan, S Rangarajan and P. Sinha, “R2D2: Embracing device-to-device communication in next generation cellular networks,” 2014 Proceedings INFOCOM IEEE, pp. 1563-1571, 2014.

      [5] G. George, R.K. Mungara, A. Lozano, “An analytical framework for device-to-device communication in cellular networks,” IEEE Transactions on Wireless Communications, vol. 14, 2015, pp.6297-6310.

      [6] J. Liu, Y. Kawamoto, H. Nishiyama, N. Kato and N. Kadowaki, “Device-to-device communications achieve efficient load balancing in LTE-advanced networks”, IEEE Wireless Communications, vol. 21, 2014, pp.57-65.

      [7] G. Fodor, A. Pradin and A. Gattami, “Device-to-device communications and network coding: friends or foes,” IEEE Comsoc MMTC E-Letter, vol. 9, 2014, pp.33-35.

      [8] P. Gandotra and R. K. Jha, “Device-to-device communication in cellular networks: A survey,” Journal of Network and Computer Applications, vol. 71, 2016, pp.99-117.

      [9] Y. Chen, S. He, F. Hou, Z. Shi and J. Chen, “Promoting device-to-device communication in cellular networks by contract-based incentive mechanisms,” IEEE Network, 2017.

      [10] K. D. Saifuldun Mostafa, Hayder Saad, Mustafa Musa Jaber, Mohammed Hasan Ali, “The Design Trends of Keystream Generator for Stream Cipher for High Immunity Attacks,” in Advanced Computer and Communication Engineering Technology, Springer International Publishing, 2016, pp. 877–889.

      [11] M. H. Ali, M. F. Zolkipli, M. M. Jaber, and M. A. Mohammed, “Intrusion detection system based on machine learning in cloud computing,” J. Eng. Appl. Sci., vol. 12, no. 16, 2017.

      [12] M. H. Ali, M. F. Zolkipli, M. A. Mohammed, and M. M. Jaber, “Enhance of extreme learning machine-genetic algorithm hybrid based on intrusion detection system,” J. Eng. Appl. Sci., vol. 12, no. 16, 2017.

      [13] S. K. Abd, R. T. Salih, S. A. R. Al-Haddad, F. Hashim, A. B. H. Abdullah, and S. Yussof, “Cloud computing security risks with authorization access for secure Multi-Tenancy based on AAAS protocol,” in IEEE Region 10 Annual International Conference, Proceedings/TENCON, 2016.

      [14] S. K. Abd, S. A. R. Al-Haddad, F. Hashim, A. B. H. J. Abdullah, and S. Yussof, “Energy-Aware Fault Tolerant Task offloading of Mobile Cloud Computing,” in Proceedings - 5th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering, MobileCloud 2017, 2017.

      [15] S.Y. Lien, C.C. Chien, F.M. Tseng and T.C. Ho, “3GPP device-to-device communications for beyond 4G cellular networks,” IEEE Communications Magazine, vol. 54, 2016, pp.29-35.

      [16] Z. Uykan and R. Jäntti, “Transmission-order optimization for bidirectional Device-To-Device (D2D) communications underlaying cellular TDD networks—A graph theoretic approach,” IEEE Journal on Selected Areas in Communications, vol. 34, 2016, pp.1-14.

      [17] H. Chen, L. Liu, T. Novlan, J.D. Matyjas, B.L. Ng and J. Zhang, “Spatial Spectrum Sensing-Based Device-to-Device Cellular Networks,” IEEE Transactions on Wireless Communications, vol. 15, 2016, pp.7299-7313.

      [18] K.W. Choi, D.T. Wiriaatmadja and E. Hossain, “Discovering mobile applications in cellular device-to-device communications: Hash function and bloom filter-based approach,” IEEE Transactions on Mobile Computing,vol. 15, 2016, pp.336-349.

      [19] T. Zhang, H. Wang, X. Chu and J. He, “A Signaling-based Incentive Mechanism for Device-to-Device Content Sharing in Cellular Networks,” IEEE Communications Letters, 2017.

      [20] J. Yao, T. Wang, X. Wu, L. Wang and B. Zheng, “Blind spot coverage strategy based on D2D communications for electric LTE network,” 8th International Conference on Wireless Communications & Signal Processing (WCSP), pp. 1-4, 2016.

      [21] A. Hematian, W. Yu, C. Lu, D. Griffith and N. Golmie, “A Clustering-Based Device-to-Device Communication to Support Diverse Applications,” Proceedings of the International Conference on Research in Adaptive and Convergent Systems. pp. 97-102, 2016.


 

View

Download

Article ID: 20587
 
DOI: 10.14419/ijet.v7i3.20.20587




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.