194 research outputs found

    SymbioCity: Smart Cities for Smarter Networks

    Get PDF
    The "Smart City" (SC) concept revolves around the idea of embodying cutting-edge ICT solutions in the very fabric of future cities, in order to offer new and better services to citizens while lowering the city management costs, both in monetary, social, and environmental terms. In this framework, communication technologies are perceived as subservient to the SC services, providing the means to collect and process the data needed to make the services function. In this paper, we propose a new vision in which technology and SC services are designed to take advantage of each other in a symbiotic manner. According to this new paradigm, which we call "SymbioCity", SC services can indeed be exploited to improve the performance of the same communication systems that provide them with data. Suggestive examples of this symbiotic ecosystem are discussed in the paper. The dissertation is then substantiated in a proof-of-concept case study, where we show how the traffic monitoring service provided by the London Smart City initiative can be used to predict the density of users in a certain zone and optimize the cellular service in that area.Comment: 14 pages, submitted for publication to ETT Transactions on Emerging Telecommunications Technologie

    5G: 2020 and Beyond

    Get PDF
    The future society would be ushered in a new communication era with the emergence of 5G. 5G would be significantly different, especially, in terms of architecture and operation in comparison with the previous communication generations (4G, 3G...). This book discusses the various aspects of the architecture, operation, possible challenges, and mechanisms to overcome them. Further, it supports users? interac- tion through communication devices relying on Human Bond Communication and COmmunication-NAvigation- SENsing- SErvices (CONASENSE).Topics broadly covered in this book are; • Wireless Innovative System for Dynamically Operating Mega Communications (WISDOM)• Millimeter Waves and Spectrum Management• Cyber Security• Device to Device Communicatio

    Tracking Infected Covid-19 Persons and their Proximity Users Using D2D in 5G Networks

    Get PDF
    The world witnessed a pandemic that needs to be limited. COVID-19 is a disease that spreads among people when an infected person is in close contact with another. To decrease the virus spreading, World Health Organization (WHO) imposed precautionary measures and suggested some rules to be followed such as social distancing and quarantining the infected people. We propose a model, using D2D and IoT technology, for tracking infected persons with COVID-19 and its proximity. If a person (mobile device) gets close to an infected person, he will also get infected, so by continuous moving, the infection will be transmitted. Thus, identifying the infected persons and their contacts will limit the spread of the disease. In each scenario, it is possible to distinguish the number of infected people and know from whom they are infected, and the location of the infection. The simulation shows the tracking of a mobile device when proximate infected person at a distance of 3 meters. As a result, our proposed D2D model is effective, especially in the scenario which found the infected person with COVID-19, tracks them, determines minimum distances, and recognizes the source of the infection. Thus, the model can limit the rapid spread of COVID-19 as it determines the 3meters distance from infected person and send precaution messages to the network

    5G: 2020 and Beyond

    Get PDF
    The future society would be ushered in a new communication era with the emergence of 5G. 5G would be significantly different, especially, in terms of architecture and operation in comparison with the previous communication generations (4G, 3G...). This book discusses the various aspects of the architecture, operation, possible challenges, and mechanisms to overcome them. Further, it supports users? interac- tion through communication devices relying on Human Bond Communication and COmmunication-NAvigation- SENsing- SErvices (CONASENSE).Topics broadly covered in this book are; • Wireless Innovative System for Dynamically Operating Mega Communications (WISDOM)• Millimeter Waves and Spectrum Management• Cyber Security• Device to Device Communicatio

    Device-to-device communications for 5G Radio Access Networks

    Get PDF
    Nowadays it is very popular to share video clips and images to one’s social network in the proximity. Direct device-to-device (D2D) communication is one of the means to respond to this requirement. D2D offers users improved end-to-end latency times, and additionally can provide higher data rates. At the same time the overall cellular network congestion decreases. D2D is also known as Proximity Services (ProSe). LTE is missing direct D2D communication. Currently D2D for 5G is standardised in the 3rd Generation Partnership Project (3GPP) Releases 12, and in parallel Mobile and wireless communications Enablers for the Twenty-twenty Information Society (METIS) project has D2D as one of its research topics. Multiple articles have been published about D2D communication. This thesis is a literature based thesis following D2D communication in 5G literature. The scope is to describe similarities and differences found in Technical Reports and Technical Specifications of the 3GPP Release 12, in deliverables written in METIS project and in some selected D2D related publications about D2D communications. 3GPP Release 12 concentrates on ProSe at least for public safety. ProSe communication out-of-coverage is only for public safety purposes. METIS provides multiple solutions for diverse D2D topics, for example, device discovery, radio resource management, mobility management and relaying. METIS provides solutions for D2D communication not yet mature enough for development and implementation but which might be realized in the future.Nykyisin on suosittua lähettää lyhyitä videoita tai kuvia läheisyydessä oleville ystäville. Laitteiden välinen suora kommunikointi eli D2D-viestintä tuo ratkaisun tähän vaatimukseen. D2D-viestinnän ansiosta viive lyhenee ja lisäksi siirtonopeudet kasvavat. Samaan aikaan koko verkon kuormitus vähenee. Suora kahden laitteen välinen kommunikointi puuttuu LTE:stä. Tällä hetkellä 3GPP Release 12 standardisoi suoraa kahden laitteen välistä kommunikointia. Samanaikaisesti Mobile and wireless communications Enablers for the Twenty-twenty Information Society (METIS) –projektin yhtenä tutkimuskohteenaan on kahden laitteen välinen suora kommunikointi, Lisäksi on lukuisia julkaisuja liittyen D2D-viestintään. Tämä diplomityö perustuu kirjallisuuteen. Sen tavoitteena on selvittää, miten kahden laitteen välistä suoraa kommunikointia on kuvattu 3GPP Release 12:ta teknisissä spesifikaatioissa, METIS-projektin julkaisuissa sekä muutamassa valitussa tieteellisessä julkaisussa. Tavoitteena on selvittää D2D-viestinnän yhtäläisyyksiä sekä poikkeamia. 3PGG Release 12 standardointi keskittyy D2D-viestinnän käyttöön ainakin julkisessa pelastustyössä. D2D-viestinnän tulee ainakin julkisessa pelastustyössä toimia myös siellä missä matkapuhelinverkko ei toimi tai sitä ei ole olemassa. METIS tarjoaa useita ratkaisuja D2D-viestinnän eri osa-alueille, esimerkiksi laitteiden tunnistamiseen, resurssien hallintaan, liikkuvuuden hallintaa ja viestien edelleen lähettämiseen. METIS-projekti on tuottanut D2D-viestinnän ratkaisuja, joiden toteuttaminen on järkevää ja mahdollista vasta tulevaisuudessa

    Reliable and Secure Drone-assisted MillimeterWave Communications

    Get PDF
    The next generation of mobile networks and wireless communication, including the fifth-generation (5G) and beyond, will provide a high data rate as one of its fundamental requirements. Providing high data rates can be accomplished through communication over high-frequency bands such as the Millimeter-Wave(mmWave) one. However, mmWave communication experiences short-range communication, which impacts the overall network connectivity. Improving network connectivity can be accomplished through deploying Unmanned Ariel Vehicles(UAVs), commonly known as drones, which serve as aerial small-cell base stations. Moreover, drone deployment is of special interest in recovering network connectivity in the aftermath of disasters. Despite the potential advantages, drone-assisted networks can be more vulnerable to security attacks, given their limited capabilities. This security vulnerability is especially true in the aftermath of a disaster where security measures could be at their lowest. This thesis focuses on drone-assisted mmWave communication networks with their potential to provide reliable communication in terms of higher network connectivity measures, higher total network data rate, and lower end-to-end delay. Equally important, this thesis focuses on proposing and developing security measures needed for drone-assisted networks’ secure operation. More specifically, we aim to employ a swarm of drones to have more connection, reliability, and secure communication over the mmWave band. Finally, we target both the cellular 5Gnetwork and Ad hoc IEEE802.11ad/ay in typical network deployments as well as in post-disaster circumstances

    Device discovery in D2D communication: A survey

    Get PDF
    Device to Device (D2D) communication was first considered in out-band to manage energy issues in the wireless sensor networks. The primary target was to secure information about system topology for successive communication. Now the D2D communication has been legitimated in in-band by the 3rd Generation Partnership Project (3GPP). To initiate D2D communication, Device Discovery (DD) is a primary task and every D2D application benefits from DD as an end to end link maintenance and data relay when the direct path is obstructed. The DD is facing new difficulties because of the mobility of the devices over static systems, and the mobility makes it more challenging for D2D communication. For in-band D2D, DD in a single cell and multi-cell, and dense area is not legitimated properly, causing latency, inaccuracy, and energy consumption. Among extensive studies on limiting energy consumption and latency, DD is one of the essential parts concentrating on access and communication. In this paper, a comprehensive survey on DD challenges, for example single cell/multi-cell and dense area DD, energy consumption during discovery, discovery delay, and discovery security, etc., has been presented to accomplish an effective paradigm of D2D networks. In order to undertake the device (user) needs, an architecture has been projected, which promises to overwhelm the various implementation challenges of DD. The paper mainly focuses on DD taxonomy and classification with an emphasis on discovery procedures and algorithms, a summary of advances and issues, and ways for potential enhancements. For ensuring a secure DD and D2D, auspicious research directions have been proposed, based on taxonomy
    • …
    corecore