研究生: |
朱峻佑 Ju, Jun-You |
---|---|
論文名稱: |
D2D通訊在LTE蜂巢式網路中之步進式位置推薦演算法 Step By Step Location Recommendation Algorithm for D2D Communication Underlying LTE Cellular Networks |
指導教授: |
王嘉斌
Wang, Chia-Pin |
學位類別: |
碩士 Master |
系所名稱: |
電機工程學系 Department of Electrical Engineering |
論文出版年: | 2018 |
畢業學年度: | 106 |
語文別: | 中文 |
論文頁數: | 57 |
中文關鍵詞: | 長程演進技術 、設備對設備通訊 、系統容量 、位置推薦 、LTE-Sim |
英文關鍵詞: | LTE-Sim, Long Term Evolution, Device-To-Device, System Capacity, Location Recommendation |
DOI URL: | http://doi.org/10.6345/THE.NTNU.DEE.009.2018.E08 |
論文種類: | 學術論文 |
相關次數: | 點閱:124 下載:9 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
在長程演進技術(Long Term Evolution, LTE)中有一項重要的技術,也就是設備對設備(Device-to-Device, D2D)的通訊,D2D通訊可以不透過基地台做設備與設備間的直接傳輸,這個做法可以減輕基地台的負擔以及增加整體系統的網路容量。
本論文提出一種基於LTE蜂巢式網路中D2D的步進式位置推薦法,希望能透過演算法規劃出一條推薦路徑,使D2D移動至推薦的路徑,並藉此能改善網路整體的系統容量及效能。
實驗模擬在一個含有傳統大型基地台及其使用者與多組D2D的環境來驗證本論文提出的步進式位置推薦演算法,並使用LTE-Sim開源工具來量測出模擬的結果,實驗結果顯示整體系統傳輸效能在多種不同的情況下可達明顯的提升效果。
Device-to-Device(D2D) communication is an important technique in Long Term Evolution (LTE) system, which can communicate with each other without connecting to the base station. Therefore, the loading of the base station could be reduced and the network capacity of the whole system could be increased.
In this thesis, we purpose a step by step location recommendation algorithm for D2D communication underlying LTE cellular networks. With this algorithm, a recommendation path could be designed where D2D pairs move to. System capacity and efficiency of the whole network could be improved by this way.
The experiments simulate an environment containing main base stations and several pairs of D2D to verify the step-by-step location recommendation algorithm proposed in this paper for D2D communications, and the LTE-Sim open source tool is utilized here to measure the simulation results. Experimental results show that the transmission performances of overall system can achieve significant improvement in various circumstances.
[1] J. G. Andrews et al., ‘‘What will 5G be?’’ IEEE J. Sel. Areas Commun., vol. 32, no. 6, pp. 1065–1082, Jun. 2014.
[2] A. Asadi, Q. Wang, and V. Mancuso, ‘‘A survey on device-to-device communication in cellular networks,’’ IEEE Commun. Surveys Tuts., vol. 16, no. 4, pp. 1801–1819, 4th Quart., 2014.
[3] M. Wang and Z. Yan, “Security in D2D communications: A review,” in Trustcom/BigDataSE/ISPA, 2015 IEEE, vol. 1, Aug 2015, pp. 1199– 1204.
[4] P. Gandotra, R. K. Jha, and S. Jain, ‘‘A survey on device-to-device (D2D) communication: Architecture and security issues,’’ J. Netw. Comput. Appl., vol. 78, pp. 9–29, Jan. 2016.
[5] C. Ma, J. Liu, X. Tian, H. Yu, Y. Cui, and X. Wang, “Interference exploitation in D2D-enabled cellular networks: A secrecy perspective,” IEEE Trans. Commun., vol. 63, no. 1, pp. 229–242, Jan. 2015.
[6] A. Celik, R. M. Radaydeh, F. S. Al-Qahtani, and M.-S. Alouini, “Joint interference management and resource allocation for device-to-device (d2d) communications underlying downlink/uplink decoupled (dude) heterogeneous networks,” in proc. IEEE Intl. Conf. Commun.(ICC), May 2017.
[7] D. Wu, L. Zhou, and Y. Cai, “Social-aware rate based content sharing mode selection for D2D content sharing scenarios,” IEEE Trans. Multimedia, to be published.
[8] A. Orsino, I. Farris, L. Militano, G. Araniti, S. Andreev, I. Gudkova, Y. Koucheryavy, and A. Iera, “Exploiting d2d communications at the network edge for mission-critical iot applications,” in European Wireless 2017; 23th European Wireless Conference; Proceedings of. VDE, 2017, pp. 1–6.
[9] W. Si, Z. Xiaoyue, L. Zhesheng, Z. Xin, and Y. Dacheng, “Distributed resource management for device-to-device (D2D) communication underlay cellular networks,” in Proc. IEEE Int. Symp. PIMRC, Sep. 2013.
[10] M. Haus, M. Waqas, A. Ding, Y. Li, S. Tarkoma, and J. Ott, “Security and Privacy in Device-to-Device (D2D) Communication: A Review,” IEEE Communications Surveys & Tutorials, vol. PP, no. 99, pp. 1-1, Jan. 2017.
[11] S. Mumtaz, K. Saidul Huq, and J. Rodriguez, “Coordinated paradigm for D2D communications,” in Proc. IEEE Conf. INFOCOM WKSHPS, Apr. 2014, pp. 718–723..
[12] H. A. U. Mustafa, M. A. Imran, M. Z. Shakir, A. Imran, and R. Tafazolli, “Separation framework: An enabler for cooperative and D2D communication for future 5G networks,” IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 419–445, 1st Quart., 2016
[13] A. Zhang, J. Chen, R. Hu, and Y. Qian, “SeDS: Secure data sharing strategy for D2D communication in LTE-Advanced networks,” IEEE Transactions on Vehicular Technology, vol. PP, no. 99, pp. 1, March, 2015.
[14] F. Jiang, Y. Liu, B. Wang, X. Wang, “A relay-aided device-to-device-based load balancing scheme for multitier heterogeneous networks,” IEEE Internet of Things, vol. 4, no. 5, pp. 1537–1551,Oct. 2017.
[15] M. Ali, S. Qaisar, M. Naeem, and S. Mumtaz, ‘‘Energy efficient resource allocation in D2D-assisted heterogeneous networks with relays,’’ IEEE Access, vol. 4, pp. 4902–4911, 2016
[16] 3GPP The Mobile Broadband Standard
http://www.3gpp.org/
[17] 李大嵩、李明峻、李常慎、黃崇榮(2016)。第四代行動通訊系統(二版),新北:全華圖書