簡易檢索 / 詳目顯示

研究生: 朱峻佑
Ju, Jun-You
論文名稱: D2D通訊在LTE蜂巢式網路中之步進式位置推薦演算法
Step By Step Location Recommendation Algorithm for D2D Communication Underlying LTE Cellular Networks
指導教授: 王嘉斌
Wang, Chia-Pin
學位類別: 碩士
Master
系所名稱: 電機工程學系
Department of Electrical Engineering
論文出版年: 2018
畢業學年度: 106
語文別: 中文
論文頁數: 57
中文關鍵詞: 長程演進技術設備對設備通訊系統容量位置推薦LTE-Sim
英文關鍵詞: LTE-Sim, Long Term Evolution, Device-To-Device, System Capacity, Location Recommendation
DOI URL: http://doi.org/10.6345/THE.NTNU.DEE.009.2018.E08
論文種類: 學術論文
相關次數: 點閱:124下載:9
分享至:
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報
  • 在長程演進技術(Long Term Evolution, LTE)中有一項重要的技術,也就是設備對設備(Device-to-Device, D2D)的通訊,D2D通訊可以不透過基地台做設備與設備間的直接傳輸,這個做法可以減輕基地台的負擔以及增加整體系統的網路容量。
    本論文提出一種基於LTE蜂巢式網路中D2D的步進式位置推薦法,希望能透過演算法規劃出一條推薦路徑,使D2D移動至推薦的路徑,並藉此能改善網路整體的系統容量及效能。
    實驗模擬在一個含有傳統大型基地台及其使用者與多組D2D的環境來驗證本論文提出的步進式位置推薦演算法,並使用LTE-Sim開源工具來量測出模擬的結果,實驗結果顯示整體系統傳輸效能在多種不同的情況下可達明顯的提升效果。

    Device-to-Device(D2D) communication is an important technique in Long Term Evolution (LTE) system, which can communicate with each other without connecting to the base station. Therefore, the loading of the base station could be reduced and the network capacity of the whole system could be increased.
    In this thesis, we purpose a step by step location recommendation algorithm for D2D communication underlying LTE cellular networks. With this algorithm, a recommendation path could be designed where D2D pairs move to. System capacity and efficiency of the whole network could be improved by this way.
    The experiments simulate an environment containing main base stations and several pairs of D2D to verify the step-by-step location recommendation algorithm proposed in this paper for D2D communications, and the LTE-Sim open source tool is utilized here to measure the simulation results. Experimental results show that the transmission performances of overall system can achieve significant improvement in various circumstances.

    中文摘要 i 英文摘要 ii 誌  謝 iv 圖 目 錄 vii 表 目 錄 ix 第一章  緒論 1 1.1 研究動機與背景 1 1.2 研究目的 3 1.3 文獻探討 4 1.4 論文架構 7 第二章  相關知識介紹 8 2.1 LTE介紹 8 2.2 D2D介紹 23 第三章  D2D通訊之步進式位置推薦演算法 26 3.1 研究作法之動機 26 3.2 網路模型建立 26 3.3 步進式位置推薦演算法設計 27 第四章  多種實驗情境設定及模擬結果 34 4.1 模擬環境與參數設定 34 4.2 模擬結果 36 4.2.1 情境1、基地台、MUE與D2D皆集中在左上角 37 4.2.2 情境2、基地台在圓心,MUE與D2D分散在地圖上 40 4.2.1 情境3、基地台分別在左上角以及右下角 43 4.2.2 情境4、基地台分別在左上角以及左下角 46 4.2.2 情境5、同情境4,但移動一個MUE之位置 49 4.3 討論 52 第五章  結論 53 參 考 文 獻 54 自 傳 56 學 術 成 就 57

    [1] J. G. Andrews et al., ‘‘What will 5G be?’’ IEEE J. Sel. Areas Commun., vol. 32, no. 6, pp. 1065–1082, Jun. 2014.
    [2] A. Asadi, Q. Wang, and V. Mancuso, ‘‘A survey on device-to-device communication in cellular networks,’’ IEEE Commun. Surveys Tuts., vol. 16, no. 4, pp. 1801–1819, 4th Quart., 2014.
    [3] M. Wang and Z. Yan, “Security in D2D communications: A review,” in Trustcom/BigDataSE/ISPA, 2015 IEEE, vol. 1, Aug 2015, pp. 1199– 1204.
    [4] P. Gandotra, R. K. Jha, and S. Jain, ‘‘A survey on device-to-device (D2D) communication: Architecture and security issues,’’ J. Netw. Comput. Appl., vol. 78, pp. 9–29, Jan. 2016.
    [5] C. Ma, J. Liu, X. Tian, H. Yu, Y. Cui, and X. Wang, “Interference exploitation in D2D-enabled cellular networks: A secrecy perspective,” IEEE Trans. Commun., vol. 63, no. 1, pp. 229–242, Jan. 2015.
    [6] A. Celik, R. M. Radaydeh, F. S. Al-Qahtani, and M.-S. Alouini, “Joint interference management and resource allocation for device-to-device (d2d) communications underlying downlink/uplink decoupled (dude) heterogeneous networks,” in proc. IEEE Intl. Conf. Commun.(ICC), May 2017.
    [7] D. Wu, L. Zhou, and Y. Cai, “Social-aware rate based content sharing mode selection for D2D content sharing scenarios,” IEEE Trans. Multimedia, to be published.
    [8] A. Orsino, I. Farris, L. Militano, G. Araniti, S. Andreev, I. Gudkova, Y. Koucheryavy, and A. Iera, “Exploiting d2d communications at the network edge for mission-critical iot applications,” in European Wireless 2017; 23th European Wireless Conference; Proceedings of. VDE, 2017, pp. 1–6.
    [9] W. Si, Z. Xiaoyue, L. Zhesheng, Z. Xin, and Y. Dacheng, “Distributed resource management for device-to-device (D2D) communication underlay cellular networks,” in Proc. IEEE Int. Symp. PIMRC, Sep. 2013.
    [10] M. Haus, M. Waqas, A. Ding, Y. Li, S. Tarkoma, and J. Ott, “Security and Privacy in Device-to-Device (D2D) Communication: A Review,” IEEE Communications Surveys & Tutorials, vol. PP, no. 99, pp. 1-1, Jan. 2017.
    [11] S. Mumtaz, K. Saidul Huq, and J. Rodriguez, “Coordinated paradigm for D2D communications,” in Proc. IEEE Conf. INFOCOM WKSHPS, Apr. 2014, pp. 718–723..
    [12] H. A. U. Mustafa, M. A. Imran, M. Z. Shakir, A. Imran, and R. Tafazolli, “Separation framework: An enabler for cooperative and D2D communication for future 5G networks,” IEEE Commun. Surveys Tuts., vol. 18, no. 1, pp. 419–445, 1st Quart., 2016
    [13] A. Zhang, J. Chen, R. Hu, and Y. Qian, “SeDS: Secure data sharing strategy for D2D communication in LTE-Advanced networks,” IEEE Transactions on Vehicular Technology, vol. PP, no. 99, pp. 1, March, 2015.
    [14] F. Jiang, Y. Liu, B. Wang, X. Wang, “A relay-aided device-to-device-based load balancing scheme for multitier heterogeneous networks,” IEEE Internet of Things, vol. 4, no. 5, pp. 1537–1551,Oct. 2017.
    [15] M. Ali, S. Qaisar, M. Naeem, and S. Mumtaz, ‘‘Energy efficient resource allocation in D2D-assisted heterogeneous networks with relays,’’ IEEE Access, vol. 4, pp. 4902–4911, 2016
    [16] 3GPP The Mobile Broadband Standard
    http://www.3gpp.org/
    [17] 李大嵩、李明峻、李常慎、黃崇榮(2016)。第四代行動通訊系統(二版),新北:全華圖書

    下載圖示
    QR CODE