词条 | Device-to-device |
释义 |
Device-to-Device (D2D) communication in cellular networks is defined as direct communication between two mobile users without traversing the Base Station (BS) or core network. D2D communication is generally non-transparent to the cellular network and it can occur on the cellular frequencies (i.e., inband) or unlicensed spectrum (i.e., outband).[1] In a traditional cellular network, all communications must go through the BS even if communicating parties are in range for proximity-based D2D communication. Communication through BS suits conventional low data rate mobile services such as voice call and text messaging in which users are seldom close enough for direct communication. However, mobile users in today's cellular networks use high data rate services (e.g., video sharing, gaming, proximity-aware social networking) in which they could potentially be in range for direct communications (i.e., D2D). Hence, D2D communications in such scenarios can greatly increase the spectral efficiency of the network.[2] The advantages of D2D communications go beyond spectral efficiency; they can potentially improve throughput, energy efficiency, delay, and fairness.[3][4] Data delivery in non-cooperative D2D communicationExisting data delivery protocols in D2D communications mainly assume that mobile nodes willingly participate in data delivery, share their resources with each other, and follow the rules of underlying networking protocols. Nevertheless, rational nodes in real-world scenarios have strategic interactions and may act selfishly for various reasons (such as resource limitations, the lack of interest in data, or social preferences).[5] For example, if a node has limited battery resources or the cost of the network bandwidth delivered by mobile network operators is high, it would not willingly relay data for others until appropriate incentives are provided. Meanwhile, malicious nodes may attack the network in different ways to disturb the normal operation of the data transmission process. An adversary, for example, may drop received messages but produce forged routing metrics or false information with the aim of attracting more messages or decreasing its detection probability. This issue becomes more challenging when colluding attackers boost their metrics to deceive the attack detection systems. Dealing with non-cooperative mobile nodes is very challenging because of the distributed network model and intermittent access of nodes to central authorities. D2D applicationsD2D Communications is used for
See also
References1. ^{{Cite journal|last=Andreev|first=S.|last2=Moltchanov|first2=D.|last3=Galinina|first3=O.|last4=Pyattaev|first4=A.|last5=Ometov|first5=A.|last6=Koucheryavy|first6=Y.|date=May 2015|title=Network-Assisted Device-to-Device Connectivity: Contemporary Vision and Open Challenges|url=https://ieeexplore.ieee.org/abstract/document/7147697|journal=Proceedings of 21th European Wireless Conference|volume=|pages=1–8|via=}} {{telecom-stub}}2. ^{{Cite journal|last=Ometov|first=A.|last2=Orsino|first2=A.|last3=Militano|first3=L.|last4=Moltchanov|first4=D.|last5=Araniti|first5=G.|last6=Olshannikova|first6=E.|last7=Fodor|first7=G.|last8=Andreev|first8=S.|last9=Olsson|first9=T.|date=August 2016|title=Toward trusted, social-aware D2D connectivity: bridging across the technology and sociality realms|url=https://ieeexplore.ieee.org/document/7553033/|journal=IEEE Wireless Communications|volume=23|issue=4|pages=103–111|doi=10.1109/MWC.2016.7553033|issn=1536-1284|via=}} 3. ^{{cite journal|last1=Asadi|first1=Arash|last2=Wang|first2=Qing|last3=Mancuso|first3=Vincenzo|title=A Survey on Device-to-Device Communication in Cellular Networks|journal=Communications Surveys & Tutorials, IEEE|date=24 April 2014|volume=16|issue=4|pages=1801–1819|url=http://ieeexplore.ieee.org/document/6805125/?arnumber=6805125}} 4. ^{{cite journal|last1=Zhang|first1=Yanru|last2=Pan|first2=Erte|last3=Song|first3=Lingyang|last4=Saad|first4=Walid|last5=Dawy|first5=Zaher|last6=Han|first6=Zhu|title=Social Network Aware Device-to-Device Communication in Wireless Networks|journal=IEEE Transactions on Wireless Communications|date=2015|volume=14|issue=1|url=http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6847726&url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel7%2F7693%2F4656680%2F06847726.pdf%3Farnumber%3D6847726}} 5. ^{{cite journal |last1=Jedari |first1=Behrouz |last2=Xia |first2=Feng |last3=Ning |first3=Zhaolong |title=A Survey on Human-Centric Communications in Non-Cooperative Wireless Relay Networks |journal=IEEE Communications Surveys & Tutorials |date=2018 |volume=20 |issue=2 |pages=914–944 |doi=10.1109/COMST.2018.2791428 |url=https://ieeexplore.ieee.org/document/8252702/}} 6. ^{{Cite web|url=https://telcomaglobal.com/blog/1918338/d2d-device-communications-5g|title=TELCOMA GLOBAL {{!}} D2D: Device to device communications|website=telcomaglobal.com|access-date=2018-09-13}} 2 : Wireless networking|Telecommunications infrastructure |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。