Petar Popovski Aalborg University, Denmark

Slides:



Advertisements
Similar presentations
Delta Confidential 1 5/29 – 6/6, 2001 SAP R/3 V4.6c PP Module Order Change Management(OCM)
Advertisements

Adders Used to perform addition, subtraction, multiplication, and division (sometimes) Half-adder adds rightmost (least significant) bit Full-adder.
Advanced Piloting Cruise Plot.
Chapter 1 The Study of Body Function Image PowerPoint
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 11 Information.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 10 User.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 6 Agile.
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 12 Cross-Layer.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Appendix 01.
Performance Evaluation Methodology & Key Technologies of New Generation Broadband Wireless Access Networking Zhiwei Gao Broadband Wireless Communication.
Cooperative Transmit Power Estimation under Wireless Fading Murtaza Zafer (IBM US), Bongjun Ko (IBM US), Ivan W. Ho (Imperial College, UK) and Chatschik.
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Interference.
1 Multi-Channel Wireless Networks: Capacity and Protocols Nitin H. Vaidya University of Illinois at Urbana-Champaign Joint work with Pradeep Kyasanur Chandrakanth.
Wireless Networks Should Spread Spectrum On Demand Ramki Gummadi (MIT) Joint work with Hari Balakrishnan.
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Jeopardy Q 1 Q 6 Q 11 Q 16 Q 21 Q 2 Q 7 Q 12 Q 17 Q 22 Q 3 Q 8 Q 13
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
FACTORING ax2 + bx + c Think “unfoil” Work down, Show all steps.
Year 6 mental test 5 second questions
Year 6 mental test 10 second questions
Università degli Studi di Firenze 08 July 2004 COST th MCM - Budapest, Hungary 1 Cross-layer design for Multiple access techniques in wireless communications.
Designing Multi-User MIMO for Energy Efficiency
Solve Multi-step Equations
Richmond House, Liverpool (1) 26 th January 2004.
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
M.Sc. Inam Ullah Supervisor: Prof. Jyri Hämäläinen
Randomized Algorithms Randomized Algorithms CS648 1.
ABC Technology Project
Chapter 7 Transmission Media
Toward a 5G Mobile & Wireless System Concept
1 Capacity analysis of mesh networks with omni or directional antennas Jun Zhang and Xiaohua Jia City University of Hong Kong.
Countering DoS Attacks with Stateless Multipath Overlays Presented by Yan Zhang.
1 Undirected Breadth First Search F A BCG DE H 2 F A BCG DE H Queue: A get Undiscovered Fringe Finished Active 0 distance from A visit(A)
VOORBLAD.
1 Analysis of Random Mobility Models with PDE's Michele Garetto Emilio Leonardi Politecnico di Torino Italy MobiHoc Firenze.
1 Breadth First Search s s Undiscovered Discovered Finished Queue: s Top of queue 2 1 Shortest path from s.
1 Developing a Predictive Model for Internet Video Quality-of-Experience Athula Balachandran, Vyas Sekar, Aditya Akella, Srinivasan Seshan, Ion Stoica,
BIOLOGY AUGUST 2013 OPENING ASSIGNMENTS. AUGUST 7, 2013  Question goes here!
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
© 2012 National Heart Foundation of Australia. Slide 2.
Welcome To The Three Umpire System. © 2007 Softball Canada All Rights Reserved Softball Canada Three Umpire System FP 2 Tips for the Three Umpire System.
Lets play bingo!!. Calculate: MEAN Calculate: MEDIAN
1 © 2004, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.1 Module 7 Ethernet Technologies.
Understanding Generalist Practice, 5e, Kirst-Ashman/Hull
10/10/ * Introduction * Network Evolution * Why Gi-Fi is used * Bluetooth & Wi-Fi * Architecture of Gi-Fi * Features / Advantages * Applications.
Addition 1’s to 20.
25 seconds left…...
Slippery Slope
H to shape fully developed personality to shape fully developed personality for successful application in life for successful.
Januar MDMDFSSMDMDFSSS
Week 1.
We will resume in: 25 Minutes.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Connecting LANs, Backbone Networks, and Virtual LANs
PSSA Preparation.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Introduction to Ad-hoc & Sensor Networks Security In The Name of God ISC Student Branch in KNTU 4 th Workshop Ad-hoc & Sensor Networks.
© 2007 Levente Buttyán and Jean-Pierre Hubaux Security and Cooperation in Wireless Networks Chapter 11: Wireless operators in.
Tarun Bansal*, Karthik Sundaresan+,
1 Chapter 13 Nuclear Magnetic Resonance Spectroscopy.
14.1 Chapter 14 Wireless LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Designing Multi-User MIMO for Energy Efficiency
Presentation transcript:

Petar Popovski petarp@es.aau.dk Aalborg University, Denmark what is in for D2D in 5G wireless support of underlay low-rate M2M links Petar Popovski petarp@es.aau.dk Aalborg University, Denmark

will not only be “4G, but faster”

5G research @ EU FP7 METIS Mobile and wireless communications Enablers for the Twenty- twenty (2020) Information Society Budget: 27 M€. Objective: 5G by 2020 system concept that meets the requirements of the 2020 connected information society and extend today’s wireless communication systems to support new usage scenarios. Such a system has to be more efficient, versatile, and scalable compared to today’s systems.

METIS system concept direct Device-to-Device communication (D2D) immense task, split into 5 Horizontal Topics direct Device-to-Device communication (D2D) how to efficiently enable and for what to use D2D Massive Machine Communication (MMC) how to support a massive number of low-cost, low-energy devices

METIS system concept Moving Networks (MN) extend the current wireless infrastructure to moving/nomadic nodes and create new services Ultra-Dense Networks (UDN) provide and sustain high rates to a large number of users in close proximity Ultra-Reliable Communication (URC) how to guarantee certain connectivity or latency 99.999+% of the time

a biased personal summary of 5G R1: today’s systems R2: high-speed versions of today’s systems R3: massive access for sensors and machines R4: ultra-reliable connectivity R5: physically impossible data rate Gbps R2 ≥99% R5 Mbps R1 ≥95% ≥99% kbps R4 ≥99.999% R3 ≥90-99% bps # devices 1 10 100 1000 10000

new services direct D2D reliability latency throughput per area refers to local D2D communication controlled by the core network it can potentially improve reliability latency throughput per area spectral efficiency machine-type access new services

D2D for reliability extended coverage multi-hopping network coding cooperative diversity ad hoc networking in emergency fallback solution

D2D for latency how to do this reliably in 2020+?

D2D for latency network-controlled D2D has an advantage over pure Bluetooth-like D2D facilitates leader election in neighbor discovery and link rendezvous interference control (licensed spectrum) diversified connection

D2D for throughput offloading and local content sharing close connection to caching

D2D for spectral efficiency the D2D setting looks like a cognitive radio with consensual primary spectral efficiency in the previous example another example is to use the features of the multiple access channel D2 D1+D3 D1 D3

D2D support of machine-type access trunking effect and coordination decrease the random access pressure on the Base Station

D2D support of machine-type access low power uplink sensor attached to a phone underlay operation in the same spectrum

D2D in the 5G diagram offloading, prosumers data rate Gbps R2 R5 machine-type access Mbps R1 kbps R4 reliability, latency R3 bps # devices 1 10 100 1000 10000

D2D for underlay machine-type access

scenario of machine-type D2D

model of underlay operation

problem definition assume that B knows the channel B-U but not the channel M-U U can decode both signals from B and M how should B select the downlink rate RB, so that the downlink transmission is not in outage? B U   M

multiple access channel at U RB RM0 is fixed B U   M RM low RM0 candidate for interference cancelation

three MAC regimes with joint decoding (JD) maximal decodable RB RB RB RB RM0 RM RM0 RM RM0 RM RM0 not decodable joint decoding of RB and RM0 SIC: RM0 removed first

max RB as a function of the strength of the link M-U rates RB and RM0 represented equivalently through SNRs GB and GM outage no outage possible to select RB and avoid outage independently of the fading statistics for M-U  

outage for the link M-U below this value outage affected only by the statistics of the M-U link outage no outage

maximal zero-outage rate increases as the rate RM0 (GM) decreases

a simple single-user decoder RB RM0 is fixed B   U RM M

maximal RB with single-user decoding outage no outage maximal zero-outage RB is lowered, there is a penalty due to single-user decoding

σ2 =−97.5[dBm] α=4 R=200[m] PM =−10[dBm] PB=30[dBm] evaluation scenario U is the reference point M is uniformly distributed on a unit-radius circle centered at U B and NM-1 MTDs uniformly distributed within the disk of radius R σ2 =−97.5[dBm] α=4 R=200[m] PM =−10[dBm] PB=30[dBm]

numerical results

regime of high interference

summary machine-type access D2D will play multiple roles in 5G and improve reliability, latency, throughput per area, spectral efficiency, machine-type access we have considered underlay D2D for low-power low-rate machine access outage-free transmission even in presence of underlay keys: low rate and successive interference cancellation next steps evaluate the concept with actual modulation/coding D2D for trunking in M2M access