An Overview of Device-To-Device Communication in Cellular Networks
Keywords:
Cellular networks, Consumption, Device to-Device communication,, Efficiency, LTE-AAbstract
Gadget to-Device (D2D) correspondence was first recommended as another worldview for further developing organization execution in cell organizations. New use-cases for D2D correspondences in cell networks have arisen because of the advancement of new applications, for example, content sharing and area mindful publicizing. D2D correspondence has been displayed to give advantages like superior range effectiveness and diminished correspondence inactivity in fundamental tests. Notwithstanding, as far as obstruction control upward and conventions, this specialized technique adds challenges that are at present being investigated. The scholarly world, business, and principles associations are for the most part investigating the reasonability of D2 D correspondences in LTE-A. There are in excess of 100 distributions on D2D correspondences in cell networks distributed to date, however no overview has been directed around here. In this paper, we give a scientific categorization in light of the D2D correspondence range, as well as a far reaching evaluation of the writing under the recommended scientific classification. Moreover, we offer new bits of knowledge into under-and over-investigated districts, prompting the distinguishing proof of open examination issues in D2D correspondence in cell organizations.
Downloads
References
M. Tehrani, M. Uysal, and H. Yanikomeroglu, “Device-to-device communication in 5G cellular
networks: Challenges, solutions, and future directions,” IEEE Commun. Mag., 2014, doi: 10.1109/MCOM.2014.6815897.
K. Sharma and L. Goswami, “RFID based Smart Railway Pantograph Control in a Different Phase of Power Line,” 2020, doi: 10.1109/ICIRCA48905.2020.9183202.
L. Goswami, M. K. Kaushik, R. Sikka, V. Anand, K. Prasad Sharma, and M. Singh Solanki, “IOT Based Fault Detection of Underground Cables through Node MCU Module,” 2020, doi: 10.1109/ICCSEA49143.2020.9132893.
X. Lin, J. G. Andrews, A. Ghosh, and R. Ratasuk, “An overview of 3GPP device-to-device proximity services,” IEEE Commun. Mag., 2014, doi: 10.1109/MCOM.2014.6807945.
P. Mach, Z. Becvar, and T. Vanek, “In-Band Device to-Device Communication in OFDMA Cellular Networks: A Survey and Challenges,” IEEE Commun. Surv. Tutorials, 2015, doi: 10.1109/COMST.2015.2447036.
M. S. Solanki, D. K. P. Sharma, L. Goswami, R. Sikka, and V. Anand, “Automatic Identification of Temples in Digital Images through Scale Invariant Feature Transform,” 2020, doi: 10.1109/ICCSEA49143.2020.9132897.
M. S. Solanki, L. Goswami, K. P. Sharma, and R. Sikka, “Automatic Detection of Temples in consumer Images using histogram of Gradient,” 2019, doi: 10.1109/ICCIKE47802.2019.9004324.
V. Anand, “Photovoltaic actuated induction motor for driving electric vehicle,” Int. J. Eng. Adv. Technol., vol. 8, no. 6 Special Issue 3, pp. 1612–1614, 2019, doi: 10.35940/ijeat.F1298.0986S319.
S. Ali and A. Ahmad, “Resource allocation, interference management, and mode selection in device-to-device communication: A survey,” Trans. Emerg. Telecommun. Technol., 2017, doi: 10.1002/ett.3148.
P. K. Sharma, D. Sharma, and R. K. Singh, “Evolution of mobile wireless communication networks (0G 8G),” Int. J. Appl. Eng. Res., 2015.
K. Ali, H. X. Nguyen, P. Shah, Q. T. Vien, and E. Ever, “D2D multi-hop relaying services towards disaster communication system,” 2017, doi: 10.1109/ICT.2017.7998287.
Y. Li is with Tsinghua, T. Wu, P. Hui, Y. Li, D. Jin, and S. Chen, “SMART-DEVICE-TO-SMART DEVICE Social-Aware D2D Communications: Qualitative Insights and Quantitative Analysis BACKGROUND AND PROBLEM STATEMENT,” IEEE Commun. Mag., 2014.
D. Singh, “Robust controlling of thermal mixing procedure by means of sliding type controlling,” Int. J. Eng. Adv. Technol., 2019, doi: 10.35940/ijeat.F1303.0986S319.
A. Chauhan, V. V. Tyagi, A. Sawhney, and S. Anand, “Comparative enviro-economic assessment and thermal optimization of two distinctly designed and experimentally validated PV/T collectors,” J. Therm. Anal. Calorim., 2022, doi: 10.1007/s10973-020- 10464-w.
S. Stojkovikj, S. Oklevski, O. Prakash Jasuja, and M. Najdoski, “Corrigendum to ‘Visualization of latent fingermarks on thermal paper: A new method based on nitrogen dioxide treatment’ (Forensic Chemistry (2020) 17, (S2468170919300931), (10.1016/j.forc.2019.100196))>,” Forensic Chemistry. 2020, doi: 10.1016/j.forc.2020.100220.
S. Stojkovikj, S. Oklevski, O. P. Jasuja, and M. Najdoski, “Visualization of latent fingermarks on thermal paper: A new method based on nitrogen dioxide treatment,” Forensic Chem., 2020, doi: 10.1016/j.forc.2019.100196.
S. Garg, R. K. Dwivedi, and H. Chauhan, “Efficient utilization of virtual machines in cloud computing using Synchronized Throttled Load Balancing,” 2016, doi: 10.1109/NGCT.2015.7375086.
G. Khan, K. K. Gola, and R. Rathore, “Robust data aggregation, encryption and data transfer in UWSNs,” 2016, doi: 10.1109/NGCT.2015.7375150.
K. Gulista, G. K. Kumar, and R. Rahul, “RE2R— Reliable energy efficient routing for UWSNs,” 2016, doi: 10.1007/978-981-10-0755-2_40.
A. Saleem and A. K. Agarwal, “Analysis and design of secure web services,” 2016, doi: 10.1007/978-981- 10-0451-3_41.
A. Iskandar, E. Virma, and A. S. Ahmar, “Implementing DMZ in improving network security of web testing in STMIK AKBA,” Int. J. Eng. Technol., 2018, doi: 10.14419/ijet.v7i2.3.12627.
X. Li and Y. Xue, “A survey on server-side approaches to securing web applications,” ACM Computing Surveys. 2014, doi: 10.1145/2541315.
P. Arunwatanamongkol, N. Nupairoj, and U. Tanlamai, “Innovative Delegation Application in Thai National Digital Identity Platform,” Int. J. Interact. Mob. Technol., 2021, doi: 10.3991/ijim.v15i14.22055.