Underlay Loosely Coupled Model for Public Safety Networks Based on Device-to-Device Communication
Abstract
:1. Introduction
- Benefits from proximity, with higher throughput, lower delays, and optimized power consumption.
- Avoids overloading the central cellular antenna by dispatching media streams directly between participants.
- Extends the cell range using an in-band D2D relay function to connect out-of-range devices.
2. Related Works
3. Underlay D2D Network Based on ProSe Service
3.1. Introduction
- PSBCH: Physical SL broadcast channel, which carries system information and synchronization signals.
- PSCCH: Physical SL control channel, carries UE-to-UE control plane data.
- PSDCH: Physical SL discovery channel, which supports UE direct discovery transmissions.
- PSSCH: Physical SL shared channel, which is used for user plane data transmission.
3.2. Reference ProSe Architecture
- The ProSe App Server serves as a public safety answering point and can directly communicate with an application defined in UE.
- The ProSe UE App is an application installed on the UE side that uses ProSe capabilities.
- A ProSe function/DDNFM acts as the reference point for the ProSe App Server and UEs. This function is responsible for the verification, authorization, and configuration of UE. It also allows network core-level discovery for direct communication scenarios between devices.
3.3. ProSe Functions and Communication Scenarios in Public Safety Networks
- In-coverage: when all UEs are within the coverage of the eNB(s).
- Partial-coverage: when at least one in-coverage participant acts as a UE-to-Network relay, while other UE-to-UE relays can provide network access to distant users.
- Out-of-coverage: when all participants are out of the eNB.
3.4. D2D Synchronization Procedure
3.5. Infrastructure vs. D2D-Based Communication
3.6. Underlay D2D Topology Models
- Loosely coupled: In this model, illustrated in Figure 6a, a minimum number of links should be created and maintained within the D2D group using the one-to-one communication method.
- Fully coupled: In this model, illustrated in Figure 6b, each UE should connect with all neighbors in its range. This approach can be achieved using a multicast one-to-many communication method.
- Tightly coupled: In this approach, illustrated in Figure 6c, starting from the loosely coupled model, new additional selected links can be added between UEs according to one of these strategies: (1) based on the CQI by maintaining only links with a certain minimum CQI level, (2) based on the maximum number of links per user, where connections are made with a neighbor having a lower number of connections instead of the neighbor with the highest CQI, and (3) based on a combination of the two previously mentioned strategies, where the additional links are both limited by their number and also by the minimum level of the CQI.
4. The D2D Loosely Coupled Model
4.1. Neighbor Classification
4.2. Adding a User to the Network
4.3. Network Update Management
4.4. UE Departure or Disconnection
- Alert before leaving: An alert can be generated by the UE before leaving the D2D network. This can happen when the battery reaches a critical level, as soon as the CQI level drops continuously and tends toward zero, or if the user sends a disconnection request before closing the application.
- Suddenly without alerting: This situation is not very frequent, and it is due to the voluntary closure of the terminal connection or signal interference. Otherwise, it could be caused by an obstacle that suddenly blocks the radio transmission.
- General disconnection from the network: When the rescue mission ends, the PLMN terminates the public safety network mode. In this case, the UE is no longer authorized to use direct D2D communication functions.
4.5. Network Control Management
- Based on the server: the nodes send updates if there are changes in the topology and the Application Server maintains the global topology map of the entire network and transmits a notification (in broadcast message) to all participants.
- Based on peers: the directly connected nodes exchange the member list of their groups.
5. Material and Methods
5.1. Simulation Environment and Parameters
5.2. Adding Users to the Simulation Area
5.3. UE Movement Model
5.4. UE Transmission/Reception Range and CQI Calculation
Algorithm 1. CQI calculation. |
if d > R CQI ← 0 else if d = = 0 CQI ← 15 else CQI ← 16–d/(R/15) //CQI is defined as an Integer |
5.5. Network Update Based on the CQI Threshold
Algorithm 2. Network update according to the CQI threshold. |
For each Gc group of UEi do if CQI_Value(New_neighbor) - CQI_Value(Old_neighbor) <= CQI_threshold then keep Connection with Old_neighbor else Connect with New_neighbor Disconnect from Old_neighbor Report the modification to the ProSe Application Server number_of_updates ++ end end |
5.6. Network Update Based on the Optimization Interval
Algorithm 3. Network update function according to the optimization interval. |
Set optimization_interval to i if sim_Step % optimization_interval = 0 then execute network update function with defined CQI_threshold else execute network update function with CQI_threshold = 15 end |
5.7. Traffic Generated by Control Message Flow
- Update message: this message is sent by UE to the Application Server when direct links are added or deleted. The message contains the updated list of directly connected users having direct links with the UE. The message size is variable and depends on the UE-managed links.
- Notification message: this message is sent in broadcast mode to all connected users and contains the topology map of the entire network. The IDs of the N active UEs are included, making the message size around N × 8 bytes.
Algorithm 4. Usage scenarios of update and notification messages. |
// User side For each UE do if new link is added or link removed then Send update message to server with containing connected IDs end // Server side if new user is connected or update message received then Send notification to all UEs with updated topology map end |
6. Simulation Results
6.1. Effects of Density and Group Connectivity
6.2. “Less Cost” vs. “Optimized Tree” Approaches
6.3. Effect of CQI Threshold-Based Approaches on Network Updates and the Average CQI of the Group
6.4. Effect of Increasing Optimization Intervals on Network Updates and the Average CQI of the Group
6.5. Effect of the Combination of the CQI Threshold and the Optimization Interval Compared with the “Optimized Tree” Approach
6.6. Control Traffic Simulation
7. Conclusions
Funding
Data Availability Statement
Conflicts of Interest
References
- Alnoman, A.; Anpalagan, A. On D2D communications for public safety applications. In Proceedings of the 2017 IEEE Canada International Humanitarian Technology Conference (IHTC), Toronto, ON, Canada, 21–22 July 2017; pp. 124–127. [Google Scholar] [CrossRef]
- Chen, Y.; Ma, C. Overview of D2D Communication Technology under 5G Cellular Network Coverage. In Proceedings of the 2020 IEEE 6th International Conference on Computer and Communications (ICCC), Chengdu, China, 11–14 December 2020; pp. 1297–1301. [Google Scholar] [CrossRef]
- 3GPP Technical Specification Group Services and System Aspects. Proximity-Based Services (Prose); Stage 2, TS 23.303 (Release 17); ETSI: Sophia Antipolis, France, 2023. [Google Scholar]
- Zahinos, R.; Abaunza, H.; Murillo, J.I.; Trujillo, M.A.; Viguria, A. Cooperative Multi-UAV System for Surveillance and Search&Rescue Operations Over a Mobile 5G Node. In Proceedings of the 2022 International Conference on Unmanned Aircraft Systems (ICUAS), Dubrovnik, Croatia, 21–24 June 2022; pp. 1016–1024. [Google Scholar] [CrossRef]
- Liu, Z.; Chen, H.; Wen, Y.; Xiao, C.; Chen, Y.; Sui, Z. Mode Design and Experiment of Unmanned Aerial Vehicle Search and Rescue in Inland Waters. In Proceedings of the 2021 6th International Conference on Transportation Information and Safety (ICTIS), Wuhan, China, 22–24 October 2021; pp. 917–922. [Google Scholar] [CrossRef]
- Naidoo, Y.; Stopforth, R.; Bright, G. Development of an UAV for search & rescue applications. In Proceedings of the IEEE Africon ’11, Victoria Falls, Zambia, 13–15 September 2011; pp. 1–6. [Google Scholar] [CrossRef]
- Ray, P.P.; Mukherjee, M.; Shu, L. Internet of Things for Disaster Management: State-of-the-Art and Prospects. IEEE Access 2017, 5, 18818–18835. [Google Scholar] [CrossRef]
- Sou, S.I.; Li, M.R.; Wang, S.H.; Tsai, M.H. File distribution via proximity group communications in LTE-advanced public safety networks. Comput. Netw. 2018, 149, 93–101. [Google Scholar] [CrossRef]
- Babun, L.; Yürekli, A.İ.; Güvenç, İ. Multi-hop and D2D communications for extending coverage in public safety scenarios. In Proceedings of the 2015 IEEE 40th Local Computer Networks Conference Workshops (LCN Workshops), Clearwater Beach, FL, USA, 26–29 October 2015; pp. 912–919. [Google Scholar] [CrossRef]
- Huang, C.; Zhai, B.; Tang, A.; Wang, X. Virtual mesh networking for achieving multi-hop D2D communications in 5G networks. Ad Hoc Netw. 2019, 94, 101936. [Google Scholar] [CrossRef]
- 3GPP Technical Specification Group Radio Access Network. Evolved Universal Terrestrial Radio Access (E-UTRA), Radio Resource Control (RRC), Protocol specification, TS 36.331 (Release 17); ETSI: Sophia Antipolis, France, 2023. [Google Scholar]
- 3GPP Technical Specification Group Core Network and Terminals. Proximity-Services (ProSe) in 5G System (5GS) Protocol Aspects, TS 24.554 (Release 18); ETSI: Sophia Antipolis, France, 2023. [Google Scholar]
- Lai, L.; Feng, D.; Zheng, F.-C.; Wang, X.; Yang, H.H.; Quek, T.Q.S. CQI-Based Interference Detection and Resource Allocation with QoS Provision in LTE-U Systems. IEEE Trans. Veh. Technol. 2021, 70, 1421–1433. [Google Scholar] [CrossRef]
- Elleuch, W. D2D Simulator for Loosely Coupled Network). ULCO. November 2023. Available online: https://github.com/wajdielleuch/D2D_SIM (accessed on 16 November 2023).
- Synave, R.; Desitter, A.; Dubrunfaut, N.; Langa, M.; Langa, G. MG2D (2D Graphics Engine). ULCO, Calais. 13 January 2020. Available online: https://iut.univ-littoral.fr/gitlab/synave/MG2D (accessed on 15 September 2023).
- Kumar, C. Evaluation of MANET Performance in Presence of Obstacles. Int. J. Ad Hoc Sens. Ubiquitous Comput. 2012, 3, 37–46. [Google Scholar] [CrossRef]
- Wang, X.; Liu, Z.; Wang, J.; Loughney, S.; Yang, Z.; Gao, X. Experimental study on individual walking speed during emergency evacuation with the influence of ship motion. Phys. A Stat. Mech. Its Appl. 2021, 562, 125369. [Google Scholar] [CrossRef]
- Lin, X.; Andrews, J.G.; Ghosh, A.; Ratasuk, R. An overview of 3GPP device-to-device proximity services. IEEE Commun. Mag. 2014, 52, 40–48. [Google Scholar] [CrossRef]
- Lim, D.-W.; Chun, C.-J.; Kang, J.-M. Transmit Power Adaptation for D2D Communications Underlaying SWIPT-Based IoT Cellular Networks. IEEE Internet Things J. 2022, 10, 987–1000. [Google Scholar] [CrossRef]
Simulation Parameters | Value |
---|---|
Transmitter range | Randomly from 100 to 200 m |
CQI | 1 to 15 (0 for unreachable UE) |
Simulation time | 7200 s (2 h) |
Node pause time when boundary is reached | Randomly 0 to 60 s |
Topology size | 500 m × 500 m |
Number of nodes | From 2 to 70 (new added node every 100 s) |
Node speed (Vmax) | 0 to 4 m/s |
CQI | Modulation and Coding Scheme | Min. Rate D2D (kbps) |
---|---|---|
1 | QPSK | 28.00 |
2 | QPSK | 37.33 |
3 | QPSK | 56.00 |
4 | QPSK | 112.00 |
5 | QPSK | 168.00 |
6 | QPSK | 201.60 |
7 | 16-QAM | 224.00 |
8 | 16-QAM | 336.00 |
9 | 16-QAM | 403.20 |
10 | 64-QAM | 504.00 |
11 | 64-QAM | 504.00 |
12 | 64-QAM | 604.80 |
13 | 64-QAM | 756.00 |
14 | 64-QAM | 840.00 |
15 | 64-QAM | 924.00 |
Optimized Tree Approach | Less Cost Approach | CQI Threshold = 1 | Optimization Interval = 2 s | CQI Threshold = 1 and Optimization Interval = 2 s | |
---|---|---|---|---|---|
Number of network updates | 33,036 | 0 (−100%) | 24,338 (−27%) | 29,403 (−11%) | 21,700 (−35%) |
Average CQI | 12.03 | 9.25 (−23.11%) | 11.89 (−1.16%) | 11.77 (−2.16%) | 11.6 (−3.57%) |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Elleuch, W. Underlay Loosely Coupled Model for Public Safety Networks Based on Device-to-Device Communication. Telecom 2024, 5, 122-144. https://doi.org/10.3390/telecom5010007
Elleuch W. Underlay Loosely Coupled Model for Public Safety Networks Based on Device-to-Device Communication. Telecom. 2024; 5(1):122-144. https://doi.org/10.3390/telecom5010007
Chicago/Turabian StyleElleuch, Wajdi. 2024. "Underlay Loosely Coupled Model for Public Safety Networks Based on Device-to-Device Communication" Telecom 5, no. 1: 122-144. https://doi.org/10.3390/telecom5010007
APA StyleElleuch, W. (2024). Underlay Loosely Coupled Model for Public Safety Networks Based on Device-to-Device Communication. Telecom, 5(1), 122-144. https://doi.org/10.3390/telecom5010007