OFDMA based device-to-device communication protocols

Download
2015
Gültekin, Yunus Can
This thesis considers the physical and media access control layer (PHY/MAC) architectures of a device-to-device (D2D) communication protocol for ad hoc networks. We propose an orthogonal frequency-division multiple access (OFDMA) based distributed D2D solution for frequency hopping networks operating with small packet sizes. The main contributions to the literature are adding an average received power estimation method to achieve interference-awareness, and implementing a time slotted connection scheduler to attain efficient spatial reuse. Design aspects are discussed for both peer discovery and connection scheduling stages. Simulation results are presented to demonstrate the potential of the proposed structure from the throughput perspective in networks where a frequency hopping strategy is implemented, and the packet sizes are relatively small as in Bluetooth.

Suggestions

Implementation of a wireless streaming system for universal multimedia access
Ünal, Halim Ünsem; Akar, Gözde; Department of Electrical and Electronics Engineering (2003)
This thesis describes a universal multimedia access system and its implementation details. In the context of this document, universal multimedia access means accessing multimedia content over ubiquitous computer networks, using different computing platforms. The computer networks involve both wired and wireless networks, and computing platforms involve wired PC, mobile PC and personal digital assistants (PDA). The system is built on a client/server architecture. Video data is H.263 coded and carried over RT...
Architectural design of an access control system for enterprise networks
Kirimer, Burak; Özgit, Attila (2007-11-09)
Client computers in enterprise networks have the potential to be the source of serious security problems, especially when their hardware and software components are out of physical administrative control. Besides, services in the network may have client configuration requirements. We propose a system composed of a policy management and enforcement server and client agents, which authenticates the client users and checks their computer configurations before allowing their access to services. The information ...
Differential network coding in wireless networks Telsiz aǧlarda farksal aǧ kodlamasi
Özdemir, Özgür; Yılmaz, Ali Özgür (2009-10-29)
In this paper a three-terminal communication scenario where two users exchange information by employing differential binary modulation and network coding via a relay is considered. The transmission is divided into three slots in time where the first and second slots are allocated to the transmission of differential encoded data of the users. After demodulation, the relay broadcasts the bit-wise XOR-ed and differential encoded packet to the users in the third slot. The optimum detector and a simplified decis...
Evaluation of priority dependent and time scheduled MAC layer protocols for ad-hoc networks
Erdeğer, İsmail; Baykal, Buyurman; Department of Electrical and Electronics Engineering (2015)
Ad-hoc networks have very unique features, such as dynamic topologies, relatively limited bandwidth and wireless signal propagation schemes, which present various challenges for wireless communication. In this thesis, control mechanisms for channel access scheduling and topology in ad-hoc networks are evaluated, which utilize the information from two-hop neighborhood to cope with the communication difficulties in ad-hoc networks. Channel assignment is one of the most important topics for ad-hoc networks. Ch...
Performance analysis of a power aware routing protocol for ad hoc networks
Yazıcı, Mehmet Akif; Bilgen, Semih; Department of Electrical and Electronics Engineering (2006)
In this thesis, performance of the Contribution Reward Routing Protocol with Shapley Value (CAP-SV), a power-aware routing protocol for ad hoc networking is analyzed. Literature study on ad hoc network routing and ower-awareness is given. The overhead induced by the extra packets of the redirection mechanism of CAP-SV is formulized and the factors affecting this overhead are discussed. Then, the power consumption of CAP-SV is analytically analized using a linear power consumption model. It is shown that CAP...
Citation Formats
Y. C. Gültekin, “OFDMA based device-to-device communication protocols,” M.S. - Master of Science, Middle East Technical University, 2015.