78 research outputs found

    Enabling Disaster Resilient 4G Mobile Communication Networks

    Full text link
    The 4G Long Term Evolution (LTE) is the cellular technology expected to outperform the previous generations and to some extent revolutionize the experience of the users by taking advantage of the most advanced radio access techniques (i.e. OFDMA, SC-FDMA, MIMO). However, the strong dependencies between user equipments (UEs), base stations (eNBs) and the Evolved Packet Core (EPC) limit the flexibility, manageability and resiliency in such networks. In case the communication links between UEs-eNB or eNB-EPC are disrupted, UEs are in fact unable to communicate. In this article, we reshape the 4G mobile network to move towards more virtual and distributed architectures for improving disaster resilience, drastically reducing the dependency between UEs, eNBs and EPC. The contribution of this work is twofold. We firstly present the Flexible Management Entity (FME), a distributed entity which leverages on virtualized EPC functionalities in 4G cellular systems. Second, we introduce a simple and novel device-todevice (D2D) communication scheme allowing the UEs in physical proximity to communicate directly without resorting to the coordination with an eNB.Comment: Submitted to IEEE Communications Magazin

    Next-generation softwarized wireless networks

    Get PDF
    © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes,creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.Fifth-generation (5G) systems are being designed not only to face the unprecedented growth of mobile data traffic forecasted for the coming years but also to support other multiple and diverse use cases associated with new market segments and vertical industries (e.g., connected cars, smart cities, e-health, and smart factories). Hence, 5G systems are envisioned to become flexible and versatile network infrastructures that can be leveraged through a wide range of service-delivery models (e.g., neutral network hosting, network as a service, and private networks) and operators can customize for different applications and customer needs using network slicing.Peer ReviewedPostprint (author's final draft

    Introducing mobile edge computing capabilities through distributed 5G Cloud Enabled Small Cells

    Get PDF
    Current trends in broadband mobile networks are addressed towards the placement of different capabilities at the edge of the mobile network in a centralised way. On one hand, the split of the eNB between baseband processing units and remote radio headers makes it possible to process some of the protocols in centralised premises, likely with virtualised resources. On the other hand, mobile edge computing makes use of processing and storage capabilities close to the air interface in order to deploy optimised services with minimum delay. The confluence of both trends is a hot topic in the definition of future 5G networks. The full centralisation of both technologies in cloud data centres imposes stringent requirements to the fronthaul connections in terms of throughput and latency. Therefore, all those cells with limited network access would not be able to offer these types of services. This paper proposes a solution for these cases, based on the placement of processing and storage capabilities close to the remote units, which is especially well suited for the deployment of clusters of small cells. The proposed cloud-enabled small cells include a highly efficient microserver with a limited set of virtualised resources offered to the cluster of small cells. As a result, a light data centre is created and commonly used for deploying centralised eNB and mobile edge computing functionalities. The paper covers the proposed architecture, with special focus on the integration of both aspects, and possible scenarios of application.Peer ReviewedPostprint (author's final draft

    Designing and Implementing Future Aerial Communication Networks

    Get PDF
    Providing "connectivity from the sky" is the new innovative trend in wireless communications. High and low altitude platforms, drones, aircrafts and airships are being considered as the candidates for deploying wireless communications complementing the terrestrial communication infrastructure. In this article, we report the detailed account of the design and implementation challenges of an aerial network consisting of LTE Advanced (LTE-A) base stations. In particular, we review achievements and innovations harnessed by an aerial network composed of Helikite platforms. Helikites can be raised in the sky to bring Internet access during special events and in the aftermath of an emergency. The trial phase of the system mounting LTE-A technology onboard Helikites to serve users on the ground showed not only to be very encouraging but that such a system could offer even a longer lasting solution provided that inefficiency in powering the radio frequency equipment in the Helikite can be overcome.Comment: IEEE Communications Magazine 201

    Innovations through 5G-Crosshaul applications

    Get PDF
    Proceeding of: 2016 European Conference on Networks and Communications (EuCNC) 27-30 junio 2016 Athens, GreeceA transport network for 5G envisions integrating the fronthaul and backhaul segments (namely 5G-Crosshaul) into a single transport network. This requires a fully integrated and unified management of fronthaul and backhaul resources in a sharable, scalable and flexible way. The integrated and unified management of the transport network resources follows the Software Defined Networking (SDN) principles of centralization, decoupling between control and data plane and application ecosystem. Innovation to enable context-aware resource management and to provide system-wide optimization of QoS, as well as energy related objectives, lies on defining key applications as logical decision entities to program the underlying network and packet forwarding behaviour. This paper presents a set of 5G-Crosshaul SDN applications with the scope of (i) managing the 5G-Crosshaul resources, including not only network but also computing and storage resources, and (ii) offering efficient media distribution and traffic offloading solutions. In order to develop these applications in a real system, we identify the interactions between the applications and the control plane. Based on these interactions, we propose a two-layer application plane and specify the requirements of the applications on the Northbound Interface (NBI) of the control plane.This work has been supported by the H2020 project “5G-Crosshaul: The 5G Integrated fronthaul/backhaul” (671598)

    Novel Resource and Energy Management for 5G Integrated Backhaul/Fronthaul (5G-Crosshaul)

    Get PDF
    The integration of both fronthaul and backhaul into a single transport network (namely, 5G-Crosshaul) is envisioned for the future 5G transport networks. This requires a fully integrated and unified management of the fronthaul and backhaul resources in a cost-efficient, scalable and flexible way through the deployment of an SDN/NFV control framework. This paper presents the designed 5G-Crosshaul architecture, two selected SDN/NFV applications targeting for cost-efficient resource and energy usage: the Resource Management Application (RMA) and the Energy Management and Monitoring Application (EMMA). The former manages 5G-Crosshaul resources (network, computing and storage resources). The latter is a special version of RMA with the focus on the objectives of optimizing the energy consumption and minimizing the energy footprint of the 5G-Crosshaul infrastructure. Besides, EMMA is applied to the mmWave mesh network and the high speed train scenarios. In particular, we present the key application design with their main components and the interactions with each other and with the control plane, and then we present the proposed application optimization algorithms along with initial results. The first results demonstrate that the proposed RMA is able to cost-efficiently utilize the Crosshaul resources of heterogeneous technologies, while EMMA can achieve significant energy savings through energy-efficient routing of traffic flows. For experiments in real system, we also set up Proof of Concepts (PoCs) for both applications in order to perform real trials in the field.© 2017 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

    Aerial base stations with opportunistic links for next generation emergency communications

    Get PDF
    Rapidly deployable and reliable mission-critical communication networks are fundamental requirements to guarantee the successful operations of public safety officers during disaster recovery and crisis management preparedness. The ABSOLUTE project focused on designing, prototyping, and demonstrating a high-capacity IP mobile data network with low latency and large coverage suitable for many forms of multimedia delivery including public safety scenarios. The ABSOLUTE project combines aerial, terrestrial, and satellites communication networks for providing a robust standalone system able to deliver resilience communication systems. This article focuses on describing the main outcomes of the ABSOLUTE project in terms of network and system architecture, regulations, and implementation of aerial base stations, portable land mobile units, satellite backhauling, S-MIM satellite messaging, and multimode user equipments

    Technology pillars in the architecture of future 5G mobile networks: NFV, MEC and SDN

    Get PDF
    This paper analyzes current standardization situation of 5G and the role network softwarization plays in order to address the challenges the new generation of mobile networks must face. This paper surveys recent documentation from the main stakeholders to pick out the use cases, scenarios and emerging vertical sectors that will be enabled by 5G technologies, and to identify future high-level service requirements. Driven by those service requirements 5G systems will support diverse radio access technology scenarios, meet end-to-end user experienced requirements and provide capability of flexible network deployment and efficient operations. Then, based on the identified requirements, the paper overviews the main 5G technology trends and design principles to address them. In particular, the paper emphasizes the role played by three main technologies, namely SDN, NFV and MEC, and analyzes the main open issues of these technologies in relation to 5G.Preprin

    Design, analysis and simulations of medium access control protocols for high and low data rate applications

    No full text
    Abstract The past two decades have witnessed an unprecedented proliferation of mobile devices equipped with extremely innovative wireless technologies. Short range networks, such as wireless personal area networks (WPANs), wireless sensor networks (WSNs) and wireless body area networks (WBANs) have been defined and researched to deliver high speed home connectivity, environment and health monitoring. This thesis tackles design, analysis and simulation of medium access control (MAC) protocols tailored for short range networks. These have in common the use of battery operated devices but also certain design challenges connected with MAC protocols are common upon selecting the physical layer technology. Ultra wideband (UWB) technology and 60 GHz technology (which is referred to also as millimeter wave communications) are two valid examples of the wireless revolution of the past decade. Several existing standards, such as IEEE 802.15.3, ECMA-368, IEEE 802.15.4 and its amendment IEEE 802.15.4a, are considered in this thesis for MAC analysis in conjunction with UWB technology. With regard to millimeter wave communications the characteristics of the IEEE 802.15.3c standard are taken into account. Apart for the IEEE 802.15.3c all the MAC protocols have been modeled in the network simulator Opnet. One contribution of this thesis is to produce an innovative and in-depth analysis of the management aspects (e.g. ECMA-368 distributed beaconing) stemming from the above mentioned standards by means of analytical and simulation models. This study approach allows selecting the MAC features suitable for the applications and the technologies of interest. The key performance metric used to analyze all the protocols is energy efficiency, but also throughput is investigated. Another contribution brought by this thesis consists in the innovative way of studying slotted-based MAC protocols as an integrated concept connected with the type of network, the type of application and the selected physical technologies. This thesis also shows MAC performance in conjunction with UWB when false alarm, miss-detection and receiver capture (capture is modeled by means of an existing interference model) are taken into consideration. Most of the unrealistic, though common, assumptions in MAC analysis are removed and the performance of selected medical applications is evaluated through Opnet simulations. The well known binary exponential backoff is analyzed with an innovative though simplified one-dimensional Markov chain approach in the context of directional MAC for 60 GHz communications. As shown in the remainder of this thesis, the simplification introduced does not hinder the accuracy of the results, but rather allows accounting even for a finite number of retransmissions with a simple chain extension.TiivistelmÀ Kahden viime vuosikymmenen aikana innovatiivisella langattomalla tekniikalla varustettujen viestintÀlaiteiden mÀÀrÀ on kasvanut rÀjÀhdysmÀisesti. Lyhyen kantaman verkkoja kuten langattomia henkilökohtaisen alueen verkkoja (WPAN), langattomia anturiverkkoja (WSN) ja langattomia vartaloalueen verkkoja (WBAN) on mÀÀritelty ja tutkittu, jotta voitaisiin tuottaa korkeanopeuksisia kotiyhteyksiÀ sekÀ vÀlineitÀ ympÀristön ja terveydentilan seurantaan. TÀmÀ vÀitöskirja kÀsittelee lyhyen kantaman viestintÀÀn suunniteltujen linkinohjauskerroksen MAC-protokollien suunnittelua, analysointia ja simulointia. NÀissÀ kaikissa kÀytetÀÀn akkukÀyttöisiÀ laitteita, mutta myös tietyt MAC-protokollien suunnittelun haasteet ovat tavallisia fyysisen kerroksen teknologiaa valittaessa. Ultra-laajakaistainen (UWB) teknologia ja 60 GHz teknologia (eli millimetriaallonpituusalueen tietoliikenne) ovat hyviÀ esimerkkejÀ kuluneen vuosikymmenen langattomasta vallankumouksesta. TÀssÀ vÀitöskirjassa huomioidaan UWB teknologiaan liittyvÀÀ MAC-kerroksen analyysiÀ tehtÀessÀ useat olemassa olevat standardit, kuten IEEE 802.15.3, ECMA-368, IEEE 802.15.4 ja sen lisÀys IEEE 802.15.4a. Millimetriaallonpituusalueen tietoliikenteessÀ huomioidaan myös IEEE 802.15.3c standardin erityispiirteet. IEEE 802.15.3c:tÀ lukuun ottamatta kaikki MAC-protokollat on mallinnettu Opnet verkkosimulaattorilla. TÀmÀ tutkimus tarjoaa innovatiivisen ja syvÀluotaavan tutkimuksen nÀiden standardien pohjalta ja analyyttisten ja simuloitujen mallien avulla kehitetyistÀ hallinnallisista lÀhestymistavoista (esim. ECMA-368 hajautettu majakkasignaali). NÀiden avulla voidaan valita kohteena oleviin sovelluksiin ja teknologioihin parhaiten soveltuvia MAC-ominaisuuksia. Kaikkien protokollien analysointiin kÀytetty ensisijainen suorituskykymittari on energiatehokkuus, mutta myös datanopeuksia on tarkasteltu. TÀssÀ tutkimuksessa esitellÀÀn myös innovatiivinen tapa tutkia MAC protokollia integroituina konsepteina suhteessa verkon ja sovellusten tyyppiin sekÀ fyysisen kerroksen teknologiaan. LisÀksi tÀmÀ vÀitöskirja esittelee MAC suorituskykyÀ UWB verkossa silloin, kun siinÀ otetaan huomioon vÀÀrÀt hÀlytykset, vÀÀrÀ havainnointi ja vastaanottimen signaalinkaappaus (vastaanoton mallintamiseksi kÀytetÀÀn olemassa olevaa interferenssimallia). MAC analyysistÀ poistetaan useimmat epÀrealistiset, vaikkakin tavalliset, olettamukset, ja verkkojen suorituskykyÀ tarkastellaan valittujen kriittisten parametrien monitoroinnissa Opnet-simulaatioiden avulla. Tunnettua binÀÀrijakoinen eksponentiaalinen perÀÀntyminen -algoritmia analysoidaan innovatiivisella, yksinkertaistetulla yksiulotteisella Markov-ketju -mallilla 60 GHz:n suunta-antenni MAC:n yhteydessÀ. Kuten tÀssÀ tutkimuksessa tullaan osoittamaan, esitelty yksinkertaistus ei rajoita tulosten tarkkuutta, vaan mukaan voidaan lukea jopa rajallinen mÀÀrÀ uudelleenlÀhetyksiÀ yksinkertaisen Markovin ketjun laajennuksen avulla

    An Urn Occupancy Approach for Cognitive Radio Networks in DTVB White Spaces

    No full text
    The cognitive Radio paradigm has recently received considerable interest to address the so called ’spectrum scarcity’ problem. In the USA, the Federal Communications Commission recently issued the regulatory for the use of cognitive radio in the TV white space spectrum. The primary objective is the design of cognitive devices able to combine the use of spectrum sensing and GEO-location information with the concept of the cognitive control channel to manage the cognitive devices. The recent standard ECMA-392 defines physical layer and medium access control protocols to enable a network managed in a fully distributed fashion. In this work, we pursue the design of an efficient medium access control protocol for the cognitive control channel to flexibly and reliability exchange messages inside the cognitive radio network. In particular, we explore how the cognitive devices can improve their knowledge of spectrum vacancies by means of sensing when the distributed beaconing defined by ECMA-392 is used. Our main contributions are the following: 1) we propose a proprietary medium access control protocol based on the Standard ECMA-392; 2) we model the behavior of the cognitive radio network by means of an innovative urn model approach, 3) we investigate the access to the frequency channels of the cognitive devices with and without spoofing attacks and 4) we investigate the ability of the cognitive devices to identify frequency holes accounting for perfect and imperfect spectrum sensing, as well as we study the network throughput.JRC.G.5-Security technology assessmen
    • 

    corecore