10 research outputs found

    Medium Access Control and Routing Protocols Design for 5G

    Get PDF
    In future wireless systems, such as 5G and beyond, the current dominating human-centric communication systems will be complemented by a tremendous increase in the number of smart devices, equipped with radio devices, possibly sensors, and uniquely addressable. This will result in explosion of wireless traffic volume, and consequently exponential growth in demand of radio spectrum. There are different engineering techniques for resolving the cost and scarcity of radio spectrum such as coexistence of diverse devices on the same pool of radio resources, spectrum aggregations, adoption of mmWave bands with huge spectrum, etc. The aim of this thesis is to investigate Medium Access Control (MAC) and routing protocols for 5G and beyond radio networks. Two scenarios are addressed: heterogeneous scenario where scheduled and uncoordinated users coexist, and a scenario where drones are used for monitoring a given area. In the heterogeneous scenario scheduled users are synchronised with the Base Station (BS) and rely on centralised resource scheduler for assignment of time slots, while the uncoordinated users are asynchronous with each other and the BS and rely unslotted Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) for channel access. First, we address a single-hop network with advanced scheduling algorithm design and packet length adaptation schemes design. Second, we address a multi-hop network with novel routing protocol for enhancing performance of the scheduled users in terms of throughput, and coexistence of all network users. In the drone-based scenario, new routing protocols are designed to address the problems of Wireless Mesh Networks with monitoring drones. In particular, a novel optimised Hybrid Wireless Mesh Protocol (O-HWMP) for a quick and efficient discovery of paths is designed, and a capacity achieving routing and scheduling algorithm, called backpressure, investigated. To improve on the long-end-to-end delays of classical backpressure, a modified backpressure algorithm is proposed and evaluated

    Separation Framework: An Enabler for Cooperative and D2D Communication for Future 5G Networks

    Get PDF
    Soaring capacity and coverage demands dictate that future cellular networks need to soon migrate towards ultra-dense networks. However, network densification comes with a host of challenges that include compromised energy efficiency, complex interference management, cumbersome mobility management, burdensome signaling overheads and higher backhaul costs. Interestingly, most of the problems, that beleaguer network densification, stem from legacy networks' one common feature i.e., tight coupling between the control and data planes regardless of their degree of heterogeneity and cell density. Consequently, in wake of 5G, control and data planes separation architecture (SARC) has recently been conceived as a promising paradigm that has potential to address most of aforementioned challenges. In this article, we review various proposals that have been presented in literature so far to enable SARC. More specifically, we analyze how and to what degree various SARC proposals address the four main challenges in network densification namely: energy efficiency, system level capacity maximization, interference management and mobility management. We then focus on two salient features of future cellular networks that have not yet been adapted in legacy networks at wide scale and thus remain a hallmark of 5G, i.e., coordinated multipoint (CoMP), and device-to-device (D2D) communications. After providing necessary background on CoMP and D2D, we analyze how SARC can particularly act as a major enabler for CoMP and D2D in context of 5G. This article thus serves as both a tutorial as well as an up to date survey on SARC, CoMP and D2D. Most importantly, the article provides an extensive outlook of challenges and opportunities that lie at the crossroads of these three mutually entangled emerging technologies.Comment: 28 pages, 11 figures, IEEE Communications Surveys & Tutorials 201

    Low-latency Networking: Where Latency Lurks and How to Tame It

    Full text link
    While the current generation of mobile and fixed communication networks has been standardized for mobile broadband services, the next generation is driven by the vision of the Internet of Things and mission critical communication services requiring latency in the order of milliseconds or sub-milliseconds. However, these new stringent requirements have a large technical impact on the design of all layers of the communication protocol stack. The cross layer interactions are complex due to the multiple design principles and technologies that contribute to the layers' design and fundamental performance limitations. We will be able to develop low-latency networks only if we address the problem of these complex interactions from the new point of view of sub-milliseconds latency. In this article, we propose a holistic analysis and classification of the main design principles and enabling technologies that will make it possible to deploy low-latency wireless communication networks. We argue that these design principles and enabling technologies must be carefully orchestrated to meet the stringent requirements and to manage the inherent trade-offs between low latency and traditional performance metrics. We also review currently ongoing standardization activities in prominent standards associations, and discuss open problems for future research

    Interference Management of Inband Underlay Device-toDevice Communication in 5G Cellular Networks

    Get PDF
    The explosive growth of data traffic demands, emanating from smart mobile devices and bandwidth-consuming applications on the cellular network poses the need to drastically modify the cellular network architecture. A challenge faced by the network operators is the inability of the finite spectral resources to support the growing data traffic. The Next Generation Network (NGN) is expected to meet defined requirements such as massively connecting billions of devices with heterogeneous applications and services through enhanced mobile broadband networks, which provides higher data rates with improved network reliability and availability, lower end-to-end latency and increased energy efficiency. Device-to-Device (D2D) communication is one of the several emerging technologies that has been proposed to support NGN in meeting these aforementioned requirements. D2D communication leverages the proximity of users to provide direct communication with or without traversing the base station. Hence, the integration of D2D communication into cellular networks provides potential gains in terms of throughput, energy efficiency, network capacity and spectrum efficiency. D2D communication underlaying a cellular network provides efficient utilisation of the scarce spectral resources, however, there is an introduction of interference emanating from the reuse of cellular channels by D2D pairs. Hence, this dissertation focuses on the technical challenge with regards to interference management in underlay D2D communication. In order to tackle this challenge to be able to exploit the potentials of D2D communication, there is the need to answer some important research questions concerning the problem. Thus, the study aims to find out how cellular channels can be efficiently allocated to D2D pairs for reuse as an underlay to cellular network, and how mode selection and power control approaches influence the degree of interference caused by D2D pairs to cellular users. Also, the research study continues to determine how the quality of D2D communication can be maintained with factors such as bad channel quality or increased distance. In addressing these research questions, resource management techniques of mode selection, power control, relay selection and channel allocation are applied to minimise the interference caused by D2D pairs when reusing cellular channels to guarantee the Quality of Service (QoS) of cellular users, while optimally improving the number of permitted D2D pairs to reuse channels. The concept of Open loop power control scheme is examined in D2D communication underlaying cellular network. The performance of the fractional open loop power control components on SINR is studied. The simulation results portrayed that the conventional open loop power control method provides increased compensation for the path loss with higher D2D transmit power when compared with the fractional open loop power control method. Furthermore, the problem of channel allocation to minimise interference is modelled in two system model scenarios, consisting of cellular users coexisting with D2D pairs with or without relay assistance. The channel allocation problem is solved as an assignment problem by using a proposed heuristic channel allocation, random channel allocation, Kuhn-Munkres (KM) and Gale-Shapley (GS) algorithms. A comparative performance evaluation for the algorithms are carried out in the two system model scenarios, and the results indicated that D2D communication with relay assistance outperformed the conventional D2D communication without relay assistance. This concludes that the introduction of relay-assisted D2D communication can improve the quality of a network while utilising the available spectral resources without additional infrastructure deployment costs. The research work can be extended to apply an effective relay selection approach for a user mobility scenario

    Practical interference management strategies in Gaussian networks

    Get PDF
    Increasing demand for bandwidth intensive activities on high-penetration wireless hand-held personal devices, combined with their processing power and advanced radio features, has necessitated a new look at the problems of resource provisioning and distributed management of coexistence in wireless networks. Information theory, as the science of studying the ultimate limits of communication e ciency, plays an important role in outlining guiding principles in the design and analysis of such communication schemes. Network information theory, the branch of information theory that investigates problems of multiuser and distributed nature in information transmission is ideally poised to answer questions about the design and analysis of multiuser communication systems. In the past few years, there have been major advances in network information theory, in particular in the generalized degrees of freedom framework for asymptotic analysis and interference alignment which have led to constant gap to capacity results for Gaussian interference channels. Unfortunately, practical adoption of these results has been slowed by their reliance on unrealistic assumptions like perfect channel state information at the transmitter and intricate constructions based on alignment over transcendental dimensions of real numbers. It is therefore necessary to devise transmission methods and coexistence schemes that fall under the umbrella of existing interference management and cognitive radio toolbox and deliver close to optimal performance. In this thesis we work on the theme of designing and characterizing the performance of conceptually simple transmission schemes that are robust and achieve performance that is close to optimal. In particular, our work is broadly divided into two parts. In the rst part, looking at cognitive radio networks, we seek to relax the assumption of non-causal knowledge of primary user's message at the secondary user's transmitter. We study a cognitive channel model based on Gaussian interference channel that does not assume anything about users other than primary user's priority over secondary user in reaching its desired quality of service. We characterize this quality of service requirement as a minimum rate that the primary user should be able to achieve. Studying the achievable performance of simple encoding and decoding schemes in this scenario, we propose a few di erent simple encoding schemes and explore di erent decoder designs. We show that surprisingly, all these schemes achieve the same rate region. Next, we study the problem of rate maximization faced by the secondary user subject to primary's QoS constraint. We show that this problem is not convex or smooth in general. We then use the symmetry properties of the problem to reduce its solution to a feasibly implementable line search. We also provide numerical results to demonstrate the performance of the scheme. Continuing on the theme of simple yet well-performing schemes for wireless networks, in the second part of the thesis, we direct our attention from two-user cognitive networks to the problem of smart interference management in large wireless networks. Here, we study the problem of interference-aware wireless link scheduling. Link scheduling is the problem of allocating a set of transmission requests into as small a set of time slots as possible such that all transmissions satisfy some condition of feasibility. The feasibility criterion has traditionally been lack of pair of links that interfere too much. This makes the problem amenable to solution using graph theoretical tools. Inspired by the recent results that the simple approach of treating interference as noise achieves maximal Generalized Degrees of Freedom (which is a measure that roughly captures how many equivalent single-user channels are contained in a given multi-user channel) and the generalization that it can attain rates within a constant gap of the capacity for a large class of Gaussian interference networks, we study the problem of scheduling links under a set Signal to Interference plus Noise Ratio (SINR) constraint. We show that for nodes distributed in a metric space and obeying path loss channel model, a re ned framework based on combining geometric and graph theoretic results can be devised to analyze the problem of nding the feasible sets of transmissions for a given level of desired SINR. We use this general framework to give a link scheduling algorithm that is provably within a logarithmic factor of the best possible schedule. Numerical simulations con rm that this approach outperforms other recently proposed SINR-based approaches. Finally, we conclude by identifying open problems and possible directions for extending these results

    Content Sharing in Mobile Networks with Infrastructure: Planning and Management

    Get PDF
    This thesis focuses on mobile ad-hoc networks (with pedestrian or vehicular mobility) having infrastructure support. We deal with the problems of design, deployment and management of such networks. A first issue to address concerns infrastructure itself: how pervasive should it be in order for the network to operate at the same time efficiently and in a cost-effective manner? How should the units composing it (e.g., access points) be placed? There are several approaches to such questions in literature, and this thesis studies and compares them. Furthermore, in order to effectively design the infrastructure, we need to understand how and how much it will be used. As an example, what is the relationship between infrastructure-to-node and node-to-node communication? How far away, in time and space, do data travel before its destination is reached? A common assumption made when dealing with such problems is that perfect knowledge about the current and future node mobility is available. In this thesis, we also deal with the problem of assessing the impact that an imperfect, limited knowledge has on network performance. As far as the management of the network is concerned, this thesis presents a variant of the paradigm known as publish-and-subscribe. With respect to the original paradigm, our goal was to ensure a high probability of finding the requested content, even in presence of selfish, uncooperative nodes, or even nodes whose precise goal is harming the system. Each node is allowed to get from the network an amount of content which corresponds to the amount of content provided to other nodes. Nodes with caching capabilities are assisted in using their cache in order to improve the amount of offered conten

    Security for network services delivery of 5G enabled device-to-device communications mobile network

    Get PDF
    The increase in mobile traffic led to the development of Fifth Generation (5G) mobile network. 5G will provide Ultra Reliable Low Latency Communication (URLLC), Massive Machine Type Communication (mMTC), enhanced Mobile Broadband (eMBB). Device-to-Device (D2D) communications will be used as the underlaying technology to offload traffic from 5G Core Network (5GC) and push content closer to User Equipment (UE). It will be supported by a variety of Network Service (NS) such as Content-Centric Networking (CCN) that will provide access to other services and deliver content-based services. However, this raises new security and delivery challenges. Therefore, research was conducted to address the security issues in delivering NS in 5G enabled D2D communications network. To support D2D communications in 5G, this thesis introduces a Network Services Delivery (NSD) framework defining an integrated system model. It incorporates Cloud Radio Access Network (C-RAN) architecture, D2D communications, and CCN to support 5G’s objectives in Home Network (HN), roaming, and proximity scenarios. The research explores the security of 5G enabled D2D communications by conducting a comprehensive investigation on security threats. It analyses threats using Dolev Yao (DY) threat model and evaluates security requirements using a systematic approach based on X.805 security framework. Which aligns security requirements with network connectivity, service delivery, and sharing between entities. This analysis highlights the need for security mechanisms to provide security to NSD in an integrated system, to specify these security mechanisms, a security framework to address the security challenges at different levels of the system model is introduced. To align suitable security mechanisms, the research defines underlying security protocols to provide security at the network, service, and D2D levels. This research also explores 5G authentication protocols specified by the Third Generation Partnership Project (3GPP) for securing communication between UE and HN, checks the security guarantees of two 3GPP specified protocols, 5G-Authentication and Key Agreement (AKA) and 5G Extensive Authentication Protocol (EAP)-AKA’ that provide primary authentication at Network Access Security (NAC). The research addresses Service Level Security (SLS) by proposing Federated Identity Management (FIdM) model to integrate federated security in 5G, it also proposes three security protocols to provide secondary authentication and authorization of UE to Service Provider (SP). It also addresses D2D Service Security (DDS) by proposing two security protocols that secure the caching and sharing of services between two UEs in different D2D communications scenarios. All protocols in this research are verified for functional correctness and security guarantees using a formal method approach and semi-automated protocol verifier. The research conducts security properties and performance evaluation of the protocols for their effectiveness. It also presents how each proposed protocol provides an interface for an integrated, comprehensive security solution to secure communications for NSD in a 5G enabled D2D communications network. The main contributions of this research are the design and formal verification of security protocols. Performance evaluation is supplementary

    Recent Trends in Communication Networks

    Get PDF
    In recent years there has been many developments in communication technology. This has greatly enhanced the computing power of small handheld resource-constrained mobile devices. Different generations of communication technology have evolved. This had led to new research for communication of large volumes of data in different transmission media and the design of different communication protocols. Another direction of research concerns the secure and error-free communication between the sender and receiver despite the risk of the presence of an eavesdropper. For the communication requirement of a huge amount of multimedia streaming data, a lot of research has been carried out in the design of proper overlay networks. The book addresses new research techniques that have evolved to handle these challenges
    corecore