29,221 research outputs found

    Adaptive stochastic radio access selection scheme for cellular-WLAN heterogeneous communication systems

    Get PDF
    This study proposes a novel adaptive stochastic radio access selection scheme for mobile users in heterogeneous cellular-wireless local area network (WLAN) systems. In this scheme, a mobile user located in dual coverage area randomly selects WLAN with probability of ω when there is a need for downloading a chunk of data. The value of ω is optimised according to the status of both networks in terms of network load and signal quality of both cellular and WLAN networks. An analytical model based on continuous time Markov chain is proposed to optimise the value of ω and compute the performance of proposed scheme in terms of energy efficiency, throughput, and call blocking probability. Both analytical and simulation results demonstrate the superiority of the proposed scheme compared with the mainstream network selection schemes: namely, WLAN-first and load balancing

    Energy efficiency in heterogeneous wireless access networks

    Get PDF
    In this article, we bring forward the important aspect of energy savings in wireless access networks. We specifically focus on the energy saving opportunities in the recently evolving heterogeneous networks (HetNets), both Single- RAT and Multi-RAT. Issues such as sleep/wakeup cycles and interference management are discussed for co-channel Single-RAT HetNets. In addition to that, a simulation based study for LTE macro-femto HetNets is presented, indicating the need for dynamic energy efficient resource management schemes. Multi-RAT HetNets also come with challenges such as network integration, combined resource management and network selection. Along with a discussion on these challenges, we also investigate the performance of the conventional WLAN-first network selection mechanism in terms of energy efficiency (EE) and suggest that EE can be improved by the application of intelligent call admission control policies

    Thirty Years of Machine Learning: The Road to Pareto-Optimal Wireless Networks

    Full text link
    Future wireless networks have a substantial potential in terms of supporting a broad range of complex compelling applications both in military and civilian fields, where the users are able to enjoy high-rate, low-latency, low-cost and reliable information services. Achieving this ambitious goal requires new radio techniques for adaptive learning and intelligent decision making because of the complex heterogeneous nature of the network structures and wireless services. Machine learning (ML) algorithms have great success in supporting big data analytics, efficient parameter estimation and interactive decision making. Hence, in this article, we review the thirty-year history of ML by elaborating on supervised learning, unsupervised learning, reinforcement learning and deep learning. Furthermore, we investigate their employment in the compelling applications of wireless networks, including heterogeneous networks (HetNets), cognitive radios (CR), Internet of things (IoT), machine to machine networks (M2M), and so on. This article aims for assisting the readers in clarifying the motivation and methodology of the various ML algorithms, so as to invoke them for hitherto unexplored services as well as scenarios of future wireless networks.Comment: 46 pages, 22 fig

    Exploiting Device-to-Device Communications to Enhance Spatial Reuse for Popular Content Downloading in Directional mmWave Small Cells

    Full text link
    With the explosive growth of mobile demand, small cells in millimeter wave (mmWave) bands underlying the macrocell networks have attracted intense interest from both academia and industry. MmWave communications in the 60 GHz band are able to utilize the huge unlicensed bandwidth to provide multiple Gbps transmission rates. In this case, device-to-device (D2D) communications in mmWave bands should be fully exploited due to no interference with the macrocell networks and higher achievable transmission rates. In addition, due to less interference by directional transmission, multiple links including D2D links can be scheduled for concurrent transmissions (spatial reuse). With the popularity of content-based mobile applications, popular content downloading in the small cells needs to be optimized to improve network performance and enhance user experience. In this paper, we develop an efficient scheduling scheme for popular content downloading in mmWave small cells, termed PCDS (popular content downloading scheduling), where both D2D communications in close proximity and concurrent transmissions are exploited to improve transmission efficiency. In PCDS, a transmission path selection algorithm is designed to establish multi-hop transmission paths for users, aiming at better utilization of D2D communications and concurrent transmissions. After transmission path selection, a concurrent transmission scheduling algorithm is designed to maximize the spatial reuse gain. Through extensive simulations under various traffic patterns, we demonstrate PCDS achieves near-optimal performance in terms of delay and throughput, and also superior performance compared with other existing protocols, especially under heavy load.Comment: 12 pages, to appear in IEEE Transactions on Vehicular Technolog

    On the Total Energy Efficiency of Cell-Free Massive MIMO

    Get PDF
    We consider the cell-free massive multiple-input multiple-output (MIMO) downlink, where a very large number of distributed multiple-antenna access points (APs) serve many single-antenna users in the same time-frequency resource. A simple (distributed) conjugate beamforming scheme is applied at each AP via the use of local channel state information (CSI). This CSI is acquired through time-division duplex operation and the reception of uplink training signals transmitted by the users. We derive a closed-form expression for the spectral efficiency taking into account the effects of channel estimation errors and power control. This closed-form result enables us to analyze the effects of backhaul power consumption, the number of APs, and the number of antennas per AP on the total energy efficiency, as well as, to design an optimal power allocation algorithm. The optimal power allocation algorithm aims at maximizing the total energy efficiency, subject to a per-user spectral efficiency constraint and a per-AP power constraint. Compared with the equal power control, our proposed power allocation scheme can double the total energy efficiency. Furthermore, we propose AP selections schemes, in which each user chooses a subset of APs, to reduce the power consumption caused by the backhaul links. With our proposed AP selection schemes, the total energy efficiency increases significantly, especially for large numbers of APs. Moreover, under a requirement of good quality-of-service for all users, cell-free massive MIMO outperforms the colocated counterpart in terms of energy efficiency

    Security and Privacy Issues in Wireless Mesh Networks: A Survey

    Full text link
    This book chapter identifies various security threats in wireless mesh network (WMN). Keeping in mind the critical requirement of security and user privacy in WMNs, this chapter provides a comprehensive overview of various possible attacks on different layers of the communication protocol stack for WMNs and their corresponding defense mechanisms. First, it identifies the security vulnerabilities in the physical, link, network, transport, application layers. Furthermore, various possible attacks on the key management protocols, user authentication and access control protocols, and user privacy preservation protocols are presented. After enumerating various possible attacks, the chapter provides a detailed discussion on various existing security mechanisms and protocols to defend against and wherever possible prevent the possible attacks. Comparative analyses are also presented on the security schemes with regards to the cryptographic schemes used, key management strategies deployed, use of any trusted third party, computation and communication overhead involved etc. The chapter then presents a brief discussion on various trust management approaches for WMNs since trust and reputation-based schemes are increasingly becoming popular for enforcing security in wireless networks. A number of open problems in security and privacy issues for WMNs are subsequently discussed before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the author's previous submission in arXiv submission: arXiv:1102.1226. There are some text overlaps with the previous submissio
    • …
    corecore