59 research outputs found

    Power allocation and energy cooperation for UAV-enabled MmWave networks: A Multi-Agent Deep Reinforcement Learning approach

    Get PDF
    Unmanned Aerial Vehicle (UAV)-assisted cellular networks over the millimeter-wave (mmWave) frequency band can meet the requirements of a high data rate and flexible coverage in next-generation communication networks. However, higher propagation loss and the use of a large number of antennas in mmWave networks give rise to high energy consumption and UAVs are constrained by their low-capacity onboard battery. Energy harvesting (EH) is a viable solution to reduce the energy cost of UAV-enabled mmWave networks. However, the random nature of renewable energy makes it challenging to maintain robust connectivity in UAV-assisted terrestrial cellular networks. Energy cooperation allows UAVs to send their excessive energy to other UAVs with reduced energy. In this paper, we propose a power allocation algorithm based on energy harvesting and energy cooperation to maximize the throughput of a UAV-assisted mmWave cellular network. Since there is channel-state uncertainty and the amount of harvested energy can be treated as a stochastic process, we propose an optimal multi-agent deep reinforcement learning algorithm (DRL) named Multi-Agent Deep Deterministic Policy Gradient (MADDPG) to solve the renewable energy resource allocation problem for throughput maximization. The simulation results show that the proposed algorithm outperforms the Random Power (RP), Maximal Power (MP) and value-based Deep Q-Learning (DQL) algorithms in terms of network throughput.This work was supported by the Agencia Estatal de Investigación of Ministerio de Ciencia e Innovación of Spain under project PID2019-108713RB-C51 MCIN/AEI /10.13039/501100011033Postprint (published version

    Studies on 6-sector-site deployment in downlink LTE

    Get PDF
    Mobile data traffic is expected to increase massively in the following years. Consequently, service operators are induced to increase the capacity of their networks continually to attract more subscribers and maximize their revenues. At the same time, they want to minimize operational costs and capital expenditures. Among the alternatives that aim to increase the network capacity, higher order sectorization, and in particular a six sectorized configuration, is nowadays attracting a lot of attention for LTE macro-cell deployments since a higher number of sectors per site results in improved site capacity and coverage. A six sectorized configuration is attractive for both roll-out phase and growth phase of the network. In the roll-out phase, the radio access network is planned with 6-sector sites instead of 3-sector sites with the advantage that less sites are needed for the same capacity and coverage requirements. In the growth phase, the six sectorized configuration can be used to upgrade existing 3-sector sites where the traffic grows beyond the current sites' capabilities. Therefore, no additional expensive and time consuming contracts need to be signed for the locations of the new sites, while the existing sites are used more efficiently. However, although potentially a 6-sector site can offer a double capacity than a 3-sector site, several factors prevent the capacity from growing proportionately to the number of sectors. Consequently, there is an uncertainty on whether the capacity gain is high enough to justify the extra costs of the additional equipment and, more specifically, whether the 6-sector-site deployment is more economically attractive than a 3-sector-site deployment. The aim of this report is to solve this uncertainty. First, we present the main factors that affect the capacity gain. Next, we quantify the impact of these factors on the capacity gain in downlink LTE with the use of a system level simulator. Finally, we use the results of the simulation study as inputs for an economic study to access the reasons for a possible deployment of 6-sector sites instead of 3-sector sites for LTE

    Enhancing physical layer security in wireless networks with cooperative approaches

    Get PDF
    Motivated by recent developments in wireless communication, this thesis aims to characterize the secrecy performance in several types of typical wireless networks. Advanced techniques are designed and evaluated to enhance physical layer security in these networks with realistic assumptions, such as signal propagation loss, random node distribution and non-instantaneous channel state information (CSI). The first part of the thesis investigates secret communication through relay-assisted cognitive interference channel. The primary and secondary base stations (PBS and SBS) communicate with the primary and secondary receivers (PR and SR) respectively in the presence of multiple eavesdroppers. The SBS is allowed to transmit simultaneously with the PBS over the same spectrum instead of waiting for an idle channel. To improve security, cognitive relays transmit cooperative jamming (CJ) signals to create additional interferences in the direction of the eavesdroppers. Two CJ schemes are proposed to improve the secrecy rate of cognitive interference channels depending on the structure of cooperative relays. In the scheme where the multiple-antenna relay transmits weighted jamming signals, the combined approach of CJ and beamforming is investigated. In the scheme with multiple relays transmitting weighted jamming signals, the combined approach of CJ and relay selection is analyzed. Numerical results show that both these two schemes are effective in improving physical layer security of cognitive interference channel. In the second part, the focus is shifted to physical layer security in a random wireless network where both legitimate and eavesdropping nodes are randomly distributed. Three scenarios are analyzed to investigate the impact of various factors on security. In scenario one, the basic scheme is studied without a protected zone and interference. The probability distribution function (PDF) of channel gain with both fading and path loss has been derived and further applied to derive secrecy connectivity and ergodic secrecy capacity. In the second scenario, we studied using a protected zone surrounding the source node to enhance security where interference is absent. Both the cases that eavesdroppers are aware and unaware of the protected zone boundary are investigated. Based on the above scenarios, further deployment of the protected zones at legitimate receivers is designed to convert detrimental interference into a beneficial factor. Numerical results are investigated to check the reliability of the PDF for reciprocal of channel gain and to analyze the impact of protected zones on secrecy performance. In the third part, physical layer security in the downlink transmission of cellular network is studied. To model the repulsive property of the cellular network planning, we assume that the base stations (BSs) follow the Mat´ern hard-core point process (HCPP), while the eavesdroppers are deployed as an independent Poisson point process (PPP). The distribution function of the distances from a typical point to the nodes of the HCPP is derived. The noise-limited and interference-limited cellular networks are investigated by applying the fractional frequency reuse (FFR) in the system. For the noise-limited network, we derive the secrecy outage probability with two different strategies, i.e. the best BS serve and the nearest BS serve, by analyzing the statistics of channel gains. For the interference-limited network with the nearest BS serve, two transmission schemes are analyzed, i.e., transmission with and without the FFR. Numerical results reveal that both the schemes of transmitting with the best BS and the application of the FFR are beneficial for physical layer security in the downlink cellular networks, while the improvement du

    Evolution Toward 5G Mobile Networks - A Survey on Enabling Technologies

    Get PDF
    In this paper, an extensive review has been carried out on the trends of existing as well as proposed potential enabling technologies that are expected to shape the fifth generation (5G) mobile wireless networks. Based on the classification of the trends, we develop a 5G network architectural evolution framework that comprises three evolutionary directions, namely, (1) radio access network node and performance enabler, (2) network control programming platform, and (3) backhaul network platform and synchronization. In (1), we discuss node classification including low power nodes in emerging machine-type communications, and network capacity enablers, e.g., millimeter wave communications and massive multiple-input multiple-output. In (2), both logically distributed cell/device-centric platforms, and logically centralized conventional/wireless software defined networking control programming approaches are discussed. In (3), backhaul networks and network synchronization are discussed. A comparative analysis for each direction as well as future evolutionary directions and challenges toward 5G networks are discussed. This survey will be helpful for further research exploitations and network operators for a smooth evolution of their existing networks toward 5G networks

    Interference management in femtocell communication system

    Get PDF
    [no abstract

    Techno-economical Analysis of Indoor Enterprise Solutions

    Get PDF

    Techniques for Efficient Spectrum Usage for Next Generation Mobile Communication Networks. An LTE and LTE-A Case Study

    Get PDF
    • …
    corecore