355 research outputs found
Spatial Performance Analysis and Design Principles for Wireless Peer Discovery
In wireless peer-to-peer networks that serve various proximity-based
applications, peer discovery is the key to identifying other peers with which a
peer can communicate and an understanding of its performance is fundamental to
the design of an efficient discovery operation. This paper analyzes the
performance of wireless peer discovery through comprehensively considering the
wireless channel, spatial distribution of peers, and discovery operation
parameters. The average numbers of successfully discovered peers are expressed
in closed forms for two widely used channel models, i.e., the interference
limited Nakagami-m fading model and the Rayleigh fading model with nonzero
noise, when peers are spatially distributed according to a homogeneous Poisson
point process. These insightful expressions lead to the design principles for
the key operation parameters including the transmission probability, required
amount of wireless resources, level of modulation and coding scheme (MCS), and
transmit power. Furthermore, the impact of shadowing on the spatial performance
and suggested design principles is evaluated using mathematical analysis and
simulations.Comment: 12 pages (double columns), 10 figures, 1 table, to appear in the IEEE
Transactions on Wireless Communication
On the 5G and beyond
UIDB/50008/2020This article provides an overview of the fifth generation of cellular communications (5G) and beyond. It presents the transmission techniques of current 5G communications and those expected of future developments, namely a brief study of non-orthogonal multiple access (NOMA) using the single carrier with frequency domain equalization (SC-FDE) block transmission technique, evidencing its added value in terms of spectral efficiency. An introduction to the sixth generation of cellular communications (6G) is also provided. The insertion of 5G and 6G within the Fourth Industrial Revolution framework (also known as Industry 4.0) is also dealt with. Consisting of a change in paradigm, when compared to previous generations, 5G supports a myriad of new services based on the Internet of things (IoT) and on vehicle-to-vehicle (V2V) communications, supporting technologies such as autonomous driving, smart cities, and remote surgery. The new services provided by 5G are supported by new techniques, such as millimeter waves (mm-wave), in addition to traditional microwave communication, and by massive multiple-input multiple-output (m-MIMO) technology. These techniques were not employed in the fourth generation of cellular communications (4G). While 5G plays an important role in the initial implementation of the Fourth Industrial Revolution, 6G will address a number of new services such as virtual reality (VR), augmented reality (AR), holographic services, the advanced Internet of things (IoT), AI-infused applications, wireless brainâcomputer interaction (BCI), and mobility at higher speeds. The current research on systems beyond 5G indicates that these applications shall be supported by new MIMO techniques and make use of terahertz (THz) bands.publishersversionpublishe
Recommended from our members
Design of interface selection protocols for multi-homed wireless networks
This thesis was submitted for the degree of Doctor of Philosophy and was awarded by Brunel University on 10 December 2010.The IEEE 802.11/802.16 standards conformant wireless communication stations have multi-homing transmission capability. To achieve greater communication efficiency, multi-homing capable stations use handover mechanism to select appropriate transmission channel according to variations in the channel quality. This thesis presents three internal-linked handover schemes, (1) Interface Selection Protocol (ISP), belonging to Wireless Local Area Network (WLAN)- Worldwide Interoperability for Microwave Access (WiMAX) environment (2) Fast Channel Scanning (FCS) and (3) Traffic Manager (TM), (2) and (3) belonging to WiMAX Environment. The proposed schemes in this thesis use a novel mechanism of providing a reliable communication route. This solution is based on a cross-layer communication framework, where the interface selection module uses various network related parameters from Medium Access Control (MAC) sub-layer/Physical Layer (PHY) across the protocol suite for decision making at the Network layer. The proposed solutions are highly responsive when compared with existing multi-homed schemes; responsiveness is one of the key factors in the design of such protocols. Selected route under these schemes is based on the most up to date link-layer information. Therefore, such a route is not only reliable in terms of route optimization but it also fulfils the application demands in terms of throughput and delay. Design of ISP protocol use probing frames during the route discovery process. The 802.11 mandates the use of different rates for data transmission frames. The ISP-metric can be incorporated into various routing aspects and its applicability is determined by the possibility of provision of MAC dependent parameters that are used to determine the best path metric values. In many cases, higher device density, interference and mobility cause variable medium access delays. It causes creation of âunreachable zonesâ, where destination is marked as unreachable. However, by use of the best path metric, the destination has been made reachable, anytime and anywhere, because of the intelligent use of the probing frames and interface selection algorithm implemented. The IEEE 802.16e introduces several MAC level queues for different access categories, maintaining service requirement within these queues; which imply that frames from a higher priority queue, i.e. video frames, are serviced more frequently than those belonging to lower priority queues. Such an enhancement at the MAC sub-layer introduces uneven queuing delays. Conventional routing protocols are unaware of such MAC specific constraints and as a result, these factors are not considered which result in channel performance degradation. To meet such challenges, the thesis presents FCS and TM schemes for WiMAX. For FCS, Its solution is to improve the mobile WiMAX handover and address the scanning latency. Since minimum scanning time is the most important issue in the handover process. This handover scheme aims to utilize the channel efficiently and apply such a procedure to reduce the time it takes to scan the neighboring access stations. TM uses MAC and physical layer (PHY) specific information in the interface metric and maintains a separate path to destination by applying an alternative interface operation. Simulation tests and comparisons with existing multi-homed protocols and handover schemes demonstrate the effectiveness of incorporating the medium dependent parameters. Moreover, show that suggested schemes, have shown better performance in terms of end-to-end delay and throughput, with efficiency up to 40% in specific test scenarios
Leveraging intelligence from network CDR data for interference aware energy consumption minimization
Cell densification is being perceived as the panacea for the imminent capacity crunch. However, high aggregated energy consumption and increased inter-cell interference (ICI) caused by densification, remain the two long-standing problems. We propose a novel network orchestration solution for simultaneously minimizing energy consumption and ICI in ultra-dense 5G networks. The proposed solution builds on a big data analysis of over 10 million CDRs from a real network that shows there exists strong spatio-temporal predictability in real network traffic patterns. Leveraging this we develop a novel scheme to pro-actively schedule radio resources and small cell sleep cycles yielding substantial energy savings and reduced ICI, without compromising the users QoS. This scheme is derived by formulating a joint Energy Consumption and ICI minimization problem and solving it through a combination of linear binary integer programming, and progressive analysis based heuristic algorithm. Evaluations using: 1) a HetNet deployment designed for Milan city where big data analytics are used on real CDRs data from the Telecom Italia network to model traffic patterns, 2) NS-3 based Monte-Carlo simulations with synthetic Poisson traffic show that, compared to full frequency reuse and always on approach, in best case, proposed scheme can reduce energy consumption in HetNets to 1/8th while providing same or better Qo
Device discovery in D2D communication: A survey
Device to Device (D2D) communication was first considered in out-band to manage energy issues in the wireless sensor networks. The primary target was to secure information about system topology for successive communication. Now the D2D communication has been legitimated in in-band by the 3rd Generation Partnership Project (3GPP). To initiate D2D communication, Device Discovery (DD) is a primary task and every D2D application benefits from DD as an end to end link maintenance and data relay when the direct path is obstructed. The DD is facing new difficulties because of the mobility of the devices over static systems, and the mobility makes it more challenging for D2D communication. For in-band D2D, DD in a single cell and multi-cell, and dense area is not legitimated properly, causing latency, inaccuracy, and energy consumption. Among extensive studies on limiting energy consumption and latency, DD is one of the essential parts concentrating on access and communication. In this paper, a comprehensive survey on DD challenges, for example single cell/multi-cell and dense area DD, energy consumption during discovery, discovery delay, and discovery security, etc., has been presented to accomplish an effective paradigm of D2D networks. In order to undertake the device (user) needs, an architecture has been projected, which promises to overwhelm the various implementation challenges of DD. The paper mainly focuses on DD taxonomy and classification with an emphasis on discovery procedures and algorithms, a summary of advances and issues, and ways for potential enhancements. For ensuring a secure DD and D2D, auspicious research directions have been proposed, based on taxonomy
- âŠ