355 research outputs found

    Spatial Performance Analysis and Design Principles for Wireless Peer Discovery

    Full text link
    In wireless peer-to-peer networks that serve various proximity-based applications, peer discovery is the key to identifying other peers with which a peer can communicate and an understanding of its performance is fundamental to the design of an efficient discovery operation. This paper analyzes the performance of wireless peer discovery through comprehensively considering the wireless channel, spatial distribution of peers, and discovery operation parameters. The average numbers of successfully discovered peers are expressed in closed forms for two widely used channel models, i.e., the interference limited Nakagami-m fading model and the Rayleigh fading model with nonzero noise, when peers are spatially distributed according to a homogeneous Poisson point process. These insightful expressions lead to the design principles for the key operation parameters including the transmission probability, required amount of wireless resources, level of modulation and coding scheme (MCS), and transmit power. Furthermore, the impact of shadowing on the spatial performance and suggested design principles is evaluated using mathematical analysis and simulations.Comment: 12 pages (double columns), 10 figures, 1 table, to appear in the IEEE Transactions on Wireless Communication

    On the 5G and beyond

    Get PDF
    UIDB/50008/2020This article provides an overview of the fifth generation of cellular communications (5G) and beyond. It presents the transmission techniques of current 5G communications and those expected of future developments, namely a brief study of non-orthogonal multiple access (NOMA) using the single carrier with frequency domain equalization (SC-FDE) block transmission technique, evidencing its added value in terms of spectral efficiency. An introduction to the sixth generation of cellular communications (6G) is also provided. The insertion of 5G and 6G within the Fourth Industrial Revolution framework (also known as Industry 4.0) is also dealt with. Consisting of a change in paradigm, when compared to previous generations, 5G supports a myriad of new services based on the Internet of things (IoT) and on vehicle-to-vehicle (V2V) communications, supporting technologies such as autonomous driving, smart cities, and remote surgery. The new services provided by 5G are supported by new techniques, such as millimeter waves (mm-wave), in addition to traditional microwave communication, and by massive multiple-input multiple-output (m-MIMO) technology. These techniques were not employed in the fourth generation of cellular communications (4G). While 5G plays an important role in the initial implementation of the Fourth Industrial Revolution, 6G will address a number of new services such as virtual reality (VR), augmented reality (AR), holographic services, the advanced Internet of things (IoT), AI-infused applications, wireless brain–computer interaction (BCI), and mobility at higher speeds. The current research on systems beyond 5G indicates that these applications shall be supported by new MIMO techniques and make use of terahertz (THz) bands.publishersversionpublishe

    Leveraging intelligence from network CDR data for interference aware energy consumption minimization

    Get PDF
    Cell densification is being perceived as the panacea for the imminent capacity crunch. However, high aggregated energy consumption and increased inter-cell interference (ICI) caused by densification, remain the two long-standing problems. We propose a novel network orchestration solution for simultaneously minimizing energy consumption and ICI in ultra-dense 5G networks. The proposed solution builds on a big data analysis of over 10 million CDRs from a real network that shows there exists strong spatio-temporal predictability in real network traffic patterns. Leveraging this we develop a novel scheme to pro-actively schedule radio resources and small cell sleep cycles yielding substantial energy savings and reduced ICI, without compromising the users QoS. This scheme is derived by formulating a joint Energy Consumption and ICI minimization problem and solving it through a combination of linear binary integer programming, and progressive analysis based heuristic algorithm. Evaluations using: 1) a HetNet deployment designed for Milan city where big data analytics are used on real CDRs data from the Telecom Italia network to model traffic patterns, 2) NS-3 based Monte-Carlo simulations with synthetic Poisson traffic show that, compared to full frequency reuse and always on approach, in best case, proposed scheme can reduce energy consumption in HetNets to 1/8th while providing same or better Qo

    Device discovery in D2D communication: A survey

    Get PDF
    Device to Device (D2D) communication was first considered in out-band to manage energy issues in the wireless sensor networks. The primary target was to secure information about system topology for successive communication. Now the D2D communication has been legitimated in in-band by the 3rd Generation Partnership Project (3GPP). To initiate D2D communication, Device Discovery (DD) is a primary task and every D2D application benefits from DD as an end to end link maintenance and data relay when the direct path is obstructed. The DD is facing new difficulties because of the mobility of the devices over static systems, and the mobility makes it more challenging for D2D communication. For in-band D2D, DD in a single cell and multi-cell, and dense area is not legitimated properly, causing latency, inaccuracy, and energy consumption. Among extensive studies on limiting energy consumption and latency, DD is one of the essential parts concentrating on access and communication. In this paper, a comprehensive survey on DD challenges, for example single cell/multi-cell and dense area DD, energy consumption during discovery, discovery delay, and discovery security, etc., has been presented to accomplish an effective paradigm of D2D networks. In order to undertake the device (user) needs, an architecture has been projected, which promises to overwhelm the various implementation challenges of DD. The paper mainly focuses on DD taxonomy and classification with an emphasis on discovery procedures and algorithms, a summary of advances and issues, and ways for potential enhancements. For ensuring a secure DD and D2D, auspicious research directions have been proposed, based on taxonomy
    • 

    corecore