10,072 research outputs found

    Integrated mmWave Access and Backhaul in 5G: Bandwidth Partitioning and Downlink Analysis

    Full text link
    With the increasing network densification, it has become exceedingly difficult to provide traditional fiber backhaul access to each cell site, which is especially true for small cell base stations (SBSs). The increasing maturity of millimeter wave (mmWave) communication has opened up the possibility of providing high-speed wireless backhaul to such cell sites. Since mmWave is also suitable for access links, the third generation partnership project (3GPP) is envisioning an integrated access and backhaul (IAB) architecture for the fifth generation (5G) cellular networks in which the same infrastructure and spectral resources will be used for both access and backhaul. In this paper, we develop an analytical framework for IAB-enabled cellular network using which we provide an accurate characterization of its downlink rate coverage probability. Using this, we study the performance of two backhaul bandwidth (BW) partition strategies, (i) equal partition: when all SBSs obtain equal share of the backhaul BW, and (ii) load-based partition: when the backhaul BW share of an SBS is proportional to its load. Our analysis shows that depending on the choice of the partition strategy, there exists an optimal split of access and backhaul BW for which the rate coverage is maximized. Further, there exists a critical volume of cell-load (total number of users) beyond which the gains provided by the IAB-enabled network disappear and its performance converges to that of the traditional macro-only network with no SBSs

    Implicit Simulations using Messaging Protocols

    Full text link
    A novel algorithm for performing parallel, distributed computer simulations on the Internet using IP control messages is introduced. The algorithm employs carefully constructed ICMP packets which enable the required computations to be completed as part of the standard IP communication protocol. After providing a detailed description of the algorithm, experimental applications in the areas of stochastic neural networks and deterministic cellular automata are discussed. As an example of the algorithms potential power, a simulation of a deterministic cellular automaton involving 10^5 Internet connected devices was performed.Comment: 14 pages, 3 figure

    Node Density Estimation in VANETs Using Received Signal Power

    Get PDF
    Accurately estimating node density in Vehicular Ad hoc Networks, VANETs, is a challenging and crucial task. Various approaches exist, yet none takes advantage of physical layer parameters in a distributed fashion. This paper describes a framework that allows individual nodes to estimate the node density of their surrounding network independent of beacon messages and other infrastructure-based information. The proposal relies on three factors: 1) a discrete event simulator to estimate the average number of nodes transmitting simultaneously; 2) a realistic channel model for VANETs environment; and 3) a node density estimation technique. This work provides every vehicle on the road with two equations indicating the relation between 1) received signal strength versus simultaneously transmitting nodes, and 2) simultaneously transmitting nodes versus node density. Access to these equations enables individual nodes to estimate their real-time surrounding node density. The system is designed to work for the most complicated scenarios where nodes have no information about the topology of the network and, accordingly, the results indicate that the system is reasonably reliable and accurate. The outcome of this work has various applications and can be used for any protocol that is affected by node density

    Exploiting the Capture Effect to Enhance RACH Performance in Cellular-Based M2M Communications

    Get PDF
    Cellular-based machine-to-machine (M2M) communication is expected to facilitate services for the Internet of Things (IoT). However, because cellular networks are designed for human users, they have some limitations. Random access channel (RACH) congestion caused by massive access from M2M devices is one of the biggest factors hindering cellular-based M2M services because the RACH congestion causes random access (RA) throughput degradation and connection failures to the devices. In this paper, we show the possibility exploiting the capture effects, which have been known to have a positive impact on the wireless network system, on RA procedure for improving the RA performance of M2M devices. For this purpose, we analyze an RA procedure using a capture model. Through this analysis, we examine the effects of capture on RA performance and propose an Msg3 power-ramping (Msg3 PR) scheme to increase the capture probability (thereby increasing the RA success probability) even when severe RACH congestion problem occurs. The proposed analysis models are validated using simulations. The results show that the proposed scheme, with proper parameters, further improves the RA throughput and reduces the connection failure probability, by slightly increasing the energy consumption. Finally, we demonstrate the effects of coexistence with other RA-related schemes through simulation results

    Autonomic State Management for Optimistic Simulation Platforms

    Get PDF
    We present the design and implementation of an autonomic state manager (ASM) tailored for integration within optimistic parallel discrete event simulation (PDES) environments based on the C programming language and the executable and linkable format (ELF), and developed for execution on x8664 architectures. With ASM, the state of any logical process (LP), namely the individual (concurrent) simulation unit being part of the simulation model, is allowed to be scattered on dynamically allocated memory chunks managed via standard API (e.g., malloc/free). Also, the application programmer is not required to provide any serialization/deserialization module in order to take a checkpoint of the LP state, or to restore it in case a causality error occurs during the optimistic run, or to provide indications on which portions of the state are updated by event processing, so to allow incremental checkpointing. All these tasks are handled by ASM in a fully transparent manner via (A) runtime identification (with chunk-level granularity) of the memory map associated with the LP state, and (B) runtime tracking of the memory updates occurring within chunks belonging to the dynamic memory map. The co-existence of the incremental and non-incremental log/restore modes is achieved via dual versions of the same application code, transparently generated by ASM via compile/link time facilities. Also, the dynamic selection of the best suited log/restore mode is actuated by ASM on the basis of an innovative modeling/optimization approach which takes into account stability of each operating mode with respect to variations of the model/environmental execution parameters
    corecore