152 research outputs found
Fog Radio Access Networks: Mobility management, interference mitigation and resource optimization
In order to make Internet connections ubiquitous and autonomous in our daily lives, maximizing the
utilization of radio resources and social information is one of the major research topics in future mobile
communication technologies. Fog radio access network (FRAN) is regarded as a promising paradigm
for the fifth generation (5G) of mobile networks. FRAN integrates fog computing with RAN and makes
full use of the edge of networks. FRAN would be different in networking, computing, storage and
control as compared with conventional radio access networks (RAN) and the emerging cloud RAN.
In this article, we provide a description of the FRAN architecture, and discuss how the distinctive
characteristics of FRAN make it possible to efficiently alleviate the burden on the fronthaul, backhaul
and backbone networks, as well as reduce content delivery latencies. We will focus on the mobility management, interference mitigation, and resource optimization in FRAN. Our simulation results show
that the proposed FRAN architecture and the associated mobility and resource management mechanisms
can reduce the signaling cost and increase the net utility for the RAN
Multiple Access in Aerial Networks: From Orthogonal and Non-Orthogonal to Rate-Splitting
Recently, interest on the utilization of unmanned aerial vehicles (UAVs) has
aroused. Specifically, UAVs can be used in cellular networks as aerial users
for delivery, surveillance, rescue search, or as an aerial base station (aBS)
for communication with ground users in remote uncovered areas or in dense
environments requiring prompt high capacity. Aiming to satisfy the high
requirements of wireless aerial networks, several multiple access techniques
have been investigated. In particular, space-division multiple access(SDMA) and
power-domain non-orthogonal multiple access (NOMA) present promising
multiplexing gains for aerial downlink and uplink. Nevertheless, these gains
are limited as they depend on the conditions of the environment. Hence, a
generalized scheme has been recently proposed, called rate-splitting multiple
access (RSMA), which is capable of achieving better spectral efficiency gains
compared to SDMA and NOMA. In this paper, we present a comprehensive survey of
key multiple access technologies adopted for aerial networks, where aBSs are
deployed to serve ground users. Since there have been only sporadic results
reported on the use of RSMA in aerial systems, we aim to extend the discussion
on this topic by modelling and analyzing the weighted sum-rate performance of a
two-user downlink network served by an RSMA-based aBS. Finally, related open
issues and future research directions are exposed.Comment: 16 pages, 6 figures, submitted to IEEE Journa
The edge cloud: A holistic view of communication, computation and caching
The evolution of communication networks shows a clear shift of focus from
just improving the communications aspects to enabling new important services,
from Industry 4.0 to automated driving, virtual/augmented reality, Internet of
Things (IoT), and so on. This trend is evident in the roadmap planned for the
deployment of the fifth generation (5G) communication networks. This ambitious
goal requires a paradigm shift towards a vision that looks at communication,
computation and caching (3C) resources as three components of a single holistic
system. The further step is to bring these 3C resources closer to the mobile
user, at the edge of the network, to enable very low latency and high
reliability services. The scope of this chapter is to show that signal
processing techniques can play a key role in this new vision. In particular, we
motivate the joint optimization of 3C resources. Then we show how graph-based
representations can play a key role in building effective learning methods and
devising innovative resource allocation techniques.Comment: to appear in the book "Cooperative and Graph Signal Pocessing:
Principles and Applications", P. Djuric and C. Richard Eds., Academic Press,
Elsevier, 201
Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid
The surge of mobile devices, such as smartphones, and tables, demands additional capacity. On the other hand, Internet-of-Things (IoT) and smart grid, which connects numerous sensors, devices, and machines require ubiquitous connectivity and data security. Additionally, some use cases, such as automated manufacturing process, automated transportation, and smart grid, require latency as low as 1 ms, and reliability as high as 99.99\%. To enhance throughput and support massive connectivity, sharing of the unlicensed spectrum (3.5 GHz, 5GHz, and mmWave) is a potential solution. On the other hand, to address the latency, drastic changes in the network architecture is required. The fifth generation (5G) cellular networks will embrace the spectrum sharing and network architecture modifications to address the throughput enhancement, massive connectivity, and low latency.
To utilize the unlicensed spectrum, we propose a fixed duty cycle based coexistence of LTE and WiFi, in which the duty cycle of LTE transmission can be adjusted based on the amount of data. In the second approach, a multi-arm bandit learning based coexistence of LTE and WiFi has been developed. The duty cycle of transmission and downlink power are adapted through the exploration and exploitation. This approach improves the aggregated capacity by 33\%, along with cell edge and energy efficiency enhancement. We also investigate the performance of LTE and ZigBee coexistence using smart grid as a scenario.
In case of low latency, we summarize the existing works into three domains in the context of 5G networks: core, radio and caching networks. Along with this, fundamental constraints for achieving low latency are identified followed by a general overview of exemplary 5G networks. Besides that, a loop-free, low latency and local-decision based routing protocol is derived in the context of smart grid. This approach ensures low latency and reliable data communication for stationary devices.
To address data security in wireless communication, we introduce a geo-location based data encryption, along with node authentication by k-nearest neighbor algorithm. In the second approach, node authentication by the support vector machine, along with public-private key management, is proposed. Both approaches ensure data security without increasing the packet overhead compared to the existing approaches
- …