152 research outputs found

    Fog Radio Access Networks: Mobility management, interference mitigation and resource optimization

    Get PDF
    In order to make Internet connections ubiquitous and autonomous in our daily lives, maximizing the utilization of radio resources and social information is one of the major research topics in future mobile communication technologies. Fog radio access network (FRAN) is regarded as a promising paradigm for the fifth generation (5G) of mobile networks. FRAN integrates fog computing with RAN and makes full use of the edge of networks. FRAN would be different in networking, computing, storage and control as compared with conventional radio access networks (RAN) and the emerging cloud RAN. In this article, we provide a description of the FRAN architecture, and discuss how the distinctive characteristics of FRAN make it possible to efficiently alleviate the burden on the fronthaul, backhaul and backbone networks, as well as reduce content delivery latencies. We will focus on the mobility management, interference mitigation, and resource optimization in FRAN. Our simulation results show that the proposed FRAN architecture and the associated mobility and resource management mechanisms can reduce the signaling cost and increase the net utility for the RAN

    Multiple Access in Aerial Networks: From Orthogonal and Non-Orthogonal to Rate-Splitting

    Get PDF
    Recently, interest on the utilization of unmanned aerial vehicles (UAVs) has aroused. Specifically, UAVs can be used in cellular networks as aerial users for delivery, surveillance, rescue search, or as an aerial base station (aBS) for communication with ground users in remote uncovered areas or in dense environments requiring prompt high capacity. Aiming to satisfy the high requirements of wireless aerial networks, several multiple access techniques have been investigated. In particular, space-division multiple access(SDMA) and power-domain non-orthogonal multiple access (NOMA) present promising multiplexing gains for aerial downlink and uplink. Nevertheless, these gains are limited as they depend on the conditions of the environment. Hence, a generalized scheme has been recently proposed, called rate-splitting multiple access (RSMA), which is capable of achieving better spectral efficiency gains compared to SDMA and NOMA. In this paper, we present a comprehensive survey of key multiple access technologies adopted for aerial networks, where aBSs are deployed to serve ground users. Since there have been only sporadic results reported on the use of RSMA in aerial systems, we aim to extend the discussion on this topic by modelling and analyzing the weighted sum-rate performance of a two-user downlink network served by an RSMA-based aBS. Finally, related open issues and future research directions are exposed.Comment: 16 pages, 6 figures, submitted to IEEE Journa

    The edge cloud: A holistic view of communication, computation and caching

    Get PDF
    The evolution of communication networks shows a clear shift of focus from just improving the communications aspects to enabling new important services, from Industry 4.0 to automated driving, virtual/augmented reality, Internet of Things (IoT), and so on. This trend is evident in the roadmap planned for the deployment of the fifth generation (5G) communication networks. This ambitious goal requires a paradigm shift towards a vision that looks at communication, computation and caching (3C) resources as three components of a single holistic system. The further step is to bring these 3C resources closer to the mobile user, at the edge of the network, to enable very low latency and high reliability services. The scope of this chapter is to show that signal processing techniques can play a key role in this new vision. In particular, we motivate the joint optimization of 3C resources. Then we show how graph-based representations can play a key role in building effective learning methods and devising innovative resource allocation techniques.Comment: to appear in the book "Cooperative and Graph Signal Pocessing: Principles and Applications", P. Djuric and C. Richard Eds., Academic Press, Elsevier, 201

    Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid

    Get PDF
    The surge of mobile devices, such as smartphones, and tables, demands additional capacity. On the other hand, Internet-of-Things (IoT) and smart grid, which connects numerous sensors, devices, and machines require ubiquitous connectivity and data security. Additionally, some use cases, such as automated manufacturing process, automated transportation, and smart grid, require latency as low as 1 ms, and reliability as high as 99.99\%. To enhance throughput and support massive connectivity, sharing of the unlicensed spectrum (3.5 GHz, 5GHz, and mmWave) is a potential solution. On the other hand, to address the latency, drastic changes in the network architecture is required. The fifth generation (5G) cellular networks will embrace the spectrum sharing and network architecture modifications to address the throughput enhancement, massive connectivity, and low latency. To utilize the unlicensed spectrum, we propose a fixed duty cycle based coexistence of LTE and WiFi, in which the duty cycle of LTE transmission can be adjusted based on the amount of data. In the second approach, a multi-arm bandit learning based coexistence of LTE and WiFi has been developed. The duty cycle of transmission and downlink power are adapted through the exploration and exploitation. This approach improves the aggregated capacity by 33\%, along with cell edge and energy efficiency enhancement. We also investigate the performance of LTE and ZigBee coexistence using smart grid as a scenario. In case of low latency, we summarize the existing works into three domains in the context of 5G networks: core, radio and caching networks. Along with this, fundamental constraints for achieving low latency are identified followed by a general overview of exemplary 5G networks. Besides that, a loop-free, low latency and local-decision based routing protocol is derived in the context of smart grid. This approach ensures low latency and reliable data communication for stationary devices. To address data security in wireless communication, we introduce a geo-location based data encryption, along with node authentication by k-nearest neighbor algorithm. In the second approach, node authentication by the support vector machine, along with public-private key management, is proposed. Both approaches ensure data security without increasing the packet overhead compared to the existing approaches
    corecore