1,581 research outputs found
Separation Framework: An Enabler for Cooperative and D2D Communication for Future 5G Networks
Soaring capacity and coverage demands dictate that future cellular networks
need to soon migrate towards ultra-dense networks. However, network
densification comes with a host of challenges that include compromised energy
efficiency, complex interference management, cumbersome mobility management,
burdensome signaling overheads and higher backhaul costs. Interestingly, most
of the problems, that beleaguer network densification, stem from legacy
networks' one common feature i.e., tight coupling between the control and data
planes regardless of their degree of heterogeneity and cell density.
Consequently, in wake of 5G, control and data planes separation architecture
(SARC) has recently been conceived as a promising paradigm that has potential
to address most of aforementioned challenges. In this article, we review
various proposals that have been presented in literature so far to enable SARC.
More specifically, we analyze how and to what degree various SARC proposals
address the four main challenges in network densification namely: energy
efficiency, system level capacity maximization, interference management and
mobility management. We then focus on two salient features of future cellular
networks that have not yet been adapted in legacy networks at wide scale and
thus remain a hallmark of 5G, i.e., coordinated multipoint (CoMP), and
device-to-device (D2D) communications. After providing necessary background on
CoMP and D2D, we analyze how SARC can particularly act as a major enabler for
CoMP and D2D in context of 5G. This article thus serves as both a tutorial as
well as an up to date survey on SARC, CoMP and D2D. Most importantly, the
article provides an extensive outlook of challenges and opportunities that lie
at the crossroads of these three mutually entangled emerging technologies.Comment: 28 pages, 11 figures, IEEE Communications Surveys & Tutorials 201
A Survey on Wireless Security: Technical Challenges, Recent Advances and Future Trends
This paper examines the security vulnerabilities and threats imposed by the
inherent open nature of wireless communications and to devise efficient defense
mechanisms for improving the wireless network security. We first summarize the
security requirements of wireless networks, including their authenticity,
confidentiality, integrity and availability issues. Next, a comprehensive
overview of security attacks encountered in wireless networks is presented in
view of the network protocol architecture, where the potential security threats
are discussed at each protocol layer. We also provide a survey of the existing
security protocols and algorithms that are adopted in the existing wireless
network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term
evolution (LTE) systems. Then, we discuss the state-of-the-art in
physical-layer security, which is an emerging technique of securing the open
communications environment against eavesdropping attacks at the physical layer.
We also introduce the family of various jamming attacks and their
counter-measures, including the constant jammer, intermittent jammer, reactive
jammer, adaptive jammer and intelligent jammer. Additionally, we discuss the
integration of physical-layer security into existing authentication and
cryptography mechanisms for further securing wireless networks. Finally, some
technical challenges which remain unresolved at the time of writing are
summarized and the future trends in wireless security are discussed.Comment: 36 pages. Accepted to Appear in Proceedings of the IEEE, 201
Business scenarios, technical challenges and system requirements - D2.1
Deliverable D2.1 del projecte Europeu OneFIT (ICT-2009-257385)Preprin
Recent Advances in Cellular D2D Communications
Device-to-device (D2D) communications have attracted a great deal of attention from researchers in recent years. It is a promising technique for offloading local traffic from cellular base stations by allowing local devices, in physical proximity, to communicate directly with each other. Furthermore, through relaying, D2D is also a promising approach to enhancing service coverage at cell edges or in black spots. However, there are many challenges to realizing the full benefits of D2D. For one, minimizing the interference between legacy cellular and D2D users operating in underlay mode is still an active research issue. With the 5th generation (5G) communication systems expected to be the main data carrier for the Internet-of-Things (IoT) paradigm, the potential role of D2D and its scalability to support massive IoT devices and their machine-centric (as opposed to human-centric) communications need to be investigated. New challenges have also arisen from new enabling technologies for D2D communications, such as non-orthogonal multiple access (NOMA) and blockchain technologies, which call for new solutions to be proposed. This edited book presents a collection of ten chapters, including one review and nine original research works on addressing many of the aforementioned challenges and beyond
Analytical characterization of inband and outband D2D Communications for network access
Mención Internacional en el tÃtulo de doctorCooperative short-range communication schemes provide powerful tools to solve interference
and resource shortage problems in wireless access networks. With such schemes, a mobile node
with excellent cellular connectivity can momentarily accept to relay traffic for its neighbors experiencing
poor radio conditions and use Device-to-Device (D2D) communications to accomplish
the task. This thesis provides a novel and comprehensive analytical framework that allows evaluating
the effects of D2D communications in access networks in terms of spectrum and energy
efficiency. The analysis covers the cases in which D2D communications use the same bandwidth
of legacy cellular users (in-band D2D) or a different one (out-band D2D) and leverages on the
characterization of underlying queueing systems and protocols to capture the complex intertwining
of short-range and legacy WiFi and cellular communications.
The analysis also unveils how D2D affects the use and scope of other optimization techniques
used for, e.g., interference coordination and fairness in resource distribution. Indeed, characterizing
the performance of D2D-enabled wireless access networks plays an essential role in the optimization
of system operation and, as a consequence, permits to assess the general applicability of
D2D solutions. With such characterization, we were able to design several mechanisms that improve
system capabilities. Specifically, we propose bandwidth resource management techniques
for controlling interference when cellular users and D2D pairs share the same spectrum, we design
advanced and energy-aware access selection mechanisms, we show how to adopt D2D communications
in conjunction with interference coordination schemes to achieve high and fair throughputs,
and we discuss on end-to-end fairness—beyond the use of access network resources—when
D2D communications is adopted in C-RAN. The results reported in this thesis show that identifying
performance bottlenecks is key to properly control network operation, and, interestingly,
bottlenecks may not be represented just by wireless resources when end-to-end fairness is of
concern.Programa Oficial de Doctorado en IngenierÃa TelemáticaPresidente: Marco Ajmone Marsan.- Secretario: Miquel Payaró Llisterri.- Vocal: Omer Gurewit
- …