222 research outputs found

    Mobile data offloading addressing the service quality vs. resource utilisation dilemma

    Get PDF

    Radio resource management for V2X in cellular systems

    Get PDF
    The thesis focuses on the provision of cellular vehicle-to-everything (V2X) communications, which have attracted great interest for 5G due to the potential of improving traffic safety and enabling new services related to intelligent transportation systems. These types of services have strict requirements on reliability, access availability, and end-to-end (E2E) latency. V2X requires advanced network management techniques that must be developed based on the characteristics of the networks and traffic requirements. The integration of the Sidelink (SL), which enables the direct communication between vehicles (i.e., vehicle-to-vehicle (V2V)) without passing through the base station into cellular networks is a promising solution for enhancing the performance of V2X in cellular systems. In this thesis, we addressed some of the challenges arising from the integration of V2V communication in cellular systems and validated the potential of this technology by providing appropriate resource management solutions. Our main contributions have been in the context of radio access network slicing, mode selection, and radio resource allocation mechanisms. With regard to the first research direction that focuses on the RAN slicing management, a novel strategy based on offline Q-learning and softmax decision-making has been proposed as an enhanced solution to determine the adequate split of resources between a slice for eMBB communications and a slice for V2X. Then, starting from the outcome of the off-line Q-learning algorithm, a low-complexity heuristic strategy has been proposed to achieve further improvements in the use of resources. The proposed solution has been compared against proportional and fixed reference schemes. The extensive performance assessment have revealed the ability of the proposed algorithms to improve network performance compared to the reference schemes, especially in terms of resource utilization, throughput, latency and outage probability. Regarding the second research direction that focuses on the mode selection, two different mode selection solutions referred to as MSSB and MS-RBRS strategies have been proposed for V2V communication over a cellular network. The MSSB strategy decides when it is appropriate to use one or the other mode, i.e. sidelink or cellular, for the involved vehicles, taking into account the quality of the links between V2V users, the available resources, and the network traffic load situation. Moreover, the MS-RBRS strategy not only selects the appropriate mode of operation but also decides efficiently the amount of resources needed by V2V links in each mode and allows reusing RBs between different SL users while guaranteeing the minimum signal to interference requirements. The conducted simulations have revealed that the MS-RBRS and MSSB strategies are beneficial in terms of throughput, radio resource utilization, outage probability and latency under different offered loads comparing to the reference scheme. Last, we have focused on the resource allocation problem including jointly mode selection and radio resource scheduling. For the mode selection, a novel mode selection has been presented to decide when it is appropriate to select sidelink mode and use a distributed approach for radio resource allocation or cellular mode and use a centralized radio resource allocation. It takes into account three aspects: the quality of the links between V2V users, the available resources, and the latency. As for the radio resource allocation, the proposed approach includes a distributed radio resource allocation for sidelink mode and a centralized radio resource allocation for cellular mode. The proposed strategy supports dynamic assignments by allowing transmission over mini-slots. A simulation-based analysis has shown that the proposed strategies improved the network performance in terms of latency of V2V services, packet success rate and resource utilization under different network loads.La tesis se centra en la provisión de comunicaciones para vehículos sistemas celulares (V2X: Vehicle to Everything), que han atraído un gran interés en el contexto de 5G debido a su potencial de mejorar la seguridad del tráfico y habilitar nuevos servicios relacionados con los sistemas inteligentes de transporte. Estos tipos de servicios tienen requisitos estrictos en términos fiabilidad, disponibilidad de acceso y latencia de extremo a extremo (E2E). Para ello, V2X requiere técnicas avanzadas de gestión de red que deben desarrollarse en función de las características de las redes y los requisitos de tráfico. La integración del Sidelink (SL), que permite la comunicación directa entre vehículos (es decir, vehículo a vehículo (V2V)) sin pasar por la estación base de las redes celulares, es una solución prometedora para mejorar el rendimiento de V2X en el sistema celular. En esta tesis, abordamos algunos de los desafíos derivados de la integración de la comunicación V2V en los sistemas celulares y validamos el potencial de esta tecnología al proporcionar soluciones de gestión de recursos adecuadas. Nuestras principales contribuciones han sido en el contexto del denominado "slicing" de redes de acceso radio, la selección de modo y los mecanismos de asignación de recursos radio. Respecto a la primera dirección de investigación que se centra en la gestión del RAN slicing, se ha propuesto una estrategia novedosa basada en Q-learning y toma de decisiones softmax como una solución para determinar la división adecuada de recursos entre un slice para comunicaciones eMBB y un slice para V2X. Luego, a partir del resultado del algoritmo de Q-learning, se ha propuesto una estrategia heurística de baja complejidad para lograr mejoras adicionales en el uso de los recursos. La solución propuesta se ha comparado con esquemas de referencia proporcionales y fijos. La evaluación ha revelado la capacidad de los algoritmos propuestos para mejorar el rendimiento de la red en comparación con los esquemas de referencia, especialmente en términos de utilización de recursos, rendimiento, y latencia . Con respecto a la segunda dirección de investigación que se centra en la selección de modo, se han propuesto dos soluciones de diferentes llamadas estrategias MSSB y MS-RBRS para la comunicación V2V a través de una red celular. La estrategia MSSB decide cuándo es apropiado usar el modo SL o el modo celular, para los vehículos involucrados, teniendo en cuenta la calidad de los enlaces entre los usuarios de V2V, los recursos disponibles y la situación de carga de tráfico de la red. Además, la estrategia MS-RBRS no solo selecciona el modo de operación apropiado, sino que también decide eficientemente la cantidad de recursos que los enlaces V2V necesitan en cada modo, y permite que los RB se reutilicen entre diferentes usuarios de SL al tiempo que garantiza requisitos mínimos de señal a interferencia. Se ha presentado un análisis basado en simulación para evaluar el desempeño de las estrategias propuestas. Finalmente, nos hemos centrado en el problema conjunto de la selección de modo y la asignación de recursos de radio. Para la selección de modo, se ha presentado una nueva estrategia para decidir cuándo es apropiado seleccionar el modo SL y usar un enfoque distribuido para la asignación de recursos de radio o el modo celular y usar la asignación de recursos de radio centralizada. Tiene en cuenta tres aspectos: la calidad de los enlaces entre los usuarios de V2V, los recursos disponibles y la latencia. En términos de asignación de recursos de radio, el enfoque propuesto incluye una asignación de recursos de radio distribuida para el modo SL y una asignación de recursos de radio centralizada para el modo celular. La estrategia propuesta admite asignaciones dinámicas al permitir la transmisión a través de mini-slots. Los resultados muestran las mejoras en términos de latencia, tasa de recepción y la utilización de recursos bajo diferentes cargas de red.Postprint (published version

    Building the Future Internet through FIRE

    Get PDF
    The Internet as we know it today is the result of a continuous activity for improving network communications, end user services, computational processes and also information technology infrastructures. The Internet has become a critical infrastructure for the human-being by offering complex networking services and end-user applications that all together have transformed all aspects, mainly economical, of our lives. Recently, with the advent of new paradigms and the progress in wireless technology, sensor networks and information systems and also the inexorable shift towards everything connected paradigm, first as known as the Internet of Things and lately envisioning into the Internet of Everything, a data-driven society has been created. In a data-driven society, productivity, knowledge, and experience are dependent on increasingly open, dynamic, interdependent and complex Internet services. The challenge for the Internet of the Future design is to build robust enabling technologies, implement and deploy adaptive systems, to create business opportunities considering increasing uncertainties and emergent systemic behaviors where humans and machines seamlessly cooperate

    Vulnerabilities of signaling system number 7 (SS7) to cyber attacks and how to mitigate against these vulnerabilities.

    Get PDF
    As the mobile network subscriber base exponentially increases due to some attractive offerings such as anytime anywhere accessibility, seamless roaming, inexpensive handsets with sophisticated applications, and Internet connectivity, the mobile telecommunications network has now become the primary source of communication for not only business and pleasure, but also for the many life and mission critical services. This mass popularisation of telecommunications services has resulted in a heavily loaded Signaling System number 7 (SS7) signaling network which is used in Second and Third Generations (2G and 3G) mobile networks and is needed for call control and services such as caller identity, roaming, and for sending short message servirces. SS7 signaling has enjoyed remarkable popularity for providing acceptable voice quality with negligible connection delays, pos- sibly due to its circuit-switched heritage. However, the traditional SS7 networks are expensive to lease and to expand, hence to cater for the growing signaling demand and to provide the seamless interconnectivity between the SS7 and IP networks a new suite of protocols known as Signaling Transport (SIGTRAN) has been designed to carry SS7 signaling messages over IP. Due to the intersignaling between the circuit-switched and the packet-switched networks, the mo- bile networks have now left the “walled garden”, which is a privileged, closed and isolated ecosystem under the full control of mobile carriers, using proprietary protocols and has minimal security risks due to restricted user access. Potentially, intersignaling can be exploited from the IP side to disrupt the services provided on the circuit-switched side. This study demonstrates the vulnerabilities of SS7 messages to cyber-attacks while being trans- ported over IP networks and proposes some solutions based on securing both the IP transport and SCTP layers of the SIGTRAN protocol stack

    Design and analysis of network coding schemes for efficient fronthaul offloading of fog-radio access networks

    Full text link
    In the era of the Internet of Things (IoT), everything will be connected. Smart homes and cities, connected cars, smart agriculture, wearable technologies, smart healthcare, smart sport, and fitness are all becoming a reality. However, the current cloud architecture cannot manage the tremendous number of connected devices and skyrocketing data traffic while providing the speeds promised by 5G and beyond. Centralised cloud data centres are physically too far from where the data originate (edge of the network), inevitably leading to data transmission speeds that are too slow for delay-sensitive applications. Thus, researchers have proposed fog architecture as a solution to the ever-increasing number of connected devices and data traffic. The main idea of fog architecture is to bring content physically closer to end users, thus reducing data transmission times. This thesis considers a type of fog architecture in which smart end devices have storage and processing capabilities and can communicate and collaborate with each other. The major goal of this thesis is to develop methods of efficiently governing communication and collaboration between smart end devices so that their requests to upper network layers are minimised. This is achieved by incorporating principles from graph theory, network coding and machine learning to model the problem and design efficient network-coded scheduling algorithms to further enhance achieved performance. By maximising end users' self-sufficiency, the load on the system is decreased and its capacity increased. This will allow the central processing unit to manage more devices which is vital, given that more than 29 billion devices will connect to the infrastructure by 2023 \cite{Cisco1823}. Specifically, given that the limitations of the smart end devices and the system in general lead to various communication conflicts, a novel network coding graph is developed that takes into account all possible conflicts and enables the search for an efficient feasible solution. The thesis designs heuristic algorithms that search for the solution over the novel network coding graph, investigates the complexity of the proposed algorithms, and shows the offloading strategy's asymptotic optimality. Although the main aim of this work is to decrease the involvement of upper fog layers in serving smart end devices, it also takes into account how much energy end devices would use during collaborations. Unfortunately, a higher system capacity comes at the price of more energy spent by smart end devices; thus, service providers' interests and end users' interests are conflicting. Finally, this thesis investigates how multihop communication between end devices influences the offloading of upper fog layers. Smart end devices are equipped with machine learning capabilities that allow them to find efficient paths to their peers, further improving offloading. In conclusion, the work in this thesis shows that by smartly designing and scheduling communication between end devices, it is possible to significantly reduce the load on the system, increase its capacity and achieve fast transmissions between end devices, allowing them to run latency-critical applications

    Building the Future Internet through FIRE

    Get PDF
    The Internet as we know it today is the result of a continuous activity for improving network communications, end user services, computational processes and also information technology infrastructures. The Internet has become a critical infrastructure for the human-being by offering complex networking services and end-user applications that all together have transformed all aspects, mainly economical, of our lives. Recently, with the advent of new paradigms and the progress in wireless technology, sensor networks and information systems and also the inexorable shift towards everything connected paradigm, first as known as the Internet of Things and lately envisioning into the Internet of Everything, a data-driven society has been created. In a data-driven society, productivity, knowledge, and experience are dependent on increasingly open, dynamic, interdependent and complex Internet services. The challenge for the Internet of the Future design is to build robust enabling technologies, implement and deploy adaptive systems, to create business opportunities considering increasing uncertainties and emergent systemic behaviors where humans and machines seamlessly cooperate

    Heterogeneous Wireless Networks QoE Framework

    Get PDF
    With the appearance of small cells and the move of mobile networks towards an all-IP 4G network, the convergence of these with Wi-Fi becomes a possibility which at the same time opens the path to achieve what will become 5G connectivity. This thesis describes the evolution of the different mainstream wireless technologies deployed around the world and how they can interact, and provides tools to use this convergence to achieve the foreseen requirements expected in a 5G environment and the ideal user experience. Several topics were identified as needing attention: handover between heterogeneous networks, security of large numbers of small cells connected via a variety of backhaul technologies to the core networks, edge content distribution to improve latency, improvement of the service provided in challenging radio environments and interference between licensed and unlicensed spectrum. Within these topics a contribution was made to improve the current status by analysing the unaddressed issues and coming up with potential improvements that were tested in trials or lab environment. The main contributions from the study have been: 1. A patent in the wireless security domain that reuses the fact that overlapping coverage is and will be available and protects against man in the middle attacks (Section 5.3). 2. A patent in the content distribution domain that manages to reduce the cost to deliver content within a mobile network by looking for the shortest path to the requested content (Section 6.3). 3. Improvements and interoperability test of 802.21 standard which improves the seamlessness of handovers (Section 4.2). 4. 2 infill trials which focus on how to improve the user experience in those challenging conditions (Sections 7.2 and 7.3). 5. An interference study with Wi-Fi 2.4GHz for the newly allocated spectrum for 4G (Section 8.2). This thesis demonstrates some of the improvements required in current wireless networks to evolve towards 5G and achieve the coverage, service, user experience, latency and security requirements expected from the next generation mobile technology

    ERP implementation methodologies and frameworks: a literature review

    Get PDF
    Enterprise Resource Planning (ERP) implementation is a complex and vibrant process, one that involves a combination of technological and organizational interactions. Often an ERP implementation project is the single largest IT project that an organization has ever launched and requires a mutual fit of system and organization. Also the concept of an ERP implementation supporting business processes across many different departments is not a generic, rigid and uniform concept and depends on variety of factors. As a result, the issues addressing the ERP implementation process have been one of the major concerns in industry. Therefore ERP implementation receives attention from practitioners and scholars and both, business as well as academic literature is abundant and not always very conclusive or coherent. However, research on ERP systems so far has been mainly focused on diffusion, use and impact issues. Less attention has been given to the methods used during the configuration and the implementation of ERP systems, even though they are commonly used in practice, they still remain largely unexplored and undocumented in Information Systems research. So, the academic relevance of this research is the contribution to the existing body of scientific knowledge. An annotated brief literature review is done in order to evaluate the current state of the existing academic literature. The purpose is to present a systematic overview of relevant ERP implementation methodologies and frameworks as a desire for achieving a better taxonomy of ERP implementation methodologies. This paper is useful to researchers who are interested in ERP implementation methodologies and frameworks. Results will serve as an input for a classification of the existing ERP implementation methodologies and frameworks. Also, this paper aims also at the professional ERP community involved in the process of ERP implementation by promoting a better understanding of ERP implementation methodologies and frameworks, its variety and history
    corecore