1,956 research outputs found

    信頼性の高い大容量公共用移動通信システムを実現するためのソフトウェア無線およびコグニティブ無線に関する研究

    Get PDF
    Public safety mobile wireless communication systems (PMCSs) are widely used by public safety personnel, such as firefighters and police, as well as local governments. PMCSs are crucial to protect safety and security of communities. Conventional PMCSs effectively cover underpopulated areas as well as urban areas by employing long-zone scheme. Since the PMCSs can cover areas that are not covered by commercial cellule systems, they play the important role as the only communication tool. Moreover, the conventional PMCSs have enhanced robustness and reliability. The conventional PMCSs can keep their services even if backbone lines are cut off. In contrast, short-zone scheme systems cannot offer stable and wide service area without backbone line connection. For example, the Great East Japan Earthquake in Japan, police mobile communication systems had kept their functions while cellular phones became disabled. PMCSs are required to be quite high robustness and reliability in order to save human life. Recently, conventional PMCSs are required to realize further expansion of service areas and high speed transmission although they have stably provided users with wide service areas so far. Nowadays, in order to solve complicated public affair quickly, more stable service areas and broadband communication are required. Compared with conventional PMCSs in urban areas, commercial wireless mobile communication systems (CWMCSs) such as cellular systems supply stable service areas and broadband communication in times of peace. In accordance with development of wireless technology, PMCSs need to keep pace with CWMCSs. However, conventional PMCSs can hardly realize further stable service areas and high speed transmission because of large-zone scheme. In terms of realization of further stable service areas, no-service areas cannot be eliminated easily. This is because no-service areas are mostly attributed to shadowing; in large-zone scheme, a no-service area that must essentially be covered by a certain base station is seldom covered by other neighboring base stations. Although new allocation of base stations is fundamental answer to solve no-service area problem in PMCSs, building new base stations of PMCSs that are not used for a commercial purpose is restricted by national and local budget. Realization of high speed transmission of PMCSs is also difficult because of large-zone scheme. To realize high speed transmission, increase of transmit power or shrinking of service area coverage is required to compensate Signal to Noise Power Ratio (SNR) deterioration caused by expanding bandwidth. Increase of transmission power of mobile station used in large-zone scheme systems is almost impossible because transmission power of mobile station is originally high. Thus, shrinking of service areas is necessary for high speed communication. Currently, to realize high speed transmission, next generation broadband PMCSs (BPMCSs) employing short-or middle-zone scheme are being developed. In the 3GPP, it is considered that the Long Term Evolution (LTE) is used for communication of public safety. In Japan, National Institute of Information and Communications Technology (NICT) has researched and developed Public Broadband Wireless Communication System (PBWCS), which employs 200MHz as carrier frequency. The PBWCS has already been equipped in national police agency in Japan. However, we consider that the conventional narrowband PMCSs (NPM-CSs) are not replaced with the BPMCSs completely. This is because the BPMCSs cannot cover all the areas that the conventional NPM-CSs have covered. Moreover, there are problems of robustness and reliability when accidents happen. Hence, users of PMCSs will utilize both of NPMCSs and BPMCSs in accordance with the situation. In this case, users equipping several terminals feel inconvenient and also radio resources are not used effectively. The best solution to realize optimal PMCSs is employing heterogeneous cognitive radio (HCR) for PMCSs. By applying the HCR to PMCSs, service areas expansion and high speed transmission in PM-CSs will be realized effectively. We propose an integrated system combining NPMCSs with CWMCSs and BPMCSs to make communication quality of the PMCSs improve. The proposed HCR recognizes communication conditions of several systems and then provides PMCS\u27s users with optimal communication quality. Although software defined radio techniques (SDR) are ideal to operate cognitive radio more flexibly, we deal with HCR mainly to realize combined systems in this thesis. We study advantages, problems, and their solution to realize the HCR for PMCSs. Firstly, we research service area expansion of NPMCSs using HCR. The proposed HCR is utilized for stabilization of NPMCS\u27s service area. If communication quality of a NPMCS deteriorates owing to shadowing, the proposed HCR terminal obtains a part of NPMCS\u27s data called subsidiary information (SI) from CWMCSs or BPMCSs. The proposed HCR terminal can improve PMCS\u27s bit error rate (BER) performance by combining the SI with received signals of the NPMCS and then decoding the combined signals using forward error correction (FEC). Since convolutional codes are often used in FEC of NPMCSs, we consider BER improvement methods of the convolutional code. We derive modified Viterbi algorithm from maximum likelihood sequence estimation (MLSE) of the combined signals. Moreover, we introduce the distance spectrum to evaluate characteristics of the convolutional codes. The distance spectrum is used for estimating improvement of BER performances. Next, we consider synchronization methods to realize the proposed HCR. In the HCR, there are two types of synchronization method; one is the self-synchronization method to synchronize each system itself. The other is the co-synchronization method to combine different systems. In this thesis, we consider self-synchronization methods of NPMCSs mainly. This is because the HCR aims to improve communication quality of NPMCSs equipping conventional self-synchronization methods that are not probably available in low SNR environments. In this environment, since NPMCSs can hardly obtain their self-synchronization alone, powerful self-synchronization methods using HCR techniques are required. We propose two synchronization methods that are utilization of global portioning system (GPS) signals and utilization of the SI, respectively. The synchronization methods utilizing GPS signals can acquire timing synchronization. To obtain timing synchronization, the proposed HCR acquires accurate time and own location using the GPS signals. The HCR also gets the location of base stations and the frame timing by making the SI convey their information. Since the HCR can know accurate time and distance between the base station and the HCR, synchronization timing can be calculated. However, in GPS based method, preciseness of timing synchronization may be deteriorated by measurement error of GPS signals, diffraction caused by mountains, and propagation delay caused by reection. For this reason, we consider a mitigation method of the timing error and then evaluate BER performances using computer simulation. Moreover, we propose a SI based synchronization method that can obtain timing synchronization without GPS signals. The proposed method is employed when a NPMCS uses differential coded π/4 shift QPSK as the modulation scheme. The notable feature of the proposed method is to convey the phase rotation of the π/4 shift QPSK as the SI. The HCR can forecast PMCS\u27s envelopes from the obtained SI and then obtain the timing synchronization by correlating the forecasted envelopes with real received envelopes. Since the proposed method can also be used for co-synchronization and BER improvement, CWMCS\u27s resource consumption to convey the SI is suppressed. Finally, we consider HCRs combining several PMCSs. In this thesis, the combination of NPMCSs and the combination of a NPMCS and a BPMCS are researched. In the combination of NPMCSs, we consider that several PMCSs are integrated by SDR. In the combination of a NPMCS and a BPMCS, we propose site diversity based on HCR to improve uplink communication quality of the BPMCS. In this diversity, since uplink interference must be avoided, we employ combination of the adaptive array and HCR techniques. Moreover, we propose information compression methods for narrow band backbone lines so that received data can be conveyed to head office with little BER deterioration. PMCSs will have played an important role to ensure social safety. In the thesis, we consider the one of the next generation PMCSs employing SDR and HCR. Using this research, we can obtain a direction of optimal PMCSs. The next step that we need to perform is to apply our proposed method to actual radio systems. We must continue this research so that high reliable and compact PMCSs can be realized.電気通信大学201

    A Comprehensive Review of D2D Communication in 5G and B5G Networks

    Get PDF
    The evolution of Device-to-device (D2D) communication represents a significant breakthrough within the realm of mobile technology, particularly in the context of 5G and beyond 5G (B5G) networks. This innovation streamlines the process of data transfer between devices that are in close physical proximity to each other. D2D communication capitalizes on the capabilities of nearby devices to communicate directly with one another, thereby optimizing the efficient utilization of available network resources, reducing latency, enhancing data transmission speed, and increasing the overall network capacity. In essence, it empowers more effective and rapid data sharing among neighboring devices, which is especially advantageous within the advanced landscape of mobile networks such as 5G and B5G. The development of D2D communication is largely driven by mobile operators who gather and leverage short-range communications data to propel this technology forward. This data is vital for maintaining proximity-based services and enhancing network performance. The primary objective of this research is to provide a comprehensive overview of recent progress in different aspects of D2D communication, including the discovery process, mode selection methods, interference management, power allocation, and how D2D is employed in 5G technologies. Furthermore, the study also underscores the unresolved issues and identifies the challenges associated with D2D communication, shedding light on areas that need further exploration and developmen

    A novel MAC Protocol for Cognitive Radio Networks

    Get PDF
    In Partial Fulfilment of the Requirements for the Degree Doctor of Philosophy from the University of BedfordshireThe scarcity of bandwidth in the radio spectrum has become more vital since the demand for wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum bands and the inefficiency in their utilization have been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting transmission characteristics. In this thesis, recent research and survey about the advances in theory and applications of cognitive radio technology has been reviewed. The thesis starts with the essential background on cognitive radio techniques and systems and discusses those characteristics of CR technology, such as standards, applications and challenges that all can help make software radio more personal. It then presents advanced level material by extensively reviewing the work done so far in the area of cognitive radio networks and more specifically in medium access control (MAC) protocol of CR. The list of references will be useful to both researchers and practitioners in this area. Also, it can be adopted as a graduate-level textbook for an advanced course on wireless communication networks. The development of new technologies such as Wi-Fi, cellular phones, Bluetooth, TV broadcasts and satellite has created immense demand for radio spectrum which is a limited natural resource ranging from 30KHz to 300GHz. For every wireless application, some portion of the radio spectrum needs to be purchased, and the Federal Communication Commission (FCC) allocates the spectrum for some fee for such services. This static allocation of the radio spectrum has led to various problems such as saturation in some bands, scarcity, and lack of radio resources to new wireless applications. Most of the frequencies in the radio spectrum have been allocated although many studies have shown that the allocated bands are not being used efficiently. The CR technology is one of the effective solutions to the shortage of spectrum and the inefficiency of its utilization. In this thesis, a detailed investigation on issues related to the protocol design for cognitive radio networks with particular emphasis on the MAC layer is presented. A novel Dynamic and Decentralized and Hybrid MAC (DDH-MAC) protocol that lies between the CR MAC protocol families of globally available common control channel (GCCC) and local control channel (non-GCCC). First, a multi-access channel MAC protocol, which integrates the best features of both GCCC and non-GCCC, is proposed. Second, an enhancement to the protocol is proposed by enabling it to access more than one control channel at the same time. The cognitive users/secondary users (SUs) always have access to one control channel and they can identify and exploit the vacant channels by dynamically switching across the different control channels. Third, rapid and efficient exchange of CR control information has been proposed to reduce delays due to the opportunistic nature of CR. We have calculated the pre-transmission time for CR and investigate how this time can have a significant effect on nodes holding a delay sensitive data. Fourth, an analytical model, including a Markov chain model, has been proposed. This analytical model will rigorously analyse the performance of our proposed DDH-MAC protocol in terms of aggregate throughput, access delay, and spectrum opportunities in both the saturated and non-saturated networks. Fifth, we develop a simulation model for the DDH-MAC protocol using OPNET Modeler and investigate its performance for queuing delays, bit error rates, backoff slots and throughput. It could be observed from both the numerical and simulation results that when compared with existing CR MAC protocols our proposed MAC protocol can significantly improve the spectrum utilization efficiency of wireless networks. Finally, we optimize the performance of our proposed MAC protocol by incorporating multi-level security and making it energy efficient

    State-of-the-art authentication and verification schemes in VANETs:A survey

    Get PDF
    Vehicular Ad-Hoc Networks (VANETs), a subset of Mobile Ad-Hoc Networks (MANETs), are wireless networks formed around moving vehicles, enabling communication between vehicles, roadside infrastructure, and servers. With the rise of autonomous and connected vehicles, security concerns surrounding VANETs have grown. VANETs still face challenges related to privacy with full-scale deployment due to a lack of user trust. Critical factors shaping VANETs include their dynamic topology and high mobility characteristics. Authentication protocols emerge as the cornerstone of enabling the secure transmission of entities within a VANET. Despite concerted efforts, there remains a need to incorporate verification approaches for refining authentication protocols. Formal verification constitutes a mathematical approach enabling developers to validate protocols and rectify design errors with precision. Therefore, this review focuses on authentication protocols as a pivotal element for securing entity transmission within VANETs. It presents a comparative analysis of existing protocols, identifies research gaps, and introduces a novel framework that incorporates formal verification and threat modeling. The review considers key factors influencing security, sheds light on ongoing challenges, and emphasises the significance of user trust. The proposed framework not only enhances VANET security but also contributes to the growing field of formal verification in the automotive domain. As the outcomes of this study, several research gaps, challenges, and future research directions are identified. These insights would offer valuable guidance for researchers to establish secure authentication communication within VANETs

    Emerging research directions in computer science : contributions from the young informatics faculty in Karlsruhe

    Get PDF
    In order to build better human-friendly human-computer interfaces, such interfaces need to be enabled with capabilities to perceive the user, his location, identity, activities and in particular his interaction with others and the machine. Only with these perception capabilities can smart systems ( for example human-friendly robots or smart environments) become posssible. In my research I\u27m thus focusing on the development of novel techniques for the visual perception of humans and their activities, in order to facilitate perceptive multimodal interfaces, humanoid robots and smart environments. My work includes research on person tracking, person identication, recognition of pointing gestures, estimation of head orientation and focus of attention, as well as audio-visual scene and activity analysis. Application areas are humanfriendly humanoid robots, smart environments, content-based image and video analysis, as well as safety- and security-related applications. This article gives a brief overview of my ongoing research activities in these areas

    Device-to-device communications for 5G Radio Access Networks

    Get PDF
    Nowadays it is very popular to share video clips and images to one’s social network in the proximity. Direct device-to-device (D2D) communication is one of the means to respond to this requirement. D2D offers users improved end-to-end latency times, and additionally can provide higher data rates. At the same time the overall cellular network congestion decreases. D2D is also known as Proximity Services (ProSe). LTE is missing direct D2D communication. Currently D2D for 5G is standardised in the 3rd Generation Partnership Project (3GPP) Releases 12, and in parallel Mobile and wireless communications Enablers for the Twenty-twenty Information Society (METIS) project has D2D as one of its research topics. Multiple articles have been published about D2D communication. This thesis is a literature based thesis following D2D communication in 5G literature. The scope is to describe similarities and differences found in Technical Reports and Technical Specifications of the 3GPP Release 12, in deliverables written in METIS project and in some selected D2D related publications about D2D communications. 3GPP Release 12 concentrates on ProSe at least for public safety. ProSe communication out-of-coverage is only for public safety purposes. METIS provides multiple solutions for diverse D2D topics, for example, device discovery, radio resource management, mobility management and relaying. METIS provides solutions for D2D communication not yet mature enough for development and implementation but which might be realized in the future.Nykyisin on suosittua lähettää lyhyitä videoita tai kuvia läheisyydessä oleville ystäville. Laitteiden välinen suora kommunikointi eli D2D-viestintä tuo ratkaisun tähän vaatimukseen. D2D-viestinnän ansiosta viive lyhenee ja lisäksi siirtonopeudet kasvavat. Samaan aikaan koko verkon kuormitus vähenee. Suora kahden laitteen välinen kommunikointi puuttuu LTE:stä. Tällä hetkellä 3GPP Release 12 standardisoi suoraa kahden laitteen välistä kommunikointia. Samanaikaisesti Mobile and wireless communications Enablers for the Twenty-twenty Information Society (METIS) –projektin yhtenä tutkimuskohteenaan on kahden laitteen välinen suora kommunikointi, Lisäksi on lukuisia julkaisuja liittyen D2D-viestintään. Tämä diplomityö perustuu kirjallisuuteen. Sen tavoitteena on selvittää, miten kahden laitteen välistä suoraa kommunikointia on kuvattu 3GPP Release 12:ta teknisissä spesifikaatioissa, METIS-projektin julkaisuissa sekä muutamassa valitussa tieteellisessä julkaisussa. Tavoitteena on selvittää D2D-viestinnän yhtäläisyyksiä sekä poikkeamia. 3PGG Release 12 standardointi keskittyy D2D-viestinnän käyttöön ainakin julkisessa pelastustyössä. D2D-viestinnän tulee ainakin julkisessa pelastustyössä toimia myös siellä missä matkapuhelinverkko ei toimi tai sitä ei ole olemassa. METIS tarjoaa useita ratkaisuja D2D-viestinnän eri osa-alueille, esimerkiksi laitteiden tunnistamiseen, resurssien hallintaan, liikkuvuuden hallintaa ja viestien edelleen lähettämiseen. METIS-projekti on tuottanut D2D-viestinnän ratkaisuja, joiden toteuttaminen on järkevää ja mahdollista vasta tulevaisuudessa

    Towards Massive Machine Type Communications in Ultra-Dense Cellular IoT Networks: Current Issues and Machine Learning-Assisted Solutions

    Get PDF
    The ever-increasing number of resource-constrained Machine-Type Communication (MTC) devices is leading to the critical challenge of fulfilling diverse communication requirements in dynamic and ultra-dense wireless environments. Among different application scenarios that the upcoming 5G and beyond cellular networks are expected to support, such as eMBB, mMTC and URLLC, mMTC brings the unique technical challenge of supporting a huge number of MTC devices, which is the main focus of this paper. The related challenges include QoS provisioning, handling highly dynamic and sporadic MTC traffic, huge signalling overhead and Radio Access Network (RAN) congestion. In this regard, this paper aims to identify and analyze the involved technical issues, to review recent advances, to highlight potential solutions and to propose new research directions. First, starting with an overview of mMTC features and QoS provisioning issues, we present the key enablers for mMTC in cellular networks. Along with the highlights on the inefficiency of the legacy Random Access (RA) procedure in the mMTC scenario, we then present the key features and channel access mechanisms in the emerging cellular IoT standards, namely, LTE-M and NB-IoT. Subsequently, we present a framework for the performance analysis of transmission scheduling with the QoS support along with the issues involved in short data packet transmission. Next, we provide a detailed overview of the existing and emerging solutions towards addressing RAN congestion problem, and then identify potential advantages, challenges and use cases for the applications of emerging Machine Learning (ML) techniques in ultra-dense cellular networks. Out of several ML techniques, we focus on the application of low-complexity Q-learning approach in the mMTC scenarios. Finally, we discuss some open research challenges and promising future research directions.Comment: 37 pages, 8 figures, 7 tables, submitted for a possible future publication in IEEE Communications Surveys and Tutorial
    corecore