7 research outputs found

    Amplify-and-Forward Relaying With Maximal Ratio Combining Over Fluctuating Two-Ray Channel:Non-Asymptotic and Asymptotic Performance Analysis

    Get PDF
    Fluctuating two-ray (FTR) channel model was shown to effectively characterize millimeter wave (mmWave) communication channels. In this article, we adopt FTR to investigate amplify-and-Forward (AF) mmWave relaying system. Two communications scenarios are considered corresponding to the presence and absence of a direct link between the transmitter and receiver. Outage probability and symbol error rate (SER) are then analytically obtained as performance metrics. The results are further compared with the corresponding metrics obtained based on conventional channel models including Nakagami- m and two-wave with diffuse power (TWDP). Especially, for the high-SNR regime, our analyses indicate that performance evaluations based on the conventional models significantly deviate from that of based on the FTR model. Our results provide quantitative insights on the importance of model selection in design and performance evaluations of relay-based mmWave systems. Moreover, for the high-SNR regime, we carry out asymptotic analysis and obtain a low-complexity expression for the achieved AF relaying gain. Such an expression provides a quantitative measure on whether or not AF relaying outperforms no-relaying in a given setting. Extensive numerical and simulation results are provided to confirm the accuracy of the analysis and investigate system performance in different settings

    Empirical Validation of a Class of Ray-Based Fading Models

    Full text link
    As new wireless standards are developed, the use of higher operation frequencies comes in hand with new use cases and propagation effects that differ from the well-established state of the art. Numerous stochastic fading models have recently emerged under the umbrella of generalized fading conditions, to provide a fine-grain characterization of propagation channels in the mmWave and sub-THz bands. For the first time in literature, this work carries out an experimental validation of a class of such ray-based models, in a wide range of propagation conditions (anechoic, reverberation and indoor) at mmWave bands. We show that the independently fluctuating two-ray (IFTR) model has good capabilities to recreate rather dissimilar environments with high accuracy. We also put forth that the key limitations of the IFTR model arise in the presence of reduced diffuse propagation, and also due to a limited phase variability for the dominant specular components.Comment: 9 pages, 13 figure

    Multi-Connectivity Techniques for Improved performance in Mobile Communications

    Get PDF
    Multi-Connectivity (MC) techniques play a significant role in enhancing the performance and reliability of mobile communication systems. These techniques aim to improve network connectivity by utilising multiple simultaneous connections between a mobile device and base stations or access points. Among other multiple benefits, MC techniques can provide increased data rates and enhanced link reliability, both of which are of extreme relevance to the new use cases introduced in the Fifth Generation (5G) of mobile communication systems, namely enhanced Mobile Broadband (eMBB), Ultra-Reliable Low-Latency Communication (URLLC) and massive Machine Type Communication (mMTC). MC techniques are equally important for the future Sixth Generation (6G) technology services and applications, where data rates and link reliability requirements will be even more demanding than in the previous generation. In this context, this thesis proposes some novel MC techniques with the potential to significantly improve both aspects (i.e., data rate and reliability) in mobile communication systems. First, a MC framework based on Carrier Aggregation (CA) is proposed. CA was originally proposed as a technique to combine spectrum from different bands into a single virtual chunk of spectrum for the higher layers of the protocol stack. In this thesis, a novel framework where CA is exploited as a diversity technique is proposed. The idea is to divide a large block of contiguous spectrum into a number of adjacent sub-blocks, where each of them is treated as an individual Component Carrier (CC) according to CA and therefore runs an independent transmission process. The motivation for this approach is to benefit from the diversity experienced at different frequencies. This idea is evaluated by means of simulations and the obtained results indicate that CA can effectively be exploited as a diversity technique to increase network capacity, with the optimum number of CCs depending on the radio propagation scenario. The simulation results indicate that the use of CA as a diversity technique, as proposed in this thesis, can enhance the obtained data rate up to almost five times with respect to the case where only one CC is employed. Subsequently, a mathematical model is developed to characterise the performance of CA as a diversity technique. The model is first used to characterise the channel capacity as a function of the number of CCs and other relevant parameters, which is shown to explain and corroborate the findings derived from simulation results. Capitalising on the developed mathematical model, the impact of various relevant configuration parameters on the performance of CA as a diversity technique is then evaluated. In such a study, not only the ergodic capacity but also the secrecy capacity are both considered and investigated. The results demonstrate that the proposed mathematical modelling approach can correctly predict the performance of CA as a diversity technique as well as the impact of various relevant configuration parameters. Finally, a hybrid transmission scheme for improved link reliability is also proposed. The proposed hybrid system benefits from the range of frequency bands available in mobile communication systems and their complementary characteristics. Higher-frequency bands tend to provide larger bandwidths (i.e., higher data rates) but are also characterised by more challenging propagation conditions (i.e., lower link reliability), while the opposite is true in general for lower-frequency bands. To exploit these complementary characteristics, a hybrid system is proposed that dynamically switches between both bands according to the instantaneous channel quality. The obtained results demonstrate that such a hybrid scheme not only improves dramatically the transmission reliability but also has the potential to simultaneously increase the capacity while efficiently exploiting the resources in both bands. Concretely, for a reliability requirement of 10−5, the proposed scheme can provide an 8/9-fold increase in the communication range of the main link in the higher-frequency bands by only reducing 2%-4% the availability of the backup link in the lower-frequency bands. Moreover, the attained high level of link reliability is not obtained at the expense of the link capacity, which is indeed improved by applying the proposed scheme. These findings suggest that the proposed scheme is a suitable technique to effectively meet the URLLC requirements for 5G/6G in a resource-efficient manner. In summary, the MC techniques developed in this thesis can provide significant improvements in terms of enhanced data rates and reliability for current and future 5G/6G mobile communication systems

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A
    corecore