98 research outputs found

    QoE Driven Multimedia Service Schemes in Wireless Networks Resource Allocation: Evolution from Optimization, Game Theory, to Economics

    Get PDF
    In order to deal with the Quality of Experience (QoE) improvement issue in the wireless networks services. In this dissertation we first investigated the Device to Device (D2D) relaying approach in the conventional Base Station (BS) to User Equipment (UE) two entities multimedia service system. In this part, the Multiple Input Multiple Output (MIMO) technology will be implemented in the D2D communication. Furthermore, factors such as the multimedia content distribution (i.e., Quad-tree fractal image compression method), the power allocation strategy, and modulation size are jointly considered to improve the QoE performance and energy efficiency. In addition, the emerging Non-Orthogonal Multiple Access (NOMA) transmission method is becoming very popular and being considered as one of the most potential technologies for the next generation of wireless networks. For the purpose of improving the QoE of UE in the wireless multimedia service, the power allocation method and the corresponding limitations are studied in detail in the wireless system where the traditional Orthogonal Multiple Access (OMA) technology and the promising NOMA technology are compared. At last, facing the real business model in the wireless network services, where the Content Provider (CP), Wireless Carrier (WC), and UE are included, we extend on work from the conventional BS-UE two entities research model to the CP-WC-UE three entities model. More specifically, a generalized best response Smart Media Pricing (SMP) method is studied in this dissertation. In our work, the CP and WC are treated as the service provider alliance. The SMP approach and the game theory are utilized to determine the data length of UE and the data price rate determined by the CP-WC union. It is worth pointing out that the concavity of utility function is no longer necessary for seeking the game equilibrium under the proposed best response game solution. Numerical simulation results also validate the system performance improvement of our proposed transmission schemes

    Will 5G See its Blind Side? Evolving 5G for Universal Internet Access

    Get PDF
    Internet has shown itself to be a catalyst for economic growth and social equity but its potency is thwarted by the fact that the Internet is off limits for the vast majority of human beings. Mobile phones---the fastest growing technology in the world that now reaches around 80\% of humanity---can enable universal Internet access if it can resolve coverage problems that have historically plagued previous cellular architectures (2G, 3G, and 4G). These conventional architectures have not been able to sustain universal service provisioning since these architectures depend on having enough users per cell for their economic viability and thus are not well suited to rural areas (which are by definition sparsely populated). The new generation of mobile cellular technology (5G), currently in a formative phase and expected to be finalized around 2020, is aimed at orders of magnitude performance enhancement. 5G offers a clean slate to network designers and can be molded into an architecture also amenable to universal Internet provisioning. Keeping in mind the great social benefits of democratizing Internet and connectivity, we believe that the time is ripe for emphasizing universal Internet provisioning as an important goal on the 5G research agenda. In this paper, we investigate the opportunities and challenges in utilizing 5G for global access to the Internet for all (GAIA). We have also identified the major technical issues involved in a 5G-based GAIA solution and have set up a future research agenda by defining open research problems

    A survey on intelligent computation offloading and pricing strategy in UAV-Enabled MEC network: Challenges and research directions

    Get PDF
    The lack of resource constraints for edge servers makes it difficult to simultaneously perform a large number of Mobile Devices’ (MDs) requests. The Mobile Network Operator (MNO) must then select how to delegate MD queries to its Mobile Edge Computing (MEC) server in order to maximize the overall benefit of admitted requests with varying latency needs. Unmanned Aerial Vehicles (UAVs) and Artificial Intelligent (AI) can increase MNO performance because of their flexibility in deployment, high mobility of UAV, and efficiency of AI algorithms. There is a trade-off between the cost incurred by the MD and the profit received by the MNO. Intelligent computing offloading to UAV-enabled MEC, on the other hand, is a promising way to bridge the gap between MDs' limited processing resources, as well as the intelligent algorithms that are utilized for computation offloading in the UAV-MEC network and the high computing demands of upcoming applications. This study looks at some of the research on the benefits of computation offloading process in the UAV-MEC network, as well as the intelligent models that are utilized for computation offloading in the UAV-MEC network. In addition, this article examines several intelligent pricing techniques in different structures in the UAV-MEC network. Finally, this work highlights some important open research issues and future research directions of Artificial Intelligent (AI) in computation offloading and applying intelligent pricing strategies in the UAV-MEC network

    User preference aware caching deployment for device-to-device caching networks

    Get PDF
    Content caching in the device-to-device (D2D) cellular networks can be utilized to improve the content delivery efficiency and reduce traffic load of cellular networks. In such cache-enabled D2D cellular networks, how to cache the diversity contents in the multiple cache-enabled mobile terminals, namely, the caching deployment, has a substantial impact on the network performance. In this paper, a user preference aware caching deployment algorithm is proposed for D2D caching networks. First, the definition of the user interest similarity is given based on the user preference. Then, a content cache utility of a mobile terminal is defined by taking the transmission coverage region of this mobile terminal and the user interest similarity of its adjacent mobile terminals into consideration. A general cache utility maximization problem with joint caching deployment and cache space allocation is formulated, where the special logarithmic utility function is integrated. In doing so, the caching deployment and the cache space allocation can be decoupled by equal cache space allocation. Subsequently, we relax the logarithmic utility maximization problem, and obtain a low complexity near-optimal solution via a dual decomposition method. Compared with the existing caching placement methods, the proposed algorithm can achieve significant improvement on cache hit ratio, content access delay, and traffic offloading gain

    A Stackelberg-game approach for disaster-recovery communications utilizing cooperative D2D

    Get PDF
    In this paper, we investigate disaster-recovery com- munications utilizing two-cell cooperative D2D communications. Specifically, one cell is in a healthy area while the other is in a disaster area. A user equipment (UE) in the healthy area aims to assist a UE in the disaster area to recover wireless information transfer (WIT) via an energy harvesting (EH) relay. In the healthy area, the cellular BS shares the spectrum with the UE, however, both of them may belong to different service providers. Thus, the UE pays an amount of price as incentive to the BS as part of two processes: energy trading and interference pricing. We formulate these two processes as two Stackelberg games, where their equilibrium is derived as closed- form solutions. The results help provide a sustainable framework for disaster recovery when the involving parties juggle between energy trading, interference compromise and payment incentives in establishing communications during the recovery process

    A Stackelberg-game approach for disaster-recovery communications utilizing cooperative D2D

    Get PDF
    In this paper, we investigate disaster-recovery com- munications utilizing two-cell cooperative D2D communications. Specifically, one cell is in a healthy area while the other is in a disaster area. A user equipment (UE) in the healthy area aims to assist a UE in the disaster area to recover wireless information transfer (WIT) via an energy harvesting (EH) relay. In the healthy area, the cellular BS shares the spectrum with the UE, however, both of them may belong to different service providers. Thus, the UE pays an amount of price as incentive to the BS as part of two processes: energy trading and interference pricing. We formulate these two processes as two Stackelberg games, where their equilibrium is derived as closed- form solutions. The results help provide a sustainable framework for disaster recovery when the involving parties juggle between energy trading, interference compromise and payment incentives in establishing communications during the recovery process

    Incentives in cooperative networks: a contract-theoretic perspective

    Get PDF

    Enable Reliable and Secure Data Transmission in Resource-Constrained Emerging Networks

    Get PDF
    The increasing deployment of wireless devices has connected humans and objects all around the world, benefiting our daily life and the entire society in many aspects. Achieving those connectivity motivates the emergence of different types of paradigms, such as cellular networks, large-scale Internet of Things (IoT), cognitive networks, etc. Among these networks, enabling reliable and secure data transmission requires various resources including spectrum, energy, and computational capability. However, these resources are usually limited in many scenarios, especially when the number of devices is considerably large, bringing catastrophic consequences to data transmission. For example, given the fact that most of IoT devices have limited computational abilities and inadequate security protocols, data transmission is vulnerable to various attacks such as eavesdropping and replay attacks, for which traditional security approaches are unable to address. On the other hand, in the cellular network, the ever-increasing data traffic has exacerbated the depletion of spectrum along with the energy consumption. As a result, mobile users experience significant congestion and delays when they request data from the cellular service provider, especially in many crowded areas. In this dissertation, we target on reliable and secure data transmission in resource-constrained emerging networks. The first two works investigate new security challenges in the current heterogeneous IoT environment, and then provide certain countermeasures for reliable data communication. To be specific, we identify a new physical-layer attack, the signal emulation attack, in the heterogeneous environment, such as smart home IoT. To defend against the attack, we propose two defense strategies with the help of a commonly found wireless device. In addition, to enable secure data transmission in large-scale IoT network, e.g., the industrial IoT, we apply the amply-and-forward cooperative communication to increase the secrecy capacity by incentivizing relay IoT devices. Besides security concerns in IoT network, we seek data traffic alleviation approaches to achieve reliable and energy-efficient data transmission for a group of users in the cellular network. The concept of mobile participation is introduced to assist data offloading from the base station to users in the group by leveraging the mobility of users and the social features among a group of users. Following with that, we deploy device-to-device data offloading within the group to achieve the energy efficiency at the user side while adapting to their increasing traffic demands. In the end, we consider a perpendicular topic - dynamic spectrum access (DSA) - to alleviate the spectrum scarcity issue in cognitive radio network, where the spectrum resource is limited to users. Specifically, we focus on the security concerns and further propose two physical-layer schemes to prevent spectrum misuse in DSA in both additive white Gaussian noise and fading environments
    • …
    corecore