1,893 research outputs found

    Energy and throughput efficient strategies for heterogeneous future communication networks

    Get PDF
    As a result of the proliferation of wireless-enabled user equipment and data-hungry applications, mobile data traffic has exponentially increased in recent years.This in-crease has not only forced mobile networks to compete on the scarce wireless spectrum but also to intensify their power consumption to serve an ever-increasing number of user devices. The Heterogeneous Network (HetNet) concept, where mixed types of low-power base stations coexist with large macro base stations, has emerged as a potential solution to address power consumption and spectrum scarcity challenges. However, as a consequence of their inflexible, constrained, and hardware-based configurations, HetNets have major limitations in adapting to fluctuating traffic patterns. Moreover, for large mobile networks, the number of low-power base stations (BSs) may increase dramatically leading to sever power consumption. This can easily overwhelm the benefits of the HetNet concept. This thesis exploits the adaptive nature of Software-defined Radio (SDR) technology to design novel and optimal communication strategies. These strategies have been designed to leverage the spectrum-based cell zooming technique, the long-term evolution licensed assisted access (LTE-LAA) concept, and green energy, in order to introduce a novel communication framework that endeavors to minimize overall network on-grid power consumption and to maximize aggregated throughput, which brings significant benefits for both network operators and their customers. The proposed strategies take into consideration user data demands, BS loads, BS power consumption, and available spectrum to model the research questions as optimization problems. In addition, this thesis leverages the opportunistic nature of the cognitive radio (CR) technique and the adaptive nature of the SDR to introduce a CR-based communication strategy. This proposed CR-based strategy alleviates the power consumption of the CR technique and enhances its security measures according to the confidentiality level of the data being sent. Furthermore, the introduced strategy takes into account user-related factors, such as user battery levels and user data types, and network-related factors, such as the number of unutilized bands and vulnerability level, and then models the research question as a constrained optimization problem. Considering the time complexity of the optimum solutions for the above-mentioned strategies, heuristic solutions were proposed and examined against existing solutions. The obtained results show that the proposed strategies can save energy consumption up to 18%, increase user throughput up to 23%, and achieve better spectrum utilization. Therefore, the proposed strategies offer substantial benefits for both network operators and users

    Workload allocation in mobile edge computing empowered internet of things

    Get PDF
    In the past few years, a tremendous number of smart devices and objects, such as smart phones, wearable devices, industrial and utility components, are equipped with sensors to sense the real-time physical information from the environment. Hence, Internet of Things (IoT) is introduced, where various smart devices are connected with each other via the internet and empowered with data analytics. Owing to the high volume and fast velocity of data streams generated by IoT devices, the cloud that can provision flexible and efficient computing resources is employed as a smart brain to process and store the big data generated from IoT devices. However, since the remote cloud is far from IoT users which send application requests and await the results generated by the data processing in the remote cloud, the response time of the requests may be too long, especially unbearable for delay sensitive IoT applications. Therefore, edge computing resources (e.g., cloudlets and fog nodes) which are close to IoT devices and IoT users can be employed to alleviate the traffic load in the core network and minimize the response time for IoT users. In edge computing, the communications latency critically affects the response time of IoT user requests. Owing to the dynamic distribution of IoT users (i.e., UEs), drone base station (DBS), which can be flexibly deployed for hotspot areas, can potentially improve the wireless latency of IoT users by mitigating the heavy traffic loads of macro BSs. Drone-based communications poses two major challenges: 1) the DBS should be deployed in suitable areas with heavy traffic demands to serve more UEs; 2) the traffic loads in the network should be allocated among macro BSs and DBSs to avoid instigating traffic congestions. Therefore, a TrAffic Load baLancing (TALL) scheme in such drone-assisted fog network is proposed to minimize the wireless latency of IoT users. In the scheme, the problem is decomposed into two sub-problems, two algorithms are designed to optimize the DBS placement and user association, respectively. Extensive simulations have been set up to validate the performance of the proposed scheme. Meanwhile, various IoT applications can be run in cloudlets to reduce the response time between IoT users (e.g., user equipments in mobile networks) and cloudlets. Considering the spatial and temporal dynamics of each application\u27s workloads among cloudlets, the workload allocation among cloudlets for each IoT application affects the response time of the application\u27s requests. To solve this problem, an Application awaRE workload Allocation (AREA) scheme for edge computing based IoT is designed to minimize the response time of IoT application requests by determining the destination cloudlets for each IoT user\u27s different types of requests and the amount of computing resources allocated for each application in each cloudlet. In this scheme, both the network delay and computing delay are taken into account, i.e., IoT users\u27 requests are more likely assigned to closer and lightly loaded cloudlets. The performance of the proposed scheme has been validated by extensive simulations. In addition, the latency of data flows in IoT devices consist of both the communications latency and computing latency. When some BSs and fog nodes are lightly loaded, other overloaded BSs and fog nodes may incur congestion. Thus, a workload balancing scheme in a fog network is proposed to minimize the latency of IoT data in the communications and processing procedures by associating IoT devices to suitable BSs. Furthermore, the convergence and the optimality of the proposed workload balancing scheme has been proved. Through extensive simulations, the performance of the proposed load balancing scheme is validated

    User Association in 5G Networks: A Survey and an Outlook

    Get PDF
    26 pages; accepted to appear in IEEE Communications Surveys and Tutorial

    A secure and energy-aware approach for cognitive radio communications

    Get PDF
    The cognitive radio (CR) technique has revealed a novel way of utilizing the precious radiospectrum via allowing unlicensed users to opportunistically access unutilized licensed bands. Using sucha technique enables agile and flexible access to the radio spectrum and can resolve the spectrum-scarcityproblem and maximize spectrum efficiency. However, two major impediments have been limiting thewidespread adoption of cognitive radio technology. The software-defined radio technology, which is theenabling technology for the CR technique, is power-hungry and this raises a major concern for battery-constrained devices such as smart phones and laptops. Secondly, the opportunistic and open nature ofthe CR can lead to major security concerns about the data being sent and how safe it is. In this paper,we introduce an energy-and-security-aware CR-based communication approach that alleviates the powerconsumption of the CR technique and enhances its security measures according to the confidentialitylevel of the data being sent. Furthermore, the proposed approach takes into account user-related factors,such as the user’s battery level and user’s data type, and network-related factors, such as the number ofunutilized bands and vulnerability level and then models the research question as a constrained optimizationproblem. Considering the time complexity of the optimum solution, we also propose a heuristic solution.We examine the proposed solution against existing solutions, and our obtained results show that theproposed approach can save energy consumption up to 18%, increase user throughput up to 20%, andachieve better spectrum utilization, up to 98%. Our proposed admission approach has the potential toopen a new research direction towards safer and greener cognitive radio techniques

    An Optimized Multi-Layer Resource Management in Mobile Edge Computing Networks: A Joint Computation Offloading and Caching Solution

    Full text link
    Nowadays, data caching is being used as a high-speed data storage layer in mobile edge computing networks employing flow control methodologies at an exponential rate. This study shows how to discover the best architecture for backhaul networks with caching capability using a distributed offloading technique. This article used a continuous power flow analysis to achieve the optimum load constraints, wherein the power of macro base stations with various caching capacities is supplied by either an intelligent grid network or renewable energy systems. This work proposes ubiquitous connectivity between users at the cell edge and offloading the macro cells so as to provide features the macro cell itself cannot cope with, such as extreme changes in the required user data rate and energy efficiency. The offloading framework is then reformed into a neural weighted framework that considers convergence and Lyapunov instability requirements of mobile-edge computing under Karush Kuhn Tucker optimization restrictions in order to get accurate solutions. The cell-layer performance is analyzed in the boundary and in the center point of the cells. The analytical and simulation results show that the suggested method outperforms other energy-saving techniques. Also, compared to other solutions studied in the literature, the proposed approach shows a two to three times increase in both the throughput of the cell edge users and the aggregate throughput per cluster
    • …
    corecore