465 research outputs found

    Spectral Efficient and Energy Aware Clustering in Cellular Networks

    Full text link
    The current and envisaged increase of cellular traffic poses new challenges to Mobile Network Operators (MNO), who must densify their Radio Access Networks (RAN) while maintaining low Capital Expenditure and Operational Expenditure to ensure long-term sustainability. In this context, this paper analyses optimal clustering solutions based on Device-to-Device (D2D) communications to mitigate partially or completely the need for MNOs to carry out extremely dense RAN deployments. Specifically, a low complexity algorithm that enables the creation of spectral efficient clusters among users from different cells, denoted as enhanced Clustering Optimization for Resources' Efficiency (eCORE) is presented. Due to the imbalance between uplink and downlink traffic, a complementary algorithm, known as Clustering algorithm for Load Balancing (CaLB), is also proposed to create non-spectral efficient clusters when they result in a capacity increase. Finally, in order to alleviate the energy overconsumption suffered by cluster heads, the Clustering Energy Efficient algorithm (CEEa) is also designed to manage the trade-off between the capacity enhancement and the early battery drain of some users. Results show that the proposed algorithms increase the network capacity and outperform existing solutions, while, at the same time, CEEa is able to handle the cluster heads energy overconsumption

    Up-link performance of the DQRUMA MAC protocol in a realistic indoor environment for W-ATM networks

    Get PDF
    This paper evaluates by simulation the performance of the distributed queuing request update multiple access (DQRUMA) MAC protocol in a realistic indoor environment. This protocol has been simulated in conjunction with a type-II hybrid-ARQ protocol based on punctured R-S codes for the LLC layer. The analysis was carried out for a multicarrier modulation scheme (OFDM) with QPSK modulation on each carrier. The hidden Markov model (HMM) is used for modelling the physical layer of the system. The performance of the protocol in terms of throughput, mean delay, CLR and p.d.f. of the delay is presented. The pseudo-Bayesian algorithm as well as harmonic back-off are applied to calculate the retransmission probability for the backlogged users.Peer ReviewedPostprint (published version

    Scalable RAN Virtualization in Multi-Tenant LTE-A Heterogeneous Networks (Extended version)

    Full text link
    Cellular communications are evolving to facilitate the current and expected increasing needs of Quality of Service (QoS), high data rates and diversity of offered services. Towards this direction, Radio Access Network (RAN) virtualization aims at providing solutions of mapping virtual network elements onto radio resources of the existing physical network. This paper proposes the Resources nEgotiation for NEtwork Virtualization (RENEV) algorithm, suitable for application in Heterogeneous Networks (HetNets) in Long Term Evolution-Advanced (LTE-A) environments, consisting of a macro evolved NodeB (eNB) overlaid with small cells. By exploiting Radio Resource Management (RRM) principles, RENEV achieves slicing and on demand delivery of resources. Leveraging the multi-tenancy approach, radio resources are transferred in terms of physical radio Resource Blocks (RBs) among multiple heterogeneous base stations, interconnected via the X2 interface. The main target is to deal with traffic variations in geographical dimension. All signaling design considerations under the current Third Generation Partnership Project (3GPP) LTE-A architecture are also investigated. Analytical studies and simulation experiments are conducted to evaluate RENEV in terms of network's throughput as well as its additional signaling overhead. Moreover we show that RENEV can be applied independently on top of already proposed schemes for RAN virtualization to improve their performance. The results indicate that significant merits are achieved both from network's and users' perspective as well as that it is a scalable solution for different number of small cells.Comment: 40 pages (including Appendices), Accepted for publication in the IEEE Transactions on Vehicular Technolog

    Weighted proportional fairness and pricing based resource allocation for uplink offloading using IP flow mobility

    Get PDF
    Mobile data offloading has been proposed as a solution for the network congestion problem that is continuously aggravating due to the increase in mobile data demand. However, the majority of the state-of-the-art is focused on the downlink offloading, while the change of mobile user habits, like mobile content creation and uploading, makes uplink offloading a rising issue. In this work we focus on the uplink offloading using IP Flow Mobility (IFOM). IFOM allows a LTE mobile User Equipment (UE) to maintain two concurrent data streams, one through LTE and the other through WiFi access technology, that presents uplink limitations due to the inherent fairness design of IEEE 802.11 DCF by employing the CSMA/CA scheme with a binary exponential backoff algorithm. In this paper, we propose a weighted proportionally fair bandwidth allocation algorithm for the data volume that is being offloaded through WiFi, in conjunction with a pricing-based rate allocation for the rest of the data volume needs of the UEs that are transmitted through the LTE uplink. We aim to improve the energy efficiency of the UEs and to increase the offloaded data volume under the concurrent use of access technologies that IFOM allows. In the weighted proportionally fair WiFi bandwidth allocation, we consider both the different upload data needs of the UEs, along with their LTE spectrum efficiency and propose an access mechanism that improves the use of WiFi access in uplink offloading. In the LTE part, we propose a two-stage pricing-based rate allocation under both linear and exponential pricing approaches, aiming to satisfy all offloading UEs regarding their LTE uplink access. We theoretically analyse the proposed algorithms and evaluate their performance through simulations. We compare their performance with the 802.11 DCF access scheme and with a state-of-the-art access algorithm under different number of offloading UEs and for both linear and exponential pricing-based rate allocation for the LTE uplink. Through the evaluation of energy efficiency, offloading capabilities and throughput performance, we provide an improved uplink access scheme for UEs that operate with IFOM for uplink offloading.Peer ReviewedPreprin

    Misbehavior Detection in the Internet of Things: A Network-Coding-aware Statistical Approach

    Get PDF
    In the Internet of Things (IoT) context, the massive proliferation of wireless devices implies dense networks that require cooperation for the multihop transmission of the sensor data to central units. The altruistic user behavior and the isolation of malicious users are fundamental requirements for the proper operation of any cooperative network. However, the introduction of new communication techniques that improve the cooperative performance (e.g., network coding) hinders the application of traditional schemes on malicious users detection, which are mainly based on packet overhearing. In this paper, we introduce a non-parametric statistical approach, based on the Kruskal-Wallis method, for the detection of user misbehavior in network coding scenarios. The proposed method is shown to effectively handle attacks in the network, even when malicious users adopt a smart probabilistic misbehavior

    Resource allocation techniques for heterogeneous networks under user misbehavior

    Get PDF
    ©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.In this letter we focus on the uplink offloading with IP Flow Mobility (IFOM). With IFOM a User Equipment (UE) is able to maintain concurrently two data streams, one through LTE and the other through WiFi. We consider the existence of malicious UEs that aim to exploit the WiFi bandwidth against their truthful peers, in order to upload less data through the energy demanding LTE uplink and a reputation based method is proposed to combat the selfish operation. The WiFi bandwidth is allocated based on weighted proportional fairness and the LTE rate is defined through an exponential pricing algorithm. We theoretically analyse our approach and evaluate the performance of the malicious and the truthful UEs in terms of energy efficiency and throughput, through simulations. We show that while the malicious UEs present better energy efficiency before being detected, their performance is significantly degraded with the proposed reaction method.Peer ReviewedPostprint (author's final draft

    Energy sharing and trading in multi-operator heterogeneous network deployments

    Get PDF
    © 2020 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.With a view to the expected increased data traffic volume and energy consumption of the fifth generation networks, the use of renewable energy (RE) sources and infrastructure sharing have been embraced as energy and cost-saving technologies. Aiming at reducing cost and grid energy consumption, in the present paper, we study RE exchange (REE) possibilities in late-trend network deployments of energy harvesting (EH) macrocell and small cell base stations (EH-MBSs, EH-SBSs) that use an EH system, an energy storage system, and the smart grid as energy procurement sources. On this basis, we study a two-tier network composed of EH-MBSs that are passively shared among a set of mobile network operators (MNOs), and EH-SBSs that are provided to MNOs by an infrastructure provider (InP). Taking into consideration the infrastructure location and the variety of stakeholders involved in the network deployment, we propose as REE approaches 1) a cooperative RE sharing, based on bankruptcy theory, for the shared EH-MBSs and 2) a non-cooperative, aggregator-assisted RE trading, which uses double auctions to describe the REE acts among the InP provided EH-SBSs managed by different MNOs, after an initial internal REE among the ones managed by a single MNO. Our results display that our proposals outperform baseline approaches, providing a considerable reduction in SG energy utilization and costs, with satisfaction of the participant parties.Peer ReviewedPostprint (author's final draft
    • …
    corecore