1,242 research outputs found

    Integration of Carrier Aggregation and Dual Connectivity for the ns-3 mmWave Module

    Full text link
    Thanks to the wide availability of bandwidth, the millimeter wave (mmWave) frequencies will provide very high data rates to mobile users in next generation 5G cellular networks. However, mmWave links suffer from high isotropic pathloss and blockage from common materials, and are subject to an intermittent channel quality. Therefore, protocols and solutions at different layers in the cellular network and the TCP/IP protocol stack have been proposed and studied. A valuable tool for the end-to-end performance analysis of mmWave cellular networks is the ns-3 mmWave module, which already models in detail the channel, Physical (PHY) and Medium Access Control (MAC) layers, and extends the Long Term Evolution (LTE) stack for the higher layers. In this paper we present an implementation for the ns-3 mmWave module of multi connectivity techniques for 3GPP New Radio (NR) at mmWave frequencies, namely Carrier Aggregation (CA) and Dual Connectivity (DC), and discuss how they can be integrated to increase the functionalities offered by the ns-3 mmWave module.Comment: 9 pages, 7 figures, submitted to the Workshop on ns-3 (WNS3) 201

    Performance Comparison of Dual Connectivity and Hard Handover for LTE-5G Tight Integration

    Full text link
    Communications at frequencies above 10 GHz (the mmWave band) are expected to play a major role for the next generation of cellular networks (5G), because of the potential multi-gigabit, ultra-low latency performance of this technology. mmWave frequencies however suffer from very high isotropic pathloss, which may result in cells with a much smaller coverage area than current LTE macrocells. High directionality techniques will be used to improve signal quality and extend coverage area, along with a high density deployment of mmWave base stations (BS). However, when propagation conditions are hard and it is difficult to provide high quality coverage with mmWave BS, it is necessary to rely on previous generation LTE base stations, which make use of lower frequencies (900 MHz - 3.5 GHz), which are less sensitive to blockage and experience lower pathloss. In order to provide ultra-reliable services to mobile users there is a need for network architectures that tightly and seamlessly integrate the LTE and mmWave Radio Access Technologies. In this paper we will present two possible alternatives for this integration and show how simulation tools can be used to assess and compare their performance.Comment: This paper was accepted for presentation at the ninth EAI SIMUtools 2016 conference, August 22 - 23, 2016, Prague, Czech Republi

    Rate-Distortion Classification for Self-Tuning IoT Networks

    Full text link
    Many future wireless sensor networks and the Internet of Things are expected to follow a software defined paradigm, where protocol parameters and behaviors will be dynamically tuned as a function of the signal statistics. New protocols will be then injected as a software as certain events occur. For instance, new data compressors could be (re)programmed on-the-fly as the monitored signal type or its statistical properties change. We consider a lossy compression scenario, where the application tolerates some distortion of the gathered signal in return for improved energy efficiency. To reap the full benefits of this paradigm, we discuss an automatic sensor profiling approach where the signal class, and in particular the corresponding rate-distortion curve, is automatically assessed using machine learning tools (namely, support vector machines and neural networks). We show that this curve can be reliably estimated on-the-fly through the computation of a small number (from ten to twenty) of statistical features on time windows of a few hundreds samples

    TCP in 5G mmWave Networks: Link Level Retransmissions and MP-TCP

    Full text link
    MmWave communications, one of the cornerstones of future 5G mobile networks, are characterized at the same time by a potential multi-gigabit capacity and by a very dynamic channel, sensitive to blockage, wide fluctuations in the received signal quality, and possibly also sudden link disruption. While the performance of physical and MAC layer schemes that address these issues has been thoroughly investigated in the literature, the complex interactions between mmWave links and transport layer protocols such as TCP are still relatively unexplored. This paper uses the ns-3 mmWave module, with its channel model based on real measurements in New York City, to analyze the performance of the Linux TCP/IP stack (i) with and without link-layer retransmissions, showing that they are fundamental to reach a high TCP throughput on mmWave links and (ii) with Multipath TCP (MP-TCP) over multiple LTE and mmWave links, illustrating which are the throughput-optimal combinations of secondary paths and congestion control algorithms in different conditions.Comment: 6 pages, 11 figures, accepted for presentation at the 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS

    On the Effects of Battery Imperfections in an Energy Harvesting Device

    Full text link
    Energy Harvesting allows the devices in a Wireless Sensor Network to recharge their batteries through environmental energy sources. While in the literature the main focus is on devices with ideal batteries, in reality several inefficiencies have to be considered to correctly design the operating regimes of an Energy Harvesting Device (EHD). In this work we describe how the throughput optimization problem changes under \emph{real battery} constraints in an EHD. In particular, we consider imperfect knowledge of the state of charge of the battery and storage inefficiencies, \emph{i.e.}, part of the harvested energy is wasted in the battery recharging process. We formulate the problem as a Markov Decision Process, basing our model on some realistic observations about transmission, consumption and harvesting power. We find the performance upper bound with a real battery and numerically discuss the novelty introduced by the real battery effects. We show that using the \emph{old} policies obtained without considering the real battery effects is strongly sub-optimal and may even result in zero throughput.Comment: In Proc. IEEE International Conference on Computing, Networking and Communications, pp. 942-948, Feb. 201

    Improved User Tracking in 5G Millimeter Wave Mobile Networks via Refinement Operations

    Full text link
    The millimeter wave (mmWave) frequencies offer the availability of huge bandwidths to provide unprecedented data rates to next-generation cellular mobile terminals. However, directional mmWave links are highly susceptible to rapid channel variations and suffer from severe isotropic pathloss. To face these impairments, this paper addresses the issue of tracking the channel quality of a moving user, an essential procedure for rate prediction, efficient handover and periodic monitoring and adaptation of the user's transmission configuration. The performance of an innovative tracking scheme, in which periodic refinements of the optimal steering direction are alternated to sparser refresh events, are analyzed in terms of both achievable data rate and energy consumption, and compared to those of a state-of-the-art approach. We aim at understanding in which circumstances the proposed scheme is a valid option to provide a robust and efficient mobility management solution. We show that our procedure is particularly well suited to highly variant and unstable mmWave environments.Comment: Accepted for publication to the 16th IEEE Annual Mediterranean Ad Hoc Networking Workshop (MED-HOC-NET), Jun. 201

    Energy Harvesting Communication System with SOC-Dependent Energy Storage Losses

    Full text link
    The popularity of Energy Harvesting Devices (EHDs) has grown in the past few years, thanks to their capability of prolonging the network lifetime. In reality, EHDs are affected by several inefficiencies, e.g., energy leakage, battery degradation or storage losses. In this work we consider an energy harvesting transmitter with storage inefficiencies. In particular, we assume that when new energy has to be stored in the battery, part of this is wasted and the losses depend upon the current state of charge of the device. This is a practical realistic assumption, e.g., for a capacitor, that changes the structure of the optimal transmission policy. We analyze the throughput maximization problem with a dynamic programming approach and prove that, given the battery status and the channel gain, the optimal transmission policy is deterministic. We derive numerical results for the energy losses in a capacitor and show the presence of a \emph{loop effect} that degrades the system performance if the optimal policy is not considered.Comment: In Proc. IEEE Twelfth Int. Symposium on Wireless Communication Systems (ISWCS), pp. 406-410, Aug. 201

    Access Policy Design for Cognitive Secondary Users under a Primary Type-I HARQ Process

    Full text link
    In this paper, an underlay cognitive radio network that consists of an arbitrary number of secondary users (SU) is considered, in which the primary user (PU) employs Type-I Hybrid Automatic Repeat Request (HARQ). Exploiting the redundancy in PU retransmissions, each SU receiver applies forward interference cancelation to remove a successfully decoded PU message in the subsequent PU retransmissions. The knowledge of the PU message state at the SU receivers and the ACK/NACK message from the PU receiver are sent back to the transmitters. With this approach and using a Constrained Markov Decision Process (CMDP) model and Constrained Multi-agent MDP (CMMDP), centralized and decentralized optimum access policies for SUs are proposed to maximize their average sum throughput under a PU throughput constraint. In the decentralized case, the channel access decision of each SU is unknown to the other SU. Numerical results demonstrate the benefits of the proposed policies in terms of sum throughput of SUs. The results also reveal that the centralized access policy design outperforms the decentralized design especially when the PU can tolerate a low average long term throughput. Finally, the difficulties in decentralized access policy design with partial state information are discussed
    • 

    corecore