Current Issue : October - December Volume : 2017 Issue Number : 4 Articles : 6 Articles
To meet the requirements of 5G mobile networks, several radio access technologies, such as millimeter wave\ncommunications and massive MIMO, are being proposed. In addition, cloud radio access network (C-RAN) architectures are\nconsidered instrumental to fully exploit the capabilities of future 5G RANs. However, RAN centralization imposes stringent\nrequirements on the transport network, which today are addressed with purpose-specific and expensive fronthaul links. As\nthe demands on future access networks rise, so will the challenges in the fronthaul and backhaul segments. It is hence of\nfundamental importance to consider the design of transport networks alongside the definition of future access\ntechnologies to avoid the transport becoming a bottleneck. Therefore, we analyze in this work the impact\nthat future RAN technologies will have on the transport network and on the design of the next generation\nfronthaul interface. To understand the especially important impact of varying user traffic, we utilize measurements from a\nreal-world 4G network and, taking target 5G performance figures into account, extrapolate its statistics to a 5G scenario.\nWith this, we derive both per-cell and aggregated data rate requirements for 5G transport networks. In addition, we show\nthat the effect of statistical multiplexing is an important factor to reduce transport network capacity requirements and\ncosts. Based on our investigations, we provide guidelines for the development of the 5G transport network architecture....
Machine-to-machine (M2M) communication is considered as one of the key enablers for providing of advanced services and\napplications. SinceM2Mfeatures a massive number of user equipment (UE) pieces, one of the key issues is the radio access network\n(RAN) overload problem formassive connections inM2M communications. In order to improve the number of successful accesses\n(i.e., theM2MUEpieces that successfully transmit data packets) forM2Mcommunications in the current long termevolution (LTE)\nsystems, we propose a new hybrid protocol for random access (RA) and data transmission based on two-phase access class barring\n(ACB) mechanisms. Furthermore, the joint optimization algorithmof the two-phaseACBfactors and the number of resource blocks\n(RBs) allocated for RA and data transmission is designed to maximize the number of successful accesses. Finally, simulation results\ndemonstrate that our scheme can significantly improve the number of successful accesses and achieve performance improvement\nin reducing the grant time....
Multiple-input and multiple-output (MIMO) technique can significantly improve\ntransmission reliability and bandwidth efficiency in wireless networks.\nHowever, many upper layer aspects of MIMO links, especially in mobile networks\nwith heterogeneous antennas and strong interference environments,\nneed further investigation. In this paper, we study its impact on medium\naccess and network capacity. Since MIMO links can enhance physical layer\ncapacity and co-channel interference suppression that affects network access\nscheduling directly, we develop a capacity-optimized access scheduling control\n(COASC) scheme for mobile ad hoc networks (MANETs) with MIMO\nlinks. We formulate the distributed scheduling taking the key of optimization\ninto design to improve the network capacity and transmission reliability. Simulation\nresults are presented to show the effectiveness of the proposed\nscheme....
Mobile Ad Hoc Networks (MANETs) are composed of a large number of devices that act as dynamic nodes with limited processing\ncapabilities that can share data among each other. Energy efficient security is the major issue in MANETs where data encryption\nand decryption operations should be optimized to consume less energy. In this regard, we have focused on network coding which\nis a lightweight mechanism that can also be used for data confidentiality. In this paper, we have further reduced the cost of network\ncoding mechanism by reducing the size of data used for permutation. The basic idea is that source permutes only global encoding\nvectors (GEVs) without permuting the whole message symbols which significantly reduces the complexity and transmission cost\nover the network.We have also proposed an algorithm for key generation and randompermutation confusion key calculation. The\nproposed scheme achieves better performance in throughput, encryption time, and energy consumption as compared to previous\nschemes....
Mobile communication through 5G technology is the key objective of this\nwork. Existing research works in mobile communication through 5G technology\nin world submitted a great necessary development towards 5G technology\nin different work approaches including hardware and software. 4G\ntechnology includes several standards under a common umbrella, similar to\nprevious generations of communication technologies. Actually 4G is good for\nnow, however if look at it in five or ten years, 4G will obviously not be able to\nmeet requirements for new applications coming up in the next few years.\nWith 5G will increase the data rate, reduce the end-to-end latency, and improve\ncoverage. These properties are particularly important for many applications\nrelated to IoT and D2D, which they are recognized as ones of the\ntechnology components of the evolving 5G architecture. The major contribution\nof this paper is the key provisions of mobile communication through 5G\n(Fifth Generation) technology of which is seen as consumer oriented. In 5G\ntechnology and mobile consumer has given top priority over others. 5G technology\nis to make use of mobile phones within very high bandwidth. The\nconsumer never experienced the utmost valued technology as 5G.The 5G\ntechnologies comprise all types of sophisticated features which make 5G\ntechnology most governing technology in the vicinity of future....
With the ever-growing number of mobile devices, there is an explosive expansion in mobile\ndata services. This represents a challenge for the traditional cellular network architecture to cope\nwith the massive wireless traffic generated by mobile media applications. To meet this challenge,\nresearch is currently focused on the introduction of a small cell base station (BS) due to its low\ntransmit power consumption and flexibility of deployment. However, due to a complex deployment\nenvironment and low transmit power of small cell BSs, the coverage boundary of small cell BSs will\nnot have a traditional regular shape. Therefore, in this paper, we discuss the coverage boundary\nof an ultra-dense small cell network and give its main features: aeolotropy of path loss fading and\nfractal coverage boundary. Simple performance analysis is given, including coverage probability and\ntransmission rate, etc., based on stochastic geometry theory and fractal theory. Finally, we present an\napplication scene and discuss challenges in the ultra-dense small cell network....
Loading....