• 제목/요약/키워드: Next generation networks

검색결과 463건 처리시간 0.026초

Low-Complexity Distributed Algorithms for Uplink CoMP in Heterogeneous LTE Networks

  • Annavajjala, Ramesh
    • Journal of Communications and Networks
    • /
    • 제18권2호
    • /
    • pp.150-161
    • /
    • 2016
  • Coordinated multi-point transmission (CoMP) techniques are being touted as enabling technologies for interference mitigation in next generation heterogeneous wireless networks (HetNets). In this paper, we present a comparative performance study of uplink (UL) CoMP algorithms for the 3GPP LTE HetNets. Focusing on a distributed and functionally-split architecture, we consider six distinct UL-CoMP algorithms: 1. Joint reception in the frequency-domain (JRFD) 2. Two-stage equalization (TSEQ) 3. Log-likelihood ratio exchange (LLR-E) 4. Symmetric TSEQ (S-TSEQ) 5. Transport block selection diversity (TBSD) 6. Coordinated scheduling with adaptive interference mitigation (CS-AIM) where JRFD, TSEQ, S-TSEQ, TBSD and CS-AIM are our main contributions in this paper, and quantify their relative performances via the post-processing signal-to-interference-plus-noise ratio distributions.We also compare the CoMP-specific front-haul rate requirements for all the schemes considered in this paper. Our results indicate that, with a linear minimum mean-square error receiver, the JRFD and TSEQ have identical performances, whereas S-TSEQ relaxes the front-haul latency requirements while approaching the performance of TSEQ. Furthermore, in a HetNet environment, we find that CS-AIM provides an attractive alternative to TBSD and LLR-E with a significantly reduced CoMP-specific front-haul rate requirement.

ATM 망에서 트래픽 다중화 정보에 의한 적응적 UPC 알고리즘에 관한 연구 (A Study on an Adaptive UPC Algorithm Based on Traffic Multiplexing Information in ATM Networks)

  • 김영철;변재영;서현승
    • 한국정보처리학회논문지
    • /
    • 제6권10호
    • /
    • pp.2779-2789
    • /
    • 1999
  • In this paper, we propose a new neural Buffered Leaky Bucket algorithm for preventing the degradation of network performance caused by congestion and dealing with the traffic congestion in ATM networks. We networks. We justify the validity of the suggested method through performance comparison in aspects of cell loss rate and mean transfer delay under a variety of traffic conditions requiring the different QoS(Quality of Service). also, the cell scheduling algorithms such as DWRR and DWEDF used for multiplexing the incoming traffics are induced to get the delay time of the traffics fairly. The network congestion information from cell scheduler is used to control the predicted traffic loss rate of Neural Leaky Bucket, and token generation rate is changed by the predicted values. The prediction of traffic loss rate by neural networks can effectively reduce the cell loss rate and the cell transfer delay of next incoming cells and be applied to other traffic control systems. Computer simulation results performed for traffic prediction show that QoSs of the various kinds of traffics are increased.

  • PDF

Content-Aware D2D Caching for Reducing Visiting Latency in Virtualized Cellular Networks

  • Sun, Guolin;Al-Ward, Hisham;Boateng, Gordon Owusu;Jiang, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.514-535
    • /
    • 2019
  • Information-centric networks operate under the assumption that all network components have built-in caching capabilities. Integrating the caching strategies of information centric networking (ICN) with wireless virtualization improves the gain of virtual infrastructure content caching. In this paper, we propose a framework for software-defined information centric virtualized wireless device-to-device (D2D) networks. Enabling D2D communications in virtualized ICN increases the spectral efficiency due to reuse and proximity gains while the software-defined network (SDN) as a platform also simplifies the computational overhead. In this framework, we propose a joint virtual resource and cache allocation solution for latency-sensitive applications in the next-generation cellular networks. As the formulated problem is NP-hard, we design low-complexity heuristic algorithms which are intuitive and efficient. In our proposed framework, different services can share a pool of infrastructure items. We evaluate our proposed framework and algorithm through extensive simulations. The results demonstrate significant improvements in terms of visiting latency, end user QoE, InP resource utilization and MVNO utility gain.

A D2D communication architecture under full control using SDN

  • Ngo, Thanh-Hai;Kim, Younghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권8호
    • /
    • pp.3435-3454
    • /
    • 2016
  • Device-to-device (D2D) communication is a potential solution to the incessant increase in data traffic on cellular networks. The greatest problem is how to control the interference between D2D users and cellular mobile users, and between D2D users themselves. This paper proposes a solution for this issue by putting the full control privilege in cellular network using the software-defined networking (SDN) concept. A software virtual switch called Open vSwitch and several components are integrated into mobile devices for data forwarding and radio resource mapping, whereas the control functions are executed in the cellular network via a SDN controller. This allows the network to assign radio resources for D2D communication directly, thus reducing interference. This solution also brings out many benefits, including resource efficiency, energy saving, topology flexibility, etc. The advantages and disadvantages of this architecture are analyzed by both a mathematical method and a simple implementation. The result shows that implementation of this solution in the next generation of cellular networks is feasible.

PKI 방식의 차세대 이동통신 망에 적용 가능한 인증서 검증 절차 설계 (Design of Validation Procedure for Certification for PKI Based Next Generation Mobile Networks)

  • 정종민;이구연
    • 산업기술연구
    • /
    • 제22권A호
    • /
    • pp.95-100
    • /
    • 2002
  • When the wireless PKI is applied to 3G/4G mobile network which requires mutual authentication among all entities, the wired PKI procedure is not feasible for validating visited network's certifications because of the wireless environmental limitations. Also, if we depend on WAP based PKI, we cannot support confidence about certification validation since the information offered from visited network is not authenticated. Therefore, in this paper we consider various and unique characteristics of mobile environment for certification validation at 3G/4G mobile networks based on wireless PKI and then propose two certification validation procedures.

  • PDF

Security and Privacy in Ubiquitous Sensor Networks

  • Perez, Alfredo J.;Zeadally, Sherali;Jabeur, Nafaa
    • Journal of Information Processing Systems
    • /
    • 제14권2호
    • /
    • pp.286-308
    • /
    • 2018
  • The availability of powerful and sensor-enabled mobile and Internet-connected devices have enabled the advent of the ubiquitous sensor network (USN) paradigm. USN provides various types of solutions to the general public in multiple sectors, including environmental monitoring, entertainment, transportation, security, and healthcare. Here, we explore and compare the features of wireless sensor networks and USN. Based on our extensive study, we classify the security- and privacy-related challenges of USNs. We identify and discuss solutions available to address these challenges. Finally, we briefly discuss open challenges for designing more secure and privacy-preserving approaches in next-generation USNs.

대면적 서셉터의 온도 균일도 검증 알고리즘 (A Verification Algorithm for Temperature Uniformity of the Large-area Susceptor)

  • 양학진;김성근;조중근
    • 한국정밀공학회지
    • /
    • 제31권10호
    • /
    • pp.947-954
    • /
    • 2014
  • Performance of next generation susceptor is affected by temperature uniformity in order to produce reliably large-sized flat panel display. In this paper, we propose a learning estimation model of susceptor to predict and appropriately assess the temperature uniformity. Artificial Neural Networks (ANNs) and Support Vector Machines (SVMs) are compared for the suitability of the learning estimation model. It is proved that SVMs provides more suitable verification of uniformity modeling than ANNs during each stage of temperature variations. Practical procedure for uniformity estimation of susceptor temperature was developed using the SVMs prediction algorithm.

An Efficient Approach for Lightpath Restoration in WDM Networks

  • Kabir, S.M. Humayun;Pham, Van Su;Yoon, Gi-Wan
    • Journal of information and communication convergence engineering
    • /
    • 제6권1호
    • /
    • pp.15-18
    • /
    • 2008
  • WDM is an incredibly promising technique in which multiple channels are operated along a single fiber, providing the facilities of terabit per second bandwidth. Thus, the survivability of WDM networks becomes critical for the success of the next generation internet architecture. Despite the fact that the path-based proactive restoration scheme guarantees 100% restoration as it computes a backup light path while the primary light path is being set up, this method results in additional capacity consumption. In this paper, an ideal technique is proposed that modifies the active multi-backup paths method and results in a better restoration scheme. Based on a theoretical analysis, a new method is shown to reduce the number of hopes as well as the restoration time.

다중 네트워크 환경에서 효율적 전송을 위한 Load Reporting and Balancing 기법 (Load Balancing and Reporting for Efficient Transmit over Heterogeneous Network Environments)

  • 손혁민;박수영;이상훈
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2008년도 하계종합학술대회
    • /
    • pp.249-250
    • /
    • 2008
  • In the field of mobile communications, load balancing between 3GPP LTE and other networks is expected to be an important topic from the perspective of current technical development. The load balancing technique includes the definition of functions and structures needed to incooperate 3G LTE E-Node B and base-stations designed for heterogeneous networks. The major goal attained from this paper is to ensure an algorithm for the mechanism of load balancing and to achieve a technical leading for the next generation mobile network.

  • PDF

차세대 인터넷망에서 이동 호스트들을 위한 멀티캐스트 라우팅 기법 (A Multicast Routing Scheme for Mobile Hosts in Next Generation Internet Networks)

  • 양승제;박성한
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2001년도 하계종합학술대회 논문집(1)
    • /
    • pp.137-140
    • /
    • 2001
  • In this paper, we propose a multicast routing scheme for an efficient and reliable support of multicast service to mobile hosts in IPv6 based networks. The purpose of this paper is to develop an algorithm to reduce both the number of multicast tree reconstruction and the multicast service disrupt time using the RSVP scheme. The proposed multicast routing scheme is a hybrid method using the advantages of the hi-directional tunneling and the remote subscription proposed by the IETF Mobile IP working group. The proposed scheme satisfies the maximum tolerable transfer delay time and supports the maximum tunneling service. The simulation results show that the proposed scheme has better performance in the number of multicast tree reconstruction and the time of multicast service disrupt than the previous schemes does.

  • PDF