21 |
Controle de potÃncia e estratÃgias de eficiÃncia energÃtica para comunicaÃÃes D2D subjacentes redes celulares / Power control and energy efficiency strategies for D2D communications underlying cellular networksYuri Victor Lima de Melo 14 July 2015 (has links)
Ericsson Brasil / Conselho Nacional de Desenvolvimento CientÃfico e TecnolÃgico / Em um mundo onde as pessoas contam com
smartphone, smartwatch, tablet e outros
dispositivos para mantÃ-las conectadas onde quer que vÃo, t
odos esperam que seus
aplicativos sejam executados sem problemas, tais como cham
adas abandonadas,
download
lento e vÃdeos com saltos.
Neste contexto, comunicaÃÃo dispositivo-a-dispositivo (
do inglÃs, Device-to-Device (D2D))
constitui uma tecnologia promissora, pois à um tipo de comun
icaÃÃo direta e utiliza baixa
potÃncia entre dispositivos prÃximos, permitindo-se desv
iar o trÃfego da rede mÃvel, aumentar
a eficiÃncia espectral e de potÃncia. Do ponto de vista do assi
nante, D2D significa usar
aplicaÃÃo sem problemas e aumentar o tempo de vida da bateria
do celular.
No entanto, a fim de realizar os ganhos potenciais das comunic
aÃÃes D2D, algumas
questÃes-chave devem ser abordadas, pois as comunicaÃÃes D
2D podem aumentar a
interferÃncia co-canal e comprometer a qualidade do enlace
das comunicaÃÃes celulares.
Esta dissertaÃÃo foca em tÃcnicas de Gerenciamento de Recur
sos de RÃdio (do inglÃs, Radio
Resource Management (RRM)) para mitigar a interferÃncia co
-canal para comunicaÃÃes D2D
que se baseiam na EvoluÃÃo de Longo Prazo (do inglÃs, Long Ter
m Evolution (LTE)), visando
a reduÃÃo da interferÃncia intra- e inter-celular e na melho
ria da eficiÃncia energÃtica. Os
principais esquemas de Controle de PotÃncia (do inglÃs, Pow
er Control (PC)) (e.g. OLPC,CLPC
e SDPC) e um esquema hÃbrido (CLSD) sÃo calibrados e utilizad
os no cenÃrio macro ou micro
multicelular, usando diferentes cargas e InformaÃÃo do Est
ado do Canal (do inglÃs, Channel
State Information (CSI)) perfeita ou imperfeita. AlÃm diss
o, o impacto da inclinaÃÃo da antena
(
downtilt
) à analisado, que à usada para ajustar o raio de cobertura de u
ma Evolved Node
B (eNB) e reduzir a interferÃncia co-canal, aumentando o iso
lamento de cÃlulas.
Os resultados numÃricos indicam que os regimes de controle d
e potÃncia e inclinaÃÃo
da antena, devidamente calibrados, podem fornecer ganhos p
ara a comunicaÃÃo celular e
D2D. Em outras palavras, a tecnologia D2D pode ser utilizada
para aumentar ainda mais
a eficiÃncia de espectro e a eficiÃncia energÃtica se algoritm
os de RRM forem utilizados
adequadamente / In a world where people count on their smartphone, smartwatch, tablet and other devices to keep them connected wherever they go, they expect its application to run without problems, such as dropped calls, slow download and choppy videos.
In this context, Device-to-Device (D2D) communication represents a promising technology, because it is a direct and low-power communication between devices close, allowing to offload the data transport network, increase spectral and power efficiency. From the subscriber point of view, D2D means to use applications without problem and increase battery life. However, in order to realize the potential gains of D2D communications, some key issues must be tackled, because D2D communications may increase the co-channel interference and compromise the link quality of cellular communications.
This masterâs thesis focuses on Radio Resource Management (RRM) techniques, especially Power Control (PC) schemes, to mitigate the co-channel interference for D2D communications
underlaying a Long Term Evolution (LTE) network, aiming at the reduction of the intra- and inter- cell interference and at the improvement of energy efficiency. The main PC schemes (e.g. OLPC, CLPC and SDPC) and a hybrid scheme (CLSD) are calibrated and used in macro- or micro- multicell scenario, using different loads and imperfect Channel State Information (CSI).
In addition, the impact of downtilt is analyzed, which is used to adjust the coverage radius of an Evolved Node B (eNB) and reduce co-channel interference by increasing cell isolation.
The numerical results indicate that PC schemes and downtilt, duly calibrated, can provide gains to cellular and D2D communications. In other words, D2D technology can be used to further increase the spectral and energy efficiency if RRM algorithms are used suitably.
|
22 |
Integrated cellular and device-to-device networksLin, Xingqin 10 February 2015 (has links)
Device-to-device (D2D) networking enables direct discovery and communication between cellular subscribers that are in proximity, thus bypassing the base stations (BSs). In principle, exploiting direct communication between nearby mobile devices will improve spectrum utilization, overall throughput, and energy consumption, while enabling new peer-to-peer and location-based applications and services. D2D-enabled broadband communication technology is also required by public safety networks that must function when cellular networks are not available. Integrating D2D into cellular networks, however, poses many challenges and risks to the long-standing cellular architecture, which is centered around the BSs. This dissertation identifies outstanding technical challenges in D2D-enabled cellular networks and addresses them with novel models and fundamental analysis. First, this dissertation develops a baseline hybrid network model consisting of both ad hoc nodes and cellular infrastructure. This model uses Poisson point processes to model the random and unpredictable locations of mobile users. It also captures key features of multicast D2D including multicast receiver heterogeneity and retransmissions while being tractable for analytical purpose. Several important multicast D2D metrics including coverage probability, mean number of covered receivers per multicast session, and multicast throughput are analytically characterized under the proposed model. Second, D2D mode selection which means that a potential D2D pair can switch between direct and cellular modes is incorporated into the hybrid network model. The extended model is applied to study spectrum sharing between cellular and D2D communications. Two spectrum sharing models, overlay and underlay, are investigated under a unified analytical framework. Analytical rate expressions are derived and applied to optimize the design of spectrum sharing. It is found that, from an overall mean-rate perspective, both overlay and underlay bring performance improvements (vs. pure cellular). Third, the single-antenna hybrid network model is extended to multi-antenna transmission to study the interplay between massive MIMO (multi-input multiple-output) and underlaid D2D networking. The spectral efficiency of such multi-antenna hybrid networks is investigated under both perfect and imperfect channel state information (CSI) assumptions. Compared to the case without D2D, there is a loss in cellular spectral efficiency due to D2D underlay. With perfect CSI, the loss can be completely overcome if the number of canceled D2D interfering signals is scaled appropriately. With imperfect CSI, in addition to pilot contamination, a new asymptotic underlay contamination effect arises. Finally, motivated by the fact that transmissions in D2D discovery are usually not or imperfectly synchronized, this dissertation studies the effect of asynchronous multicarrier transmission and proposes a tractable signal-to-interference-plus-noise ratio (SINR) model. The proposed model is used to analytically characterize system-level performance of asynchronous wireless networks. The loss from lack of synchronization is quantified, and several solutions are proposed and compared to mitigate the loss. / text
|
23 |
Supporting device-to-device search and sharing of hyper-localized dataMichel, Jonas Reinhardt 08 September 2015 (has links)
Supporting emerging mobile applications in densely populated environments requires connecting mobile users and their devices with the surrounding digital landscape. Specifically, the volume of digitally-available data in such computing spaces presents an imminent need for expressive mechanisms that enable humans and applications to share and search for relevant information within their digitally accessible physical surroundings. Device-to-device communications will play a critical role in facilitating transparent access to proximate digital resources. A wide variety of approaches exist that support device-to-device dissemination and query-driven data access. Very few, however, capitalize on the contextual history of the shared data itself to distribute additional data or to guide queries. This dissertation presents Gander, an application substrate and mobile middleware designed to ease the burden associated with creating applications that require support for sharing and searching of hyper-localized data in situ. Gander employs a novel trajectory-driven model of spatiotemporal provenance that enriches shared data with its contextual history -- annotations that capture data's geospatial and causal history across a lifetime of device-to-device propagation. We demonstrate the value of spatiotemporal data provenance as both a tool for improving ad hoc routing performance and for driving complex application behavior. This dissertation discusses the design and implementation of Gander's middleware model, which abstracts away tedious implementation details by enabling developers to write high-level rules that govern when, where, and how data is distributed and to execute expressive queries across proximate digital resources. We evaluate Gander within several simulated large-scale environments and one real-world deployment on the UT Austin campus. The goal of this research is to provide formal constructs realized within a software framework that ease the software engineering challenges encountered during the design and deployment of several applications in emerging mobile environments. / text
|
24 |
Mecanismos de Identificação de Proximidade e Alocação de Recursos para uma Comunicação D2D Energeticamente Eficiente em Redes LTE-ASANTOS, Marcos Graciano 11 August 2014 (has links)
Submitted by Lucelia Lucena (lucelia.lucena@ufpe.br) on 2015-03-09T19:50:50Z
No. of bitstreams: 2
DISSERTAÇÃO Marcos Graciano Santos.pdf: 3653832 bytes, checksum: 63b7958428e143779e52059edac458d4 (MD5)
license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5) / Made available in DSpace on 2015-03-09T19:50:50Z (GMT). No. of bitstreams: 2
DISSERTAÇÃO Marcos Graciano Santos.pdf: 3653832 bytes, checksum: 63b7958428e143779e52059edac458d4 (MD5)
license_rdf: 1232 bytes, checksum: 66e71c371cc565284e70f40736c94386 (MD5)
Previous issue date: 2014-08-11 / Atualmente, mais de 200 milhões de usuários utilizam as redes 3G/LTE (Long Term Evolution). Com este aumento crescente de usuários com acesso sem fio, muitas pesquisas se concentram no esforço de desenvolvimento de soluções que permitam atender às demandas de redes com alta disponibilidade e altas taxas de transmissão sem considerar, em geral, as limitações de bateria dos dispositivos. Como requisito do LTE Advanced (especificações para a Quarta Geração de comunicações móveis) incluem-se os Serviços de Proximidade, comunicação denominada de dispositivo a dispositivo (D2D, do inglês: device-to-device) para atender ao desenvolvimento de novas demandas de serviços, como jogos e vídeos on-line ou transferência de conteúdos, aplicações que, a cada dia, requerem maiores consumos de energia. Neste trabalho, realizamos medições que avaliam o consumo da comunicação dispositivo-estação base e propomos primeiramente um algoritmo de identificação de pares de dispositivos e definição de limiares de referência, diferentemente de outros trabalhos, com base nas características de consumo dos dispositivos, que viabilize comunicação direta D2D energeticamente mais eficiente que a comunicação convencional via estação rádio base. Em seguida, para cenários de grande aglomeração de pessoas, uma alternativa de serviço de disponibilização de conteúdos ou transferência de arquivos através de um novo padrão de alocação de recursos, utilizando o modo duplex por divisão no tempo (TDD – Time Duplex Division). Foram considerados cinco modelos de propagação distintos para comparação do desempenho, tomando como base uma situação real num parque do Recife considerando a transmissão de um vídeo em alta definição. Por fim, tratamos a questão da segurança com uma criptografia específica entre os dispositivos próximos. Os resultados são avaliados via simulação utilizando-se o Matlab, demonstrando a eficácia da solução com reduções de até 43% no consumo de energia da bateria do dispositivo.
|
25 |
Dissémination de contenus populaires et tolérants au délai dans les réseaux cellulaires / Dissemination of popular and delay-tolerant content in cellular networksBelouanas, Salah-Eddine 13 October 2017 (has links)
Les ressources cellulaires sont précieuses et doivent être préservées dès que possible. Dans cette thèse, nous abordons le problème de la dissémination de contenus dans un réseau cellulaire surchargé. La première partie présente SCoD (Scheduled Content Delivery), une stratégie de dissémination purement cellulaire qui exploite la mobilité des utilisateurs ainsi que leur tolérance aux délais afin d’effectuer des transmissions différées. SCoD attend que les utilisateurs se rassemblent autour d’un minimum de points d’accès afin que le nombre total de transmissions soit réduit. Pour déclencher des transmissions, SCoD repose sur différentes fonctions de décision qui déclenchent aux instants opportuns une transmission en multicast. La deuxième partie de cette thèse traite également le problème d’économie de ressources cellulaires, mais en l’attaquant sous un autre angle. Nous exploitons des communications D2D que nous associons au multicast pour réduire la charge sur l’infrastructure. Nous analysons les avantages des communications opportunistes dans le contexte d’un service de diffusion de contenus basé sur les abonnements des utilisateurs. Nous présentons nos résultats pour deux cas de figure. Tout d’abord, nous illustrons le bénéfice des communications D2D dans le cadre d’un processus de diffusion, où le coût d’une transmission opportuniste est négligeable par rapport à celui d’une transmission cellulaire. Nous considérons ensuite le cas où les utilisateurs doivent être indemnisés pour leur participation au processus de diffusion, et où il y a donc un compromis à trouver. Nous fournissons des lignes directrices dans ce sens et nous montrons la variation d’un tel compromis en fonction de plusieurs paramètres du réseau. / Cellular resources are valuable and must be saved whenever possible. In this thesis, we address the problem of content dissemination within an overloaded cellular network. Firstly, we propose SCoD (Scheduled Content Delivery), a purely cellular dissemination strategy that exploits the mobility of users and their delay tolerance in order to postpone transmissions. SCoD waits for users to gather around a minimum number of access points so that the total number of transmissions is reduced. To trigger transmissions, SCoD relies on different decision functions which launch, if necessary, a multicast transmission. The second part of this thesis deals with the same problem of saving cellular resources, but from another angle. We use D2D (Device-to-Device) communications with multicast to mitigate the traffic load on the infrastructure. We study the benefits of opportunistic communications in the context of a content distribution service based on user subscriptions. We present our results in two ways. First, we illustrate the benefits of D2D communications in a content dissemination process where the cost of opportunistic transmission is negligible compared to that of cellular transmission. Then, we consider the case where users must be compensated for their participation in the dissemination process. Therefore, there is a tradeoff to be found, we thus provide guidelines in this direction and show the variation of such a tradeoff as a function of several network parameters.
|
26 |
Device-device communication and multihop transmission for future cellular networksAmate, Ahmed Mohammed January 2015 (has links)
The next generation wireless networks i.e. 5G aim to provide multi-Gbps data traffic, in order to satisfy the increasing demand for high-definition video, among other high data rate services, as well as the exponential growth in mobile subscribers. To achieve this dramatic increase in data rates, current research is focused on improving the capacity of current 4G network standards, based on Long Term Evolution (LTE), before radical changes are exploited which could include acquiring additional/new spectrum. The LTE network has a reuse factor of one; hence neighbouring cells/sectors use the same spectrum, therefore making the cell edge users vulnerable to inter-cell interference. In addition, wireless transmission is commonly hindered by fading and pathloss. In this direction, this thesis focuses on improving the performance of cell edge users in LTE and LTE-Advanced (LTE-A) networks by initially implementing a new Coordinated Multi-Point (CoMP) algorithm to mitigate cell edge user interference. Subsequently Device-to-Device (D2D) communication is investigated as the enabling technology for maximising Resource Block (RB) utilisation in current 4G and emerging 5G networks. It is demonstrated that the application, as an extension to the above, of novel power control algorithms, to reduce the required D2D TX power, and multihop transmission for relaying D2D traffic, can further enhance network performance. To be able to develop the aforementioned technologies and evaluate the performance of new algorithms in emerging network scenarios, a beyond-the-state-of-the-art LTE system-level simulator (SLS) was implemented. The new simulator includes Multiple-Input Multiple-Output (MIMO) antenna functionalities, comprehensive channel models (such as Wireless World initiative New Radio II i.e. WINNER II) and adaptive modulation and coding schemes to accurately emulate the LTE and LTE-A network standards. Additionally, a novel interference modelling scheme using the 'wrap around' technique was proposed and implemented that maintained the topology of flat surfaced maps, allowing for use with cell planning tools while obtaining accurate and timely results in the SLS compared to the few existing platforms. For the proposed CoMP algorithm, the adaptive beamforming technique was employed to reduce interference on the cell edge UEs by applying Coordinated Scheduling (CoSH) between cooperating cells. Simulation results show up to 2-fold improvement in terms of throughput, and also shows SINR gain for the cell edge UEs in the cooperating cells. Furthermore, D2D communication underlaying the LTE network (and future generation of wireless networks) was investigated. The technology exploits the proximity of users in a network to achieve higher data rates with maximum RB utilisation (as the technology reuses the cellular RB simultaneously), while taking some load off the Evolved Node B (eNB) i.e. by direct communication between User Equipment (UE). Simulation results show that the proximity and transmission power of D2D transmission yields high performance gains for a D2D receiver, which was demonstrated to be better than that of cellular UEs with better channel conditions or in close proximity to the eNB in the network. The impact of interference from the simultaneous transmission however impedes the achievable data rates of cellular UEs in the network, especially at the cell edge. Thus, a power control algorithm was proposed to mitigate the impact of interference in the hybrid network (network consisting of both cellular and D2D UEs). It was implemented by setting a minimum SINR threshold so that the cellular UEs achieve a minimum performance, and equally a maximum SINR threshold to establish fairness for the D2D transmission as well. Simulation results show an increase in the cell edge throughput and notable improvement in the overall SINR distribution of UEs in the hybrid network. Additionally, multihop transmission for D2D UEs was investigated in the hybrid network: traditionally, the scheme is implemented to relay cellular traffic in a homogenous network. Contrary to most current studies where D2D UEs are employed to relay cellular traffic, the use of idle nodes to relay D2D traffic was implemented uniquely in this thesis. Simulation results show improvement in D2D receiver throughput with multihop transmission, which was significantly better than that of the same UEs performance with equivalent distance between the D2D pair when using single hop transmission.
|
27 |
Towards enhancing information dissemination in wireless networksAGARWAL, Rachit 02 September 2013 (has links) (PDF)
In public warning message systems, information dissemination across the network is a critical aspect that has to be addressed. Dissemination of warning messages should be such that it reaches as many nodes in the network in a short time. In communication networks those based on device to device interactions, dissemination of the information has lately picked up lot of interest and the need for self organization of the network has been brought up. Self organization leads to local behaviors and interactions that have global effects and helps in addressing scaling issues. The use of self organized features allows autonomous behavior with low memory usage. Some examples of self organization phenomenon that are observed in nature are Lateral Inhibition and Flocking. In order to provide self organized features to communication networks, insights from such naturally occurring phenomenon is used. Achieving small world properties is an attractive way to enhance information dissemination across the network. In small world model rewiring of links in the network is performed by altering the length and the direction of the existing links. In an autonomous wireless environment such organization can be achieved using self organized phenomenon like Lateral inhibition and Flocking and beamforming (a concept in communication). Towards this, we first use Lateral Inhibition, analogy to Flocking behavior and beamforming to show how dissemination of information can be enhanced. Lateral Inhibition is used to create virtual regions in the network. Then using the analogy of Flocking rules, beam properties of the nodes in the regions are set. We then prove that small world properties are achieved using average path length metric. However, the proposed algorithm is applicable to static networks and Flocking and Lateral Inhibition concepts, if used in a mobile scenario, will be highly complex in terms of computation and memory. In a mobile scenario such as human mobility aided networks, the network structure changes frequently. In such conditions dissemination of information is highly impacted as new connections are made and old ones are broken. We thus use stability concept in mobile networks with beamforming to show how information dissemination process can be enhanced. In the algorithm, we first predict the stability of a node in the mobile network using locally available information and then uses it to identify beamforming nodes. In the algorithm, the low stability nodes are allowed to beamform towards the nodes with high stability. The difference between high and low stability nodes is based on threshold value. The algorithm is developed such that it does not require any global knowledge about the network and works using only local information. The results are validated using how quickly more number of nodes receive the information and different state of the art algorithms. We also show the effect of various parameters such as number of sources, number of packets, mobility parameters and antenna parameters etc. on the information dissemination process in the network. In realistic scenarios however, the dynamicity in the network is not only related to mobility. Dynamic conditions also arise due to change in density of nodes at a given time. To address effect of such scenario on the dissemination of information related to public safety in a metapopulation, we use the concepts of epidemic model, beamforming and the countrywide mobility pattern extracted from the $D4D$ dataset. Here, we also propose the addition of three latent states to the existing epidemic model ($SIR$ model). We study the transient states towards the evolution of the number of devices having the information and the difference in the number of devices having the information when compared with different cases to evaluate the results. Through the results we show that enhancements in the dissemination process can be achieved in the addressed scenario
|
28 |
Analysis on MIMO relaying scenarios in wireless communication systemsJayasinghe, L. K. (Laddu Keeth Saliya) 02 February 2015 (has links)
Abstract
The thesis concentrates on evaluating and improving performances of various multiple-input multiple-output (MIMO) relaying scenarios that are particularly relevant to future wireless systems. A greater emphasis is placed on important practical situations, considering relay deployments, availability of channel state information (CSI), limitations of spectrum, and information secrecy.
Initially, the performance of a non-coherent amplify-and-forward (AF) MIMO relaying is analyzed when the relay is deployed with the relay-to-destination channel having a line-of-sight (LoS) path. The main attention is given to analyzing the performance of orthogonal space-time block coded based non-coherent AF MIMO system. Exact expressions of statistical parameters and performance metrics are derived considering the instantaneous signal-to-noise ratio (SNR) received at the destination. These performance metrics reveal that a strong LoS component in relay-destination channel always limits the performance promised by MIMO scattering environment when both nodes have multiple antennas.
The thesis also considers scenarios in MIMO two-way relaying (TWR) with physical layer network coding (PNC) mapping at the relay. PNC mapping becomes complex with multiple streams being combined at the relay node. Joint precoder-decoder schemes are considered to ease this, and various studies are carried out depending on the CSI. The zero-forcing criterion is used at the nodes when perfect CSI is available. For the imperfect CSI scenario, a robust joint precoder-decoder design is considered. The precoder and decoder matrices are obtained by solving optimization problems, which are formulated to maximize sum-rate and minimize weighted mean square error (WMSE) under transmit power constraints on the nodes.
Next, a precoder-decoder scheme for MIMO underlay device-to-device (D2D) communication system is investigated by considering two D2D modes; PNC based D2D and direct D2D. The joint design is based on minimizing mean square error (MSE) which is useful to mitigate interference, and to improve the performance of both D2D and cellular communications. Distributed and centralized algorithms are proposed considering bi-directional communication in both D2D and cellular communications. System performance is discussed with two transmit mode selection schemes as dynamic and static selection schemes. The results show that the PNC based D2D mode extends the coverage area of D2D communication.
Finally, secure beamforming schemes for the PNC based MIMO TWR systems are investigated when multiple eavesdroppers are attempting to intercept the user information. The CSI of the user-to-eavesdropper channels is imperfect at the users. The channel estimation errors are assumed with both ellipsoidal bound and Gaussian Markov uncertainty models. Robust optimization problems are formulated considering both scenarios to design beamforming vectors at the users and relay. Numerical results suggest that the proposed algorithms converge fast and provide higher security. / Tiivistelmä
Tässä väitöskirjassa keskitytään arvioimaan ja parantamaan suorituskykyä useissa moniantennitoistinjärjestelmissä, jotka ovat ajankohtaisia tulevaisuuden langattomissa verkoissa. Erityisesti työssä analysoidaan tärkeitä käytännön tilanteita, sisältäen toistimien sijoittamisen, kanavatiedon saatavuuden, rajoitetun taajuuskaistan ja tiedon salauksen.
Aluksi epäkoherentin, vahvistavan ja jatkolähettävän moniantennitoistimen suorituskykyä analysoidaan tilanteessa, jossa toistin on sijoitettu siten, että kohteeseen on suora yhteys. Suorituskyvyn arvioinnin pääkohteena on ortogonaalinen tila-aika-tason lohkokoodattu epäkoherentti vahvistava ja jatkolähettävä moniantennitoistin. Työssä johdetaan tarkat lausekkeet tilastollisille parametreille ja suorituskykymittareille ottaen huomioon hetkellinen signaalikohinasuhde vastaanottimessa. Nämä suorituskykymittarit ilmaisevat, että toistimen ja kohteen välillä oleva vahva suoran yhteyden komponentti rajoittaa sitä suorituskykyä, jota moniantennijärjestelmän hajontaympäristö ennustaa.
Työssä tutkitaan myös kahdensuuntaisia moniantennitoistimia, jotka käyttävät fyysisen kerroksen verkkokoodausta. Koodauksesta tulee monimutkaista, kun monia datavirtoja yhdistetään toistimessa. Tämän helpottamiseksi käytetään yhdistettyä esikoodaus-dekoodausmenetelmää, jota tutkitaan erilaisten kanavatietojen tapauksissa. Täydellisen kanavatiedon tapauksessa käytetään nollaanpakotuskriteeriä. Epätäydellisen kanavatiedon tapauksessa käytetään robustia yhdistettyä esikoodaus-dekoodausmenetelmää. Esikoodaus- ja dekoodausmatriisit saadaan ratkaisemalla optimointiongelmat. Nämä ongelmat on muodostettu maksimoimaan summadatanopeus, ja minimoimaan painotettu keskineliövirhe, kun optimointirajoitteina ovat solmujen lähetystehot.
Seuraavaksi esikoodaus-dekoodausmenetelmää tutkitaan moniantennijärjestelmässä, jossa käytetään kahdentyyppistä laitteesta-laitteeseen (D2D) kommunikaatiomenetelmää: fyysisen kerroksen verkkokoodaukseen pohjautuvaa D2D- ja suoraa D2D-kommunikaatiota. Yhteissuunnittelu perustuu keskineliövirheen minimointiin, joka on hyödyllistä, kun halutaan vähentää häiriötä ja parantaa molempien verkkojen suorituskykyä. Työssä ehdotetaan hajautettuja ja keskitettyjä algoritmeja tilanteessa, jossa käytetään kaksisuuntaista kommunikaatiota molemmissa verkoissa. Järjestelmän suorituskykyä arvioidaan, kun käytetään kahta eri lähetystilan valintaa, dynaamista ja staattista. Tulokset osoittavat, että fyysisen kerroksen verkkokoodaukseen pohjautuva D2D kasvattaa D2D-kommunikaatiojärjestelmän kantamaa.
Lopuksi, turvallisia keilanmuodostustekniikoita arvioidaan fyysisen kerroksen verkkokoodaukseen pohjautuvassa kahdensuuntaisessa moniantennitoistinjärjestelmässä, kun useat salakuuntelijat yritävät siepata käyttäjätiedon. Käyttäjillä on epäideaalinen kanavatieto heidän ja salakuuntelijoiden välisten linkkien kanavista. Kanavatiedon estimointivirheitä arvioidaan ellipsoidisella ja Gauss-Markov-epävarmuusmallilla. Robustit optimointiongelmat, joissa suunnitellaan keilanmuodostusvektorit käyttäjän ja toistimen välille, muodostetaan molemmille malleille. Numeeriset tulokset osoittavat, että ehdotetut algoritmit konvergoituvat nopeasti ja tarjoavat korkeamman turvallisuuden.
|
29 |
Stochastic Geometry Based Analysis of Capacity, Mobility and Energy Efficiency for Dense Heterogeneous NetworksMerwaday, Arvind 29 March 2016 (has links)
In recent years, the increase in the population of mobile users and the advances in computational capabilities of mobile devices have led to an exponentially increasing traffic load on the wireless networks. This trend is foreseen to continue in the future due to the emerging applications such as cellular Internet of things (IoT) and machine type communications (MTC). Since the spectrum resources are limited, the only promising way to keep pace with the future demand is through aggressive spatial reuse of the available spectrum which can be realized in the networks through dense deployment of small cells. There are many challenges associated with such densely deployed heterogeneous networks (HetNets). The main challenges which are considered in this research work are capacity enhancement, velocity estimation of mobile users, and energy efficiency enhancement.
We consider different approaches for capacity enhancement of the network. In the first approach, using stochastic geometry we theoretically analyze time domain inter-cell interference coordination techniques in a two-tier HetNet and optimize the parameters to maximize the capacity of the network. In the second approach, we consider optimization of the locations of aerial bases stations carried by the unmanned aerial vehicles (UAVs) to enhance the capacity of the network for public safety and emergency communications, in case of damaged network infrastructure. In the third approach, we introduce a subsidization scheme for the service providers through which the network capacity can be improved by using regulatory power of the government. Finally, we consider the approach of device-to-device communications and multi-hop transmissions for enhancing the capacity of a network.
Velocity estimation of high speed mobile users is important for effective mobility management in densely deployed small cell networks. In this research, we introduce two novel methods for the velocity estimation of mobile users: handover-count based velocity estimation, and sojourn time based velocity estimation. Using the tools from stochastic geometry and estimation theory, we theoretically analyze the accuracy of the two velocity estimation methods through Cramer-Rao lower bounds (CRLBs).
With the dense deployment of small cells, energy efficiency becomes crucial for the sustained operation of wireless networks. In this research, we jointly study the energy efficiency and the spectral efficiency in a two-tier HetNet. We optimize the parameters of inter-cell interference coordination technique and study the trade-offs between the energy efficiency and spectral efficiency of the HetNet.
|
30 |
Towards enhancing information dissemination in wireless networks / Vers une amélioration de la diffusion des informations dans les réseaux sans-filsAgarwal, Rachit 02 September 2013 (has links)
Dans les systèmes d'alertes publiques, l’étude de la diffusion des informations dans le réseau est essentielle. Les systèmes de diffusion des messages d'alertes doivent atteindre beaucoup de nœuds en peu de temps. Dans les réseaux de communication basés sur les interactions “device to device”, on s'est récemment beaucoup intéressé à la diffusion des informations et le besoin d'auto-organisation a été mis en évidence. L'auto-organisation conduit à des comportements locaux et des interactions qui ont un effet sur le réseau global et présentent un avantage de scalabilité. Ces réseaux auto-organisés peuvent être autonomes et utiliser peu d'espace mémoire. On peut développer des caractères auto-organisés dans les réseaux de communication en utilisant des idées venant de phénomènes naturels. Il semble intéressant de chercher à obtenir les propriétés des “small world” pour améliorer la diffusion des informations dans le réseau. Dans les modèles de “small world” on réalise un recâblage des liens dans le réseau en changeant la taille et la direction des liens existants. Dans un environnement sans-fils autonome une organisation de ce type peut être créée en utilisant le flocking, l'inhibition latérale et le “beamforming”. Dans ce but, l'auteur utilise d'abord l'analogie avec l'inhibition latérale, le flocking et le “beamforming” pour montrer comment la diffusion des informations peut être améliorée. L'analogue de l'inhibition latérale est utilisé pour créer des régions virtuelles dans le réseau. Puis en utilisant l'analogie avec les règles du flocking, on caractérise les propriétés des faisceaux permettant aux nœuds de communiquer dans les régions. Nous prouvons que les propriétés des “small world” sont vérifiées en utilisant la mesure des moyennes des longueurs des chemins. Cependant l'algorithme proposé est valable pour les réseaux statiques alors que dans les cas introduisant de la mobilité, les concepts d'inhibition latérale et de flocking nécessiteraient beaucoup plus de temps. Dans le cas d'un réseau mobile la structure du réseau change fréquemment. Certaines connexions intermittentes impactent fortement la diffusion des informations. L'auteur utilise le concept de stabilité avec le “beamforming” pour montrer comment on peut améliorer la diffusion des informations. Dans son algorithme il prévoit d'abord la stabilité du nœud en utilisant des informations locales et il utilise ce résultat pour identifier les nœuds qui réaliseront du beamforming. Dans l'algorithme, les nœuds de stabilité faible sont autorisés à faire du beamforming vers les nœuds de forte stabilité. La frontière entre forte et faible stabilité est fixée par un seuil. Cet algorithme ne nécessite pas une connaissance globale du réseau, mais utilise des données locales. Les résultats sont validés en étudiant le temps au bout duquel plus de nœuds reçoivent l'information et en comparant avec d'autres algorithmes de la littérature. Cependant, dans les réseaux réels, les changements de structure ne sont pas dus qu'à la mobilité, mais également à des changements de la densité des nœuds à un moment donné. Pour tenir compte de l'influence de tels événements sur la diffusion des informations concernant la sécurité publique, l'auteur utilise les concepts de modèle de métapopulation, épidémiologiques, “beamforming” et mobilité géographique obtenu à partir de données D4D. L'auteur propose la création de trois états latents qu'il ajoute au modèle épidémiologique connu: SIR. L'auteur étudie les états transitoires en analysant l'évolution du nombre de postes ayant reçu les informations et compare les résultats concernant ce nombre dans les différents cas. L'auteur démontre ainsi que le scenario qu'il propose permet d'améliorer le processus de diffusion des informations. Il montre aussi les effets de différents paramètres comme le nombre de sources, le nombre de paquets, les paramètres de mobilité et ceux qui caractérisent les antennes sur la diffusion des informations / In public warning message systems, information dissemination across the network is a critical aspect that has to be addressed. Dissemination of warning messages should be such that it reaches as many nodes in the network in a short time. In communication networks those based on device to device interactions, dissemination of the information has lately picked up lot of interest and the need for self organization of the network has been brought up. Self organization leads to local behaviors and interactions that have global effects and helps in addressing scaling issues. The use of self organized features allows autonomous behavior with low memory usage. Some examples of self organization phenomenon that are observed in nature are Lateral Inhibition and Flocking. In order to provide self organized features to communication networks, insights from such naturally occurring phenomenon is used. Achieving small world properties is an attractive way to enhance information dissemination across the network. In small world model rewiring of links in the network is performed by altering the length and the direction of the existing links. In an autonomous wireless environment such organization can be achieved using self organized phenomenon like Lateral inhibition and Flocking and beamforming (a concept in communication). Towards this, we first use Lateral Inhibition, analogy to Flocking behavior and beamforming to show how dissemination of information can be enhanced. Lateral Inhibition is used to create virtual regions in the network. Then using the analogy of Flocking rules, beam properties of the nodes in the regions are set. We then prove that small world properties are achieved using average path length metric. However, the proposed algorithm is applicable to static networks and Flocking and Lateral Inhibition concepts, if used in a mobile scenario, will be highly complex in terms of computation and memory. In a mobile scenario such as human mobility aided networks, the network structure changes frequently. In such conditions dissemination of information is highly impacted as new connections are made and old ones are broken. We thus use stability concept in mobile networks with beamforming to show how information dissemination process can be enhanced. In the algorithm, we first predict the stability of a node in the mobile network using locally available information and then uses it to identify beamforming nodes. In the algorithm, the low stability nodes are allowed to beamform towards the nodes with high stability. The difference between high and low stability nodes is based on threshold value. The algorithm is developed such that it does not require any global knowledge about the network and works using only local information. The results are validated using how quickly more number of nodes receive the information and different state of the art algorithms. We also show the effect of various parameters such as number of sources, number of packets, mobility parameters and antenna parameters etc. on the information dissemination process in the network. In realistic scenarios however, the dynamicity in the network is not only related to mobility. Dynamic conditions also arise due to change in density of nodes at a given time. To address effect of such scenario on the dissemination of information related to public safety in a metapopulation, we use the concepts of epidemic model, beamforming and the countrywide mobility pattern extracted from the $D4D$ dataset. Here, we also propose the addition of three latent states to the existing epidemic model ($SIR$ model). We study the transient states towards the evolution of the number of devices having the information and the difference in the number of devices having the information when compared with different cases to evaluate the results. Through the results we show that enhancements in the dissemination process can be achieved in the addressed scenario
|
Page generated in 0.0693 seconds