On Base Station Sleeping for Heterogeneous Cloud-Fog Computing Networks

Author(s):  
Ali Alnoman ◽  
Alagan Anpalagan
2018 ◽  
Vol 2018 ◽  
pp. 1-17
Author(s):  
Imad Al-Samman ◽  
Reham Almesaeed ◽  
Angela Doufexi ◽  
Mark Beach

Responding to the unprecedented challenges imposed by the 5G technologies, mobile operators have given significant attention to Heterogeneous Cloud Radio Access Networks (H-CRAN) due to their beneficial features of performing optimization, cost effectiveness, and improving spectral and energy efficiency performance. H-CRAN inherits the attractive benefits of Heterogeneous Networks (HetNet) and the cloud computing by facilitating interference mitigation, scalability, and radio resource control. Consequently, H-CRAN is proposed in this article as a cost-effective potential solution to alleviate intertier interference and improve cooperative processing gains in HetNets by employing cloud computing. H-CRAN can provide efficient resource sharing at the spectrum, network, and infrastructure levels. Therefore, this article proposes H-CRAN cooperative interference mitigation method that enhances the time sharing among Radio Remote Heads (RRH) users. The study proposes an enhanced Almost Blank Subframe (ABSF) technique to increase the SINR and throughput of the small-cell (low power base station) and macrocell users. Simulation results show that the proposed Dynamic Programming-Diverse Almost Blank Subframe (ABSF) Pattern (DP-DAP) scheme improved the macro- and small-cell users up to 56% and 35%, respectively, as compared to other state-of-the-art ABSF schemes.


2021 ◽  
Vol 25 (2) ◽  
pp. 485-516
Author(s):  
Zoltán Szabó ◽  
Vilmos Bilicki

Since the advent of smartphones, IoT and cloud computing, we have seen an industry-wide requirement to integrate different healthcare applications with each other and with the cloud, connecting multiple institutions or even countries. But despite these trends, the domain of access control and security of sensitive healthcare data still raises a serious challenge for multiple developers and lacks the necessary definitions to create a general security framework addressing these issues. Taking into account newer, more special cases, such as the popular heterogeneous infrastructures with a combination of public and private clouds, fog computing, Internet of Things, the area becomes more and more complicated. In this paper we will introduce a categorization of these required policies, describe an infrastructure as a possible solution to these security challenges, and finally evaluate it with a set of policies based on real-world requirements.


Sensors ◽  
2020 ◽  
Vol 20 (7) ◽  
pp. 1901 ◽  
Author(s):  
Mengjun Yin ◽  
Wenjing Li ◽  
Lei Feng ◽  
Peng Yu ◽  
Xuesong Qiu

Emergency communications need to meet the developing demand of equipment and the complex scenarios of network in public safety networks (PSNs). Heterogeneous Cloud Radio Access Network (H-CRAN), an important technology of the 5th generation wireless systems (5G), plays an important role in PSN. H-CRAN has the features of resource sharing and centralized allocation which can make up for resource shortage in emergency communications. Therefore, an emergency communications strategy based on Device-to-device (D2D) multicast is proposed to make PSN more flexible and rapid. Nearby users can communicate directly without a base station through D2D. This strategy may guarantee high speed data transmission and stable continuous real-time communications. It is divided into three steps. Firstly, according to the distance between users, the alternative cluster head is divided. Secondly, two kinds of cluster head user selection schemes are developed. One is based on terminal power and the other is based on the number of extended users. Last but not least, the Hungarian Algorithm based on throughput-aware is used to channel multiplexing. The numerical results show that the proposed scheme can effectively extend the coverage of PSN and optimize the utilization of resources.


2018 ◽  
Vol 14 (3/4) ◽  
pp. 247-267 ◽  
Author(s):  
Mohan Liyanage ◽  
Chii Chang ◽  
Satish Narayana Srirama

Purpose The distant data centre-centric Internet of Things (IoT) systems face the latency issue especially in the real-time-based applications, such as augmented reality, traffic analytics and ambient assisted living. Recently, Fog computing models have been introduced to overcome the latency issue by using the proximity-based computational resources, such as the computers co-located with the cellular base station, grid router devices or computers in local business. However, the increasing users of Fog computing servers cause bottleneck issues and consequently the latency issue arises again. This paper aims to introduce the utilisation of Mist computing (Mist) model, which exploits the computational and networking resources from the devices at the very edge of the IoT networks. Design/methodology/approach This paper proposes a service-oriented mobile-embedded Platform as a Service (mePaaS) framework that allows the mobile device to provide a flexible platform for proximal users to offload their computational or networking program to mePaaS-based Mist computing node. Findings The prototype has been tested and performance has been evaluated on the real-world devices. The evaluation results have shown the promising nature of mePaaS. Originality/value The proposed framework supports resource-aware autonomous service configuration that can manage the availability of the functions provided by the Mist node based on the dynamically changing hardware resource availability. In addition, the framework also supports task distribution among a group of Mist nodes.


Author(s):  
Yugashree Bhadane ◽  
Pooja Kadam

Now days, wireless technology is one of the center of attention for users and researchers. Wireless network is a network having large number of sensor nodes and hence called as “Wireless Sensor Network (WSN)”. WSN monitors and senses the environment of targeted area. The sensor nodes in WSN transmit data to the base station depending on the application. These sensor nodes communicate with each other and routing is selected on the basis of routing protocols which are application specific. Based on network structure, routing protocols in WSN can be divided into two categories: flat routing, hierarchical or cluster based routing, location based routing. Out of these, hierarchical or cluster based routing is becoming an active branch of routing technology in WSN. To allow base station to receive unaltered or original data, routing protocol should be energy-efficient and secure. To fulfill this, Hierarchical or Cluster base routing protocol for WSN is the most energy-efficient among other routing protocols. Hence, in this paper, we present a survey on different hierarchical clustered routing techniques for WSN. We also present the key management schemes to provide security in WSN. Further we study and compare secure hierarchical routing protocols based on various criteria.


2019 ◽  
Vol E102.B (10) ◽  
pp. 2014-2020
Author(s):  
Yancheng CHEN ◽  
Ning LI ◽  
Xijian ZHONG ◽  
Yan GUO

Sign in / Sign up

Export Citation Format

Share Document