A Power Control Strategy for IoT Sensors Developed for 5G Networks

Author(s):  
Weston Mwashita ◽  
Marcel Ohanga Odhiambo

This research work presents a power control mechanism developed for ProSe-enabled sensors so that the sensors can be smoothly integrated into the fifth generation (5G) of mobile networks. It is strongly anticipated that 5G networks will provide an enabling environment for the 21st century innovations like the internet of things (IoT). Sensors are pivotal in IoT. The proposed power control mechanism involves an open loop power control (OLPC) mechanism that a ProSe-enabled sensor has to use to establish communication with a base station (BS) and a closed loop power control (CLPC) the BS then has use to establish transmit power levels for devices to be involved in a device to device (D2D) communication depending on the prevailing channel conditions. The results obtained demonstrate that the developed scheme does not adversely affect the quality of service (QoS) of a 5G mobile network.

Telecom IT ◽  
2020 ◽  
Vol 8 (2) ◽  
pp. 44-54
Author(s):  
A. Grebenshchikova ◽  
Elagin V.

The paper considers the data traffic based on slicing in a 5g mobile network uplink system. Slicing is a promising technology for the fifth generation of networks that provides optimal quality of QOS services for each specific user or group of users. Data traffic that is processed by cellular networks increases every year. Therefore, we should consider all set of traffic from VoIP to M2M devices. For example, smart devices in the healthcare system transmit big data that is sensitive to latency, but also a video stream that requires minimal latency in certain cases. The paper focuses on the successful processing of traffic through a relay node, donor microstates, and a base station. All traffic is divided into three levels of QoS segmentation: sensitive, less sensitive, and low-sensitivity, using the AnyLogic simulation program. For fifth-generation 5G networks, achieving minimum latency and maximum data transfer speed within QoS is an important implementation condition. Therefore, in this paper, using simulation modeling, the main and possible results of each segment in the new generation of mobile networks are obtained. The use of a relay node in conjunction with micro-stations can ensure optimal station load and successful data processing. Also, the solutions outlined in this paper will allow you to identify a number of areas for future research to assess possible ways to design new mobile networks, or improve existing ones.


2015 ◽  
Vol 2015 ◽  
pp. 1-6 ◽  
Author(s):  
AlMuthanna Turki Nassar ◽  
Ahmed Iyanda Sulyman ◽  
Abdulhameed Alsanie

This paper presents radio frequency (RF) capacity estimation for millimeter wave (mm-wave) based fifth-generation (5G) cellular networks using field-level simulations. It is shown that, by reducing antenna beamwidth from 65° to 30°, we can enhance the capacity of mm-wave cellular networks roughly by 3.0 times at a distance of 220 m from the base station (BS). This enhancement is far much higher than the corresponding enhancement of 1.2 times observed for 900 MHz and 2.6 GHz microwave networks at the same distance from the BS. Thus the use of narrow beamwidth transmitting antennas has more pronounced benefits in mm-wave networks. Deployment trials performed on an LTE TDD site operating on 2.6 GHz show that 6-sector site with 27° antenna beamwidth enhances the quality of service (QoS) roughly by 40% and more than doubles the overall BS throughput (while enhancing the per sector throughput 1.1 times on average) compared to a 3-sector site using 65° antenna beamwidth. This agrees well with our capacity simulations. Since mm-wave 5G networks will use arbitrary number of beams, with beamwidth much less than 30°, the capacity enhancement expected in 5G system when using narrow beamwidth antennas would be much more than three times observed in our simulations.


Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1387
Author(s):  
Oswaldo Sebastian Peñaherrera-Pulla ◽  
Carlos Baena ◽  
Sergio Fortes ◽  
Eduardo Baena ◽  
Raquel Barco

Cloud Gaming is a cutting-edge paradigm in the video game provision where the graphics rendering and logic are computed in the cloud. This allows a user’s thin client systems with much more limited capabilities to offer a comparable experience with traditional local and online gaming but using reduced hardware requirements. In contrast, this approach stresses the communication networks between the client and the cloud. In this context, it is necessary to know how to configure the network in order to provide service with the best quality. To that end, the present work defines a novel framework for Cloud Gaming performance evaluation. This system is implemented in a real testbed and evaluates the Cloud Gaming approach for different transport networks (Ethernet, WiFi, and LTE (Long Term Evolution)) and scenarios, automating the acquisition of the gaming metrics. From this, the impact on the overall gaming experience is analyzed identifying the main parameters involved in its performance. Hence, the future lines for Cloud Gaming QoE-based (Quality of Experience) optimization are established, this way being of configuration, a trendy paradigm in the new-generation networks, such as 4G and 5G (Fourth and Fifth Generation of Mobile Networks).


LastMile ◽  
2021 ◽  
Vol 98 (6) ◽  
Author(s):  
A. Ivashkin

Today, many countries around the world are actively building fifth generation mobile networks (5G/IMT-2020). The magazine Last Mile asked the director of the Republican unitary enterprise for supervision on telecommunications "BelGIE" of the Republic of Belarus (hereinafter: State Enterprise "BelGIE") A.A. Ivashkin about the situation with the implementation of the 5G network in the Republic of Belarus.


Author(s):  
Phudit Ampririt ◽  
Ermioni Qafzezi ◽  
Kevin Bylykbashi ◽  
Makoto Ikeda ◽  
Keita Matsuo ◽  
...  

The fifth generation (5G) network is expected to be flexible to satisfy quality of service (QoS) requirements, and the software-defined network (SDN) with network slicing will be a good approach for admission control. In this paper, the authors present and compare two fuzzy-based schemes to evaluate the QoS (FSQoS). They call these schemes FSQoS1 and FSQoS2. The FSQoS1 considers three parameters: slice throughput (ST), slice delay (SD), and slice loss (SL). In FSQoS2, they consider as an additional parameter the slice reliability (SR). So, FSQoS2 has four input parameters. They carried out simulations for evaluating the performance of the proposed schemes. From simulation results, they conclude that the considered parameters have different effects on the QoS performance. The FSQoS2 is more complex than FSQoS1, but it has a better performance for evaluating QoS. When ST and SR are increasing, the QoS parameter is increased. But, when SD and SL are increasing, the QoS is decreased. When ST is 0.1, SD is 0.1, SL is 0.1, and the QoS is increased by 32.02% when SR is increased from 0.3 to 0.8.


2020 ◽  
Vol 10 (17) ◽  
pp. 5971 ◽  
Author(s):  
Sven Kuehn ◽  
Serge Pfeifer ◽  
Niels Kuster

In this study, the total electromagnetic dose, i.e., the combined dose from fixed antennas and mobile devices, was estimated for a number of hypothetical network topologies for implementation in Switzerland to support the deployment of fifth generation (5G) mobile communication systems while maintaining exposure guidelines for public safety. In this study, we consider frequency range 1 (FR1) and various user scenarios. The estimated dose in hypothetical 5G networks was extrapolated from measurements in one of the Swiss 4G networks and by means of Monte Carlo analysis. The results show that the peak dose is always dominated by an individual’s mobile phone and, in the case of non-users, by the bystanders’ mobile phones. The reduction in cell size and the separation of indoor and outdoor coverage can substantially reduce the total dose by >10 dB. The introduction of higher frequencies in 5G mobile networks, e.g., 3.6 GHz, reduces the specific absorption rate (SAR) in the entire brain by an average of −8 dB, while the SAR in the superficial tissues of the brain remains locally constant, i.e., within ±3 dB. Data from real networks with multiple-input multiple-output (MIMO) were not available; the effect of adaptive beam-forming antennas on the dose will need to be quantitatively revisited when 5G networks are fully established.


Author(s):  
Abdulbaki Uzun ◽  
Eric Neidhardt ◽  
Axel Küpper

Mobile network operators maintain data about their mobile network topology, which is mainly used for network provisioning and planning purposes restricting its full business potential. Utilizing this data in combination with the extensive pool of semantically modeled data in the Linking Open Data Cloud, innovative applications can be realized that would establish network operators as service providers and enablers in the highly competitive services market. In this article, the authors introduce the OpenMobileNetwork (available at http://www.openmobilenetwork.org/) as an open solution for providing approximated network topology data based on the principles of Linked Data along with a business concept for network operators to exploit their valuable asset. Since the quality of the estimated network topology is crucial when providing services on top of it, the authors further analyze and evaluate state-of-the-art approaches for estimating base station positions out of crowdsourced data and discuss the results in comparison to real base station locations.


2020 ◽  
Vol 10 (12) ◽  
pp. 4409
Author(s):  
Wei Kuang Lai ◽  
Chin-Shiuh Shieh ◽  
Fu-Sheng Chou ◽  
Chia-Yu Hsu ◽  
Meng-Han Shen

This study addresses the handover management issue for Device-to-Device communication in fifth-generation (5G) networks. The Third Generation Partnership Project (3GPP) drafted a standard for proximity services (ProSe), also named device-to-device (D2D) communication, which is a promising technology in offering higher throughput and lower latency services to end users. Handover is an essential issue in wireless mobile networks due to the mobility of user equipment (UE). Specifically, we need to transfer an ongoing connection from an old E-UTRAN Node B (eNB) to a new one, so that the UE can retain its connectivity. In the data plane, both parties of a D2D pair can communicate directly with each other without the involvement of the base station. However, in the control plane, devices must be connected to the eNB for tasks such as power control and resource allocation. In the current standard of handover scheme, the number of unnecessary handovers would be increased by the effect of shadowing fading on two devices. More important, the handover mechanism for D2D pairs is not standardized yet. LTE-A only considers the handover procedure of a single user. Therefore, when a D2D pair moves across cell boundaries, the control channels of the two UEs may connect to different base stations and result in increased latency due to the exchange of D2D related control messages. Hence, we propose a handover management scheme for D2D communication to let both parties of a D2D pair handover to the same destination eNB at the same time. By doing so, the number of unnecessary handovers, as well as the handover latency, can be reduced. In the proposed method, we predict the destination eNB of D2D users based on their movements and the received signal characteristics. Subsequently, we make a handover decision for each D2D pair by jointly factoring in the signal quality and connection stability. Expected improvement can be attained, as revealed in the simulation. Unnecessary handover can be avoided. Consequently, both UEs of a D2D pair reside in the same cell and, therefore, result in increased throughput and decreased delay.


Sensors ◽  
2019 ◽  
Vol 19 (5) ◽  
pp. 1249 ◽  
Author(s):  
Alicja Winnicka ◽  
Karolina Kęsik ◽  
Dawid Połap ◽  
Marcin Woźniak ◽  
Zbigniew Marszałek

Rapid development and conducted experiments in the field of the introduction the fifth generation of the mobile network standard allow for the flourishing of the Internet of Things. This is one of the most important reasons to design and test systems that can be implemented to increase the quality of our lives. In this paper, we propose a system model for managing tasks in smart homes using multi-agent solutions. The proposed solution organizes work and distributes tasks to individual family members. An additional advantage is the introduction of gamification, not only between household members, but also between families. The solution was tested to simulate the entire solution as well as the individual components that make up the system. The proposal is described with regard to the possibility of implementing smart homes in future projects.


2019 ◽  
Vol 2019 ◽  
pp. 1-14
Author(s):  
Hani Alquhayz ◽  
Nasser Alalwan ◽  
Ahmed Ibrahim Alzahrani ◽  
Ali H. Al-Bayatti ◽  
Mhd Saeed Sharif

Advances in mobile phone technology and the growth of associated networks have been phenomenal over the last decade. Therefore, they have been the focus of much academic research, driven by commercial and end-user demands for increasingly faster technology. The most recent generation of mobile network technology is the fifth generation (5G). 5G networks are expected to launch across the world by 2020 and to work with existing 3G and 4G technologies to provide extreme speed despite being limited to wireless technologies. An alternative network, Y-Communication (Y-Comm), proposes to integrate the current wired and wireless networks, attempting to achieve the main service requirements of 5G by converging the existing networks and providing an improved service anywhere at any time. Quality of service (QoS), vertical handover, and security are some of the technical concerns resulting from this heterogeneity. In addition, it is believed that the Y-Comm convergence will have a greater influence on security than was the case with the previous long-term evolution (LTE) 4G networks and with future 5G networks. The purpose of this research is to satisfy the security recommendations for 5G mobile networks. This research provides a policy-based security management system, ensuring that end-user devices cannot be used as weapons or tools of attack, for example, IP spoofing and man-in-the-middle (MITM) attacks. The results are promising, with a low disconnection rate of less than 4% and 7%. This shows the system to be robust and reliable.


Sign in / Sign up

Export Citation Format

Share Document