Performance Analysis in Wireless HetNets: Traffic, Energy, and Secrecy Considerations

· Linköping Studies in Science and Technology. Licentiate Thesis Book 1 · Linköping University Electronic Press
Ebook
19
Pages
Ratings and reviews aren’t verified  Learn More

About this ebook

To this day, most of the communication networks are characterized by a "monolithic" operating approach. Network elements are configured and operate without any reconfiguration for long time periods. Softwarization, whereby dedicated elements are being replaced by more general-purpose devices, has been lately challenging this existing approach. Virtualizing the infrastructure through the softwarization can provide significant benefits to end users and operators, supporting more flexible service deployment, providing real time monitoring and operational changes. 

In Paper I we study a novel allocation technique and traffic optimization process for the access network. Cellular network technologies (i.e. UMTS, LTE, LTE-A) will coexist with non-cellular small cells and offload traffic from cellular to non-cellular networks mainly operating in 3GPP Wi-Fi (IEEE 802.11 standards). This is a scenario for indoor wireless access implementations where offloading mechanisms can improve the QoS offered by the operators, and reduce the traffic handled by the access fronthaul. The analysis of a novel optimization algorithm exhibited a holistic solution for access-core interworking where LWA (LTE-WiFi Aggregation) offers improved performance for the end users. 

In order to optimize core network operations factors such as the operational costs should be addressed. Following this approach in Paper II we analysed how environmental factors (e.g. temperature, humidity) can affect the power consumption of core network data centers (cooling systems). By applying machine learning techniques using data from a data center, we were able to forecast the power consumption based on to atmospheric weather conditions and analyse its accuracy. 

Optimizing the access network operations and the interworking (resource allocation, scheduling, offloading) can lead to highly configurable and secure operations. These have been factors of great concern as wireless connectivity increases in denser populated areas. In Paper III we examine the physical layer secrecy aspects of a collaborative small cell network in the presence of parallel connections and caching capabilities at the edge nodes. Using tools from the probability theory, we examined how the power allocation for the transmissions can ensure secrecy in the presence of an eavesdropper. 

Rate this ebook

Tell us what you think.

Reading information

Smartphones and tablets
Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.
Laptops and computers
You can listen to audiobooks purchased on Google Play using your computer's web browser.
eReaders and other devices
To read on e-ink devices like Kobo eReaders, you'll need to download a file and transfer it to your device. Follow the detailed Help Center instructions to transfer the files to supported eReaders.