-
Provisioning Energy-Efficiency and QoS for Multi-Carrier CoMP with Limited Feedback
Authors:
Mohammad G. Khoshkholgh,
Victor C. M. Leung,
Kang G. Shin,
Keivan Navaie
Abstract:
We consider resource allocation (RA) in multi-carrier coordinated multi-point (CoMP) systems with limited feedback, in which a cluster of base stations (BSs), each equipped with multiple antennas, are connect to each other and/or a central processor via backhauls/fronthauls. The main objective of coordinated RA is to select user equipments (UEs) on each subcarrier, dynamically decide upon the clus…
▽ More
We consider resource allocation (RA) in multi-carrier coordinated multi-point (CoMP) systems with limited feedback, in which a cluster of base stations (BSs), each equipped with multiple antennas, are connect to each other and/or a central processor via backhauls/fronthauls. The main objective of coordinated RA is to select user equipments (UEs) on each subcarrier, dynamically decide upon the cluster size for each subcarrier, and finally partition the feedback resources, provisioned for acquisition of channel direction information (CDI) across all subcarriers, active cells, and selected UEs, in order to maximize the weighted sum utility (WSU). We show how to recast the WSU maximization problem to achieve spectral efficiency, quality-of-service (QoS), and energyefficiency (EE). Specifically, we investigate four instances of WSU to maximize practical system objectives: (i) weighted sum capacity, (ii) weighted sum effective capacity, (iii) weighted sum energy-efficiency (EE), and (iv) weighted sum effective EE. The unified composition of these problems through WSU allows us to use the same set of developed algorithms for all cases. The algorithms have a greedy structure achieving fast convergence, and successfully cope with the huge computational complexity of RA problems, mostly rooted in their combinatorial compositions. Our simulation results shed lights on the network optimization by discovering insights on appropriate cluster-size, distribution of BSs in the cluster, and the number of subcarriers. The proposed UE scheduling and subcarrier assignment are shown to improve the system performance by several orders-of-magnitude.
△ Less
Submitted 19 August, 2019;
originally announced August 2019.
-
Energy-Efficient Cooperative Caching in UAV Networks
Authors:
Mohammad G. Khoshkholgh,
Victor C. M. Leung
Abstract:
For an unmanned aerial vehicle (UAV) enabled network we investigate the energy-efficiency (EE) of joint caching and cooperative communication (Fog-RAN). Since UAVs are battery- and cache-limited, placing the popular contents in the caches and managing the energy expenditure of UAVs become crucial. We formulate the energy consumption of UAVs as an aggregate of communication/caching, hovering, and v…
▽ More
For an unmanned aerial vehicle (UAV) enabled network we investigate the energy-efficiency (EE) of joint caching and cooperative communication (Fog-RAN). Since UAVs are battery- and cache-limited, placing the popular contents in the caches and managing the energy expenditure of UAVs become crucial. We formulate the energy consumption of UAVs as an aggregate of communication/caching, hovering, and vertical displacement energies, and then devise an optimization problem for optimally assigning contents to caches and choosing the height of UAVs. Adopting tools from stochastic geometry, we also derive the EE in a numerically tractable form as a function of density, the radius of the cooperation zone, cache size, main communication/physical characteristics of UAVs, and influential environmental parameters. We develop two content placement strategies with low computational complexity. The conducted numerical results demonstrate that by adopting these algorithms one is able to improve EE by up to 800% compared to common content placement schemes, e.g., the least-frequently used (LRU), the most-popular, and Hit-rate. Furthermore, while under LRU and Hit-rate schemes there is no benefit in vertically displacing UAVs, under our algorithms one is able to increase EE by at most 600%. Importantly, via our algorithms one can increase the size of cooperation zone in order to steadily increase EE, which is not the cases of LRU, the most-popular, and Hit-rate schemes. We finally observe that there is optimal values for density and cache-size of UAVs, granting maximum EE.
△ Less
Submitted 19 August, 2019;
originally announced August 2019.
-
Cross-Layer Scheduling and Beamforming in Smart Grid Powered Small-Cell Networks
Authors:
Yanjie Dong,
Md. Jahangir Hossain,
Julian Cheng,
Victor C. M. Leung
Abstract:
In the small-cell networks (SCNs) with multiple small-cell base stations (ScBSs), the joint design of beamforming vectors, user scheduling and ScBS slee** is investigated with the constraints on proportional rate. A long-term grid-energy expenditure minimization problem is formulated for the considered SCNs, which are powered by the smart grid and natural renewable energy. Since the scheduled us…
▽ More
In the small-cell networks (SCNs) with multiple small-cell base stations (ScBSs), the joint design of beamforming vectors, user scheduling and ScBS slee** is investigated with the constraints on proportional rate. A long-term grid-energy expenditure minimization problem is formulated for the considered SCNs, which are powered by the smart grid and natural renewable energy. Since the scheduled user indicators are coupled with the beamforming vectors, the formulated problem is challenging to handle. In order to decouple the beamforming vectors from the scheduled user indicators, the Lyapunov optimization technique is used. As a result, a practical two-scale algorithm is proposed to allocate the user scheduling indicators and ScBS slee** variables at the coarse-grained granularity (frame) as well as obtain the beamforming vectors at the fine-grained granularity (slot). Numerical results are used to verify the performance of the proposed two-scale algorithm.
△ Less
Submitted 13 August, 2019;
originally announced August 2019.
-
Joint Precoding and Power Control in Small-Cell Networks With Proportional-Rate MISO-BC Backhaul
Authors:
Yanjie Dong,
Md. Jahangir Hossain,
Julian Cheng,
Victor C. M. Leung
Abstract:
In the small-cell networks with multiple-input-single-output broadcasting (MISO-BC) backhauls, the joint dirty-paper coding and power control are investigated for the \mbox{MISO-BC} backhauls and access links in order to minimize the system transmit power. Considering the proportional rates of MISO-BC backhauls and flow-conservation constraints, the formulated optimization problem is \mbox{non-con…
▽ More
In the small-cell networks with multiple-input-single-output broadcasting (MISO-BC) backhauls, the joint dirty-paper coding and power control are investigated for the \mbox{MISO-BC} backhauls and access links in order to minimize the system transmit power. Considering the proportional rates of MISO-BC backhauls and flow-conservation constraints, the formulated optimization problem is \mbox{non-convex}. Moreover, the formulated problem couples the precoding vectors with the power-control variables. In order to handle the \mbox{non-convex} optimization problem and decouple the backhaul and access links, the structure of the formulated problem is investigated such that the optimal precoding vectors and optimal power-control variables are independently obtained. Moreover, the optimal precoding vectors are obtained in closed-form expressions. Simulation results are used to show the performance improvement over the benchmark scheme.
△ Less
Submitted 13 August, 2019;
originally announced August 2019.
-
Joint Fronthaul Multicast and Cooperative Beamforming for Cache-Enabled Cloud-Based Small Cell Networks: An MDS Codes-Aided Approach
Authors:
Xiongwei Wu,
Qiang Li,
Victor C. M. Leung,
P. C. Ching
Abstract:
The performance of cloud-based small cell networks (C-SCNs) relies highly on a capacity-limited fronthaul, which degrade quality of service when it is saturated. Coded caching is a promising approach to addressing these challenges, as it provides abundant opportunities for fronthaul multicast and cooperative transmissions. This paper investigates a cache-enabled C-SCNs, in which small-cell base st…
▽ More
The performance of cloud-based small cell networks (C-SCNs) relies highly on a capacity-limited fronthaul, which degrade quality of service when it is saturated. Coded caching is a promising approach to addressing these challenges, as it provides abundant opportunities for fronthaul multicast and cooperative transmissions. This paper investigates a cache-enabled C-SCNs, in which small-cell base stations (SBSs) are connected to the central processor via fronthaul, and can prefetch popular contents by applying maximum distance separable (MDS) codes. To fully capture the benefits of fronthaul multicast and cooperative transmissions, an MDS codes-aided transmission scheme is first proposed. We formulate the problem to minimize the content delivery latency by jointly optimizing fronthaul bandwidth allocation, SBS clustering, and beamforming. To efficiently solve the resulting nonlinear integer programming problem, we propose a penalty-based design by leveraging variational reformulations of binary constraints. To improve the solution of the penalty-based design, a greedy SBS clustering design is also developed. Furthermore, closed-form characterization of the optimal solution is obtained, through which the benefits of MDS codes can be quantified. Simulation results are given to demonstrate the significant benefits of the proposed MDS codes-aided transmission scheme.
△ Less
Submitted 20 July, 2019;
originally announced July 2019.
-
Convergence of Edge Computing and Deep Learning: A Comprehensive Survey
Authors:
Xiaofei Wang,
Yiwen Han,
Victor C. M. Leung,
Dusit Niyato,
Xueqiang Yan,
Xu Chen
Abstract:
Ubiquitous sensors and smart devices from factories and communities are generating massive amounts of data, and ever-increasing computing power is driving the core of computation and services from the cloud to the edge of the network. As an important enabler broadly changing people's lives, from face recognition to ambitious smart factories and cities, developments of artificial intelligence (espe…
▽ More
Ubiquitous sensors and smart devices from factories and communities are generating massive amounts of data, and ever-increasing computing power is driving the core of computation and services from the cloud to the edge of the network. As an important enabler broadly changing people's lives, from face recognition to ambitious smart factories and cities, developments of artificial intelligence (especially deep learning, DL) based applications and services are thriving. However, due to efficiency and latency issues, the current cloud computing service architecture hinders the vision of "providing artificial intelligence for every person and every organization at everywhere". Thus, unleashing DL services using resources at the network edge near the data sources has emerged as a desirable solution. Therefore, edge intelligence, aiming to facilitate the deployment of DL services by edge computing, has received significant attention. In addition, DL, as the representative technique of artificial intelligence, can be integrated into edge computing frameworks to build intelligent edge for dynamic, adaptive edge maintenance and management. With regard to mutually beneficial edge intelligence and intelligent edge, this paper introduces and discusses: 1) the application scenarios of both; 2) the practical implementation methods and enabling technologies, namely DL training and inference in the customized edge computing framework; 3) challenges and future trends of more pervasive and fine-grained intelligence. We believe that by consolidating information scattered across the communication, networking, and DL areas, this survey can help readers to understand the connections between enabling technologies while promoting further discussions on the fusion of edge intelligence and intelligent edge, i.e., Edge DL.
△ Less
Submitted 28 January, 2020; v1 submitted 18 July, 2019;
originally announced July 2019.
-
Cognitive Information Measurements: A New Perspective
Authors:
Min Chen,
Yixue Hao,
Hamid Gharavi,
Victor C. M. Leung
Abstract:
From a traditional point of view, the value of information does not change during transmission. The Shannon information theory considers information transmission as a statistical phenomenon for measuring the communication channel capacity. However, in modern communication systems, information is spontaneously embedded with a cognitive link during the transmission process, which requires a new meas…
▽ More
From a traditional point of view, the value of information does not change during transmission. The Shannon information theory considers information transmission as a statistical phenomenon for measuring the communication channel capacity. However, in modern communication systems, information is spontaneously embedded with a cognitive link during the transmission process, which requires a new measurement that can incorporate continuously changing information value. In this paper, we introduce the concept of cognitive information value and a method of measuring such information. We first describe the characteristics of cognitive information followed by an introduction of the concept of cognitive information in measuring information popularity. The new measurement is based on the mailbox principle in the information value chain. This is achieved by encapsulating the information as a mailbox for transmission where the cognition is continuously implemented during the transmission process. Finally, we set up a cognitive communication system based on a combination of the traditional communication system and cognitive computing. Experimental results attest to the impact of incorporating cognitive value in the performance of 5G networks.
△ Less
Submitted 2 July, 2019;
originally announced July 2019.
-
Secure Distributed On-Device Learning Networks With Byzantine Adversaries
Authors:
Yanjie Dong,
Julian Cheng,
Md. Jahangir Hossain,
Victor C. M. Leung
Abstract:
The privacy concern exists when the central server has the copies of datasets. Hence, there is a paradigm shift for the learning networks to change from centralized in-cloud learning to distributed \mbox{on-device} learning. Benefit from the parallel computing, the on-device learning networks have a lower bandwidth requirement than the in-cloud learning networks. Moreover, the on-device learning n…
▽ More
The privacy concern exists when the central server has the copies of datasets. Hence, there is a paradigm shift for the learning networks to change from centralized in-cloud learning to distributed \mbox{on-device} learning. Benefit from the parallel computing, the on-device learning networks have a lower bandwidth requirement than the in-cloud learning networks. Moreover, the on-device learning networks also have several desirable characteristics such as privacy preserving and flexibility. However, the \mbox{on-device} learning networks are vulnerable to the malfunctioning terminals across the networks. The worst-case malfunctioning terminals are the Byzantine adversaries, that can perform arbitrary harmful operations to compromise the learned model based on the full knowledge of the networks. Hence, the design of secure learning algorithms becomes an emerging topic in the on-device learning networks with Byzantine adversaries. In this article, we present a comprehensive overview of the prevalent secure learning algorithms for the two promising on-device learning networks: Federated-Learning networks and decentralized-learning networks. We also review several future research directions in the \mbox{Federated-Learning} and decentralized-learning networks.
△ Less
Submitted 3 June, 2019;
originally announced June 2019.
-
Reconstruction of FRI Signals using Deep Neural Network Approaches
Authors:
Vincent C. H. Leung,
Jun-Jie Huang,
Pier Luigi Dragotti
Abstract:
Finite Rate of Innovation (FRI) theory considers sampling and reconstruction of classes of non-bandlimited continuous signals that have a small number of free parameters, such as a stream of Diracs. The task of reconstructing FRI signals from discrete samples is often transformed into a spectral estimation problem and solved using Prony's method and matrix pencil method which involve estimating si…
▽ More
Finite Rate of Innovation (FRI) theory considers sampling and reconstruction of classes of non-bandlimited continuous signals that have a small number of free parameters, such as a stream of Diracs. The task of reconstructing FRI signals from discrete samples is often transformed into a spectral estimation problem and solved using Prony's method and matrix pencil method which involve estimating signal subspaces. They achieve an optimal performance given by the Cramér-Rao bound yet break down at a certain peak signal-to-noise ratio (PSNR). This is probably due to the so-called subspace swap event. In this paper, we aim to alleviate the subspace swap problem and investigate alternative approaches including directly estimating FRI parameters using deep neural networks and utilising deep neural networks as denoisers to reduce the noise in the samples. Simulations show significant improvements on the breakdown PSNR over existing FRI methods, which still outperform learning-based approaches in medium to high PSNR regimes.
△ Less
Submitted 22 April, 2020; v1 submitted 21 May, 2019;
originally announced May 2019.
-
Joint Long-Term Cache Allocation and Short-Term Content Delivery in Green Cloud Small Cell Networks
Authors:
Xiongwei Wu,
Qiang Li,
Xiuhua Li,
Victor C. M. Leung,
P. C. Ching
Abstract:
Recent years have witnessed an exponential growth of mobile data traffic, which may lead to a serious traffic burn on the wireless networks and considerable power consumption. Network densification and edge caching are effective approaches to addressing these challenges. In this study, we investigate joint long-term cache allocation and short-term content delivery in cloud small cell networks (C-S…
▽ More
Recent years have witnessed an exponential growth of mobile data traffic, which may lead to a serious traffic burn on the wireless networks and considerable power consumption. Network densification and edge caching are effective approaches to addressing these challenges. In this study, we investigate joint long-term cache allocation and short-term content delivery in cloud small cell networks (C-SCNs), where multiple smallcell BSs (SBSs) are connected to the central processor via fronthaul and can store popular contents so as to reduce the duplicated transmissions in networks. Accordingly, a long-term power minimization problem is formulated by jointly optimizing multicast beamforming, BS clustering, and cache allocation under quality of service (QoS) and storage constraints. The resultant mixed timescale design problem is an anticausal problem because the optimal cache allocation depends on the future file requests. To handle it, a two-stage optimization scheme is proposed by utilizing historical knowledge of users' requests and channel state information. Specifically, the online content delivery design is tackled with a penalty-based approach, and the periodic cache updating is optimized with a distributed alternating method. Simulation results indicate that the proposed scheme significantly outperforms conventional schemes and performs extremely close to a genie-aided lower bound in the low caching region.
△ Less
Submitted 24 April, 2019;
originally announced April 2019.
-
Enhanced Energy-Efficient Downlink Resource Allocation in Green Non-Orthogonal Multiple Access Systems
Authors:
Rukhsana Ruby,
Shuxin Zhong,
Derrick Wing Kwan Ng,
Kaishun Wu,
Victor C. M. Leung
Abstract:
Despite numerous advantages, non-orthogonal multiple access (NOMA) technique can bring additional interference for the neighboring ultra-dense networks if the power consumption of the system is not properly optimized. While targeting on the green communication concept, in this paper, we propose an energy-efficient downlink resource allocation scheme for a NOMA-equipped cellular network. The object…
▽ More
Despite numerous advantages, non-orthogonal multiple access (NOMA) technique can bring additional interference for the neighboring ultra-dense networks if the power consumption of the system is not properly optimized. While targeting on the green communication concept, in this paper, we propose an energy-efficient downlink resource allocation scheme for a NOMA-equipped cellular network. The objective of this work is to allocate subchannels and power of the base station among the users so that the overall energy efficiency is maximized. Since this problem is NP-hard, we attempt to find an elegant solution with reasonable complexity that provides good performance for some realistic applications. To this end, we decompose the problem into a subchannel allocation subproblem followed by a power loading subproblem that allocates power to each user's data stream on each of its allocated subchannels. We first employ a many-to-many matching model under the assumption of uniform power loading in order to obtain the solution of the first subproblem with reasonable performance. Once the the subchannel-user map** information is known from the first solution, we propose a geometric programming (GP)-based power loading scheme upon approximating the energy efficiency of the system by a ratio of two posynomials. The techniques adopted for these subproblems better exploit the available multi-user diversity compared to the techniques used in an earlier work. Having observed the computational overhead of the GP-based power loading scheme, we also propose a suboptimal computationally-efficient algorithm for the power loading subproblem with a polynomial time complexity that provides reasonably good performance. Extensive simulation has been conducted to verify that our proposed solution schemes always outperform the existing work while consuming much less power at the base station.
△ Less
Submitted 18 April, 2019;
originally announced April 2019.
-
Coverage Performance of Aerial-Terrestrial HetNets
Authors:
M. G. Khoshkholgh,
Keivan Navaie,
Halim Yanikomerogluy,
V. C. M. Leung,
Kang. G. Shin
Abstract:
Providing seamless coverage under current cellular network technologies is surmountable only through gross overengineering. Alternatively, as an economically effective solution, the use of unmanned aerial vehicles (UAVs), augmented with the functionalities of terrestrial base stations (BSs), is recently advocated. In this paper we investigate the effect that the incorporation of UAV-mounted BSs (U…
▽ More
Providing seamless coverage under current cellular network technologies is surmountable only through gross overengineering. Alternatively, as an economically effective solution, the use of unmanned aerial vehicles (UAVs), augmented with the functionalities of terrestrial base stations (BSs), is recently advocated. In this paper we investigate the effect that the incorporation of UAV-mounted BSs (U-BS) poses on the coverage probability of cellular networks. To this end, we focus on the evaluation of the coverage probability of a large-scale aerialterrestrial heterogenous cellular network (AT-HetNet), in which BSs of each technology/tier can be either ground (G-BS) or UBS. Our analysis incorporates the impact of Line-of-Sight (LOS) and non-LOS (NLOS) path-loss attenuations of both ground-toground (G2G) and Air-to-Ground (A2G) links. Adopting tools of stochastic geometry we provide an expression for the coverage probability based on main system parameters and percentage of BSs in each tier that are aerial. We confirm the accuracy of our analysis. Using our analysis, we observe that for several common communication environments, e.g., high-rise and dense urban environments, the inclusion of U-BSs can be detrimental to the coverage probability. Nevertheless, it is still possible to minimize the coverage cost by turning off a percentage of G-BSs. Interestingly, for urban and sub-urban areas one can adjust the altitude of U-BSs in order to increase the coverage probability.
△ Less
Submitted 22 February, 2019;
originally announced February 2019.
-
Randomized Caching in Cooperative UAV-Enabled Fog-RAN
Authors:
M. G. Khoshkholgh,
Keivan Navaie,
Halim Yanikomerogluy,
V. C. M. Leung,
Kang G. Shin
Abstract:
We consider an unmanned aerial vehicle enabled (UAV-enabled) fog-radio access network (F-RAN) in which UAVs are considered as flying remote radio heads (RRH) equipped with caching and cooperative communications capabilities. We are mainly focus on probabilistic/randomized content placement strategy, and accordingly formulate the content placement as an optimization problem. We then study the effic…
▽ More
We consider an unmanned aerial vehicle enabled (UAV-enabled) fog-radio access network (F-RAN) in which UAVs are considered as flying remote radio heads (RRH) equipped with caching and cooperative communications capabilities. We are mainly focus on probabilistic/randomized content placement strategy, and accordingly formulate the content placement as an optimization problem. We then study the efficiency of the proposed content placement by evaluating the average system capacity and its energy-efficiency. Our results indicate that cooperative communication plays an essential role in UAVenabled edge communications as it effectively curbs the impact of dominant Line-of-Sight (LOS) received interference. It is also seen that cooperative cache-enabled UAV F-RAN performs better in high-rise environments than dense urban and sub-urban environments. This is due to a significant reduction of the received LOS interference because of blockage by the high-rise buildings, and the performance gain of cooperative communication on the attending signal. Comparing the performances of the developed content placement strategy and conventional caching techniques shows that our proposed probabilistic/randomized caching outperforms the others in most of the practical cases.
△ Less
Submitted 22 February, 2019;
originally announced February 2019.
-
How Do Non-Ideal UAV Antennas Affect Air-to-Ground Communications?
Authors:
M. G. Khoshkholgh,
Keivan Navaie,
Halim Yanikomeroglu,
V. C. M. Leung,
Kang. G. Shin
Abstract:
Analysis of the performance of Unmanned Aerial Vehicle (UAV)-enabled communications systems often relies upon idealized antenna characteristic, where the side-lobe gain of UAVs' antenna is ignored. In practice, however, side-lobe cause inevitable interference to the ground users. We investigate the impact of UAVs' antenna side-lobe on the performance of UAV-enabled communication. Our analysis show…
▽ More
Analysis of the performance of Unmanned Aerial Vehicle (UAV)-enabled communications systems often relies upon idealized antenna characteristic, where the side-lobe gain of UAVs' antenna is ignored. In practice, however, side-lobe cause inevitable interference to the ground users. We investigate the impact of UAVs' antenna side-lobe on the performance of UAV-enabled communication. Our analysis shows that even for a very small antenna's side-lobe gain, the ground receiver can experience substantial interference. We further show that a rather large exclusion zone is required to ensure a sufficient level of protection for the ground receiver. Nevertheless, in a multiple-antenna setting for the ground users, even when such a large exclusion zone was in place, UAVs' antenna side-lobe creates a high level of correlation among the interference signals received across receive antennas. Such a correlation limits the system ability to exploit channel diversity in a multiple-antenna setting for improving capacity. We then quantify the impact of UAVs' antenna side-lobes on the overall system performance by deriving the corresponding loss of the achieved capacity in various communications environments. We provide a new quantitative insight on the cost of adopting non-ideal UAV antenna on the overall capacity. Our analysis also shows that the capacity loss can be confined by careful selection of system parameters.
△ Less
Submitted 22 February, 2019;
originally announced February 2019.
-
Caching or No Caching in Dense HetNets?
Authors:
M. G. Khoshkholgh,
Keivan Navaie,
Kang G. Shin,
V. C. M. Leung,
Halim Yanikomeroglu
Abstract:
Caching the content closer to the user equipments (UEs) in heterogenous cellular networks (HetNets) improves user-perceived Quality-of-Service (QoS) while lowering the operators backhaul usage/costs. Nevertheless, under the current networking strategy that promotes aggressive densification, it is unclear whether cache-enabled HetNets preserve the claimed cost-effectiveness and the potential benefi…
▽ More
Caching the content closer to the user equipments (UEs) in heterogenous cellular networks (HetNets) improves user-perceived Quality-of-Service (QoS) while lowering the operators backhaul usage/costs. Nevertheless, under the current networking strategy that promotes aggressive densification, it is unclear whether cache-enabled HetNets preserve the claimed cost-effectiveness and the potential benefits. This is due to 1) the collective cost of caching which may inevitably exceed the expensive cost of backhaul in a dense HetNet, and 2) the excessive interference which affects the signal reception irrespective of content placement. We analyze these significant, yet overlooked, issues, showing that while densification reduces backhaul load and increases spectral efficiency in cache-enabled dense networks, it simultaneously reduces cache-hit probability and increases the network cost. We then introduce a caching efficiency metric, area spectral efficiency per unit spent cost, and find it enough to cache only about 3% of the content library size in the cache of smallcell base stations. Furthermore, we show that range expansion, which is known to be of substantial value in wireless networks, is almost impotent to curb the caching inefficiency. Surprisingly, unlike the conventional wisdom recommending traffic offloading from macro cells to small cells, in cache-enabled HetNets, it is generally more beneficial to exclude offloading altogether or to do the opposite.
△ Less
Submitted 30 January, 2019;
originally announced January 2019.
-
Delay Analysis of Spatially-Coded MIMO-ZFBF with Retransmissions in Random Networks
Authors:
Mohammad G. Khoshkholgh,
Victor C. M. Leung
Abstract:
For a low-mobile Poisson bipolar network and under line-of-sight/non-line-of-sight (LOS/NLOS) path-loss model, we study repetitive retransmissions (RR) and blocked incremental redundancy (B-IR). We consider spatially-coded multiple-input multiple-output (MIMO) zero-forcing beamforming (ZFBF) multiplexing system, whereby the packet success reception is determined based on the aggregate data rate ac…
▽ More
For a low-mobile Poisson bipolar network and under line-of-sight/non-line-of-sight (LOS/NLOS) path-loss model, we study repetitive retransmissions (RR) and blocked incremental redundancy (B-IR). We consider spatially-coded multiple-input multiple-output (MIMO) zero-forcing beamforming (ZFBF) multiplexing system, whereby the packet success reception is determined based on the aggregate data rate across spatial dimensions of the MIMO system. Characterization of retransmission performance in this low-mobile configuration is practically important, but inherently complex due to a substantial rate correlation across retransmissions and intractability of evaluating the probability density function (pdf) of aggregate data rate. Adopting tools of stochastic geometry, we firstly characterize the rate correlation coefficient (RCC) for both schemes. Our results show that, compared to RR scheme, B-IR scheme has higher RCC while its coverage probability is substantially larger. We demonstrate that the spotted contention between coverage probability and RCC causes the mean transmission delay (MTD) of B-IR to become either smaller or larger than the MTD of RR scheme. Finally, we develop a numerical approximation of MTD, and evaluate the effective spatial throughput (EST), which is reciprocal to MTD, of RR and B-IR schemes. Our numerical results highlight fundamental tradeoffs between densification, multiplexing gain, block length, and activity factor of nodes. We further observe that for dense networks 1) LOS component is considerably instrumental to enhance EST; 2) EST of B-IR scheme can be much higher than that of RR scheme; 3) When Doppler spread exists, it can improve MTD of B-IR while it does not cast any meaningful effect on the MTD of RR.
△ Less
Submitted 30 January, 2019;
originally announced January 2019.
-
Decentralized Applications: The Blockchain-Empowered Software System
Authors:
Wei Cai,
Zehua Wang,
Jason B. Ernst,
Zhen Hong,
Chen Feng,
Victor C. M. Leung
Abstract:
Blockchain technology has attracted tremendous attention in both academia and capital market. However, overwhelming speculations on thousands of available cryptocurrencies and numerous initial coin offering (ICO) scams have also brought notorious debates on this emerging technology. This paper traces the development of blockchain systems to reveal the importance of decentralized applications (dApp…
▽ More
Blockchain technology has attracted tremendous attention in both academia and capital market. However, overwhelming speculations on thousands of available cryptocurrencies and numerous initial coin offering (ICO) scams have also brought notorious debates on this emerging technology. This paper traces the development of blockchain systems to reveal the importance of decentralized applications (dApps) and the future value of blockchain. We survey the state-of-the-art dApps and discuss the direction of blockchain development to fulfill the desirable characteristics of dApps. The readers will gain an overview of dApp research and get familiar with recent developments in the blockchain.
△ Less
Submitted 12 October, 2018;
originally announced October 2018.
-
Robust Energy Efficient Beamforming in MISOME-SWIPT Systems With Proportional Secrecy Rate
Authors:
Yanjie Dong,
Md. Jahangir Hossain,
Julian Cheng,
Victor C. M. Leung
Abstract:
The joint design of beamforming vector and artificial noise covariance matrix is investigated for the multiple-input-single-output-multiple-eavesdropper simultaneous wireless information and power transferring \mbox{(MISOME-SWIPT)} systems. In the MISOME-SWIPT system, the base station delivers information signals to the legitimate user equipments and broadcasts jamming signals to the eavesdroppers…
▽ More
The joint design of beamforming vector and artificial noise covariance matrix is investigated for the multiple-input-single-output-multiple-eavesdropper simultaneous wireless information and power transferring \mbox{(MISOME-SWIPT)} systems. In the MISOME-SWIPT system, the base station delivers information signals to the legitimate user equipments and broadcasts jamming signals to the eavesdroppers. A secrecy energy efficiency (SEE) maximization problem is formulated for the considered \mbox{MISOME-SWIPT} system with imperfect channel state information, where the SEE is defined as the ratio of sum secrecy rate over total power consumption. Since the formulated SEE maximization problem is non-convex, it is first recast into a series of convex problems in order to obtain the optimal solution with a reasonable computational complexity. Two suboptimal solutions are also proposed based on the heuristic beamforming techniques that trade performance for computational complexity. In addition, the analysis of computational complexity is performed for the optimal and suboptimal solutions. Numerical results are used to verify the performance of proposed algorithms and to reveal practical insights.
△ Less
Submitted 8 September, 2018;
originally announced September 2018.
-
Resource Allocation for a Wireless Powered Integrated Radar and Communication System
Authors:
Yifan Zhou,
Huilin Zhou,
Fuhui Zhou,
Yongpeng Wu,
Victor C. M. Leung
Abstract:
The integrated radar and communication system is promising in the next generation wireless communication networks. However, its performance is confined by the limited energy. In order to overcome it, a wireless powered integrated radar and communication system is proposed. An energy minimization problem is formulated subject to constraints on the radar and communication performances. The energy be…
▽ More
The integrated radar and communication system is promising in the next generation wireless communication networks. However, its performance is confined by the limited energy. In order to overcome it, a wireless powered integrated radar and communication system is proposed. An energy minimization problem is formulated subject to constraints on the radar and communication performances. The energy beamforming and radar-communication waveform are jointly optimized to minimize the consumption energy. The challenging non-convex problem is solved by using semidefinite relaxation and auxiliary variable methods. It is proved that the optimal solution can be obtained. Simulation results demonstrate that our proposed optimal design outperforms the benchmark scheme.
△ Less
Submitted 2 September, 2018;
originally announced September 2018.
-
Robust Secrecy Energy Efficient Beamforming in MISOME-SWIPT Systems With Proportional Fairness
Authors:
Yanjie Dong,
Md. Jahangir Hossain,
Julian Cheng,
Victor C. M. Leung
Abstract:
The joint design of beamforming vector and artificial noise covariance matrix is investigated for multiple-input-single-output-multiple-eavesdropper simultaneous wireless information and power transferring (MISOME-SWIPT) systems. A secrecy energy efficiency (SEE) maximization problem is formulated in the MISOME-SWIPT system with imperfect channel state information and proportional secrecy rate con…
▽ More
The joint design of beamforming vector and artificial noise covariance matrix is investigated for multiple-input-single-output-multiple-eavesdropper simultaneous wireless information and power transferring (MISOME-SWIPT) systems. A secrecy energy efficiency (SEE) maximization problem is formulated in the MISOME-SWIPT system with imperfect channel state information and proportional secrecy rate constraints. Since the formulated SEE maximization problem is non-convex, it is first recast into a series of convex problems in order to obtain the optimal solution with a reasonable computational complexity. Numerical results are used to verify the performance of the proposed algorithm and to reveal practical insights.
△ Less
Submitted 8 September, 2018; v1 submitted 6 August, 2018;
originally announced August 2018.
-
Cable Diagnostics with Power Line Modems for Smart Grid Monitoring
Authors:
Yinjia Huo,
Gautham Prasad,
Lazar Atanackovic,
Lutz Lampe,
Victor C. M. Leung
Abstract:
Remote monitoring of electrical cable conditions is an essential characteristic of the next-generation smart grid, which features the ability to consistently surveil and control the grid infrastructure. In this paper, we propose a technique that harnesses power line modems (PLMs) as sensors for monitoring cable health. We envisage that all or most of these PLMs have already been deployed for data…
▽ More
Remote monitoring of electrical cable conditions is an essential characteristic of the next-generation smart grid, which features the ability to consistently surveil and control the grid infrastructure. In this paper, we propose a technique that harnesses power line modems (PLMs) as sensors for monitoring cable health. We envisage that all or most of these PLMs have already been deployed for data communication purposes and focus on the distribution grid or neighborhood area networks in the smart grid. For such a setting, we propose a machine learning (ML) based framework for automatic cable diagnostics by continuously monitoring the cable status to identify, assess, and locate possible degradations. As part of our technique, we also synthesize state-of-the-art reflectometry methods within the PLMs to extract beneficial features for effective performance of our proposed ML solution. Simulation results demonstrate the effectiveness of our solution under different aging conditions and varying load configurations. Finally, we reflect on our proposed diagnostics method by evaluating its robustness and comparing it with existing alternatives.
△ Less
Submitted 21 February, 2019; v1 submitted 3 August, 2018;
originally announced August 2018.
-
Optimal Resource Allocation in Full-Duplex Ambient Backscatter Communication Networks for Wireless-Powered IoT
Authors:
Gang Yang,
Dongdong Yuan,
Ying-Chang Liang,
Rui Zhang,
Victor C. M. Leung
Abstract:
This paper considers an ambient backscatter communication (AmBC) network in which a full-duplex access point (FAP) simultaneously transmits downlink orthogonal frequency division multiplexing (OFDM) signals to its legacy user (LU) and receives uplink signals backscattered from multiple BDs in a time-division-multiple-access manner. To maximize the system throughput and ensure fairness, we aim to m…
▽ More
This paper considers an ambient backscatter communication (AmBC) network in which a full-duplex access point (FAP) simultaneously transmits downlink orthogonal frequency division multiplexing (OFDM) signals to its legacy user (LU) and receives uplink signals backscattered from multiple BDs in a time-division-multiple-access manner. To maximize the system throughput and ensure fairness, we aim to maximize the minimum throughput among all BDs by jointly optimizing the backscatter time and reflection coefficients of the BDs, and the FAP's subcarrier power allocation, subject to the LU's throughput constraint, the BDs' harvested-energy constraints, and other practical constraints. For the case with a single BD, we obtain closed-form solutions and propose an efficient algorithm by using the Lagrange duality method. For the general case with multiple BDs, we propose an iterative algorithm by leveraging the block coordinated decent and successive convex optimization techniques. We further show the convergence performances of the proposed algorithms and analyze their complexities. In addition, we study the throughput region which characterizes the Pareto-optimal throughput trade-offs among all BDs. Finally, extensive simulation results show that the proposed joint design achieves significant throughput gain as compared to the benchmark schemes.
△ Less
Submitted 18 June, 2018;
originally announced June 2018.
-
Extracting the Most Weighted Throughput in UAV Empowered Wireless Systems With Nonlinear Energy Harvester
Authors:
Yanjie Dong,
Julian Cheng,
Md. Jahangir Hossain,
Victor C. M. Leung
Abstract:
With the maturity of unmanned aerial vehicle (UAV) technology, this work investigates the integration of UAV into wireless communication systems. Since the UAV is powered by a capacity-limited battery, this work proposes to use the radio energy harvesting technology at the UAV in order to extend the lifetime of UAV empowered base station. To extract the most weighted throughput of UAV empowered wi…
▽ More
With the maturity of unmanned aerial vehicle (UAV) technology, this work investigates the integration of UAV into wireless communication systems. Since the UAV is powered by a capacity-limited battery, this work proposes to use the radio energy harvesting technology at the UAV in order to extend the lifetime of UAV empowered base station. To extract the most weighted throughput of UAV empowered wireless systems, the dirty paper coding scheme and information-theoretic uplink-downlink channel duality are exploited to propose an extracting the most weighted throughput algorithm. Numerical results are used to verify the proposed algorithm.
△ Less
Submitted 27 April, 2018;
originally announced April 2018.
-
Performance Enhancement of Downlink NOMA by Combination with GSSK
Authors:
** Woo Kim,
Soo Young Shin,
Victor C. M. Leung
Abstract:
In non-orthogonal multiple access (NOMA), cell-edge users experience significantly low spectral density because only some part of the total transmit power is allocated. This leads to low spectral efficiency for the paired users in NOMA. To overcome this problem, we propose an integration of NOMA and generalized space shift keying (GSSK), called NOMA-GSSK, to improve the spectral efficiency by expl…
▽ More
In non-orthogonal multiple access (NOMA), cell-edge users experience significantly low spectral density because only some part of the total transmit power is allocated. This leads to low spectral efficiency for the paired users in NOMA. To overcome this problem, we propose an integration of NOMA and generalized space shift keying (GSSK), called NOMA-GSSK, to improve the spectral efficiency by exploiting the spatial domain. Spectral and energy efficiency, bit error rate (BER), and computational complexity of the proposed system were analyzed and compared to those of multiple-input multiple-output NOMA (MIMO-NOMA). It is shown that NOMA-GSSK outperforms MIMO-NOMA.
△ Less
Submitted 16 April, 2018;
originally announced April 2018.
-
Mixed Málaga-$\mathcal{M}$ and Generalized-$\cal K$ Dual-Hop FSO/RF Systems with Interference
Authors:
Imène Trigui,
Nesrine Cherif,
Sofiène Affes,
Xianbin Wang,
Victor C. M. Leung
Abstract:
This paper investigates the impact of radio frequency (RF) cochannel interference (CCI) on the performance of dual-hop free-space optics (FSO)/RF relay networks. The considered FSO/RF system operates over mixed Málaga-$\mathcal{M}$/composite fading/shadowing generalized-$\cal K$ ($\cal GK$) channels with pointing errors. The {\rm H}-transform theory, wherein integral transforms involve Fox's {\rm…
▽ More
This paper investigates the impact of radio frequency (RF) cochannel interference (CCI) on the performance of dual-hop free-space optics (FSO)/RF relay networks. The considered FSO/RF system operates over mixed Málaga-$\mathcal{M}$/composite fading/shadowing generalized-$\cal K$ ($\cal GK$) channels with pointing errors. The {\rm H}-transform theory, wherein integral transforms involve Fox's {\rm H}-functions as kernels, is embodied into a unifying performance analysis framework that encompasses closed-form expressions for the outage probability, the average bit error rate (BER), and the ergodic capacity. By virtue of some {\rm H}-transform asymptotic expansions, the high signal-to-interference-plus-noise ratio (SINR) analysis culminates in easy-to-compute expressions for the outage probability and BER.
△ Less
Submitted 19 March, 2018;
originally announced March 2018.
-
An Edge Computing Empowered Radio Access Network With UAV-Mounted FSO Fronthaul and Backhaul: Key Challenges and Approaches
Authors:
Yanjie Dong,
Md. Zoheb Hassan,
Julian Cheng,
Md. Jahangir Hossain,
Victor C. M. Leung
Abstract:
One promising approach to address the supply-demand mismatch between the terrestrial infrastructure and the temporary and/or unexpected traffic demands is to leverage the unmanned aerial vehicle (UAV) technologies. Motivated by the recent advancement of UAV technologies and retromodulator based free space optical communication, we propose a novel edge-computing empowered radio access network archi…
▽ More
One promising approach to address the supply-demand mismatch between the terrestrial infrastructure and the temporary and/or unexpected traffic demands is to leverage the unmanned aerial vehicle (UAV) technologies. Motivated by the recent advancement of UAV technologies and retromodulator based free space optical communication, we propose a novel edge-computing empowered radio access network architecture where the fronthaul and backhaul links are mounted on the UAVs for rapid event response and flexible deployment. The implementation of hardware and networking technologies for the proposed architecture are investigated. Due to the limited payload and endurance as well as the high mobility of UAVs, research challenges related to the communication resource management and recent research progress are reported.
△ Less
Submitted 16 March, 2018;
originally announced March 2018.
-
Resource Allocation for Secure MISO-NOMA Cognitive Radios Relying on SWIPT
Authors:
Fuhui Zhou,
Zheng Chu,
Haijian Sun,
Victor C. M. Leung
Abstract:
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) are two promising technologies in the next generation wireless communication systems. The security of a NOMA CR network (CRN) is important but lacks of study. In this paper, a multiple-input single-output NOMA CRN relying on simultaneous wireless information and power transfer is studied. In order to improve the security of both the pr…
▽ More
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) are two promising technologies in the next generation wireless communication systems. The security of a NOMA CR network (CRN) is important but lacks of study. In this paper, a multiple-input single-output NOMA CRN relying on simultaneous wireless information and power transfer is studied. In order to improve the security of both the primary and secondary network, an artificial noise-aided cooperative jamming scheme is proposed. Different from the most existing works, a power minimization problem is formulated under a practical non-linear energy harvesting model. A suboptimal scheme is proposed to solve this problem based on semidefinite relaxation and successive convex approximation. Simulation results show that the proposed cooperative jamming scheme is efficient to achieve secure communication and NOMA outperforms the conventional orthogonal multiple access in terms of the power consumption.
△ Less
Submitted 12 February, 2018;
originally announced February 2018.
-
D2D Big Data: Content Deliveries over Wireless Device-to-Device Sharing in Large Scale Mobile Networks
Authors:
Xiaofei Wang,
Yuhua Zhang,
Victor C. M. Leung,
Nadra Guizani,
Tianpeng Jiang
Abstract:
Recently the topic of how to effectively offload cellular traffic onto device-to-device (D2D) sharing among users in proximity has been gaining more and more attention of global researchers and engineers. Users utilize wireless short-range D2D communications for sharing contents locally, due to not only the rapid sharing experience and free cost, but also high accuracy on deliveries of interesting…
▽ More
Recently the topic of how to effectively offload cellular traffic onto device-to-device (D2D) sharing among users in proximity has been gaining more and more attention of global researchers and engineers. Users utilize wireless short-range D2D communications for sharing contents locally, due to not only the rapid sharing experience and free cost, but also high accuracy on deliveries of interesting and popular contents, as well as strong social impacts among friends. Nevertheless, the existing related studies are mostly confined to small-scale datasets, limited dimensions of user features, or unrealistic assumptions and hypotheses on user behaviors. In this article, driven by emerging Big Data techniques, we propose to design a big data platform, named D2D Big Data, in order to encourage the wireless D2D communications among users effectively, to promote contents for providers accurately, and to carry out offloading intelligence for operators efficiently. We deploy a big data platform and further utilize a large-scale dataset (3.56 TBytes) from a popular D2D sharing application (APP), which contains 866 million D2D sharing activities on 4.5 million files disseminated via nearly 850 million users in 13 weeks. By abstracting and analyzing multidimensional features, including online behaviors, content properties, location relations, structural characteristics, meeting dynamics, social arborescence, privacy preservation policies and so on, we verify and evaluate the D2D Big Data platform regarding predictive content propagating coverage. Finally, we discuss challenges and opportunities regarding D2D Big Data and propose to unveil a promising upcoming future of wireless D2D communications.
△ Less
Submitted 2 February, 2018;
originally announced February 2018.
-
Energy-Efficient Resource Allocation in NOMA Heterogeneous Networks
Authors:
Haijun Zhang,
Fang Fang,
Julian Cheng,
Ke** Long,
Wei Wang,
Victor C. M. Leung
Abstract:
Non-orthogonal multiple access (NOMA) has attracted much recent attention owing to its capability for improving the system spectral efficiency in wireless communications. Deploying NOMA in heterogeneous network can satisfy users' explosive data traffic requirements, and NOMA will likely play an important role in the fifth-generation (5G) mobile communication networks. However, NOMA brings new tech…
▽ More
Non-orthogonal multiple access (NOMA) has attracted much recent attention owing to its capability for improving the system spectral efficiency in wireless communications. Deploying NOMA in heterogeneous network can satisfy users' explosive data traffic requirements, and NOMA will likely play an important role in the fifth-generation (5G) mobile communication networks. However, NOMA brings new technical challenges on resource allocation due to the mutual cross-tier interference in heterogeneous networks. In this article, to study the tradeoff between data rate performance and energy consumption in NOMA, we examine the problem of energy-efficient user scheduling and power optimization in 5G NOMA heterogeneous networks. The energy-efficient user scheduling and power allocation schemes are introduced for the downlink 5G NOMA heterogeneous network for perfect and imperfect channel state information (CSI) respectively. Simulation results show that the resource allocation schemes can significantly increase the energy efficiency of 5G NOMA heterogeneous network for both cases of perfect CSI and imperfect CSI.
△ Less
Submitted 14 January, 2018;
originally announced January 2018.
-
Secure Communications in NOMA System: Subcarrier Assignment and Power Allocation
Authors:
Haijun Zhang,
Ning Yang,
Ke** Long,
Miao Pan,
George K. Karagiannidis,
Victor C. M. Leung
Abstract:
Secure communication is a promising technology for wireless networks because it ensures secure transmission of information. In this paper, we investigate the joint subcarrier (SC) assignment and power allocation problem for non-orthogonal multiple access (NOMA) amplify-and-forward two-way relay wireless networks, in the presence of eavesdroppers. By exploiting cooperative jamming (CJ) to enhance t…
▽ More
Secure communication is a promising technology for wireless networks because it ensures secure transmission of information. In this paper, we investigate the joint subcarrier (SC) assignment and power allocation problem for non-orthogonal multiple access (NOMA) amplify-and-forward two-way relay wireless networks, in the presence of eavesdroppers. By exploiting cooperative jamming (CJ) to enhance the security of the communication link, we aim to maximize the achievable secrecy energy efficiency by jointly designing the SC assignment, user pair scheduling and power allocation. Assuming the perfect knowledge of the channel state information (CSI) at the relay station, we propose a low-complexity subcarrier assignment scheme (SCAS-1), which is equivalent to many-to-many matching games, and then SCAS-2 is formulated as a secrecy energy efficiency maximization problem. The secure power allocation problem is modeled as a convex geometric programming problem, and then solved by interior point methods. Simulation results demonstrate that the effectiveness of the proposed SSPA algorithms under scenarios of using and not using CJ, respectively.
△ Less
Submitted 13 January, 2018;
originally announced January 2018.
-
When Exploiting Individual User Preference Is Beneficial for Caching at Base Stations
Authors:
Dong Liu,
Chenyang Yang,
Victor C. M. Leung
Abstract:
Most of prior works optimize caching policies based on the following assumptions: 1) every user initiates request according to content popularity, 2) all users are with the same active level, and 3) users are uniformly located in the considered region. In practice, these assumptions are often not true. In this paper, we explore the benefit of optimizing caching policies for base stations by exploi…
▽ More
Most of prior works optimize caching policies based on the following assumptions: 1) every user initiates request according to content popularity, 2) all users are with the same active level, and 3) users are uniformly located in the considered region. In practice, these assumptions are often not true. In this paper, we explore the benefit of optimizing caching policies for base stations by exploiting user preference considering the spatial locality and different active level of users. We obtain optimal caching policies, respectively minimizing the download delay averaged over all file requests and user locations in the network (namely network average delay), and minimizing the maximal weighted download delay averaged over the file requests and location of each user (namely maximal weighted user average delay), as well as minimizing the weighted sum of both. The analysis and simulation results show that exploiting heterogeneous user preference and active level can improve user fairness, and can also improve network performance when users are with spatial locality.
△ Less
Submitted 1 March, 2018; v1 submitted 10 January, 2018;
originally announced January 2018.
-
Secure Beamforming in Full-Duplex SWIPT Systems With Loopback Self-Interference Cancellation
Authors:
Yanjie Dong,
Ahmed El Shafie,
Md. Jahangir Hossain,
Julian Cheng,
Naofal Al-Dhahir,
Victor C. M. Leung
Abstract:
Security is a critical issue in full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems with loopback self-interference cancellation. To guarantee high security and energy harvesting p…
▽ More
Security is a critical issue in full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems with loopback self-interference cancellation. To guarantee high security and energy harvesting performance of the FD-SWIPT system, the proposed design is formulated as a secrecy rate maximization problem under energy transfer rate constraints. Although the secrecy rate maximization problem is non-convex, we solve it via semidefinite relaxation and a two-dimensional search. We prove the optimality of our proposed algorithm and demonstrate its performance via simulations.
△ Less
Submitted 8 January, 2018;
originally announced January 2018.
-
Fronthaul-Aware Group Sparse Precoding and Signal Splitting in SWIPT C-RAN
Authors:
Yanjie Dong,
Md. Jahangir Hossain,
Julian Cheng,
Victor C. M. Leung
Abstract:
We investigate the precoding, remote radio head (RRH) selection and signal splitting in the simultaneous wireless information and power transferring (SWIPT) cloud radio access networks \mbox{(C-RANs)}. The objective is to minimize the power consumption of the SWIPT C-RAN. Different from the existing literature, we consider the nonlinear fronthaul power consumption and the multiple antenna RRHs. By…
▽ More
We investigate the precoding, remote radio head (RRH) selection and signal splitting in the simultaneous wireless information and power transferring (SWIPT) cloud radio access networks \mbox{(C-RANs)}. The objective is to minimize the power consumption of the SWIPT C-RAN. Different from the existing literature, we consider the nonlinear fronthaul power consumption and the multiple antenna RRHs. By switching off the unnecessary RRHs, the group sparsity of the precoding coefficients is introduced, which indicates that the precoding process and the RRH selection are coupled. In order to overcome these issues, a group sparse precoding and signal splitting algorithm is proposed based on the majorization-minimization framework, and the convergence behavior is established. Numerical results are used to verify our proposed studies.
△ Less
Submitted 15 November, 2017;
originally announced November 2017.
-
Downlink Energy Efficiency of Power Allocation and Wireless Backhaul Bandwidth Allocation in Heterogeneous Small Cell Networks
Authors:
Haijun Zhang,
Hao Liu,
Julian Cheng,
Victor C. M. Leung
Abstract:
The widespread application of wireless services and dense devices access have triggered huge energy consumption. Because of the environmental and financial considerations, energy-efficient design in wireless networks becomes an inevitable trend. To the best of the authors' knowledge, energy-efficient orthogonal frequency division multiple access heterogeneous small cell optimization comprehensivel…
▽ More
The widespread application of wireless services and dense devices access have triggered huge energy consumption. Because of the environmental and financial considerations, energy-efficient design in wireless networks becomes an inevitable trend. To the best of the authors' knowledge, energy-efficient orthogonal frequency division multiple access heterogeneous small cell optimization comprehensively considering energy efficiency maximization, power allocation, wireless backhaul bandwidth allocation, and user Quality of Service is a novel approach and research direction, and it has not been investigated. In this paper, we study the energy-efficient power allocation and wireless backhaul bandwidth allocation in orthogonal frequency division multiple access heterogeneous small cell networks. Different from the existing resource allocation schemes that maximize the throughput, the studied scheme maximizes energy efficiency by allocating both transmit power of each small cell base station to users and bandwidth for backhauling, according to the channel state information and the circuit power consumption. The problem is first formulated as a non-convex nonlinear programming problem and then it is decomposed into two convex subproblems. A near optimal iterative resource allocation algorithm is designed to solve the resource allocation problem. A suboptimal low-complexity approach is also developed by exploring the inherent structure and property of the energy-efficient design. Simulation results demonstrate the effectiveness of the proposed algorithms by comparing with the existing schemes.
△ Less
Submitted 9 October, 2017;
originally announced October 2017.
-
Dynamic Cross-Layer Beamforming in Hybrid Powered Communication Systems With Harvest-Use-Trade Strategy
Authors:
Yanjie Dong,
Md. Jahangir Hossain,
Julian Cheng,
Victor C. M. Leung
Abstract:
The application of renewable energy is a promising solution to realize the Green Communications. However, if the cellular systems are solely powered by the renewable energy, the weather dependence of the renewable energy arrival makes the systems unstable. On the other hand, the proliferation of the smart grid facilitates the loads with two-way energy trading capability. Hence, a hybrid powered ce…
▽ More
The application of renewable energy is a promising solution to realize the Green Communications. However, if the cellular systems are solely powered by the renewable energy, the weather dependence of the renewable energy arrival makes the systems unstable. On the other hand, the proliferation of the smart grid facilitates the loads with two-way energy trading capability. Hence, a hybrid powered cellular system, which combines the smart grid with the base stations, can reduce the grid energy expenditure and improve the utilization efficiency of the renewable energy. In this paper, the long-term grid energy expenditure minimization problem is formulated as a stochastic optimization model. By leveraging the stochastic optimization theory, we reformulate the stochastic optimization problem as a \mbox{per-frame} grid energy plus weighted penalized packet rate minimization problem, which is NP-hard. As a result, two suboptimal algorithms, which jointly consider the effects of the channel quality and the packet reception failure, are proposed based on the successive approximation beamforming (SABF) technique and the \mbox{zero-forcing} beamforming (ZFBF) technique. The convergence properties of the proposed suboptimal algorithms are established, and the corresponding computational complexities are analyzed. Simulation results show that the proposed SABF algorithm outperforms the ZFBF algorithm in both grid energy expenditure and packet delay. By tuning a control parameter, the grid energy expenditure can be traded for the packet delay under the proposed stochastic optimization model.
△ Less
Submitted 19 September, 2017;
originally announced September 2017.
-
Secure Beamforming in Full-Duplex SWIPT Systems
Authors:
Yanjie Dong,
Ahmed El Shafie,
Md. Jahangir Hossain,
Julian Cheng,
Naofal Al-Dhahir,
Victor C. M. Leung
Abstract:
Physical layer security is a key issue in the full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, the joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems. To guarantee high security and energy harvesting performance of the FD-SWIPT…
▽ More
Physical layer security is a key issue in the full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, the joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems. To guarantee high security and energy harvesting performance of the FD-SWIPT system, the proposed design is formulated as a sum information transmission rate (SITR) maximization problem under information-leakage and energy constraints. In addition, we consider the fairness issue between the uplink and downlink information transmission rates by formulating a \mbox{fairness-aware} SITR-maximization problem. Although the formulated \mbox{SITR-maximization} and \mbox{fairness-aware} \mbox{SITR-maximization} problems are non-convex, we solve them via semidefinite relaxation and one-dimensional search. The optimality of our proposed algorithms is theoretically proved, and the computation complexities are established. Moreover, we propose two suboptimal solutions to the formulated optimization problems. In terms of the SITR-maximization problem, numerical results show that the performance achieved by one of the two suboptimal algorithms is close to the performance of the optimal algorithm with increasing maximum transmission power of the FD-BST.
△ Less
Submitted 19 September, 2017;
originally announced September 2017.
-
Fog Radio Access Networks: Mobility Management, Interference Mitigation and Resource Optimization
Authors:
Haijun Zhang,
Yu Qiu,
Xiaoli Chu,
Ke** Long,
Victor C. M. Leung
Abstract:
In order to make Internet connections ubiquitous and autonomous in our daily lives, maximizing the utilization of radio resources and social information is one of the major research topics in future mobile communication technologies. Fog radio access network (FRAN) is regarded as a promising paradigm for the fifth generation (5G) of mobile networks. FRAN integrates fog computing with RAN and makes…
▽ More
In order to make Internet connections ubiquitous and autonomous in our daily lives, maximizing the utilization of radio resources and social information is one of the major research topics in future mobile communication technologies. Fog radio access network (FRAN) is regarded as a promising paradigm for the fifth generation (5G) of mobile networks. FRAN integrates fog computing with RAN and makes full use of the edge of networks. FRAN would be different in networking, computing, storage and control as compared with conventional radio access networks (RAN) and the emerging cloud RAN. In this article, we provide a description of the FRAN architecture, and discuss how the distinctive characteristics of FRAN make it possible to efficiently alleviate the burden on the fronthaul, backhaul and backbone networks, as well as reduce content delivery latencies. We will focus on the mobility management, interference mitigation, and resource optimization in FRAN. Our simulation results show that the proposed FRAN architecture and the associated mobility and resource management mechanisms can reduce the signaling cost and increase the net utility for the RAN.
△ Less
Submitted 20 July, 2017;
originally announced July 2017.
-
Heterogeneous Services Provisioning in Small Cell Networks with Cache and Mobile Edge Computing
Authors:
Zhiyuan Tan,
F. Richard Yu,
Xi Li,
Hong Ji,
Victor C. M. Leung
Abstract:
In the area of full duplex (FD)-enabled small cell networks, limited works have been done on consideration of cache and mobile edge communication (MEC). In this paper, a virtual FD-enabled small cell network with cache and MEC is investigated for two heterogeneous services, high-data-rate service and computation-sensitive service. In our proposed scheme, content caching and FD communication are cl…
▽ More
In the area of full duplex (FD)-enabled small cell networks, limited works have been done on consideration of cache and mobile edge communication (MEC). In this paper, a virtual FD-enabled small cell network with cache and MEC is investigated for two heterogeneous services, high-data-rate service and computation-sensitive service. In our proposed scheme, content caching and FD communication are closely combined to offer high-data-rate services without the cost of backhaul resource. Computing offloading is conducted to guarantee the delay requirement of users. Then we formulate a virtual resource allocation problem, in which user association, power control, caching and computing offloading policies and resource allocation are jointly considered. Since the original problem is a mixed combinatorial problem, necessary variables relaxation and reformulation are conducted to transfer the original problem to a convex problem. Furthermore, alternating direction method of multipliers (ADMM) algorithm is adopted to obtain the optimal solution. Finally, extensive simulations are conducted with different system configurations to verify the effectiveness of the proposed scheme.
△ Less
Submitted 28 June, 2017;
originally announced June 2017.
-
Base Station Selection for Massive MIMO Networks with Two-stage Precoding
Authors:
Jianpeng Ma,
Shun Zhang,
Hongyan Li,
Nan Zhao,
Victor C. M. Leung
Abstract:
The two-stage precoding has been proposed to reduce the overhead of both the channel training and the channel state information (CSI) feedback for the massive multiple-input multiple-output (MIMO) system. But the overlap of the angle-spreading-ranges (ASR) for different user clusters may seriously degrade the performance of the two-stage precoding. In this letter, we propose one ASR overlap mitiga…
▽ More
The two-stage precoding has been proposed to reduce the overhead of both the channel training and the channel state information (CSI) feedback for the massive multiple-input multiple-output (MIMO) system. But the overlap of the angle-spreading-ranges (ASR) for different user clusters may seriously degrade the performance of the two-stage precoding. In this letter, we propose one ASR overlap mitigating scheme through the base station (BS) selection. Firstly, the BS selection is formulated as a sum signal-to-interference-plus-noise ratio (SINR) maximization problem. Then, the problem is solved by a low-complex algorithm through maximizing signal-to-leakage-plus-noise ratio (SLNR). In addition, we propose one low-overhead algorithm with the lower bound on the average SLNR as the objective function. Finally, we demonstrate the efficacy of the proposed schemes through the numerical simulations.
△ Less
Submitted 16 June, 2017;
originally announced June 2017.
-
Interference-Alignment and Soft-Space-Reuse Based Cooperative Transmission for Multi-cell Massive MIMO Networks
Authors:
Jianpeng Ma,
Shun Zhang,
Hongyan Li,
Nan Zhao,
Victor C. M. Leung
Abstract:
As a revolutionary wireless transmission strategy, interference alignment (IA) can improve the capacity of the cell-edge users. However, the acquisition of the global channel state information (CSI) for IA leads to unacceptable overhead in the massive MIMO systems. To tackle this problem, in this paper, we propose an IA and soft-space-reuse (IA-SSR) based cooperative transmission scheme under the…
▽ More
As a revolutionary wireless transmission strategy, interference alignment (IA) can improve the capacity of the cell-edge users. However, the acquisition of the global channel state information (CSI) for IA leads to unacceptable overhead in the massive MIMO systems. To tackle this problem, in this paper, we propose an IA and soft-space-reuse (IA-SSR) based cooperative transmission scheme under the two-stage precoding framework. Specifically, the cell-center and the cell-edge users are separately treated to fully exploit the spatial degrees of freedoms (DoF). Then, the optimal power allocation policy is developed to maximize the sum-capacity of the network. Next, a low-cost channel estimator is designed for the proposed IA-SSR framework. Some practical issues in IA-SSR implementation are also discussed. Finally, plenty of numerical results are presented to show the efficiency of the proposed algorithm.
△ Less
Submitted 16 June, 2017;
originally announced June 2017.
-
Network Slicing Based 5G and Future Mobile Networks: Mobility, Resource Management, and Challenges
Authors:
H. Zhang,
N. Liu,
X. Chu,
K. Long,
A. Aghvami,
V. C. M. Leung
Abstract:
The fifth-generation (5G) networks are expected to be able to satisfy users' different quality-of-service (QoS) requirements. Network slicing is a promising technology for 5G networks to provide services tailored for users' specific QoS demands. Driven by the increased massive wireless data traffic from different application scenarios, efficient resource allocation schemes should be exploited to i…
▽ More
The fifth-generation (5G) networks are expected to be able to satisfy users' different quality-of-service (QoS) requirements. Network slicing is a promising technology for 5G networks to provide services tailored for users' specific QoS demands. Driven by the increased massive wireless data traffic from different application scenarios, efficient resource allocation schemes should be exploited to improve the flexibility of network resource allocation and capacity of 5G networks based on network slicing. Due to the diversity of 5G application scenarios, new mobility management schemes are greatly needed to guarantee seamless handover in network slicing based 5G systems. In this article, we introduce a logical architecture for network slicing based 5G systems, and present a scheme for managing mobility between different access networks, as well as a joint power and subchannel allocation scheme in spectrum-sharing two-tier systems based on network slicing, where both the co-tier interference and cross-tier interference are taken into account. Simulation results demonstrate that the proposed resource allocation scheme can flexibly allocate network resources between different slices in 5G systems. Finally, several open issues and challenges in network slicing based 5G networks are discussed, including network reconstruction, network slicing management and cooperation with other 5G technologies.
△ Less
Submitted 24 April, 2017;
originally announced April 2017.
-
Energy Efficient User Association and Power Allocation in Millimeter Wave Based Ultra Dense Networks with Energy Harvesting Base Stations
Authors:
H. Zhang,
S. Huang,
C. Jiang,
K. Long,
V. C. M. Leung,
H. Vincent Poor
Abstract:
Millimeter wave (mmWave) communication technologies have recently emerged as an attractive solution to meet the exponentially increasing demand on mobile data traffic. Moreover, ultra dense networks (UDNs) combined with mmWave technology are expected to increase both energy efficiency and spectral efficiency. In this paper, user association and power allocation in mmWave based UDNs is considered w…
▽ More
Millimeter wave (mmWave) communication technologies have recently emerged as an attractive solution to meet the exponentially increasing demand on mobile data traffic. Moreover, ultra dense networks (UDNs) combined with mmWave technology are expected to increase both energy efficiency and spectral efficiency. In this paper, user association and power allocation in mmWave based UDNs is considered with attention to load balance constraints, energy harvesting by base stations, user quality of service requirements, energy efficiency, and cross-tier interference limits. The joint user association and power optimization problem is modeled as a mixed-integer programming problem, which is then transformed into a convex optimization problem by relaxing the user association indicator and solved by Lagrangian dual decomposition. An iterative gradient user association and power allocation algorithm is proposed and shown to converge rapidly to an optimal point. The complexity of the proposed algorithm is analyzed and the effectiveness of the proposed scheme compared with existing methods is verified by simulations.
△ Less
Submitted 24 April, 2017;
originally announced April 2017.
-
Delay-Optimal Biased User Association in Heterogeneous Networks
Authors:
Fancheng Kong,
Xinghua Sun,
Victor C. M. Leung,
Hongbo Zhu
Abstract:
In heterogeneous networks (HetNets), load balancing among different tiers can be effectively achieved by a biased user association scheme with which each user chooses to associate with one base station (BS) based on the biased received power. In contrast to previous studies where a BS always has packets to transmit, we assume in this paper that incoming packets intended for all the associated user…
▽ More
In heterogeneous networks (HetNets), load balancing among different tiers can be effectively achieved by a biased user association scheme with which each user chooses to associate with one base station (BS) based on the biased received power. In contrast to previous studies where a BS always has packets to transmit, we assume in this paper that incoming packets intended for all the associated users form a queue in the BS. In order to find the delay limit of the network to support real-time service, we focus on the delay optimization problem by properly tuning the biasing factor of each tier. By adopting a thinned Poisson point process (PPP) model to characterize the locations of BSs in the busy state, an explicit expression of the average traffic intensity of each tier is obtained. On that basis, an optimization problem is formulated to minimize a lower bound of the network mean queuing delay. By showing that the optimization problem is convex, the optimal biasing factor of each tier can be obtained numerically. When the mean packet arrival rate of each user is small, a closed-form solution is derived. The simulation results demonstrate that the network queuing performance can be significantly improved by properly tuning the biasing factor. It is further shown that the network mean queuing delay might be improved at the cost of a deterioration of the network signal-to-interference ratio (SIR) coverage, which indicates a performance tradeoff between real-time and non-real-time traffic in HetNets.
△ Less
Submitted 4 January, 2017;
originally announced January 2017.
-
Aggressive Congestion Control Mechanism for Space Systems
Authors:
**g**g Wang,
Chunxiao Jiang,
Haijun Zhang,
Yong Ren,
Victor C. M. Leung
Abstract:
How to implement an impeccable space system-of-systems (SoS) internetworking architecture has been a significant issue in system engineering for years. Reliable data transmission is considered one of the most important technologies of space SoS internetworking systems. Due to the high bit error rate (BER), long time delay and asymmetrical channel in the space communication environment, the congest…
▽ More
How to implement an impeccable space system-of-systems (SoS) internetworking architecture has been a significant issue in system engineering for years. Reliable data transmission is considered one of the most important technologies of space SoS internetworking systems. Due to the high bit error rate (BER), long time delay and asymmetrical channel in the space communication environment, the congestion control mechanism of classic transport control protocols (TCP) shows unsatisfying performances. With the help of existing TCP modifications, this paper contributes an aggressive congestion control mechanism. The proposed mechanism is characterized with a fast start procedure, as well as the feedback information to analyze network traffic and with a link terminating processing mechanism, which can help to reveal the real reason of packet loss, and maintain the size of congestion window at a high level. Simulation results are shown in the end to verify the proposed scheme.
△ Less
Submitted 5 August, 2020; v1 submitted 1 January, 2017;
originally announced January 2017.
-
Dynamic Resource Allocation in Next Generation Cellular Networks with Full-Duplex Self-backhauls
Authors:
Lei Chen,
F. Richard Yu,
Hong Ji,
Bo Rong,
Victor C. M. Leung
Abstract:
With the dense deployment of small cell networks, low-cost backhaul schemes for small cell base stations (SBSs) have attracted great attentions. Self-backhaul using cellular communication technology is considered as a promising solution. Although some excellent works have been done on self-backhaul in small cell networks, most of them do not consider the recent advances of full-duplex (FD) and mas…
▽ More
With the dense deployment of small cell networks, low-cost backhaul schemes for small cell base stations (SBSs) have attracted great attentions. Self-backhaul using cellular communication technology is considered as a promising solution. Although some excellent works have been done on self-backhaul in small cell networks, most of them do not consider the recent advances of full-duplex (FD) and massive multiple-input and multiple-output (MIMO) technologies. In this paper, we propose a self-backhaul scheme for small cell networks by combining FD and massive MIMO technologies. In our proposed scheme, the macro base station (MBS) is equipped with massive MIMO antennas, and the SBSs have the FD communication ability. By treating the SBSs as \textit{special} macro users, we can achieve the simultaneous transmissions of the access link of users and the backhaul link of SBSs in the same frequency. Furthermore, considering the existence of inter-tier and intra-tier interference, we formulate the power allocation problem of the MBS and SBSs as an optimization problem. Because the formulated power allocation problem is a non-convex problem, we transform the original problem into a difference of convex program (DCP) by successive convex approximation method (SCAM) and variable transformation, and then solve it using a constrained concave convex procedure (CCCP) based iterative algorithm. Finally, extensive simulations are conducted with different system configurations to verify the effectiveness of the proposed scheme.
△ Less
Submitted 18 November, 2016;
originally announced November 2016.
-
Fronthauling for 5G LTE-U Ultra Dense Cloud Small Cell Networks
Authors:
Haijun Zhang,
Yanjie Dong,
Julian Cheng,
Md. Jahangir Hossain,
Victor C. M. Leung
Abstract:
Ultra dense cloud small cell network (UDCSNet), which combines cloud computing and massive deployment of small cells, is a promising technology for the fifth-generation (5G) LTE-U mobile communications because it can accommodate the anticipated explosive growth of mobile users' data traffic. As a result, fronthauling becomes a challenging problem in 5G LTE-U UDCSNet. In this article, we present an…
▽ More
Ultra dense cloud small cell network (UDCSNet), which combines cloud computing and massive deployment of small cells, is a promising technology for the fifth-generation (5G) LTE-U mobile communications because it can accommodate the anticipated explosive growth of mobile users' data traffic. As a result, fronthauling becomes a challenging problem in 5G LTE-U UDCSNet. In this article, we present an overview of the challenges and requirements of the fronthaul technology in 5G \mbox{LTE-U} UDCSNets. We survey the advantages and challenges for various candidate fronthaul technologies such as optical fiber, millimeter-wave based unlicensed spectrum, Wi-Fi based unlicensed spectrum, sub 6GHz based licensed spectrum, and free-space optical based unlicensed spectrum.
△ Less
Submitted 24 July, 2016;
originally announced July 2016.
-
Distributed Virtual Resource Allocation in Small Cell Networks with Full Duplex Self-backhauls and Virtualization
Authors:
Lei Chen,
F. Richard Yu,
Hong Ji,
Gang Liu,
Victor C. M. Leung
Abstract:
Wireless network virtualization has attracted great attentions from both academia and industry. Another emerging technology for next generation wireless networks is in-band full duplex (FD) communications. Due to its promising performance, FD communication has been considered as an effective way to achieve self-backhauls for small cells. In this paper, we introduce wireless virtualization into sma…
▽ More
Wireless network virtualization has attracted great attentions from both academia and industry. Another emerging technology for next generation wireless networks is in-band full duplex (FD) communications. Due to its promising performance, FD communication has been considered as an effective way to achieve self-backhauls for small cells. In this paper, we introduce wireless virtualization into small cell networks, and propose a virtualized small cell network architecture with FD self-backhauls. We formulate the virtual resource allocation problem in virtualized small cell networks with FD self-backhauls as an optimization problem. Since the formulated problem is a mixed combinatorial and non-convex optimization problem, its computational complexity is high. Moreover, the centralized scheme may suffer from signaling overhead, outdated dynamics information, and scalability issues. To solve it efficiently, we divide the original problem into two subproblems. For the first subproblem, we transfer it to a convex optimization problem, and then solve it by an efficient alternating direction method of multipliers (ADMM)-based distributed algorithm. The second subproblem is a convex problem, which can be solved by each infrastructure provider. Extensive simulations are conducted with different system configurations to show the effectiveness of the proposed scheme.
△ Less
Submitted 19 October, 2015;
originally announced October 2015.
-
Reinforcement Learning Based Transmission Strategy of Cognitive User in IEEE 802.11 based Networks
Authors:
Rukhsana Ruby,
Victor C. M. Leung,
John Sydor
Abstract:
Traditional concept of cognitive radio is the coexistence of primary and secondary user in multiplexed manner. we consider the opportunistic channel access scheme in IEEE 802.11 based networks subject to the interference mitigation scenario. According to the protocol rule and due to the constraint of message passing, secondary user is unaware of the exact state of the primary user. In this paper,…
▽ More
Traditional concept of cognitive radio is the coexistence of primary and secondary user in multiplexed manner. we consider the opportunistic channel access scheme in IEEE 802.11 based networks subject to the interference mitigation scenario. According to the protocol rule and due to the constraint of message passing, secondary user is unaware of the exact state of the primary user. In this paper, we have proposed an online algorithm for the secondary which assist determining a backoff counter or the decision of being idle for utilizing the time/frequency slot unoccupied by the primary user. Proposed algorithm is based on conventional reinforcement learning technique namely Q-Learning. Simulation has been conducted in order to prove the strength of this algorithm and also results have been compared with our contemporary solution of this problem where secondary user is aware of some states of primary user.
△ Less
Submitted 15 October, 2015;
originally announced October 2015.
-
Performance Analysis of a Heterogeneous Traffic Scheduler using Large Deviation Principle
Authors:
Rukhsana Ruby,
Victor C. M. Leung
Abstract:
In this paper, we study the stability of light traffic achieved by a scheduling algorithm which is suitable for heterogeneous traffic networks. Since analyzing a scheduling algorithm is intractable using the conventional mathematical tool, our goal is to minimize the largest queue-overflow probability achieved by the algorithm. In the large deviation setting, this problem is equivalent to maximizi…
▽ More
In this paper, we study the stability of light traffic achieved by a scheduling algorithm which is suitable for heterogeneous traffic networks. Since analyzing a scheduling algorithm is intractable using the conventional mathematical tool, our goal is to minimize the largest queue-overflow probability achieved by the algorithm. In the large deviation setting, this problem is equivalent to maximizing the asymptotic decay rate of the largest queue-overflow probability. We first derive an upper bound on the decay rate of the queue overflow probability as the queue overflow threshold approaches infinity. Then, we study several structural properties of the minimum-cost-path to overflow of the queue with the largest length, which is basically equivalent to the decay rate of the largest queue-overflow probability. Given these properties, we prove that the queue with the largest length follows a sample path with linear increment. For certain parameter value, the scheduling algorithm is asymptotically optimal in reducing the largest queue length. Through numerical results, we have shown the large deviation properties of the queue length typically used in practice while varying one parameter of the algorithm.
△ Less
Submitted 5 April, 2016; v1 submitted 15 October, 2015;
originally announced October 2015.
-
Cooperative Interference Mitigation and Handover Management for Heterogeneous Cloud Small Cell Networks
Authors:
Haijun Zhang,
Chunxiao Jiang,
Julian Cheng,
Victor C. M. Leung
Abstract:
Heterogeneous small cell network has attracted much attention to satisfy users' explosive data traffic requirements. Heterogeneous cloud small cell network (HCSNet), which combines cloud computing and heterogeneous small cell network, will likely play an important role in 5G mobile communication networks. However, with massive deployment of small cells, co-channel interference and handover managem…
▽ More
Heterogeneous small cell network has attracted much attention to satisfy users' explosive data traffic requirements. Heterogeneous cloud small cell network (HCSNet), which combines cloud computing and heterogeneous small cell network, will likely play an important role in 5G mobile communication networks. However, with massive deployment of small cells, co-channel interference and handover management are two important problems in HCSNet, especially for cell edge users. In this article, we examine the problems of cooperative interference mitigation and handover management in HCSNet. A network architecture is described to combine cloud radio access network with small cells. An effective coordinated multi-point (CoMP) clustering scheme using affinity propagation is adopted to mitigate cell edge users' interference. A low complexity handover management scheme is presented, and its signaling procedure is analyzed in HCSNet. Numerical results show that the proposed network architecture, CoMP clustering scheme and handover management scheme can significantly increase the capacity of HCSNet while maintaining users' quality of service.
△ Less
Submitted 30 April, 2015; v1 submitted 30 April, 2015;
originally announced April 2015.