首页期刊导航|Eurasip Journal on Wireless Communications and Networking
期刊信息/Journal information
Eurasip Journal on Wireless Communications and Networking
Springer
Eurasip Journal on Wireless Communications and Networking

Springer

1687-1472

Eurasip Journal on Wireless Communications and Networking/Journal Eurasip Journal on Wireless Communications and NetworkingEIISTPSCI
正式出版
收录年代

    Synchronization in 5G networks: a hybrid Bayesian approach toward clock offset/skew estimation and its impact on localization

    Goodarzi MeysamCvetkovski DarkoMaletic NebojsaGutiérrez Jesús...
    22页
    查看更多>>摘要:Abstract Clock synchronization has always been a major challenge when designing wireless networks. This work focuses on tackling the time synchronization problem in 5G networks by adopting a hybrid Bayesian approach for clock offset and skew estimation. Furthermore, we provide an in-depth analysis of the impact of the proposed approach on a synchronization-sensitive service, i.e., localization. Specifically, we expose the substantial benefit of belief propagation (BP) running on factor graphs (FGs) in achieving precise network-wide synchronization. Moreover, we take advantage of Bayesian recursive filtering (BRF) to mitigate the time-stamping error in pairwise synchronization. Finally, we reveal the merit of hybrid synchronization by dividing a large-scale network into local synchronization domains and applying the most suitable synchronization algorithm (BP- or BRF-based) on each domain. The performance of the hybrid approach is then evaluated in terms of the root mean square errors (RMSEs) of the clock offset, clock skew, and the position estimation. According to the simulations, in spite of the simplifications in the hybrid approach, RMSEs of clock offset, clock skew, and position estimation remain below 10 ns, 1 ppm, and 1.5 m, respectively.

    Outage prediction for ultra-reliable low-latency communications in fast fading channels

    Schmitt EvaH??ler TomScheuvens LucasFranchi Norman...
    25页
    查看更多>>摘要:Abstract The addition of redundancy is a promising solution to achieve a certain quality of service (QoS)?for ultra-reliable low-latency communications (URLLC) in challenging fast fading scenarios. However, adding more and more redundancy to the transmission results in severely increased radio resource consumption. Monitoring and prediction of fast fading channels can serve as the foundation of advanced scheduling. By choosing suitable resources for transmission, the resource consumption is reduced while maintaining the QoS. In this article, we present outage prediction approaches for Rayleigh and Rician fading channels. Appropriate performance metrics are introduced to show the suitability for URLLC radio resource scheduling. Outage prediction in the Rayleigh fading case can be achieved by adding a threshold comparison to state-of-the-art fading prediction approaches. A line-of-sight (LOS) component estimator is introduced that enables outage prediction in LOS scenarios. Extensive simulations have shown that under realistic conditions, effective outage probabilities of 10-5\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$10^{-5}$$\end{document} can be achieved while reaching up-state prediction probabilities of more than 90%\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${90}{\%}$$\end{document}. We show that the predictor can be tuned to satisfy the desired trade-off between prediction reliability and utilizability of the link. This enables our predictor to be used in future scheduling strategies, which achieve the challenging QoS of URLLC with fewer required redundancy.

    Application of an artificial neural network optimization model in e-commerce platform based on tourism management

    Wei CaoWang QinanLiu Chengying
    21页
    查看更多>>摘要:Abstract The advantages of e-commerce and information technology play an extremely important role in enhancing the competitiveness of the tourism industry and adapting to the needs of global economic integration. The development of e-commerce has played a huge role in all walks of life. For the tourism industry, the role of e-commerce is even more important. This article analyzes the influence of e-commerce on tourism production factors, such as optimizing tourism production factors, optimizing industrial structure, improving the competitiveness of tourism enterprises and playing the leading role of the government. This article attempts to find out the fundamental reason why e-commerce can enhance the competitiveness of China’s tourism industry, so as to find a better way for e-commerce to promote the development of China’s tourism industry. In order to accurately predict the scale and quantity of domestic tourism, an optimized neural network model is proposed to analyze and predict tourism data, and then analyze and research the data. Tourism development factors such as tourism development factors, changes in tourism demand and the optimization of industrial structure have effectively promoted the development of China’s tourism industry.

    End-to-end network slice architecture and distribution across 5G micro-operator leveraging multi-domain and multi-tenancy

    Badmus IdrisLaghrissi AbdelquoddoussMatinmikko-Blue MarjaPouttu Ari...
    23页
    查看更多>>摘要:Abstract Local 5G networks are emerging as a new form for 5G deployment, targeting service delivery for vertical-specific purposes and other local users. These networks are also known as micro-operator networks for which prior work has established different deployment scenarios, namely Closed, Open and Mixed Networks. To achieve network flexibility, customization and privacy required by various vertical sectors, such as industry, health and energy, it is essential to have a well-defined network slicing architecture and adequate implementation procedure. In this paper, a sophisticated end-to-end network slicing architecture is proposed for different deployment scenarios of the local 5G micro-operator concept. The proposed architecture incorporates a broad four-layer concept, leveraging a multi-tenancy layer for different tenants and their end users, a descriptive service layer, a multi-domain slicing management and orchestration layer, and a resource layer. We further propose a network slice instance (NSI) communication service distribution technique for local 5G micro-operators. This is achieved by expanding/leveraging the communication service management function in the multi-tenant layer into a multi-tenant manager and an orchestrator of communication services. In addition, we describe how the communication service orchestrator will address all the possible multitenant-slice situations during the distribution of a network slice instance to multiple tenants. The novel methods described in the paper present a solution for not only network slice communication service distribution across different micro-operator’s tenants but also for future use cases, especially, when the allocated slice is responsible for multiple tenants or when a tenant requests multiple NSIs.

    IDSDL: a sensitive intrusion detection system based on deep learning

    Hu YanjunBai FanYang XuemiaoLiu Yafeng...
    20页
    查看更多>>摘要:Abstract Device-free passive (DfP) intrusion detection system is a system that can detect moving entities without attaching any device to the entities. To achieve good performance, the existing algorithms require proper access point (AP) deployment. It limits the applying scenario of those algorithms. We propose an intrusion detection system based on deep learning (IDSDL) with finer-grained channel state information (CSI) to free the AP position. A CSI phase propagation components decomposition algorithm is applied to obtain blurred components of CSI phase on several paths as a more sensitive detection signal. Convolutional neuron network (CNN) of deep learning is used to enable the computer to learn and detect intrusion without extracting numerical features. We prototype IDSDL to verify its performance and the experimental results indicate that IDSDL is effective and reliable.

    Evaluation of LiDAR data processing at the mobile network edge for connected vehicles

    Ojanper? TiiaM?kel? JukkaMajanen MikkoM?mmel? Olli...
    23页
    查看更多>>摘要:Abstract 5G mobile network technology together with edge computing will create new opportunities for developing novel road safety services in order to better support connected and automated driving in challenging situations. This paper studies the feasibility and benefits of localized mobile network edge applications for supporting vehicles in diverse conditions. We study a particular scenario, where vehicle sensor data processing, required by road safety services, is installed into the mobile network edge in order to extend the electronic horizon of the sensors carried by other vehicles. Specifically, we focus on a LiDAR data-based obstacle warning case where vehicles receive obstacle warnings from the mobile network edge. The proposed solution is based on a generic system architecture. In this paper, we first evaluate different connectivity and computing options associated with such a system using ns-3 simulations. Then, we introduce a proof-of-concept implementation of the LiDAR-based obstacle warning scenario together with first results from an experimental evaluation, conducted both in a real vehicle testbed environment and in a laboratory setting. As a result, we obtain first insights on the feasibility of the overall solution and further enhancements needed.

    5G connected and automated driving: use cases, technologies and trials in cross-border environments

    Hetzer DirkMuehleisen MaciejKousaridas ApostolosBarmpounakis Sokratis...
    19页
    查看更多>>摘要:Abstract Cooperative, connected and automated mobility (CCAM) across Europe requires harmonized solutions to support cross-border seamless operation. The possibility of providing CCAM services across European countries has an enormous innovative business potential. However, the seamless provision of connectivity and the uninterrupted delivery of real-time services pose technical challenges which 5G technologies aim to solve. The situation is particularly challenging given the multi-country, multi-operator, multi-telco-vendor, multi-car-manufacturer and cross-network-generation scenario of any cross-border scenario. Motivated by this, the 5GCroCo project, with a total budget of 17 million Euro and partially funded by the European Commission, aims at validating 5G technologies in the Metz-Merzig-Luxembourg cross-border 5G corridor considering the borders between France, Germany and Luxembourg. The activities of 5GCroCo are organized around three use cases: (1) Tele-operated Driving, (2) high-definition map generation and distribution for automated vehicles and (3) Anticipated Cooperative Collision Avoidance (ACCA). The results of the project help contribute to a true European transnational CCAM. This paper describes the overall objectives of the project, motivated by the discussed challenges of cross-border operation, the use cases along with their requirements, the technical 5G features that will be validated and provides a description of the planned trials within 5GCroCo together with some initial results.

    Pulse deinterleaving based on fusing PDWs and PRI extraction process for radar-assisted edge devices considering computational costs

    Hasani HamidKhosravi Mohammad R.
    14页
    查看更多>>摘要:Abstract Deinterleaving or radar pulse separation is a very important goal in terms of radar sources for identifying and implementing electronic warfare systems. In order to separate radar pulses, parameters measured by electronic warfare receivers such as electronic warfare support measures (ESM) and electronic signals intelligence (ELINT) are used in pulse separation. This paper presents a multi-parameter improved method for separating the pulse sequence of radar signals based on time of arrival (TOA) processing with sorting the other pulse descriptor words (PDW) parameters. In the proposed method, after extracting all the pulse repetition intervals (PRIs) based on TOA, the parameters of the angle of arrival, pulse width and carrier frequency (RF) are being used in pulse sorting to separate the received interleaved pulse sequences. The sequential difference histogram (SDIF) algorithm or cumulative difference histogram (CDIF) algorithm is used to extract all pulse repetition intervals. Also, in order to separate the sequence of the received pulses from all surroundings emitters, in addition to matching the potential PRI among the TOAs of the pulses and the similarity measurement in the other parameters of the pulse sequence (pulse sorting) have been used. This proposed algorithm is implemented in the integrated and complete design for deinterleaving of the radar pulses. The proposed method by considering low-cost computing sources considers a fast and low-complexity solution that can be used for edge-enabled distributed processors in aerial radar platforms as edge devices for military/combat unmanned aerial vehicles or networked missiles. The simulation results show that our method is completely effective.

    A novel method of mobility-based clustering protocol in software defined sensor network

    Cao BuwenDeng ShuguangQin HuaTan Yue...
    19页
    查看更多>>摘要:Abstract The distributed clustering method is widely used to extend network lifetime in traditional wireless sensor networks. However, it is difficult to achieve the idea performance of the whole network, such as transmission rate, energy consumption, and control overhead, neglecting the global stability of the network. To tackle this problem, a centralized mobility-based clustering (CMBC) protocol is proposed in the software defined sensor network. The method of CMBC mainly consists of two aspects: first, CMBC clusters the nodes with the connection time between the mobile nodes (i.e., noncluster head nodes, non-CH) and the cluster head (CH) and establishes stable topological structures between the non-CHs and the CH; second, when emergencies occur, the centralization management control center sends the configuration files to replace the CH. Compared to the distributed network of MBC, WCRA and IMP-MECA protocol, the proposed method can be applied in scenarios with high-speed mobile nodes to improve the network performance in terms of transmission successful rate, average power consumption, and average control overhead.

    Transition technologies towards 6G networks

    Raddo Thiago R.Rommel SimonCimoli BrunoVagionas Chris...
    22页
    查看更多>>摘要:Abstract The sixth generation (6G) mobile systems will create new markets, services, and industries making possible a plethora of new opportunities and solutions. Commercially successful rollouts will involve scaling enabling technologies, such as cloud radio access networks, virtualization, and artificial intelligence. This paper addresses the principal technologies in the transition towards next generation mobile networks. The convergence of 6G key-performance indicators along with evaluation methodologies and use cases are also addressed. Free-space optics, Terahertz systems, photonic integrated circuits, softwarization, massive multiple-input multiple-output signaling, and multi-core fibers, are among the technologies identified and discussed. Finally, some of these technologies are showcased in an experimental demonstration of a mobile fronthaul system based on millimeter 5G NR OFDM signaling compliant with 3GPP Rel.?15. The signals are generated by a bespoke 5G baseband unit and transmitted through both a 10?km prototype multi-core fiber and 4?m wireless V-band link using a pair of directional 60?GHz antennas with 10° beamwidth. Results shown that the 5G and beyond fronthaul system can successfully transmit signals with both wide bandwidth (up to 800?MHz) and fully centralized signal processing. As a result, this system can support large capacity and accommodate several simultaneous users as a key candidate for next generation mobile networks. Thus, these technologies will be needed for fully integrated, heterogeneous solutions to benefit from hardware commoditization and softwarization. They will ensure the ultimate user experience, while also anticipating the quality-of-service demands that future applications and services will put on 6G networks.