Top Banner
C D B . A C/, C 5 , 1618 2014
94

Hayar Presss5g 2014 f

Oct 17, 2015

Download

Documents

asupcom
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • Cross-Layer Design for Spectrum- and Energy-Efficient Wireless Networks

    By Prof. Aawatif Hayar GREENTIC/ENSEM, University Hassan II Casablanca Morocco

    SS5G Hammamet Tunisia, March 16-18 2014

  • Philosophy Nous n'hritons pas de la terre de nos parents, nous l'empruntons nos enfants. par

    Antoine de Saint-Exupry

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • GREENTIC Initiative

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Context

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Challenges

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Opportunities

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • By Btechkaboss (slideshare)

  • 1111stststst GENERATION:GENERATION:GENERATION:GENERATION:

    Introduced in 1980

    Analog cellular mobile,Data speed

    2.4kbps

    1G mobiles- AMPS,NMT,TACS

    Uses FDMA technique with

    30KHz

  • 2222ndndndnd GENERATION:GENERATION:GENERATION:GENERATION:

    Digital cellular systems

    Digital modulation schemes-

    TDMA,CDMA

    Data speed in 2g is up to 64kbps

    Data speed in 2.5g is up to

    144kbps

    GPRS, EDGE and CDMA 2000 were

    2.5 technologies.

  • 3333rdrdrdrd GENERATION:GENERATION:GENERATION:GENERATION: 3g technology is intended for true

    multimedia cell phone

    typically called smart phones and

    features increased bandwidth and

    transfer rates to accommodate

    wed-based applications and

    phone-based audio and video files

    AdvantagesAdvantagesAdvantagesAdvantagesuniversal global roaming

    multimedia (voice , data & video)

    384 kbps while moving

    2mbps when stationary at specific l

    locations

    video calling

  • 4444thththth GENERATION:GENERATION:GENERATION:GENERATION:

    high-speed data access

    high quality streaming

    video

    combination of wi- fi and

    wi-max

    SDR,OFDM,OFDMA

    and MIMO

  • WHAT IS 5G???WHAT IS 5G???WHAT IS 5G???WHAT IS 5G???

    5G is a packet switched wireless system with wide area coverage and high throughput.

    5G wireless uses OFDM and millimeter wireless that enables data rate of 1Gbps and frequency band of 2-8 GHz.

  • OBJETIVES OF 5G:OBJETIVES OF 5G:OBJETIVES OF 5G:OBJETIVES OF 5G:

    5G being developed to accommodate QoS rate requirements

    set by further development of existing 4G applications.

    Flexible channel bandwidth between 5 and 20MHz,

    optionally up to 40MHz.

    Data rate of 1Gb/s between any two points in the world.

    Increase system spectral efficiency of up to 3bit/s/Hz/cell

    in the downlink and 2.25bit/s/Hz/cell for indoor usage.

  • STANDARD WIRELESS 5G:STANDARD WIRELESS 5G:STANDARD WIRELESS 5G:STANDARD WIRELESS 5G:

    WiMAXWiMAXWiMAXWiMAX formed to provide conformance and interoperability of the IEEE 802.16 standard. It aims to provide wireless data over long distance from point-to-point link to cellular mobile type access.

    WiBROWiBROWiBROWiBRO a part of IEEE 802.16e in process to provide collaborative and generic mobile WiMAX.

    3GPP LTE 3GPP LTE 3GPP LTE 3GPP LTE a project aims to improve the mobile phone standard to cope with future requirements.

    5GPP 2 UMB5GPP 2 UMB5GPP 2 UMB5GPP 2 UMB a project to improve the CDMA2000 mobile phone standard for next generation applications.

  • 5G NETWORK REFRENCE MODEL:5G NETWORK REFRENCE MODEL:5G NETWORK REFRENCE MODEL:5G NETWORK REFRENCE MODEL:

  • IPv6 SUPPORT:IPv6 SUPPORT:IPv6 SUPPORT:IPv6 SUPPORT:

    IPv6 increases the IP addresses size from 32bit to 128 bits, to support

    more levels of addressing hierarchy and much greater number of

    addressable node.

    IPv6 support large number of wireless enabled devices.

    IPv6 Extend the IP address space enough to offer a unique IP address

    to any device.

    IPv6 Improve support for IP Mobility.

  • BENEFITS OF 5G:BENEFITS OF 5G:BENEFITS OF 5G:BENEFITS OF 5G:

    High speed, high capacity, and low cost per bit.

    Support interactive multimedia, voice, streaming video, Internet, and other broadband services

    Global access, service portability, and scalable mobile services.

    The high quality services of 5G technology based on Policy to avoid error.

  • Energy efficiency in cellular networks is a growing concern for cellular operators to not only maintain profitability, but also to reduce the overall environment effects.

    This emerging trend of achieving energy efficiency in cellular networks is motivating the standardization authorities and network operators to continuously explore future technologies in order to bring improvements in the entire network infrastructure.

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

    Green Cellular Networks

  • Green cellular networks

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Green cellular networks ARCHITECTURE: ENERGY SAVINGS IN BASE STATIONS:

    Improvements in Power Amplifier: There are three essential parts of a BS: radio, baseband and feeder. Out of these three, radio

    consumes more than 80% of a BSs energy requirement, of which power amplifier (PA) consumes almost 50%

    Power Saving Protocols: Exemple: DRX and DTX

    Energy-Aware Cooperative BS Power Management cell-breathing

    sleep mode

    Using Renewable Energy Resources: biofuels,

    solar

    wind energy

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • IT greening the world

  • Green IT in Smart Grids

  • Energy management and efficiency:

    Energy as a service concept

    New ICT-Based Architecture for Energy Management and Energy as a Service Concept in Smart Grids by B. Sendama, A. Hayar and S. Bouferda, ICEER2013 23

  • Some examples from Computer

    Science fieldGoogle wins floating data center patent; April

    30th, 2009Google has been awarded a U.S. patent for its floating data centers. The data

    center could be powered and cooled by the ocean, and these offshore data

    centers could sit 3 to 7 miles offshore.

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Energy Efficient Software Design

    Windows 8 Power Saving features: up to 30%

    energy saving

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Energy Efficient Concepts and

    architecturesVirtualization:

    Save Energy by Reducing Server Underutilization

    Source: Sustainable Energy New Zealand, May 2007

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Energy Efficient Cloud based Solutions

    Cloud-Controlled Energy Saving From Google

    And Ford

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Green IT for Health :

    Electromagnetic Field Reduction

  • explosive increase in the use of mobile devices, Technology advances and consumers demands have transformed mobile terminals, from simple voice call terminals, to rich multimedia applications platforms, providing various services including: internet access, video teleconferencing, GPS localization, high quality audio and video.

    => two key impacts:health effectsthe battery lifetime for mobile devices.

    Therefore, minimizing the power consumption of wireless platforms becomes a great challenge, for the entire Information and Communication technologies (ICTs), at all system levels.

    Motivation

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Cognitive radio : CR/Users interaction

    Beamforming to avoid head

    Heterogeneous Networks: Switching the network in dependency of the service used by the device

    can improve energy efficiency.

    Power saving protocols: it minimizes energy usage while meeting delay-tolerance deadlines

    specified by users.

    Some proposed solution in the literature

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • A fundamental parameter for discussing the health risks of

    electromagnetic field power absorption in the human head is the specific

    absorption rate (SAR)

    It also can be defined through mathematical approach as the equation

    below with the units Watts per kilogram, W/kg .

    SAR =E /

    Health effect of electromagnetic radiation

  • When this limit of SAR is exceeded or only reached, it produces human

    health effects that can cause :

    reverse cell membrane polarity, alter brain waves, damage DNA, and leads

    to cancer and memory loss.

    However, mobile phones are designed with low power and operate at high frequency where the value of SAR is lower than the limit that stated by International Commission on Non-Ionization Radiation Protection (ICNIRP). So the examples given remain somewhat rare, however there are other consequences of electromagnetic radiation of mobile phones which are very frequent such as : heating, headache, fuzziness of the view, fatigue and nausea.

    Health effect of electromagnetic radiation

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Cognitive radio

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Lets Start from the beginning...

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Currently, the radio spectrum is beginning to be crowded due to the rapid growth of wireless technologies this century. However, many studies show that the major licensed bands are underutilized and some of the remaining bands are heavily used. This fact leads to spectrum wastage.

    Hence, cognitive radio has become an important research topic in these last years since it tries to take advantage of the unused spectrum by the licensed users, while causing a minimum level of interference in the licensed bands.

    Motivation

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Mitola coined the term Cognitive Radio (CR) in his work published in 1998 Mitola defined CR as a radio that employs model based reasoning to

    achieve a specific level of competence in radio-related domains Haykin : an intelligent wireless communication system that is aware of its

    surrounding environment (i.e., outside world), and uses the methodology of understanding-by-building to learn from the environment and adapt its internal states to statistical variations in the incoming RF stimuli by making corresponding changes in certain operating parameters (e.g.,transmit-power, carrier frequency, and modulation strategy) in real-time, with two primary objectives in mind: Highly reliable communications whenever and wherever needed. Efficient utilization of the radio spectrum.

    The FCC gave the following definition on cognitive radio [795]. A cognitive radio is a radio that can change its transmitter parameters based on interaction with the environment in which it operates.as radio systems that continuously perform spectrum sensing, dynamically identify unused (white) spectrum, and then operate in this spectrum at times when it is not used by incumbent radio systems.

    Definition of cognitive radio

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • 1) Radio-scene analysis, which encompasses the following: estimation of interference level of the radio environment

    detection of spectrum holes.2) Channel identification, which encompasses the following:

    estimation of channel-state information (CSI); prediction of channel capacity for use by the transmitter

    3) Transmit-power control and dynamic spectrum management.

    Cycle of cognitive radio

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Temporal spectrum holes mean that there is no signal coming from primary users over the band of interest during the sensing time. So that, the secondary users can use that spectrum band while the primary signal is absent. In such a case, the secondary users are located inside the coverage area of the primary transmitters.

    Spatial spectrum holes mean that spectrum band of interest is busy by the primary transmitter but only in a restricted area. In other words, this spectrum band will be able to be used by secondary users being outside of this restricted area. Nevertheless, the secondary transmission is only allowed if the signal does not interfere with the primary receivers inside the coverage area.

    Frequency spectrum holes are defined as a frequency band in which a secondary user can transmit without interfering with any primary receivers across all frequencies.

    Spectrum holes

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • 1. Sensing: Efficient spectrum sensing techniques which provide continuous monitoring of the spectrum with lower sensing time.

    Matched filter detection

    Energy detection Cyclostationarity

    2. Interference management and Resource allocation: 1. DSA methods able to adapt to the fluctuating nature of the

    cognitive radio system and allocate the bandwidth accordingly.

    2. Interference management

    Cognitive radio main research axes

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Two networks with different priorities

    Primary network : owner of the spctrum

    Secondary network : trying to access the spectrum in a opportubistic way

    without causing harmful degradation to the PS

    Requirement :

    High reactivity for the sensing

    Flexible Ressource allocations

    CR scenarios:

    Primary versus secondary networks

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • No one is owner of the spectrum (no licensed band )

    No Secondary system

    This model works with a shared spectrum among devices. All the devices have the same priority to access communication services and they must share the spectrum through techniques such as cooperation or just co-existing. According to the sharing technique it is necessary for a protocol to manage the spectrum.

    Different approaches: Sensing + Ressource allocations

    Interference Management + Ressource allocations

    CR scenarios:

    Open opportunistic access

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • As the performance of the primary system must fulfill always the requirements of the policies and regulatory bodies, the interference management in cognitive systems has become an important issue.

    the cognitive users must be aware of the interference generated at primary receivers

    Depending on the level of the generated interference, the performance of the primary system can be negatively affected. Therefore, the harmful interference should be controlled by the secondary users using different techniques.

    interference management in cognitive

    radio systems

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • when the secondary users are trying to access the primary resources they should choose which channel, QoS and which scheme to use.

    All the cognitive users must follow some procedures to determine whether the access to some spectrum resource is feasible or not :

    sensing the spectrum in order to identify available spectrum opportunities

    spectrum allocation which will depend on the internal different (cognitive system itself) spectrum allocation policies as well as external (licensed service)

    Interference management:

    spectrum sharing techniques

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • spectrum access.(There must be some protocol able to manage this spectrum allocation) -> radio Resource management entity

    The capability of changing the used spectrum resource quickly must be available as well, it means using another free spectrum resource preserving a minimum QoS for the unlicensed system

    The current spectrum sharing techniques can be divided into different classes, according to the architecture of the cognitive system, the spectrum access technique...

    Interference managment :spectrum

    sharing techniques

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Spectrum access technique: Interweave: the CS does not transmit overall time slot because it uses

    a part of time for "spectrum sensing" to make a decision on primary

    signal presence and starts transmission only when PS is absent

    Underlay: SU and PU can access the spectrum simultaneously. Once

    the spectrum allocation has been made, some advanced techniques

    such as spread spectrum techniques can be used in order to spread

    the transmitted power under the noise or at primary receivers,

    avoiding then their harmful interference.

    Overlay: In this approach, there is a cooperation between the primary

    and the secondary systems. The CS decodes partially or totally the PS

    and uses this information to transmit while avoiding interference with

    the primary. The PS ca, also act as a relay for the PS

    Interference management in cognitive

    radio systems

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Interweave

    Overlay

    Underlay

    Source B. Kouass Theisii

  • Architecture :

    Centralized spectrum sharing : A centralized entity controls the allocation and access procedures . The cognitive users send the information to the main entity that

    Distributed spectrum sharing: The users decide by themselves when they can access the spectrum according to the policies.

    Interference managment :

    centralized versus distributed spectrum sharing

    techniques

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Spectrum sensing

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • General Cognitive Radio Network

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Recent trends

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Spectrum sensing techniques

    Energy detection

    Cyclostationary Feature setection

    Data aided based detection

    Features detection (Sub space)

    Compressed sensing

  • Spectrum sensing goal

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Spectrum sensing goal

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Model selection using Kullback-Leibler

    distance

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Akaike Information Criterion

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Blind sensing based on dimension

    using model selection toolsThe received signal, denoted by the q x1 complex vector x, can be modeled as:

    Patent: A. HAYAR "Process for sensing vacant bands over the spectrum bandwidth and apparatus

    for performing the same based on sub space and distributions analysis. European

    patent 08368002.5, Submitted on 2007 and accepted on 2008.

  • Blind sensing based on dimension

    using model selection tools

    Because the noise is zero mean and independent of the signals, it follows that the covariance matrix of x(t) is given by:

  • Blind sensing based on dimension

    using model selection tools

    From our covariance matrix model given by equation (2), let us consider the following family of covariance matrix :

  • Blind sensing based on Dimension

    estimation

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Model selection using AIC

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Dimension estimation detector (DED)

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Dimension Estimation DetectorDED: Dimension Estimation Detector based on Subspace analysis and model

    selection tools such as Akaike Information Criterion (AIC)

    Detection rule

    Detection Threshold

    F2 denote the cumulative density function (CDF) for the distribution of

    Tracy-Widom 62

  • Blind sensing based on distribution

    analysis and model selection tools

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Blind sensing based on distribution

    analysis and model selection tools

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Blind sensing based on distribution

    analysis and model selection tools

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Distribution analysis detector (DAD)

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Distribution Analysis DetectorDAD: Based on Kullback-Leibler distance and Akaike weights

    Detection rule

    Detection Threshold

    where G denotes the Meijer G-function

    B. Zayen and A. Hayar, "Dimension estimation-based spectrum sensing for

    cognitive radio" EURASIP Journal on Wireless Communications and Networking (JSAC)

    2012, 2012 :64 February 2012. 67

  • Spectrum Discountinuities Detection using

    Algebraic Method: Algebraic Detector

    The sensing algorithm is based on the following steps:

    Modeling the spectrum as a piecewise polynomial.

    Expressing the discontinuities properties in frequency domain.

    Transferring the equations to the Laplace domain

    Back to the frequency domain, the problems solution is casted as a

    filtering by N+1 filters.

    Computing the threshold and making the decision on each sensed

    sub-and.

    Wael Guibene, Monia Turki, Bassem Zayen, Aawatif Hayar " Spectrum sensing

    for cognitive radio exploiting spectrum discontinuities detection" EURASIP Journal

    on Wireless Communications and Networking (JSAC) 2012, 2012 :4 January 2012. 68

  • Spectrum Discountinuities Detection using

    Algebraic Method: Algebraic Detector

  • Spectrum Discountinuities Detection

    using Algebraic Method: Algebraic

    Detector

  • Spectrum Discountinuities Detection

    using Algebraic Method: Algebraic

    Detector

  • Performance comparison for low

    complexity Blind spectrum sensing

    techniques

    Probability of detection vs. SNR for the three detectors: energy detector (ED), distribution analysis

    detector (DAD) and algebraic detector (AD) with PFA = 0.05 and N = (1, 3) for a DVB-T primary user

    system with Rician channel.

    73

  • Combined Compressed Sensing and

    Distribution Discontinuities Detection

    Approach to Wideband Spectrum Sensing

    Compressive sensing makes possible the reconstruction of a sparse signal by

    taking less samples than Nyquist sampling, and thus wideband spectrum sensing is

    then doable.

    74

  • Simulations

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Simulations

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Simulations

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Simulations

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Complexity

  • Blind cyclostationary feature detector

    Z. Khalaf, A.Nafkha et J. Palicot Blind cyclostationary feature detector based on sparsity hypotheses for cognitive radio

    equipment", The 54th IEEE International Midwest Symposium on Circuits and Systems, Seoul, Korea, Aout 2011

  • Cognitive Orthogonal Spectrum pooling:

    Principle The objective is to enhance spectral efficiency by

    overlaying a new mobile radio system on an existing one

    without requiring any changes to the actual licensed

    system.

    Idea: exploit primary system fading and operate cognitive

    transmission during the voids

    Spectral efficiency gain 81

  • Cognitive Orthogonal Spectrum

    Pooling: Performance

    [HHD08] Haddad, Majed ; Hayar, Aawatif ;Debbah, Merouane, "Spectral efciency

    of spectrum pooling systems", IET Special Issue on Cognitive Spectrum Access,

    July 2008, vol. 2, No. 6, pp. 733-741. 82

  • Cognitive Spectrum Sharing based on outage

    probabilty criterion The objective is to maximize the total SU throughput under interference and noise

    impairments, and binary power constraints while preserving the QoS of the

    primary system.

    Trying to transmit as much information for itself as possible,

    Maintaining the primary users outage probability unaffected.

    Bassem Zayen, Majed Haddad, Aawatif Hayar and Geir E. ien,"Binary

    Power Allocation for Cognitive Radio Networks with Centralized and Distributed User

    Selection Strategies", Phycom Journal, ELSEVIER vol.1 Issue 3, 2008. 83

  • Vandermonde Frequency Division

    Multiplexing: VFDM

    VANDERMONDE FREQUENCY DIVISION MULTIPLEXING FOR COGNITIVE RADIO by Leonardo S.Cardoso,

    Mari Kobayashi, yvind Ryan and Merouane Debbah

  • VFDM

  • VFDM

  • VFDM

  • VFDM

  • Spatial Interweave Technique

    B. Kouassi, B. Zayen, R. Knopp, F. Kaltenberger, D. Slock, I. Ghauri, F. Negro and L. Deneire. Design and Implementation of Spatial Interweave LTE-TDD Cognitive Radio Communication on an Experimental Platform. IEEE Wireless Communications

    Magazine : Next Generation Cognitive Cellular Networks.

  • Cross Layer Design Approach

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Crosslayer Design

    Application

    Network

    Access

    Link

    Hardware

    Delay Constraints

    Rate Constraints

    Energy Constraints

    Adapt across design layers

    Reduce uncertainty through scheduling

    Provide robustness via diversity

    Source Lecture from Pr A.Goldsmith

  • Cross layer design impacts

    Technology Enhancements

    Hardware: Better batteries. Better circuits/processors.

    Link: Antennas, modulation, coding, adaptivity, DSP, BW.

    Channel acess (MAC) : Retransmissions, delay,

    Network: Dynamic resource allocation. Mobility support.

    Application: Soft and adaptive QoS.

    Source Lecture from Pr A.Goldsmith

  • 3/17/2014 94

    Radio interface protocol architecture

    around the

    physical layer FDD

    L3c

    o

    n

    t

    r

    o

    l

    c

    o

    n

    t

    r

    o

    l

    c

    o

    n

    t

    r

    o

    l

    c

    o

    n

    t

    r

    o

    l

    LogicalChannels

    TransportChannels

    C-plane signalling U-plane information

    PHY

    L2/MAC

    L1

    RLC

    DCNtGC

    L2/RLC

    MAC

    RLCRLCRLC

    RLCRLCRLCRLC

    Access Stratum

    BMC L2/BMC

    control

    PDCPPDCP L2/PDCP

    RadioBearers

    RRC

    Non Access Stratum

  • Cross-layer Techniques

    Adaptive techniques Link, MAC, network, and application adaptation Resource management and allocation (power control) Synergies with diversity and scheduling

    Diversity techniques Link diversity (antennas, channels, etc.) Access diversity Route diversity Application diversity Content location/server diversity

    Scheduling Application scheduling/data prioritization Resource reservation Access scheduling

  • Joint MAC and routing solution

    Use the same MAC for directional antennas, but transmit RTS

    over multiple hops (MMAC protocol)

    If source 1 wants to communicate with node 6 transmits a forwarding RTS with the profile of node 6, using DO links

    when node 6 gets the RTS, it beamforms in the direction of 1, forming a

    DD link

    Transmission from 1 to 9 on DD links requires only 2 hops

  • Performance Evaluation

  • CLD Routing based approach

    Luigi & al.

  • Routing in wireless network

    Shortest path approche is not always optimal

    Physical channel is instable

    Each transmission injects interference in the

    network

    Interference reduce capacity

    Power management is needed

    Make use of multi-rate and power control

    Cross Layer approch

  • Maximise throughput

    Gupta & Kumar

    Throughput

    Node number

    Transmission range

    Rate

    To maximise throughput we have to maximise transmission rate

    and reduce interference generated by each packets

  • Capacity Constraints

  • Cross-Layer Approach

    SIR

    Interface characteristics

    Next-Hop

    Data-Rate

    Transmission power

    Routing metricRateInterferencePacket Error Rate

  • Interference

    Measurement: unrealistic

    More neighbor => More interference

    More power => More interference

    Defining a interference replacement function I(P)

    Minimise I(P) => Minimise Real interference

  • Packet Error Rate (I)Packet Error Rate (I)

  • Packet Error Rate (III)

  • Sensing tools to assist energy

    consumption reduction at MAC layer

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Unied Framework for Congestion and Fading

    Analysis and Backo Exponent Computation in

    Cognitive Green Networks

    Unified Framework for Congestion and Fading Analysis and Backoff Exponent Computation in Cognitive Green Networks , Mohamed Amine Sakraoui*, Aawatif Hayar*, Mohamed Sadik*, Geir E. ien+ and Changmian Wang, IEEE ISWCS2012 Paris France

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Cooperative offload strategy in

    heterogeneous networks for energy

    consumption reduction and capacity

    optimization

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Basic Power Allocation strategy

    Minimization of the transmit power :

    For simplicity of the analysis we will consider a basic power allocation

    in which we suppose that the received power at the BSs is fixed

    to.

    The transmit power from the ith terminal to its BS can be expressed as

    following:

    =

    (2)

    Based on our algorithm, the system will, at each location, decide to

    attach the user to the BTS with the higher channel gain. Thus, the

    average transmit power is expected to decrease automatically

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • system model

    Ub

    Ub

    Ub

    Ub

    Ub

    Ua

    Ua

    Ua

    Ua

    Ua

    Ua

    BS(B)BS(A)

    ,,

    ,,

    x

    y

    Figure 1 : two cells in an heterogeneous network

    operating at different frequencies:

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • = 46.3 + 33.9 ! 13.82 ' () +44.9 6.55 ' + + CM (1)

    () = 3.20 11.75 4.97

    CM= 0

    Basic Power Allocation strategy

    Channel gain model used : COST-231 Hata

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Basic Power Allocation strategy

    Expression of the capacities of the system before cooperation

    C0 = C23,0 = log7 1 + SINR3,0)=

    = (3)

    SINR3,0 =>?,@B?@,?

    C

    D >?EB?E,?CFGEHIE@

    J (4)

    KL = KM + KM = 2 7 1 +

    L 1 + P7 (7)

    CQ =RC23,Q =Rlog7 1 + SINR3,Q)=

    =

    (5)

    TUVW, = X,YX,XC

    D XZYXZ,XCF[ZHIZ\ (6)

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Basic Power Allocation strategy

    Expression of the capacities in the cooperative system:

    after classifying, according to our channel gain selection criteria, we will have 4

    capacities:

    CAA: the sum capacity of users from cell A which remained attached to BS A

    CAB: the sum capacity of users from cell A which moved to BS B.

    CBB: the sum capacity of users from cell B which remained attached to BS B

    CBA: the sum capacity of users from cell B which moved to BS A.

    The new capacities of cell A and cell B will then be expressed as following:

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Basic Power Allocation strategy

    CNA= CAA+ CAB

    = 7 1 +

    ]^^F]X^_ F\C+ 7 1 +

    ]XXF]^X_ F\C

    (8)

    CNB= CBB+ CBA

    = 1 +

    ]XXF]^X_ F\C+ 1 +

    ]^^F]X^_ F\C

    (9)

    K`L = K` + K`

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Introduction to game theory:

    Game theory is the study of strategic decision making.

    It helps understand situations in which decision-makers interact in a complex

    environment according to a set of rule [6].

    Game theory is mainly used in economics, political science, and psychology, as

    well as logic and biology.

    Power Allocation Strategy using Game Theory tools

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • a formal game model for the power control can be defined as follows:

    Players : are the users present in the cell.

    Actions : called also as the decisions, and are defined by the transmission power allocation strategy.

    Utility function: represents the value of the observed quality-of-service (QoS) for a player.

    Power allocation algorithm using a game theory frameworkPower Allocation Strategy using Game Theroy tools

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Utility function of the game proposed :

    utility function = payoff function + price function

    Payoff function : function of the transmit power level and the signal-to-noise

    and interference ratio (SINR). The players SINR is a function of its own

    transmit power and the transmit powers of the other players in the cell

    The price function : represents the interference constraint

    Power Allocation Strategy using Game Theroy tools

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Capacity of the victim user k:

    Where:

    Capacity of the interfering users:

    Where:

    Power allocation algorithm using a game theory frameworkPower Allocation Strategy using Game Theroy tools

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • The interference power experienced to the mth user :

    The transmit power from user m :

    Power allocation algorithm using a game theory frameworkPower Allocation Strategy using Game Theroy tools

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • The protection for the victim user k:

    Interference level

    Power allocation algorithm using a game theory framework

    is the maximum interference level that user m can generate to user k

    Power Allocation Strategy using Game Theroy tools

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • maximisation of the utility function :

    Power allocation algorithm using a game theory frameworkPower Allocation Strategy using Game Theroy tools

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Expression of the SINR as a solution of the maximisation of the utility function:

    Power allocation algorithm using a game theory frameworkPower Allocation Strategy using Game Theroy tools

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • power cell A Power cell B

    Simulations

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • 136

    capacity cell A capacity cell B

    Simulations

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Energy efficiency and interference

    management in femtocells networks

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Wide coverage Short range wireless System: femtocells scenario

    Isolated

    terminals, link

    to the nearest

    femto cell

    Ad hoc

    cluster

    Short

    range

    Directive

    transmission

    Wide range

    CH

    CH

    Isolated

    terminals,

    link to the

    macro cell

    Femto

    cell short

    range

    Directive

    transmission

    Wide range

    Relaying and

    cooperative

    comm

    Cell range

    extension

    138

    A.HAYAR, B.ZAYEN, S.BOUFERDA, Interference Management Strategy for deploying Energy

    Efficient Femtocells Network CROWNCOM 2012 Sweden.

    S.BOUFERDA, A.HAYAR, B.ZAYEN, M .RIFI, Multiuser Diversity Based Energy Efficiency Optimization for Heterogeneous Wireless Mobile

    Networks . RMT (Mediterranean telecommunications journal) September 2012

    Secure HeNB Network Management Based VPN IPSec , A. Laguidi, A. HAYAR and M. Wetterwald NGNS 2012 Portugal

  • New planning approach based on Femto cells concept

    Femtocells are low-power cellular base stations that operate in licensed spectrum. They are typically deployed indoors to improve coverage and provide excellent user

    experience, including high data rates. Cellular operators benefit from reduced infrastructure and operational expenses for capacity

    upgrades and coverage improvements. Although Femtocells may cause some interference to other users in the network.

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Energy Efficiency and Interference in Femtocells

    Network

    Figure : N co-located femtocells (HNB) operating in the same band

    We propose to combine the

    cooperative protocol with

    cognitive radio (CR) and

    game theory approaches to

    mitigate interference and

    improve performance at the

    same time

    The Protection for primary users is ensured in a cognitive manner by the following

    constraints

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco

  • Average transmit power in

    the femtocells networkAverage capacity in the

    femtocells network

    Simulations

    Dr. Aawatif HAYAR, GREENTIC, Univ Hassan II Casablanca, Morocco