• ### Aggressive Congestion Control Mechanism for Space Systems(1701.00234)

Jan. 23, 2019 cs.NI
How to implement an impeccable space system-of-systems (SoS) internetworking architecture has been a significant issue in system engineering for years. Reliable data transmission is considered one of the most important technologies of space SoS internetworking systems. Due to the high bit error rate (BER), long time delay and asymmetrical channel in the space communication environment, the congestion control mechanism of classic transport control protocols (TCP) shows unsatisfying performances. With the help of existing TCP modifications, this paper contributes an aggressive congestion control mechanism. The proposed mechanism is characterized with a fast start procedure, as well as the feedback information to analyze network traffic and with a link terminating processing mechanism, which can help to reveal the real reason of packet loss, and maintain the size of congestion window at a high level. Simulation results are shown in the end to verify the proposed scheme.
• ### Extracting the Most Weighted Throughput in UAV Empowered Wireless Systems With Nonlinear Energy Harvester(1804.10723)

April 28, 2018 cs.IT, math.IT
With the maturity of unmanned aerial vehicle (UAV) technology, this work investigates the integration of UAV into wireless communication systems. Since the UAV is powered by a capacity-limited battery, this work proposes to use the radio energy harvesting technology at the UAV in order to extend the lifetime of UAV empowered base station. To extract the most weighted throughput of UAV empowered wireless systems, the dirty paper coding scheme and information-theoretic uplink-downlink channel duality are exploited to propose an extracting the most weighted throughput algorithm. Numerical results are used to verify the proposed algorithm.
• ### Mixed M\'alaga-$\mathcal{M}$ and Generalized-$\cal K$ Dual-Hop FSO/RF Systems with Interference(1803.10261)

March 19, 2018 eess.SP
This paper investigates the impact of radio frequency (RF) cochannel interference (CCI) on the performance of dual-hop free-space optics (FSO)/RF relay networks. The considered FSO/RF system operates over mixed M\'alaga-$\mathcal{M}$/composite fading/shadowing generalized-$\cal K$ ($\cal GK$) channels with pointing errors. The {\rm H}-transform theory, wherein integral transforms involve Fox's {\rm H}-functions as kernels, is embodied into a unifying performance analysis framework that encompasses closed-form expressions for the outage probability, the average bit error rate (BER), and the ergodic capacity. By virtue of some {\rm H}-transform asymptotic expansions, the high signal-to-interference-plus-noise ratio (SINR) analysis culminates in easy-to-compute expressions for the outage probability and BER.
• ### An Edge Computing Empowered Radio Access Network With UAV-Mounted FSO Fronthaul and Backhaul: Key Challenges and Approaches(1803.06381)

March 16, 2018 cs.NI
One promising approach to address the supply-demand mismatch between the terrestrial infrastructure and the temporary and/or unexpected traffic demands is to leverage the unmanned aerial vehicle (UAV) technologies. Motivated by the recent advancement of UAV technologies and retromodulator based free space optical communication, we propose a novel edge-computing empowered radio access network architecture where the fronthaul and backhaul links are mounted on the UAVs for rapid event response and flexible deployment. The implementation of hardware and networking technologies for the proposed architecture are investigated. Due to the limited payload and endurance as well as the high mobility of UAVs, research challenges related to the communication resource management and recent research progress are reported.
• ### Resource Allocation for Secure MISO-NOMA Cognitive Radios Relying on SWIPT(1802.03908)

Feb. 12, 2018 cs.IT, math.IT, eess.SP
Cognitive radio (CR) and non-orthogonal multiple access (NOMA) are two promising technologies in the next generation wireless communication systems. The security of a NOMA CR network (CRN) is important but lacks of study. In this paper, a multiple-input single-output NOMA CRN relying on simultaneous wireless information and power transfer is studied. In order to improve the security of both the primary and secondary network, an artificial noise-aided cooperative jamming scheme is proposed. Different from the most existing works, a power minimization problem is formulated under a practical non-linear energy harvesting model. A suboptimal scheme is proposed to solve this problem based on semidefinite relaxation and successive convex approximation. Simulation results show that the proposed cooperative jamming scheme is efficient to achieve secure communication and NOMA outperforms the conventional orthogonal multiple access in terms of the power consumption.
• ### D2D Big Data: Content Deliveries over Wireless Device-to-Device Sharing in Large Scale Mobile Networks(1802.00893)

Feb. 3, 2018 cs.NI
Recently the topic of how to effectively offload cellular traffic onto device-to-device (D2D) sharing among users in proximity has been gaining more and more attention of global researchers and engineers. Users utilize wireless short-range D2D communications for sharing contents locally, due to not only the rapid sharing experience and free cost, but also high accuracy on deliveries of interesting and popular contents, as well as strong social impacts among friends. Nevertheless, the existing related studies are mostly confined to small-scale datasets, limited dimensions of user features, or unrealistic assumptions and hypotheses on user behaviors. In this article, driven by emerging Big Data techniques, we propose to design a big data platform, named D2D Big Data, in order to encourage the wireless D2D communications among users effectively, to promote contents for providers accurately, and to carry out offloading intelligence for operators efficiently. We deploy a big data platform and further utilize a large-scale dataset (3.56 TBytes) from a popular D2D sharing application (APP), which contains 866 million D2D sharing activities on 4.5 million files disseminated via nearly 850 million users in 13 weeks. By abstracting and analyzing multidimensional features, including online behaviors, content properties, location relations, structural characteristics, meeting dynamics, social arborescence, privacy preservation policies and so on, we verify and evaluate the D2D Big Data platform regarding predictive content propagating coverage. Finally, we discuss challenges and opportunities regarding D2D Big Data and propose to unveil a promising upcoming future of wireless D2D communications.
• ### Downlink Energy Efficiency of Power Allocation and Wireless Backhaul Bandwidth Allocation in Heterogeneous Small Cell Networks(1710.02942)

Oct. 9, 2017 cs.IT, math.IT
The widespread application of wireless services and dense devices access have triggered huge energy consumption. Because of the environmental and financial considerations, energy-efficient design in wireless networks becomes an inevitable trend. To the best of the authors' knowledge, energy-efficient orthogonal frequency division multiple access heterogeneous small cell optimization comprehensively considering energy efficiency maximization, power allocation, wireless backhaul bandwidth allocation, and user Quality of Service is a novel approach and research direction, and it has not been investigated. In this paper, we study the energy-efficient power allocation and wireless backhaul bandwidth allocation in orthogonal frequency division multiple access heterogeneous small cell networks. Different from the existing resource allocation schemes that maximize the throughput, the studied scheme maximizes energy efficiency by allocating both transmit power of each small cell base station to users and bandwidth for backhauling, according to the channel state information and the circuit power consumption. The problem is first formulated as a non-convex nonlinear programming problem and then it is decomposed into two convex subproblems. A near optimal iterative resource allocation algorithm is designed to solve the resource allocation problem. A suboptimal low-complexity approach is also developed by exploring the inherent structure and property of the energy-efficient design. Simulation results demonstrate the effectiveness of the proposed algorithms by comparing with the existing schemes.
• ### Secure Beamforming in Full-Duplex SWIPT Systems(1709.06623)

Sept. 19, 2017 cs.IT, math.IT
Physical layer security is a key issue in the full duplex (FD) communication systems due to the broadcast nature of wireless channels. In this paper, the joint design of information and artificial noise beamforming vectors is proposed for the FD simultaneous wireless information and power transferring (FD-SWIPT) systems. To guarantee high security and energy harvesting performance of the FD-SWIPT system, the proposed design is formulated as a sum information transmission rate (SITR) maximization problem under information-leakage and energy constraints. In addition, we consider the fairness issue between the uplink and downlink information transmission rates by formulating a \mbox{fairness-aware} SITR-maximization problem. Although the formulated \mbox{SITR-maximization} and \mbox{fairness-aware} \mbox{SITR-maximization} problems are non-convex, we solve them via semidefinite relaxation and one-dimensional search. The optimality of our proposed algorithms is theoretically proved, and the computation complexities are established. Moreover, we propose two suboptimal solutions to the formulated optimization problems. In terms of the SITR-maximization problem, numerical results show that the performance achieved by one of the two suboptimal algorithms is close to the performance of the optimal algorithm with increasing maximum transmission power of the FD-BST.
• ### Dynamic Cross-Layer Beamforming in Hybrid Powered Communication Systems With Harvest-Use-Trade Strategy(1709.06625)

Sept. 19, 2017 cs.IT, math.IT
The application of renewable energy is a promising solution to realize the Green Communications. However, if the cellular systems are solely powered by the renewable energy, the weather dependence of the renewable energy arrival makes the systems unstable. On the other hand, the proliferation of the smart grid facilitates the loads with two-way energy trading capability. Hence, a hybrid powered cellular system, which combines the smart grid with the base stations, can reduce the grid energy expenditure and improve the utilization efficiency of the renewable energy. In this paper, the long-term grid energy expenditure minimization problem is formulated as a stochastic optimization model. By leveraging the stochastic optimization theory, we reformulate the stochastic optimization problem as a \mbox{per-frame} grid energy plus weighted penalized packet rate minimization problem, which is NP-hard. As a result, two suboptimal algorithms, which jointly consider the effects of the channel quality and the packet reception failure, are proposed based on the successive approximation beamforming (SABF) technique and the \mbox{zero-forcing} beamforming (ZFBF) technique. The convergence properties of the proposed suboptimal algorithms are established, and the corresponding computational complexities are analyzed. Simulation results show that the proposed SABF algorithm outperforms the ZFBF algorithm in both grid energy expenditure and packet delay. By tuning a control parameter, the grid energy expenditure can be traded for the packet delay under the proposed stochastic optimization model.
• ### Delay-Optimal Biased User Association in Heterogeneous Networks(1701.00904)

Jan. 4, 2017 cs.NI
In heterogeneous networks (HetNets), load balancing among different tiers can be effectively achieved by a biased user association scheme with which each user chooses to associate with one base station (BS) based on the biased received power. In contrast to previous studies where a BS always has packets to transmit, we assume in this paper that incoming packets intended for all the associated users form a queue in the BS. In order to find the delay limit of the network to support real-time service, we focus on the delay optimization problem by properly tuning the biasing factor of each tier. By adopting a thinned Poisson point process (PPP) model to characterize the locations of BSs in the busy state, an explicit expression of the average traffic intensity of each tier is obtained. On that basis, an optimization problem is formulated to minimize a lower bound of the network mean queuing delay. By showing that the optimization problem is convex, the optimal biasing factor of each tier can be obtained numerically. When the mean packet arrival rate of each user is small, a closed-form solution is derived. The simulation results demonstrate that the network queuing performance can be significantly improved by properly tuning the biasing factor. It is further shown that the network mean queuing delay might be improved at the cost of a deterioration of the network signal-to-interference ratio (SIR) coverage, which indicates a performance tradeoff between real-time and non-real-time traffic in HetNets.
• ### Fronthauling for 5G LTE-U Ultra Dense Cloud Small Cell Networks(1607.07015)

July 24, 2016 cs.IT, math.IT
Ultra dense cloud small cell network (UDCSNet), which combines cloud computing and massive deployment of small cells, is a promising technology for the fifth-generation (5G) LTE-U mobile communications because it can accommodate the anticipated explosive growth of mobile users' data traffic. As a result, fronthauling becomes a challenging problem in 5G LTE-U UDCSNet. In this article, we present an overview of the challenges and requirements of the fronthaul technology in 5G \mbox{LTE-U} UDCSNets. We survey the advantages and challenges for various candidate fronthaul technologies such as optical fiber, millimeter-wave based unlicensed spectrum, Wi-Fi based unlicensed spectrum, sub 6GHz based licensed spectrum, and free-space optical based unlicensed spectrum.
• ### Buffer Aided Relaying Improves Both Throughput and End-to-End Delay(1503.02348)

March 9, 2015 cs.IT, math.IT, cs.NI
Buffer aided relaying has recently attracted a lot of attention due to the improvement in the system throughput. However, a side effect usually deemed is that buffering at relay nodes results in the increase in packet delays. In this paper, we study the effect of buffering relays on the end-to-end delay of users' data, from the time they arrive at source until delivery to the destination. We use simple discussions to provide an insight on the overall waiting time of the packets in the system. By studying the Bernoulli distributed channel conditions, and using intuitive generalizations, we conclude that the use of buffers at relays improves not only throughput, but ironically the end-to-end delay as well. Computer simulations in the settings of practical systems confirm the above results.
• ### Fundamental Limits of CDF-Based Scheduling: Throughput, Fairness, and Feedback Overhead(1502.03666)

Feb. 12, 2015 cs.IT, math.IT, cs.NI
In this paper, we investigate fundamental performance limits of cumulative distribution function (CDF)-based scheduling (CS) in downlink cellular networks. CS is known as an efficient scheduling method that can assign different time fractions for users or, equivalently, satisfy different channel access ratio (CAR) requirements of users while exploiting multi-user diversity. We first mathematically analyze the throughput characteristics of CS in arbitrary fading statistics and data rate functions. It is shown that the throughput gain of CS increases as the CAR of a user decreases or the number of users in a cell increases. For Nakagami-m fading channels, we obtain the average throughput in closed-form and investigate the effects of the average signal-to-noise ratio, the shape parameter m, and the CAR on the throughput performance. In addition, we propose a threshold-based opportunistic feedback technique in order to reduce feedback overhead while satisfying the CAR requirements of users. We prove that the average feedback overhead of the proposed technique is upper bounded by -ln(p), where p is the probability that no user satisfies the threshold condition in a cell. Finally, we adopt a novel fairness criterion, called qualitative fairness, which considers not only the quantity of the allocated resources to users but also the quality of the resources. It is observed that CS provides a better qualitative fairness than other scheduling algorithms designed for controlling CARs of users.
• ### User Selection for Multi-user MIMO Downlink with Zero-Forcing Beamforming(1206.6217)

June 27, 2012 cs.IT, math.IT
In this paper, we propose a greedy user selection with swap (GUSS) algorithm based on zero-forcing beamforming (ZFBF) for the multi-user multiple-input multiple-output (MIMO) downlink channels. Since existing user selection algorithms, such as the zero-forcing with selection (ZFS), have redundant user' and local optimum' flaws that compromise the achieved sum rate, GUSS adds delete' and swap' operations to the user selection procedure of ZFS to improve the performance by eliminating redundant user' and escaping from local optimum', respectively. In addition, an effective channel vector based effective-channel-gain updating scheme is presented to reduce the complexity of GUSS. With the help of this updating scheme, GUSS has the same order of complexity of ZFS with only a linear increment. Simulation results indicate that on average GUSS achieves 99.3 percent of the sum rate upper bound that is achieved by exhaustive search, over the range of transmit signal-to-noise ratios considered with only three to six times the complexity of ZFS.