Hindawi
Wireless Communications and Mobile Computing
Volume 2022, Article ID 7948395, 9 pages
https://doi.org/10.1155/2022/7948395
Research Article
Improved Channel Capacity in 5G Ultradense Network
Shilpa Biradar,1 J. Shiny Duela,2 P. Ramya,3 Flory Francis,4 Tarun Singhal,5 Ankur Singhal,5
Ranjan Mishra,6 R. Govindaraj,7 and Amare Kebede Asfaw 8
1
Department of Information Science and Engineering, Dr. Ambedkar Institute of Technology, Bengaluru, Karnataka 560056, India
Department of Computer Science and Engineering, SRM Institute of Science and Technology, Ramapuram Campus, Chennai,
Tamil Nadu 600089, India
3
Department of Electronics & Communication Engineering, Bannari Amman Institute of Technology, 638401, Erode,
Tamil Nadu, India
4
Department of Electronics & Communication Engineering, M. S. Ramaiah Institute of Technology, Bengaluru,
Karnataka 560054, India
5
Department of Electronics & Communication Engineering, Chandigarh Engineering College, Landran, Punjab 140307, India
6
Department of Electrical and Electronic Engineering, University of Petroleum and Energy Studies, Dehradun,
Uttarakhand 248007, India
7
Department of Electronics and Communication Engineering, Agni College of Technology, Chennai, Tamil Nadu, India
8
Department of Computer Science, Kombolcha Institute of Technology, Wollo University, Ethiopia
2
Correspondence should be addressed to Amare Kebede Asfaw;
[email protected]
Received 1 April 2022; Accepted 27 May 2022; Published 25 June 2022
Academic Editor: Mohammad Farukh Hashmi
Copyright © 2022 Shilpa Biradar et al. This is an open access article distributed under the Creative Commons Attribution License,
which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
In general, it is necessary to evaluate the required bandwidth in each segment of the 5G ultradense network. After doing so, it is
necessary to decide on the choice of OSI network and connection layer technologies. The most suitable models of network
equipment are determined according to the technologies so selected. This question is not easy because performance depends
directly on the performance of the hardware and also on the performance, software, and hardware configuration. These
channel capabilities are the criteria for evaluating the performance of channels and equipment on 5G networks. In this paper,
a model is proposed to increase the channel capacity of the 5G ultradense network. It is designed to increase the bandwidth
usage of the channel and increase its functionality. Its main special feature is that its energy and power consumption is very
low compared to other methods. This method is also ideal for sending more data with less power.
1. Introduction
Since the invention of the telegraphic theory in the 18th century, several methods for measuring the capacity of a channel have been developed. Performance criteria for pocket
networks, on the other hand, are harder to calculate and
are unlikely to produce accurate results [1]. It is caused by
a wide range of situations (particularly those inherent in current multiservice networks), all of which are extremely difficult to predict in the first place. Using IP networks, a study
can run multiple applications on the same network infrastructure, each with its own unique traffic model. This is
possible because of the flexibility of IP networks. During a
session, traffic in one direction may differ from traffic in
the other, and this might be confusing. To make matters
even more complicated, the pace of data between individual
network nodes can fluctuate, making it more difficult to perform computations. If the study looks at what other companies have done with networks, the study will see that most of
the time, performance is judged by these things [2–4].
Consider an email service. It uses protocols that run
over TCP, which means that the data transfer rate is constantly adjusted and attempts to take over all available
bandwidth [5]. So, let us start with the maximum value of
the delay in sending a message—assuming that 1 second
is enough for the user to be comfortable [6]. Next, the
2
Wireless Communications and Mobile Computing
study needs to estimate the average size of the message
sent. At the peak of the process, we will assume that there
will be various links (invoices, reports, etc.) in the mail
messages, so for our example, let us take the average message size of 500 kb [7]. Finally, the last parameter we have
to choose is the maximum number of employees who can
send messages at once. Suppose half the staff presses the
“Send” button on the email client at the same time during
an emergency [8–10].
The maximum performance required for email traffic is
500 kb × 150 hosts
= 75, 000 kb/s or 600 Mbps:
1s
ð1Þ
This allows the study to immediately identify that the
mail server must be connected to the network via a 5G super
dense channel as a result of the analysis. When this number
is used as the network foundation, it can be used to figure
out how much bandwidth is needed.
The UDP protocol is used to transmit both telephone
traffic and video surveillance traffic, and the transfer rate is
rather constant in both cases when using the protocol. With
the exception of the fact that the streams on a phone are limited to bilateral communication and call time, the streams
for video surveillance are sent in a single direction and are
generally continuous in nature. According to an example
of telephony traffic, the gateway must have the ability to
handle a minimum number of 100 connections per second
passing through it. Using the G.711 codec, single-stream
speeds and service packets, including captions, for 5G super
dense networks are approximately 100 kbps [11]. This suggests that the network hub bandwidth need during peak
hours is 10 megabits per second.
It is possible to determine video surveillance traffic in a
straightforward and accurate manner. For the sake of our
application, a 4 Mbps stream is a realistic assumption
[12–14]. It is necessary to calculate the required bandwidth by taking into account the combined speed of all
video streams. Mbps stands for megabits per second multiplied by the number of cameras, which equals 80 Mbps.
Thus, the total peak data rate for all three network services
is 690 Mbps in aggregate. This amount of bandwidth will
be provided by the network hub, which will be necessary.
As the network expands in size, it is critical to consider
the possibilities for scalability in order to ensure that the
communication lines can manage the maximum amount
of traffic. If studies are talking about the service requirements, Gigabit Ethernet will satisfy [15]. Additional nodes
can be simply added to the network at the same time, if
necessary.
Remember that VoIP traffic (IP telephony) is not only
divided between phones, but it is also dispersed across the
server computers. Different departments within an organization may also have variable levels of internet traffic: for
example, the desktop department may use more phone calls,
the project department may use more email, and the engineering department may use more traffic [16], among other
things. In order to achieve this, some network components
may consume more bandwidth than others. When calculat-
ing the IP telephony stream rate, the size of the codec that
was used as well as the pocket title was taken into consideration. This is a very important factor to keep in mind.
The overall bandwidth of a stream is determined by the
encryption method (codecs used), the amount of data carried in each packet, and the algorithms used at the connection layer [17]. This is the total amount of network
bandwidth that must be taken into consideration when
determining the required network bandwidth. The same
cannot be said for all real-time streaming services, but it is
particularly true in the case of IP telephony and other lowrate real-time streaming services [18]. In order to properly
distinguish between the two VoIP streams, it is necessary
to compare them side by side (see table). Each of these
streams utilizes the same summary but has a different payload size (actual digital audio stream) and communicates
over a different communication protocol [19] than the
others.
If the selected network equipment is limited, in addition
to the flexible configuration and scaling promised by the
manufacturer, the study can take a lot of “risks.” When
selecting modules, the study should carefully read their
description or consult the manufacturer. It is not enough
to be guided only by the type of interfaces and their number—the study also needs to know the structure of the module [20]. While transporting traffic, it is not uncommon for
some packets to be processed automatically, while others
may send packets to the central processing unit for further
processing (accordingly, for the same external modules, their
price may vary several times). In the first case, the overall
performance of the tool and, consequently, its maximum
efficiency are higher than in the second, because the central
processor converts part of its work to volume processors [21].
In addition, the main contribution of this modular
equipment is that it often has a blocking configuration
(when maximum performance is less than the total speed
of all ports). This is due to the low bandwidth of the inner
bus, through which the modules exchange traffic between
themselves. For example, if a modular switch has a 20 Gbps
internal bus, it can only use 20 ports when 48-gigabit Ethernet ports are fully loaded to its line card.
2. Literature Review
Bhushan et al. [1] discussed the signal information that is
transmitted and transmitted in the form of a series of codes.
From the source to the recipient, the message is sent through
some material medium. When technical communication
mechanisms are used in the transmission process, they are
called communication channels (information channels).
This includes telephone, radio, and TV. Human sensory
organs play the role of biological information channels. They
[2] accurately determine the bandwidth required for a
designed network; it is essential to first know the requirements that those applications will use. Furthermore, for each
application, it is necessary to analyze how the data transfer
takes place at selected times, for which protocols are used.
Wireless Communications and Mobile Computing
3
Network cloud
control with
secured admin
access
Integrated network
control for 5G ultra
dense network
Networ
k relay
Power
supply
Network application
1
Network application
2
Input media
entry
Network application
3
Input text
entry
Network application
4
Figure 1: Proposed system design.
Jungnickel et al. [3] expressed that the code sent to the
communication line must be redundant. Due to this, some
part of the information can be lost during the transfer. However, you cannot magnify the layoff. This can lead to delays
and higher communication costs. As they [4] discussed,
the nonstandard equipment can distort the transmitted signal and lead to data loss. Such interruptions, first of all, arise
for technical reasons: poor quality of communication lines
and mutual insecurity of different information sent on the
same channels. To protect against noise, different methods
are used, for example, the use of different types of filters that
separate the effective signal from the noise. Lu et al. [5] provide the definition of bandwidth which is generally used for
a communication channel and determines the maximum
amount of information that can be sent or received per unit
time. Bandwidth is one of the most important factors in the
user’s view. Network, in range, is estimated by the amount of
data that a unit time transfers from one device connected to
another.
They [6] expressed the transfer of information from
computer to computer. This process is called synchronous
communication in 5G ultradense network and allows you
to store messages through an intermediate computer and
transfer them to personal computers as requested by the
user-asynchronous. They [7] discussed the transmission
medium, and the twisted-pair cables are used to transmit
digital data and are widely used in computer networks. It
is also possible to use them for the transmission of analog
signals. Twisting the wires reduces the influence of external
interference on the effective signals and reduces the electromagnetic waves propagating outside. Shield increases cable
cost, complicates installation, and requires high-quality
landing. This work [8] discusses about the speed, and the
information transfer depends on the speed of its creation
(source performance), encryption, and decoding methods.
The maximum data transfer rate on a given channel is called
its bandwidth.
nario: a network with 300 active PCs and 300 IP telephones.
In addition to email, IP telephones and video surveillance
are also options. A total of twenty cameras are used for video
monitoring, with video streams being supplied to the server
from each one of these. All of the services will be able to use
all of the bandwidth available on each server channel during
the time between the network core switches and the point
where the network meets them. It should be noted now that
all calculations must be performed for the user’s largest network activity time (in telegraphic theory—CNN, peak
hours), as network performance is generally critical during
such periods and the resulting usage failures associated with
the lack of bandwidth are unacceptable.
3. Proposed Model
3.1. Choosing Connection Layer. The protocols are usually
not a problem (today, the question often arises as to
how much bandwidth the Ethernet channel should have),
but it is difficult for even an experienced engineer to
choose the right equipment. The development of network
technologies along with the growing needs of applications
for network bandwidth is also forcing the equipment manufacturers to develop new software and hardware configurations. Often, from one manufacturer, there are identical
equipment models at first glance but designed to solve different network problems. Take Ethernet switches, for
example: with conventional switches used in companies,
most manufacturers have switches for creating storage networks and organizing operator services. Models of the
same price category differ in their configuration, being
“sharp” for certain tasks.
There is integrated connection between the network
devices getting the media and text entry of the devices. Then,
this goes into the network admin approval. If the admin
approved this for access, then the user goes to access the various parts inside the network. Then, the networks relay here
to provide the important access to the network. The power
supply module provides the required power to the network
components. This will be helpful to run the network
applications.
The proposed 5G ultradense network capacity model
(UDNCM) is shown in Figure 1. Consider the following sce-
3.2. Choice of Hardware. In addition to the overall performance, the choice of hardware should be driven by
4
Wireless Communications and Mobile Computing
Smart security
Intercom and
telephone
Bandwidth
5G Dense
network
Remote distance
Sockets and load
Entry control
Multimedia
Figure 2: Implementation of 5G ultradense network.
supported technologies. Depending on the type of equipment, specific functions and types of transport can be processed at the hardware level without the use of CPU and
memory resources. In this case, the traffic of other applications is processed at the software level, which greatly reduces
the overall performance and, consequently, the maximum
performance. For example, multilayer switches, due to their
sophisticated hardware configuration, are capable of transmitting IP packets without performance degradation when
all ports are fully loaded. Also, if we want to use more complex encapsulation (GRE, MPLS), such switches (at least the
cheaper models) do not apply to us because their configuration does not support the relevant protocols, and at best,
such connection occurs. The central processor has low performance cost. So, to solve such problems, for example,
depends on software rather than routers and hardware
implementation based on high-performance core processor.
In this case, we get a large number of support protocols and
technologies that are not supported by switches of the same
price category, at maximum performance cost.
3.3. Maximum Performance. One is expressed in pockets per
second, and the other in bits per second. This is because
most of the performance of network equipment is usually
spent on processing pocket headers. Roughly speaking, the
equipment must accept the packet, find the appropriate
transition path, create a new header, and (if necessary) send
it. Obviously, in this case, it is not the amount of data sent
per unit time, but the number of packets. Comparing two
streams at the same rate but with different pocket sizes
requires a higher performance for a stream with a smaller
pocket size. This fact must be taken into account if the network is to be used, for example, a large number of IP telephony streams—where the maximum performance in bits
per second is much lower than that reported. It is clear that
with mixed transport and taking into account additional services (NAT, VPN), it is very difficult to calculate the load of
equipment resources, as is the case in most cases. Often,
equipment manufacturers or their partners carry out load
testing of different models under different conditions and
publish the results on the Internet in the form of comparison
tables. Dealing with these results greatly simplifies the task of
selecting the appropriate model.
t
v
a
A = 〠 〠 cðj Þ − k2h ,
ð2Þ
h=1 b=1
where in the above equation (2), A is the utility point of the
ðtÞ
network, t the quantity of the cluster, v network quantity, ch
th
th
the j case of h network cluster, and kh the centric of hth
network cluster.
When designing 5G ultradense networks, bandwidth is
an important parameter that affects the structure of the network as a whole. The list of network services is shown in
Figure 2. For a more accurate assessment of performance,
the study can follow these guidelines:
(i) Read the application study plan to use on the network, the technologies they use, and the amount
of traffic they transfer. Use the advice of developers
and the experience of colleagues to take into
account all the nuances of these applications when
building networks
(ii) Learn more about the network protocols and technologies used by these applications
Wireless Communications and Mobile Computing
5
80
75
Energy consumption (%)
70
65
60
55
50
45
40
100
200
300
400
500
600
700
Instructions
NDFWE
SCAUD
DMNNC
UDCNS
UDNCM
Figure 3: Comparison of energy consumption (%).
100
95
Energy efficiency (%)
90
85
80
75
70
65
100
200
300
400
500
600
700
Instructions
NDFWE
SCAUD
DMNNC
UDCNS
UDNCM
Figure 4: Comparison of energy efficiency (%).
(iii) Read the documentation carefully when selecting
equipment. To get some stock of ready-made solutions, check out product lines from different
manufacturers
As a result, with the right choice of technologies and
equipment, the study can be confident that the network will
fully meet the needs of all applications and will be flexible
and scalable for a long time.
6
Wireless Communications and Mobile Computing
100
Energy storage in (%)
95
90
85
80
75
70
100
200
300
400
500
600
700
600
700
Instructions
NDFWE
SCAUD
DMNNC
UDCNS
UDNCM
Figure 5: Comparison of energy storage (%).
85
80
Power consumption (%)
75
70
65
60
55
50
45
40
100
200
300
400
500
Instructions
NDFWE
SCAUD
DMNNC
UDCNS
UDNCM
Figure 6: Comparison of power consumption (%).
Wireless Communications and Mobile Computing
7
100
Bandwidth utilization (%)
95
90
85
80
75
70
100
200
300
400
500
600
700
600
700
Instructions
NDFWE
SCAUD
DMNNC
UDCNS
UDNCM
Figure 7: Comparison of bandwidth utilization (%).
x 105
5
4.5
Throughput (kbps)
4
3.5
3
2.5
2
1.5
1
100
200
300
400
500
Instructions
NDFWE
SCAUD
DMNNC
UDCNS
UDNCM
Figure 8: Comparison of throughput (%).
8
Wireless Communications and Mobile Computing
4. Results and Discussion
The proposed 5G ultradense network capacity model
(UDNCM) was compared with the existing network densification for wireless evolution into 5G (NDFWE), system
capacity analysis for ultradense (SCAUD), distributed
monitoring of normalized network capacity (DMNNC),
and 5G ultradense cellular networking system (UDCNS).
4.1. Energy Consumption. As a general rule, the amount of
energy used has an impact on the amount of energy used.
Multiplying the amount of power used in a certain time
period by the total amount of power used is how the study
figure out how much power the study uses. Figure 3 shows
the estimation of the energy consumption between existing
NDFWE, SCAUD, DMNNC, UDCNS, and UDNCM.
4.2. Energy Efficiency. The energy efficiency ratio is a measure of how efficiently a machine uses the energy it receives
in comparison to the energy it produces as output. Due to
the increase in efficiency, all of the available energy was utilized to its full capacity. Figure 4 shows the estimation of the
energy efficiency between existing NDFWE, SCAUD,
DMNNC, UDCNS, and UDNCM.
4.3. Energy Storage. The following formula is used to store the
energy stored capacitor used in all the modules’ commonly
proposed methods in which the energy is stored. Figure 5
shows the estimation of the energy storage between existing
NDFWE, SCAUD, DMNNC, UDCNS, and UDNCM.
4.4. Power Consumption. The power requirements of each
gadget must be met in full. Ensuring that such a payment
is received requires setting a fair price for the electricity generated. If this is not done, the test accuracy will be jeopardized. Figure 6 shows the estimation of the power
consumption between existing NDFWE, SCAUD, DMNNC,
UDCNS, and UDNCM.
The proposed method achieves 96% of bandwidth
utilization, 50% of power consumption, 97% of energy storage,
96% of energy efficiency, and 41% of energy consumption.
5. Conclusion
The wide range of devices and bandwidths commonly used
in a 5G network will increase its reliability by operating at
a range of speeds and precision. In addition, the services of
users on such dense networks are designed to be different.
This will increase the time of use. For this reason, the number of users using it will be greatly reduced. The way to fix
this is to convert it to the existing bandwidth of the band
so that its speed is higher and the difficulties in use are minimized. The proposed 5G ultradense network capacity
model (UDNCM) was compared with the existing network
densification for wireless evolution into 5G (NDFWE), system capacity analysis for ultradense (SCAUD), distributed
monitoring of normalized network capacity (DMNNC),
and 5G ultradense cellular networking systems (UDCNS).
So, the proposed model performs well and good in 5G ultradense networks and the improved channel capacity. Based
on the results, the proposed model was getting higher energy
efficiency and high bandwidth utilization. This shows that
the proposed model effectively allows the various device
functions inside the network. The proposed model uses very
low energy and power consumption. This shows that the
proposed method shares the energy and power as per the
device requirements. The further enhancements of the proposed model are to enhance the entire channel capacity of
the distributed network section. Now, the device and cluster
capacity was getting more attention than this was enhanced.
If the clusters are enhanced, then the node values are also
increased. Then, the network capacity also increased. So
the future focus will be the entire network capacity
increment.
4.5. Utilization of Bandwidth. At a given time, the highest
quantity of data transferred over a user is referred to as the
bandwidth. The percentage of consumed bandwidth off the
total available bandwidth is called the bandwidth utilization.
Figure 7 shows the estimation of the bandwidth utilization
between existing NDFWE, SCAUD, DMNNC, UDCNS,
and UDNCM.
Data Availability
4.6. Network Throughput. The network throughput is the
amount of the data rates that are distributed to all users in
a network. It refers the data flow rate of a communication
channel. In wireless environment, throughput is an essential
measurement while the data are moving without any traffic
simultaneously.
The authors declare that there are no conflicts of interest
regarding the publication of this paper.
Throughput
bits
ðnumber of successful packetsÞ ∗ ðaverage packet sizeÞ
=〠
:
total time sent in delivering that amount of data
sec
ð3Þ
Figure 8 shows the estimation of the bandwidth utilization between existing NDFWE, SCAUD, DMNNC, UDCNS,
and UDNCM.
The data used to support the findings of this study are
included within the article. Further data or information is
available from the corresponding author upon request.
Conflicts of Interest
Acknowledgments
The authors appreciate the supports from Kombolcha Institute of Technology, Wollo University, Ethiopia, for the
research and preparation of the manuscript.
References
[1] N. Bhushan, J. Li, D. Malladi et al., “Network densification: the
dominant theme for wireless evolution into 5G,” IEEE Communications Magazine, vol. 52, no. 2, pp. 82–89, 2014.
Wireless Communications and Mobile Computing
[2] A. De Domenico, E. C. Strinati, and A. Capone, “Enabling
green cellular networks: a survey and outlook,” Computer
Communications, vol. 37, pp. 5–24, 2014.
[3] V. Jungnickel, K. Manolakis, W. Zirwas et al., “The role of
small cells, coordinated multipoint, and massive MIMO in
5G,” IEEE Communications Magazine, vol. 52, no. 5, pp. 44–
51, 2014.
[4] S. W. H. Shah, A. N. Mian, S. Mumtaz, and J. Crowcroft, “System capacity analysis for ultra-dense multi-tier future cellular
networks,” IEEE Access, vol. 7, pp. 50503–50512, 2019.
[5] L. Lu, G. Y. Li, A. L. Swindlehurst, A. Ashikhmin, and
R. Zhang, “An overview of massive MIMO: benefits and challenges,” IEEE journal of selected topics in signal processing,
vol. 8, no. 5, pp. 742–758, 2014.
[6] S. Kucera, “Enabling co-channel small-cell deployments in
SINR-constraint networks by distributed monitoring of normalized network capacity,” IEEE/ACM Transactions on Networking, vol. 22, no. 5, pp. 1577–1590, 2014.
[7] E. Hossain, M. Rasti, H. Tabassum, and A. Abdelnasser, “Evolution toward 5G multi-tier cellular wireless networks: an
interference management perspective,” IEEE Wireless Communications, vol. 21, no. 3, pp. 118–127, 2014.
[8] P. Banelli, S. Buzzi, G. Colavolpe, A. Modenini, F. Rusek, and
A. Ugolini, “Modulation formats and waveforms for 5G networks: who will be the heir of OFDM?: an overview of alternative modulation schemes for improved spectral efficiency,”
IEEE Signal Processing Magazine, vol. 31, no. 6, pp. 80–93,
2014.
[9] O. Afolalu and N. Ventura, “Carrier aggregation-enabled nonorthogonal multiple access approach towards enhanced network performance in 5G ultra-dense networks,” International
Journal of Communication Systems, vol. 34, no. 4, article e4701,
2021.
[10] X. Chen, X. Liu, Y. Chen, L. Jiao, and G. Min, “Deep Qnetwork based resource allocation for UAV-assisted ultradense networks,” Computer Networks, vol. 196, p. 108249,
2021.
[11] Q. Liu, C. F. Kwong, S. Wei, L. Li, and S. Zhang, “Intelligent
handover triggering mechanism in 5G ultra-dense networks
via clustering-based reinforcement learning,” Mobile Networks
and Applications, vol. 26, no. 1, pp. 27–39, 2021.
[12] M. Raithatha, A. U. Chaudhry, R. H. Hafez, and J. W. Chinneck, “A fast heuristic for gateway location in wireless backhaul of 5G ultra-dense networks,” IEEE Access, vol. 9,
pp. 43653–43674, 2021.
[13] F. Salahdine, J. Opadere, Q. Liu, T. Han, N. Zhang, and S. Wu,
“A survey on sleep mode techniques for ultra-dense networks
in 5G and beyond,” Computer Networks, vol. 201, p. 108567,
2021.
[14] K. Venkateswararao and P. Swain, “Binary-PSO-based energyefficient small cell deployment in 5G ultra-dense network,”
The Journal of Supercomputing, vol. 78, no. 1, pp. 1071–1092,
2022.
[15] B. T. Tinh, L. D. Nguyen, H. H. Kha, and T. Q. Duong, “Practical optimization and game theory for 6G ultra-dense networks: overview and research challenges,” IEEE Access,
vol. 10, pp. 13311–13328, 2022.
[16] R. A. Kumar and K. S. Prasad, “Performance analysis of
GFDM modulation in heterogeneous network for 5G NR,”
Wireless Personal Communications, vol. 116, no. 3, pp. 2299–
2319, 2021.
9
[17] K. Hou, Q. Xu, X. Zhang, Y. Huang, and L. Yang, “User association and power allocation based on unsupervised graph
model in ultra-dense network,” in 2021 IEEE wireless communications and networking conference (WCNC), pp. 1–6, Nanjing, China, 2021.
[18] N. Sharma and K. Kumar, “Resource allocation trends for ultra
dense networks in 5G and beyond networks: a classification
and comprehensive survey,” Physical Communication,
vol. 48, p. 101415, 2021.
[19] K. Sun, J. Yu, W. Huang, H. Zhang, and V. C. Leung, “A multiattribute handover algorithm for QoS enhancement in ultra
dense network,” IEEE Transactions on Vehicular Technology,
vol. 70, no. 5, pp. 4557–4568, 2021.
[20] A. A. Ajani, V. K. Oduol, and Z. K. Adeyemo, “GPON and Vband mmWave in green backhaul solution for 5G ultra-dense
network,” International Journal of Electrical and Computer
Engineering, vol. 11, no. 1, p. 390, 2021.
[21] L. Zhu, L. Yang, Q. Zhang, T. Zhou, and J. Hua, “Cluster-based
energy-efficient joint user association and resource allocation
for B5G ultra-dense network,” Physical Communication,
vol. 46, p. 101311, 2021.