Network Technologies LLL Unit
Network Technologies LLL Unit
Network Technologies LLL Unit
Digital voice and video broadcasting (DVB) [6] and satellite communications will be suing
OFDMA signalling formats. • Ad hoc and sensor networks with emerging applications. Although
4G is open for new multiple access schemes, the CRE concept remains attractive for increasing
the service provision efficiency and the exploitation possibilities of the available RATs.
Composite radio systems and reconfigurability, discussed above, are potential enablers of DSA
systems. Composite radio systems allow seamless delivery of services through the most
appropriate access network, and close network cooperation can facilitate the sharing not only of
services, but also of spectrum.
PROTOCOL BOOSTERS
A protocol booster is a software or hardware module that transparently improves protocol
performance. The booster can reside anywhere in the network or end systems, and may operate
independently (one-element booster), or in cooperation with other protocol boosters (multi-
One-Element Error Detection Booster for UDP:UDP has an optional 16-bit checksum field in
the header. If it contains the value zero, it means that the checksum was not computed by the
source For wide-area communication, the single-element error detection booster computes the
checksum and puts it into the UDP header. The booster could be located either in the source host
(below the level of UDP) or in a gateway machine.
One-Element ACK Compression Booster for TCP On a system with asymmetric channel
speeds, such as broadcast satellite, the forward (data) channel may be considerably faster than
the return (ACK) channel. On such a system, many TCP ACK‘s may build up in a queue,
increasing round-trip time, and thus reducing the transmission rate for a given TCP window size.
The booster increases the protocol performance because it reduces the ACK latency, and allows
faster transmission for a given window size
One-Element ARQ Booster for TCP: CP uses ARQ to retransmit data unacknowledged by the
receiver when a packet loss is suspected, such as after a retransmission time out expires. The
ARQ booster improves performance by shortening the retransmission path. A typical application
would be if Host X were on a wireless network and the booster were on the interface between the
wireless and wire line networks.
A Forward Erasure Correction Booster for IP or TCP: For many real-time and multicast
applications, forward error correction coding is desirable. The two-element FZC booster uses a
packet forward error correction code and erasure decoding. The FZC booster at the transmitter
side of the network adds parity packets.
Two-Element Jitter Control Booster for IP: For real time communication, we may be
interested in bounding the amount of jitter that occurs in the network. A jitter control booster can
be used to reduce jitter at the expense of increased latency.
Two-Element Selective ARQ Booster for IP or TCP: For links with significant error rates
using a selective ARQ protocol (with selective acknowledgment and selective retransmission)
can significantly improve the efficiency compared to using TCP‘s ARQ (with cumulative
acknowledgment and possibly go-back-N retransmission)
Downloaded by Jefferson James ([email protected])
lOMoARcPSD|45470517
Infrastructure WLAN: BS-oriented network. Single hop (or cellular) networks that require
fixed base stations interconnected by a wired backbone.
Non-infrastructure WLAN: Ad hoc WLAN. Unlike the BS-oriented network, which has BSs
providing coverage for MHs, ad hoc networks do not have any centralized administration or
standard support services regularly available on the network to which the hosts may normally be
connected.
The LTE Channel Model in Downlink Direction : All higher layer signaling and user data
traffic are organized in channels Mapping DTCHs to a single shared channel is done in two
steps. First, the logical DTCHs of all users are mapped to a transport layer Downlink Shared
Channel (DL-SCH). In the second step, this data stream is then mapped to the Physical
Downlink Shared Channel (PDSCH).
Downlink Management Channels: The downlink control information occupies the first one to
four symbols over the whole channel bandwidth in each sub frame. The number of symbols that
are used for this purpose is broadcast via the Physical Control Format Indicator Channel
(PCFICH), which occupies 16 symbols and finally, some symbols are reserved to acknowledge
the proper reception of uplink data blocks or to signal to the mobile device that a block was not
received correctly. This functionality is referred to as Hybrid Automatic Retransmission Request
(HARQ) and the corresponding channel is the Physical Hybrid Automatic Retransmission
Request Indicator Channel (PHICH).
The LTE Channel Model in Uplink Direction: In the uplink direction, a similar channel model
is used as in the downlink direction. There are again logical, transport and physical channels to
separate logical data streams from the physical transmission over the air interface and to
multiplex different data streams onto a single channel the most important channel is the Physical
Uplink Shared Channel (PUSCH).
Its main task is to carry user data in addition to signaling information and signal quality
feedback the mobile has been dormant for some time and wants to reestablish the connection. A
radio link failure has occurred and the mobile has found a suitable cell again. During a handover
process, the mobile needs to synchronize with a new cell before user data traffic can be resumed.
Optionally for requesting uplink resources.
Concepts of 5G:
5G is the 5th generation mobile network. ... 5G wireless technology is meant to deliver higher
multi-Gbps peak data speeds, ultra low latency, more reliability, massive network capacity,
increased availability, and a more uniform user experience to more users.
Fundamental Concepts:
C=B log2(1+S/N)
where
C is the channel capacity in bits per second
B is the bandwidth of the channel in Hertz
S is the average received signal power over the bandwidth, measured in watts
N is the average noise or interference power over the bandwidth, measured in watts (or
volts squared)
3. Spectral Efficiency: The spectral efficiency refers to the information rate that can be
transmitted over a given bandwidth in a specific communication system. The spectral
efficiency of a mobile communications system largely depends on the choice of a multiple
access method. The other factors may include the type of modulation used, error correction
methods, frequency reuse factor, the number of users served, radio capability, and the
Downloaded by Jefferson James ([email protected])
lOMoARcPSD|45470517
Multiple Access/Waveform:
First, since the available spectrum bands for 5G can be distributed over a large range of
frequencies, including even the millimeter wave bands.
The air-interface should be flexible enough so that it can operate in different frequency
bands.
Together with advanced radio frequency (RF) architecture and RF-related signal processing,
it needs to support either flexible switching between different frequency bands or
simultaneous operation in several frequency bands, including fragmented usage of certain
bands.
For this purpose, flexible numerology and frame structure as well as adaptive configuration
are needed.
1. OFDM:
OFDM is a multi-carrier modulation technique developed in the 1960s.
OFDM has been part and parcel of many telecom/broadcasting standards and its CP-
OFDM form is currently used in LTE, WiMAX, and LTE-Advanced (4G) standards.
OFDM capitalizes on the use of cyclic prefixes to reduce intersymbol interference
(ISI) and IFFT/FFT operations. IFFT/FFT (Inverse/Fast Fourier transform) allows
combining multiple carriers at the baseband leading to OFDMA.
OFDMA offers bandwidth scalability, robustness to multipath, and effective
integration with MIMO.
OFDM suffers from high PAPR (Peak-to-Average Power Ratio) and inferior
frequency localization due to the use of pulse shape filters.
2. GFDM:
3. NOMA:
In NOMA, multiple users can transmit at the same time using the same code and
frequency but with different power levels.
In this access method, multiple users are multiplexed in the power domain on the
transmitting end and on the receiving side, SIC (Successive Interference
Cancellation) can be used for multi-user signal separation.
NOMA introduces additional complexity and delay due to the use of SIC and the
performance gain is also insignificant at low SNR.
NOMA is suitable for both eMBB and mMTC (Massive Machine-Type
Communications) types of services, but perhaps not for URLLC due to the inherent
delay associated with SIC.
4. UFMC:
5. FBMC:
Filter bank multicarrier (FBMC) is one of the potential 5G waveforms where filtering
is considered at a very granular level, that is, on a per subcarrier basis.
In simple terms, FBMC represents a multi-carrier system where single subcarrier
signals are individually filtered with prototype filters.
FBMC has been proposed for cognitive radio applications.
During multipath propagation, the multicarrier symbols overlap at the receiver input
resulting in ISI.
FBMC addresses this challenge by adding some additional processing to the FFT
while keeping the timing and the symbol duration as it is. This additional processing
together with the FFT constitutes a bank of filters.
FBMC also offers higher robustness against Doppler and time and frequency
impairments compared to OFDM due to the use of appropriate filters.
6. SCMA:
COGNITIVE RADIO:
Downloaded by Jefferson James ([email protected])
lOMoARcPSD|45470517
Cognitive Radio (CR) is one of the potential solutions to increase the effectiveness of the
underutilized assigned spectrum.
CR extends the software radio with radio domain model-based reasoning about radio
etiquette.
Radio etiquette is the set of RF bands, air interfaces, protocols, and spatial and temporal
patterns that moderate the use of the radio spectrum.
FCC states that a CR is one that has the ability to change its parameters based on the
interaction with the environment it operates in to maximize the utilization of the radio
spectrum.
This interaction may involve active negotiation or communication with other spectrum
users and/or passive sensing and decision making within the radio.
The primary objective of the CR is to obtain the best available spectrum through
cognitive capability without interfering with the transmission of primary users.
It enables the utilization of the temporarily unused licensed spectrum which is
commonly known as the white space or spectrum hole.
SPECTRUM MANAGEMENT:
A CR-based network identifies two types of users, namely primary users and secondary
users.
The primary users (licensed users) use traditional wireless communication systems with
static spectrum allocation and have priority in spectrum utilization within the band.
Secondary Users (SU) are equipped with CRs and exploit spectrum opportunities to
sustain their communication activities without interfering with primary user (PU)
transmissions.
This requires spectrum aware operations which can consist of four steps, namely
spectrum sensing, spectrum decision, spectrum sharing, and spectrum mobility
1. Spectrum Sensing:
The spectrum sensing function involves probing the spectrum, capturing the information,
and locating an unused part of it for sharing.
Spectrum sensing schemes can be classified either as narrowband or wideband.
Downloaded by Jefferson James ([email protected])
lOMoARcPSD|45470517
2. Spectrum Decision:
The detection of the spectrum to find the best available channel for the CR users.
The selection of a spectrum involves a number of steps
Spectrum Characterization/Analysis: Spectrum analysis shall be conducted for
characterization of different spectrum bands to get the best channel appropriate for the
CR users’ requirements.
Communication Features Selection : After the selection of the channel, CR users then
adaptively select the appropriate modulation types, error control schemes, and upper
layer protocols to meet the application requirements. These communication
characteristics have to be adaptable to allow for changes in the characteristics of the
spectrum.
3. Spectrum Sharing:
Spectrum is expected to be shared between primary and secondary (cognitive) users in
5G networks.
The basic goal behind spectrum sharing is that it shall not cause interference to the
PUs while maintaining QoS for cognitive users.
The task is performed by coordinating the channel access as well as adaptively
allocating communication resources.
4. Spectrum Mobility:
The need for spectrum mobility arises when current channel conditions become worse
for CR users or a PU appears in the area.
C-RAN Architecture:
There are two approaches to split base stations, functions between RRU and BBU within
the C-RAN architecture.
With full centralization, the baseband (i.e., layer 1), layer 2, and layer 3 functions are
located in the BBU pool.
In partial centralization, the RRU integrates layer 1/radio functions, while all other higher
layer functions are still in BBU.
Both approaches have pros and cons. Though the full centralization technique will ease
the network upgrade process, it requires very high transmission bandwidth between BBU
and RRU.
The partial centralization approach requires certain lower transmission bandwidths
between the units, but it gives less flexibility for upgrading.
RRU
RRU
RRU
RRU
Transport: The connectivity between BBUs and RRUs in C-RAN is provided through front haul
which is for the most part is supported via optical fiber cable, but in some cases, wireless links
are also used.
Downloaded by Jefferson James ([email protected])
lOMoARcPSD|45470517
In fronthaul, BBU and RRU communicate using an analog RF signal, while backhaul which
connects the base transceiver station (BTS) to the Radio Controller in 3G and to the core network
in 4G is primarily Ethernet/IP based.
Carrier Ethernet can also be applied from RRU toward the BBU pool. However, if Ethernet is
chosen as the transport method for C-RAN, a CPRI (common protocol radio interface) Ethernet
gateway will be needed. This gateway maps CPRI data to Ethernet packets, close to or at the
interface of RRU toward the BBU pool.
Interface(s): Today, C-RAN is primarily supported by CPRI (common protocol radio interface).
protocol is sensitive to latency and the synchronization performance of a transmission system, so
in a number of cases, it is limited to a distance of about 40 km.
Other interfaces, such as OBSAI (Open Base Station Architecture Initiative) and ORI (Open
Radio equipment Interface) are also used/specified. Thus, these existing protocols may need to
be revised to allow for high volume transmission over long distances.
China Mobile is currently working on developing a new interface, that is, Next Generation
Fronthaul Interfaces (NGFI), to address the low transmission efficiency and scalability of
CPRI/OBSAI interfaces.
VEHICULAR COMMUNICATIONS:
1. From V2Vto V2X: In the early stages of development and until the recent past, V2V and
V2I [89–93] were envisioned as the highpoints of vehicular communications.
V2V: Using V2V communication, a vehicle can detect the position and movement of
other vehicles for short distances. The vehicles communicate with each other to support
applications such as cooperative driver assistance, slow vehicle warning, and so on.
V2I: V2I enables vehicles to communicate with fixed infrastructure along the side of the
road in order to provide user communication and information services such as Internet
access, mobile advertising, and so on.
V2X:
As technology evolves, so do the services that run on top of those technologies.
Similarly, vehicular communication is evolving from V2V/V2I to V2X to keep up with
the demands of the automotive industry and to take advantage of LTE/5G developments.
V2X includes C-ITS (Cooperative Intelligent Transport Systems) which is a critical
component of the connected car and automated driving of the future. V2X is comprised
of four forms, namely V2V, V2I, V2N (Vehicle-to-Network), and V2P (Vehicle-to-
Pedestrian).
V2V and V2P communications are primarily based on broadcast capability between
vehicles and vehicles and road users.
These two forms exchange information such as location, velocity, and direction to avoid
accidents and mishaps.
V2I and V2N on the other hand also involve infrastructure/network sending messages to
the vehicles.
V2I communication is between vehicles and roadside units (RSUs) and between vehicles
and nearby traffic control devices. V2N transmission is between vehicles and application
servers through cellular networks such as LTE.
2. Key Standards:
The IEEE 802.11p is an approved amendment to the IEEE 802.11 standard and
adds a vehicular communication system, that is, Wireless Access in Vehicular
Environments (WAVE).
It defines the enhancements to IEEE 802.11 required to support ITS applications.
DSRC, defined in IEEE 802.11p and IEEE 1609 family of standards for WAVE
allows high-speed data exchange between vehicles and between the vehicles and
the roadside infrastructure using a licensed ITS band of 5.9 GHz (5.855–5.925
GHz).
The IEEE 1609 standards define architecture, security protocols, management
functions, and a standardized set of services and interfaces for enabling V2V and
V2I communications.
The DSRC protocol stack is based on IEEE 1609 and IEEE 802.11p standards.
The latter provides physical and MAC layers while the higher layers are defined
by the former.
V2V communications mainly rely on lightweight WAVE Short Message Protocol
(WSMP) while TCP/IP are used in V2I and V2N modes.
3. VC Architecture:
VC architecture is derived from the multitude of V2V and V2I and, in general,
V2X projects.
Vehicles, in particular high-end ones, are equipped with multiple processors and
micro controllers dedicated to tasks such as fuel injection, braking, transmission,
battery charging, and so on, and are also equipped with navigation systems such
as GPS and sensors for velocity, direction, temperature, airbag status, rear and
front cameras, and so on.
The VC computing functionality is expected to be independent and responsible
for running the V2X communication protocols and the supported applications.
compares the current protocol stack with a probable C-V2X one. The key difference
between the two is at the lower layers.
In the case of DSRC/WAVE, the physical layer is based on IEEE 802.11p standard,
while in C-V2X, it can be based on LTE and/or 5G.
The MAC is divided into lower and upper MAC supported by IEEE 802.11p and 1609.4
standards, respectively, in DSRC, while MAC is based on cellular standards in C-V2X.
The upper layers, security mechanisms, and management services can be similar in the
two stacks.
LTE/5G wireless transmission and medium access technologies will further enrich the
VC environment as DSCR/WAVE can only support V2V and V2I based applications.
The DSCR/WAVE protocol stack is split above the MAC layer between WAVE Short
Message Protocol (WSMP) which is non-IP and IP.
A wide variety of user cases that require low latency and high reliability can be addressed
by LTE such as “do not pass warning” at highway speeds and ADAS (Automated
Driving and Advanced driver assistance Systems).
5. VC Challenges:
VC brings a number of technical but also behavioral challenges (financial,
privacy, legal, and organizational issues) because a number of industries are
involved in the upbringing.
One such challenge is related to the security of such systems. To protect VC
systems from information contamination such as false warnings, and other such
attacks, strong and efficient security mechanisms are required.
security measures such as beaconing, neighbor discovery, and geocasting must be
taken in order to ensure vehicle identification methods are effectively
implemented.
6. VC Evolution:
The debate on VC started over two decades ago and has come a long way. The
inception of WAVE/DSRC for V2V and V2I applications by IEEE along with the
allocation of 5.9 GHz band in some countries was a significant milestone.
In the last few years, 3GPP has joined the bandwagon and conceptualized V2X.
3GPP Rel-14 established the foundation of V2X by setting requirements along
with use cases.
V2X use cases such as forward collision warning, control loss warning,
emergency vehicle warning, queue warning, and so on have been envisioned in
Rel-14.
Taking advantage of IEEE’s ineffectiveness in defining a meaningful evolution
path for DSRC, 3GPP has been putting requirements for low latency and higher
reliability V2X applications in its Rel-15.
NETWORK SLICING
Network slicing is an end-to-end logical instance of a network with at least the following
attributes
1. E2E Slicing:
Network slicing can be considered an evolution of network sharing, which is a proven
business model for operators to reduce CAPEX and OPEX. Network slicing goes
beyond sharing and envisions using virtualization and softwarization to improve user
experience, increase network usage, and add on to operators’ revenues.
The slicing manifests the resolution of many complex issues including slice design,
instantiation, implementation, and operations that requires new thinking.
Fronthaul in the case of C-RANs and transport area may have to be considered for
some cases. Furthermore, virtualization and softwarization through NFV and SDN are
also key building blocks of network slicing.
The slicing is realized through network functions which provide the tailored
capabilities needed to entertain a specific demand. Network functions could be slice-
specific or could be used across multiple slices.
In today’s cut throat competition environment, operators are working to maximize
their return on investment and utilization of their networks. E2E (end-to-end) slicing
is an instrument which can achieve this goal, is making headlines, and is an important
area of 5G research and development.
A slice in the RAN relies on Radio Access Technology (RAT) and configuration
of radio resources to carry what it is intended to deliver. There could be separate
RATs in 5G designed to address different services.
RAN related configuration, which is customized to a particular slice, may include
access control, load balancing, and resource scheduling.
To activate a slice, an access point/base station may allocate radio resources for
the slice and enable all radio and network functions required for the operation of
the slice. The slices in RAN may require slice-specific control-plane/user-plane
and slice on/off operations
SDN provides extensive control plane functions for enabling network slicing, however, to
efficiently manage the lifecycle of slices and their constituent resources, NFV is needed.
3. Benefits/Challenges/Future: