Performance Analysis in Wireless HetNets: Traffic, Energy, and Secrecy Considerations
Author: Georgios Smpokos
Publisher: Linköping University Electronic Press
Published: 2021-03-17
Total Pages: 19
ISBN-13: 9179296696
DOWNLOAD EBOOKTo this day, most of the communication networks are characterized by a "monolithic" operating approach. Network elements are configured and operate without any reconfiguration for long time periods. Softwarization, whereby dedicated elements are being replaced by more general-purpose devices, has been lately challenging this existing approach. Virtualizing the infrastructure through the softwarization can provide significant benefits to end users and operators, supporting more flexible service deployment, providing real time monitoring and operational changes. In Paper I we study a novel allocation technique and traffic optimization process for the access network. Cellular network technologies (i.e. UMTS, LTE, LTE-A) will coexist with non-cellular small cells and offload traffic from cellular to non-cellular networks mainly operating in 3GPP Wi-Fi (IEEE 802.11 standards). This is a scenario for indoor wireless access implementations where offloading mechanisms can improve the QoS offered by the operators, and reduce the traffic handled by the access fronthaul. The analysis of a novel optimization algorithm exhibited a holistic solution for access-core interworking where LWA (LTE-WiFi Aggregation) offers improved performance for the end users. In order to optimize core network operations factors such as the operational costs should be addressed. Following this approach in Paper II we analysed how environmental factors (e.g. temperature, humidity) can affect the power consumption of core network data centers (cooling systems). By applying machine learning techniques using data from a data center, we were able to forecast the power consumption based on to atmospheric weather conditions and analyse its accuracy. Optimizing the access network operations and the interworking (resource allocation, scheduling, offloading) can lead to highly configurable and secure operations. These have been factors of great concern as wireless connectivity increases in denser populated areas. In Paper III we examine the physical layer secrecy aspects of a collaborative small cell network in the presence of parallel connections and caching capabilities at the edge nodes. Using tools from the probability theory, we examined how the power allocation for the transmissions can ensure secrecy in the presence of an eavesdropper.