Journal articles on the topic 'Open Radio access networks, ORAN'

To see the other types of publications on this topic, follow the link: Open Radio access networks, ORAN.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Open Radio access networks, ORAN.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Pepadu, Jurnal, and Muhamad Shodikin. "ANALISIS PERANCANGAN LTE HOME PADA JARINGAN 4G LTE BERBASIS OPEN RADIO ACCESS NETWORK." Jurnal Pepadu 2, no. 4 (October 29, 2021): 408–20. http://dx.doi.org/10.29303/pepadu.v2i4.2255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Penelitian tentang LTE berlanjut hingga teknologi generasi kelima secara resmi ditetapkan oleh badan standar. Ketersediaan jaringan transmisi berbasis serat optik mendorong riset untuk mengoptimalkan kecepatan akses pelanggan rumahan sehingga PT Telkomsel meluncurkan layanan LTE Home berbasis modem CPE untuk menghadirkan komunikasi LTE. Dasar dari teknologi LTE Home adalah penguat sinyal menggunakan modem CPE di rumah pelanggan. Mudah diimplementasikan tetapi memiliki kelemahan yaitu tidak memancarkan sinyalnya sendiri dan membebani pemancar sumber LTE. Penelitian ini mengusulkan teknologi LTE Home berbasis Open Radio Access Network (ORAN) sebagai solusi, dengan memasang pemancar LTE Home di rumah pelanggan dan terkoneksi langsung ke jaringan inti melalui transmisi pita lebar milik sendiri / sewa. Penelitian ini penting dilakukan karena dapat menyelesaikan masalah konektivitas tidak langsung dengan sistem jaringan inti yang terjadi pada LTE Home berbasis modem CPE dan juga membuka peluang penerapan teknologi seperti IoT untuk rumah pintar dan gedung pintar. Metode penelitian ini menganalisis desain LTE Home berbasis ORAN, model pengukuran Key Performance Indicator (KPI) dan integrasinya ke dalam operator seluler. Batasan penelitian adalah eksplorasi teknologi LTE berbasis ORAN yang disimulasikan secara virtual terintegrasi dengan komponen Open Source. Luaran penelitian ini mendeskripsikan desain LTE Home berbasis ORAN, mendeskripsikan hardware dan software berbasis Open Source yang digunakan, menjelaskan desain dan simulasi teknik LTE Home berbasis ORAN, menjelaskan bahwa ORAN merupakan teknologi berbasis Open Source yang murah namun layak.
2

Adrian Kliks, Marcin Dryjanski, Vishnu Ram, Leon Wong, and Paul Harvey. "Towards autonomous open radio access networks." ITU Journal on Future and Evolving Technologies 4, no. 2 (May 17, 2023): 251–68. http://dx.doi.org/10.52953/gjii3746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this paper we give an overview of an open disaggregated network architecture based on an Open Radio Access Network (O-RAN), including the current work from standards bodies and industry bodies in this area. Based on this architecture, a framework for the automation of xApp development and deployment is proposed. This is then aligned with the key concepts described in ITU-T in terms of the evolution, experimentation, and adaptation of controllers. The various steps in such an aligned workflow, including design, validation, and deployment of xApps, are discussed, and use case examples are provided to illustrate further our position regarding the mechanisms needed to achieve automation.
3

Plantin, Jean-Christophe. "The geopolitical hijacking of open networking: the case of Open RAN." European Journal of Communication 36, no. 4 (July 9, 2021): 404–17. http://dx.doi.org/10.1177/02673231211028375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This article investigates how discourses on open networking technologies provide a social imaginary that industry and government actors mobilize in an attempt to expand their control over mobile telecommunications networks. The case of recent initiatives aiming to ‘open up’ radio access network (or RAN, a key component of telecommunications infrastructure) with an ‘open RAN’ model reveals how the US Government came to promote this nascent technology to create an opposition between its own ‘open’ telecommunications networks versus proprietary and presumed ‘untrustworthy’ networks based on foreign equipment, namely Huawei. While a closer look casts doubts on the benefits of open radio access network to increase network security or to open up the equipment market, this case reveals how openness is an ambiguous notion that can be used by governments to exclude foreign trade enemies, while advocating for trust in telecommunications networks.
4

Dryjański, Marcin, Łukasz Kułacz, and Adrian Kliks. "Toward Modular and Flexible Open RAN Implementations in 6G Networks: Traffic Steering Use Case and O-RAN xApps." Sensors 21, no. 24 (December 7, 2021): 8173. http://dx.doi.org/10.3390/s21248173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The development of cellular wireless systems has entered the phase when 5G networks are being deployed and the foundations of 6G solutions are being identified. However, in parallel to this, another technological breakthrough is observed, as the concept of open radio access networks is coming into play. Together with advancing network virtualization and programmability, this may reshape the way the functionalities and services related to radio access are designed, leading to modular and flexible implementations. This paper overviews the idea of open radio access networks and presents ongoing O-RAN Alliance standardization activities in this context. The whole analysis is supported by a study of the traffic steering use case implemented in a modular way, following the open networking approach.
5

Tsagkaris, Kostas, George Poulios, Panagiotis Demestichas, Abdoulaye Tall, Zwi Altman, and Christian Destré. "An open framework for programmable, self-managed radio access networks." IEEE Communications Magazine 53, no. 7 (July 2015): 154–61. http://dx.doi.org/10.1109/mcom.2015.7158279.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wypiór, Dariusz, Mirosław Klinkowski, and Igor Michalski. "Open RAN—Radio Access Network Evolution, Benefits and Market Trends." Applied Sciences 12, no. 1 (January 1, 2022): 408. http://dx.doi.org/10.3390/app12010408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Open RAN (radio access network) movement is perceived as a game changer, having robust potential to introduce shifts in mobile radio access networks towards tailor-made solutions based on the architecture decomposition. It is widely assumed that those changes will affect the approach to network deployments and supply chains of network elements and their further integration and maintenance. First deployments of O-RAN-based networks have already delivered broadband services to end users. In parallel, many proof-of-concept feature evaluations and theoretical studies are being conducted by academia and the industry. In this review, the authors describe the RAN evolution towards open models and make an attempt to indicate potential open RAN benefits and market trends.
7

Azariah, Wilfrid, Fransiscus Asisi Bimo, Chih-Wei Lin, Ray-Guang Cheng, Navid Nikaein, and Rittwik Jana. "A Survey on Open Radio Access Networks: Challenges, Research Directions, and Open Source Approaches." Sensors 24, no. 3 (February 5, 2024): 1038. http://dx.doi.org/10.3390/s24031038.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The open radio access network (RAN) aims to bring openness and intelligence to the traditional closed and proprietary RAN technology and offer flexibility, performance improvement, and cost-efficiency in the RAN’s deployment and operation. This paper provides a comprehensive survey of the Open RAN development. We briefly summarize the RAN evolution history and the state-of-the-art technologies applied to Open RAN. The Open RAN-related projects, activities, and standardization is then discussed. We then summarize the challenges and future research directions required to support the Open RAN. Finally, we discuss some solutions to tackle these issues from the open source perspective.
8

Iturria-Rivera, Pedro Enrique, Han Zhang, Hao Zhou, Shahram Mollahasani, and Melike Erol-Kantarci. "Multi-Agent Team Learning in Virtualized Open Radio Access Networks (O-RAN)." Sensors 22, no. 14 (July 19, 2022): 5375. http://dx.doi.org/10.3390/s22145375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Starting from the concept of the Cloud Radio Access Network (C-RAN), continuing with the virtual Radio Access Network (vRAN) and most recently with the Open RAN (O-RAN) initiative, Radio Access Network (RAN) architectures have significantly evolved in the past decade. In the last few years, the wireless industry has witnessed a strong trend towards disaggregated, virtualized and open RANs, with numerous tests and deployments worldwide. One unique aspect that motivates this paper is the availability of new opportunities that arise from using machine learning, more specifically multi-agent team learning (MATL), to optimize the RAN in a closed-loop where the complexity of disaggregation and virtualization makes well-known Self-Organized Networking (SON) solutions inadequate. In our view, Multi-Agent Systems (MASs) with MATL can play an essential role in the orchestration of O-RAN controllers, i.e., near-real-time and non-real-time RAN Intelligent Controllers (RIC). In this article, we first provide an overview of the landscape in RAN disaggregation, virtualization and O-RAN, then we present the state-of-the-art research in multi-agent systems and team learning as well as their application to O-RAN. We present a case study for team learning where agents are two distinct xApps: power allocation and radio resource allocation. We demonstrate how team learning can enhance network performance when team learning is used instead of individual learning agents. Finally, we identify challenges and open issues to provide a roadmap for researchers in the area of MATL based O-RAN optimization.
9

Kaarthik, K., P. T. Sivagurunathan, and S. Sivaranjani. "A REVIEW ON SPECTRUM SENSING METHODS FOR COGNITIVE RADIO NETWORKS." JOURNAL OF ADVANCES IN CHEMISTRY 12, no. 18 (November 16, 2016): 5053–57. http://dx.doi.org/10.24297/jac.v12i18.5380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In Wireless Communication, Radio Spectrum is doing a vital role; for the future need it should use efficient. The existing system, it is not possible to use it efficiently where the allocation of spectrum is done based on fixed spectrum access (FSA) policy. Several surveys prove that it show the way to inefficient use of spectrum. An innovative technique is needed for spectrum utilization effectively. Using Dynamic spectrum access (DSA) policy, available spectrum can be exploited. Cognitive radio arises to be an attractive solution which introduces opportunistic usage of the frequency bands that are not commonly occupied by licensed users. Cognitive radios promote open spectrum allocation which is a clear departure from habitual command and control allocation process for radio spectrum usage. In short, it permits the formation of “infrastructure-less” joint network clusters which is called Cognitive Radio Networks (CRN). Conversely the spectrum sensing techniques are needed to detect free spectrum. In this paper, different spectrum sensing techniques are analyzed.
10

Sun, Yaohua, Mugen Peng, Yijing Ren, Li Chen, Li Yu, and Shiqiang Suo. "Harmonizing Artificial Intelligence with Radio Access Networks: Advances, Case Study, and Open Issues." IEEE Network 35, no. 4 (July 2021): 144–51. http://dx.doi.org/10.1109/mnet.011.2000656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Galluzzi, Valerie, and Ted Herman. "Survey: Discovery in Wireless Sensor Networks." International Journal of Distributed Sensor Networks 8, no. 1 (January 1, 2012): 271860. http://dx.doi.org/10.1155/2012/271860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Neighbor discovery is a component of communication and access protocols for ad hoc networks. Wireless sensor networks often must operate under a more severe low-power regimen than do traditional ad hoc networks, notably by turning off radio for extended periods. Turning off a radio is problematic for neighbor discovery, and a balance is needed between adequate open communication for discovery and silence to conserve power. This paper surveys recent progress on the problems of neighbor discovery for wireless sensor networks. The basic ideas behind these protocols are explained, which include deterministic schedules of waking and sleeping, randomized schedules, and combinatorial methods to ensure discovery.
12

Gregory, Mark A. "Future of Telecommunications is Open Source." Journal of Telecommunications and the Digital Economy 8, no. 3 (September 30, 2020): ii—iv. http://dx.doi.org/10.18080/jtde.v8n3.363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Papers in the September 2020 issue of the Journal include the NBN Futures Forum on the social and economic benefits of broadband for digital inclusion and telehealth, the benefits of submarine cables to South Pacific nations, 5G transmission, the economics of over-the-top media, energy efficient wireless sensor networks and a celebration of the life of Liz Fell, journalist and Distinguished Fellow of the Telecommunications Society of Australia (now the Telecommunications Association). This year, open source has moved into focus with the telecommunications industry, with open core systems and open radio access networks for 5G taking centre stage. The Journal welcomes contributions on telecommunications and the digital economy.
13

Rehman, Bilal Ur, Mohammad Inayatullah Babar, Arbab Waheed Ahmad, Mohammad Amir, Wasim Habib, Muhammad Farooq, and Gamil Abdel Azim. "Uplink non-orthogonal multiple access in heterogeneous networks: A review of recent advances and open research challenges." International Journal of Distributed Sensor Networks 18, no. 10 (October 2022): 155013292211324. http://dx.doi.org/10.1177/15501329221132496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Fifth-generation wireless communications provide several benefits, including high throughput, lower latency, massive connectivity, considerable improvement in the number of users, higher base station capacity, and achieved quality of service. Non-orthogonal multiple access, an effective approach for sharing the same radio resources, has been highlighted as a viable technology in the fifth-generation wireless networks to achieve the demands of available bandwidth, user connectivity, and application latency. Non-orthogonal multiple access and heterogeneous networks have recently emerged as promising network infrastructures for enhancing the spectrum capacity and accommodating more users by sharing the same resources with high throughput. This potential capability has made the non-orthogonal multiple access–enabled heterogeneous networks a new research topic in the modern era. In this survey, the concept of non-orthogonal multiple access and its significance in different emerging technologies has been well explored. Furthermore, this survey covers a systematic overview of the state-of the-art techniques based on non-orthogonal multiple access–enabled heterogeneous networks and devising taxonomy for uplink non-orthogonal multiple access–enabled heterogeneous networks. In addition, this survey provides critical insights and identifies several open research challenges considering the uplink non-orthogonal multiple access–enabled heterogeneous networks.
14

Ganesh, D., and T. Pavan Kumar. "A Survey onadvances in security threats and its counter measures in cognitive radio networks." International Journal of Engineering & Technology 7, no. 2.8 (March 19, 2018): 372. http://dx.doi.org/10.14419/ijet.v7i2.8.10465.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cognitive radio is a promising wireless communication technology that improves spectrum utilization and offers many benefits for internet users. Cognitive radio networks utilizes the available limited resources in a more efficient and flexible way. The main objective of the Cognitive network is to efficiently utilize the unutilized spectrum and meet the demand of the secondary users. some of the important features of cognitive of Cognitive radio networks are dynamic spectrum access, self organizing and flexibility. As Cognitive radio networks are flexible in nature, it will be effected by various security attacks which in turn affects the performance of the network. Furthermore Cognitive radio networks transmit the spectrum in several licensed bands and it also performs dynamic spectrum allocation. Cognitive radio and Cognitive radio networks are wireless in nature these face conventional attacks. In this survey we address various attacks in different layers , new threats and challenges that Cognitive networks face, current available solutions to address layer attacks. In addition applications, open problems and future Research challenges are also specified.
15

Peng, Mugen, Yaohua Sun, Xuelong Li, Zhendong Mao, and Chonggang Wang. "Recent Advances in Cloud Radio Access Networks: System Architectures, Key Techniques, and Open Issues." IEEE Communications Surveys & Tutorials 18, no. 3 (2016): 2282–308. http://dx.doi.org/10.1109/comst.2016.2548658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Musa, Abubakar Ahmad, Adamu Hussaini, Cheng Qian, Yifan Guo, and Wei Yu. "Open Radio Access Networks for Smart IoT Systems: State of Art and Future Directions." Future Internet 15, no. 12 (November 27, 2023): 380. http://dx.doi.org/10.3390/fi15120380.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Internet of Things (IoT) constitutes a vast network comprising various components such as physical devices, vehicles, buildings, and other items equipped with sensors, actuators, and software. These components are interconnected, facilitating the collection and exchange of copious data across networked communications. IoT empowers extensive monitoring and control over a myriad of objects, enabling them to gather and disseminate data that bolster applications, thereby enhancing the system’s capacity for informed decision making, environmental surveillance, and autonomous inter-object interaction, all without the need for direct human involvement. These systems have achieved seamless connectivity requirements using the next-generation wireless network infrastructures (5G, 6G, etc.), while their diverse reliability and quality of service (QoS) requirements across various domains require more efficient solutions. Open RAN (O-RAN), i.e., open radio open access network (RAN), promotes flexibility and intelligence in the next-generation RAN. This article reviews the applications of O-RAN in supporting the next-generation smart world IoT systems by conducting a thorough survey. We propose a generic problem space, which consists of (i) IoT Systems: transportation, industry, healthcare, and energy; (ii) targets: reliable communication, real-time analytics, fault tolerance, interoperability, and integration; and (iii) artificial intelligence and machine learning (AI/ML): reinforcement learning (RL), deep neural networks (DNNs), etc. Furthermore, we outline future research directions concerning robust and scalable solutions, interoperability and standardization, privacy, and security. We present a taxonomy to unveil the security threats to emerge from the O-RAN-assisted IoT systems and the feasible directions to move this research forward.
17

Giannopoulos, Anastasios, Sotirios Spantideas, Nikolaos Kapsalis, Panagiotis Gkonis, Lambros Sarakis, Christos Capsalis, Massimo Vecchio, and Panagiotis Trakadas. "Supporting Intelligence in Disaggregated Open Radio Access Networks: Architectural Principles, AI/ML Workflow, and Use Cases." IEEE Access 10 (2022): 39580–95. http://dx.doi.org/10.1109/access.2022.3166160.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

TSUCHIDA, Shohei, Mamoru SAWAHASHI, Hidekazu TAOKA, and Kenichi HIGUCHI. "Field Experiments on Open-Loop Type Transmit Diversity in OFDM Radio Access." IEICE Transactions on Communications E92-B, no. 5 (2009): 1705–13. http://dx.doi.org/10.1587/transcom.e92.b.1705.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Damayanti, Lusi, Damelia Panggabean, Sheren Regina Pingkan, Asri Wulandari, Alfin Hikmaturokhman, and Adhi Hidayatullah. "Design and Build 4G Open Radio Access Network at SmartLab Politeknik Negeri Jakarta." JOURNAL OF INFORMATICS AND TELECOMMUNICATION ENGINEERING 6, no. 2 (January 25, 2023): 414–23. http://dx.doi.org/10.31289/jite.v6i2.7537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The transition of RAN (Radio Access Network) development from the conventional model to Open RAN is motivated by the fact that Open RAN presents new services by reducing CAPEX (Capital Expenditure) and has the ability to integrate all cellular technologies in one server. One of cellular technology that can be developed using Open RAN is 4G LTE networks. The 4G LTE network produces internet with high data rate and low latency system. Various use case implementations can be carried out, for example to support learning on campus. In this study, the development of Open RAN 4G is implemented as a use case to build the Jakarta State Polytechnic SmartLab which produces its own cellular network. The importance of this research is to be able to ascertain the performance of the Open RAN 4G network using a Centralized RAN scenario. The method used in this research consists of knowing the problem, determining the tools used, determining the implementation scenario, configuring, and testing network performance. Parameters measured to test network performance are uplink downlink speed, RSRP value, and SINR value. Based on the scenarios that have been executed, the results show that the Open RAN 4G network has a maximum downlink speed performance of 13.6 Mbps, a maximum uplink speed of 7.22 Mbps, a maximum SINR of 22 dB, an RSRP of -200 dBm, and a maximum range that can be reached is 5 meters.
20

Sagar Anand Ukey, Aishwarya, and Meenu Chawla. "Spectrum aware clustering in cognitive radio ad hoc networks." International Journal of Engineering & Technology 7, no. 2.30 (May 29, 2018): 27. http://dx.doi.org/10.14419/ijet.v7i2.30.13458.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cognitive radio (CR) is an emerging technology developed for efficient utilization of the radio spectrum. CRN utilizes CR technology and enables the unlicensed users also referred as secondary users (SUs) to access free portions of the licensed spectrum in an opportunistic manner. To support scalability and stability in distributed CRNs also referred as cognitive radio ad hoc networks (CRAHNs), SUs are often organized into smaller groups known as clusters. Spectrum aware clustering is considered as the key technique to overcome numerous is-sues associated with the dynamic nature of CRAHNs. This article focuses on clustering in CRAHNs and presents a comprehensive review of various spectrum aware clustering algorithms presented in the literature. The article highlights notable clustering metrics and includes the description of cluster formation and maintenance process. The article also renders potential research gaps in existing research works and discusses open challenges and issues that need to be addressed for efficient clustering in CRAHNs.
21

Vaduganathan, Lakshminarayanan, Shubhangi Neware, Przemysław Falkowski-Gilski, and Parameshachari Bidare Divakarachari. "Spectrum Sensing Based on Hybrid Spectrum Handoff in Cognitive Radio Networks." Entropy 25, no. 9 (August 31, 2023): 1285. http://dx.doi.org/10.3390/e25091285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The rapid advancement of wireless communication combined with insufficient spectrum exploitation opens the door for the expansion of novel wireless services. Cognitive radio network (CRN) technology makes it possible to periodically access the open spectrum bands, which in turn improves the effectiveness of CRNs. Spectrum sensing (SS), which allows unauthorized users to locate open spectrum bands, plays a fundamental part in CRNs. A precise approximation of the power spectrum is essential to accomplish this. On the assumption that each SU’s parameter vector contains some globally and partially shared parameters, spectrum sensing is viewed as a parameter estimation issue. Distributed and cooperative spectrum sensing (CSS) is a key component of this concept. This work introduces a new component-specific cooperative spectrum sensing model (CSCSSM) in CRNs considering the amplitude and phase components of the input signal including Component Specific Adaptive Estimation (CSAE) for mean squared deviation (MSD) formulation. The proposed concept ensures minimum information loss compared to the traditional methods that consider error calculation among the direct signal vectors. The experimental results and performance analysis prove the robustness and efficiency of the proposed work over the traditional methods.
22

Zhu, Yanmin, and Yuan Jiang. "On Optimal Antijamming Strategies in Sensor Networks." International Journal of Distributed Sensor Networks 8, no. 4 (April 1, 2012): 793194. http://dx.doi.org/10.1155/2012/793194.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Physical layer radio jamming is a serious security threat to a wireless sensor network since the network relies on open wireless radio channels. A radio jammer is typically strategic and chooses its jamming strategy in response to the possible defense strategy taken by the sensor network. In this paper we model the interaction between the sensor network and the attacker as a noncooperative nonzero-sum static game. In such a game, the sensor network has a set of strategies of controlling its probability of wireless channel access and the attacker manipulates its jamming by controlling its jamming probability after sensing a transmission activity. We propose an algorithm for computing the optimal strategies for jamming attack and network defense. A critical issue is that there may exist a number of possible strategy profiles of Nash equilibria. To address this issue, we further propose to choose realistic Nash equilibria by applying the Pareto dominance and risk dominance. Our numerical results demonstrate that the strategies chosen by the Pareto dominance and risk dominance achieve the expected performance. Our results presented in the paper provide valuable defense guidance for wireless sensor networks against jamming attacks.
23

Luitel, Subash, and Sangman Moh. "Energy-Efficient Medium Access Control Protocols for Cognitive Radio Sensor Networks: A Comparative Survey." Sensors 18, no. 11 (November 5, 2018): 3781. http://dx.doi.org/10.3390/s18113781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The increase of application areas in wireless sensor networks demands novel solutions in terms of energy consumption and radio frequency management. Cognitive radio sensor networks (CRSNs) are key for ensuring efficient spectrum management, by making it possible to use the unused licensed frequency spectrum together with the unlicensed frequency spectrum. Sensor nodes powered by energy-constrained batteries necessarily require energy-efficient protocols at the routing and medium access control (MAC) layers. In CRSNs, energy efficiency is more important because the sensor nodes consume additional energy for spectrum sensing and management. To the best of authors’ knowledge, there is no survey on “energy-efficient” MAC protocols for CRSNs in the literature, even though a conceptual review on MAC protocols for CRSNs was presented at a conference recently. In this paper, energy-efficient MAC protocols for CRSNs are extensively surveyed and qualitatively compared. Open issues, and research challenges in the design of MAC protocols for CRSNs, are also discussed.
24

Kumar, Sunil. "AI/ML Enabled Automation System for Software Defined Disaggregated Open Radio Access Networks: Transforming Telecommunication Business." Big Data Mining and Analytics 7, no. 2 (June 2024): 271–93. http://dx.doi.org/10.26599/bdma.2023.9020033.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Aldababsa, Mahmoud, Mesut Toka, Selahattin Gökçeli, Güneş Karabulut Kurt, and Oğuz Kucur. "A Tutorial on Nonorthogonal Multiple Access for 5G and Beyond." Wireless Communications and Mobile Computing 2018 (June 28, 2018): 1–24. http://dx.doi.org/10.1155/2018/9713450.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Today’s wireless networks allocate radio resources to users based on the orthogonal multiple access (OMA) principle. However, as the number of users increases, OMA based approaches may not meet the stringent emerging requirements including very high spectral efficiency, very low latency, and massive device connectivity. Nonorthogonal multiple access (NOMA) principle emerges as a solution to improve the spectral efficiency while allowing some degree of multiple access interference at receivers. In this tutorial style paper, we target providing a unified model for NOMA, including uplink and downlink transmissions, along with the extensions to multiple input multiple output and cooperative communication scenarios. Through numerical examples, we compare the performances of OMA and NOMA networks. Implementation aspects and open issues are also detailed.
26

Chaoub, Abdelaali, and Elhassane Ibn-Elhaj. "Performance Evaluation of Multimedia Traffic Transmission Under Binomial and Poissonian Primary Traffics in Cognitive Radio Networks." International Journal of Mobile Computing and Multimedia Communications 4, no. 3 (July 2012): 87–105. http://dx.doi.org/10.4018/jmcmc.2012070106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cognitive Radio is an enabling agile technology for communication and channels sharing in multimedia and wireless networks. The authors consider multimedia traffic transmission over Cognitive Radio (CR) networks using a progressive source coding associated to fountain codes. For a Cognitive Radio infrastructure where the spectrum is owned by Primary Users (PUs) that have Binomial and/or Poissonian traffics, Secondary Users (SUs) are allowed to share these spectral resources using the Opportunistic Spectrum Sharing feature of the Cognitive Radio concept. The objective of this paper lies in characterizing the reliability and as a result evaluating the performance of the secondary multimedia service provision under both primary traffic types in lossy Cognitive Radio environments. The authors have conducted a general analysis for many still open issues in Cognitive Radio and tackle three critical factors responsible for secondary service disruption: primary traffic interruptions, concurrent access to shared frequency bands leading to collisions and subchannels characteristics. Numerical simulations, in view of the average Spectral Efficiency, examine the performance of the multimedia transmission under the primary interruptions caused by the Binomial and the Poissonian primary applications and consider also the dynamics between the competing secondary peers in addition to subchannels fading and noise.
27

Kułacz, Łukasz, and Adrian Kliks. "Dynamic Spectrum Allocation Using Multi-Source Context Information in OpenRAN Networks." Sensors 22, no. 9 (May 5, 2022): 3515. http://dx.doi.org/10.3390/s22093515.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Bearing in mind the stringent problem of limited and inefficiently used radio resources, a multi-source mechanism for the dynamic adjustment of occupied frequency bands is proposed. Instead of relying only on radio-related information, the system that collects data from various sources is discussed. Mainly, using the ubiquitous sources of information about the presence of users (such as city monitoring), it is possible to identify areas that have high or low expected traffic with high probabilities. Consequently, in low-traffic areas, it is not necessary to allocate all available spectrum resources while maintaining the quality of service. This leads to the improved spectral efficiency of the network. As the level of trust in certain information sources may differ among various operators, we propose to implement such functionality in the form of an application. Our contribution is a proposal for an algorithm that limits the use of radio resources through fuzzy and soft connections of multiple sources of contextual information. The simulation results presented in this paper show that it is possible to reduce the spectrum used with a slight and simultaneous reduction in user bitrate, which increases the spectral efficiency of the entire system. Hence, following the concept of an open radio access network, various policies for information merging may be specified.
28

Polyakov, Nikita, and Anna Platonova. "Assessing Latency of Packet Delivery in the 5G 3GPP Integrated Access and Backhaul Architecture with Half-Duplex Constraints." Future Internet 14, no. 11 (November 21, 2022): 345. http://dx.doi.org/10.3390/fi14110345.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Integrated Access and Backhaul (IAB) is an enabling technology for efficient 5G millimeter wave (mmWave) New Radio (NR) deployment. The key feature of IAB is multi-hop wireless backhauling, allowing utilizing relaying IAB-nodes to provide cost-efficient access network densification and alleviate the problem of blockages. One of the critical performance measures in such systems is the latency of packet delivery over the multi-hop paths. The paper aims at assessing the impact of multi-hop transmission on the end-to-end delay in an IAB radio access network, taking into account the half-duplex constraint. We build a detailed queuing theory model for latency assessment in time-division-multiplexing (TDM)-based IAB deployments and evaluate the delay due to queuing in the network nodes for several cell topologies and under different time allocation strategies between access and backhaul. The paper considers a practical Manhattan-style urban deployment, which is characteristically impaired by the blockage of buildings. The numerical results show that balancing the access and backhaul micro phases is crucial for reducing the end-to-end packet delay, at least in the uplink, while increasing the number of network hops yields a linear increase in the total packet delay for both the uplink and downlink. The numerical results were obtained via simulation using the open-source software OMNeT++.
29

Mohsin, Mustafa, Jordi Mongay Batalla, Evangelos Pallis, George Mastorakis, Evangelos K. Markakis, and Constandinos X. Mavromoustakis. "On Analyzing Beamforming Implementation in O-RAN 5G." Electronics 10, no. 17 (September 4, 2021): 2162. http://dx.doi.org/10.3390/electronics10172162.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The open radio access network (O-RAN) concept is changing the landscape of mobile networks (5G deployment and 6G research). O-RAN Alliance’s suggestions that O-RAN can offer openness and intelligence to the traditional RAN vendors will enable the capability for multi-vendors to re-shape the RAN structure and optimize the network. This paper positions the main research challenges of the O-RAN approach in regards to the implementation of beamforming. We investigate the O-RAN architecture and the configurations of the interfaces between O-RAN units and present the split options between the radio and distributing units in terms of O-RAN specification and 3GPP standards. From this point, we discuss the beamforming methods in O-RAN, addressing challenges and potential solutions, and suggest the introduction of the zero-forcing equalizer as a precoding vector in the channel-information-based beamforming method. This may be one of the solutions for achieving flexibility in a high-traffic communication environment while reducing the radio unit interferences caused by implanting the precoding in the open radio unit.
30

Malekzadeh, Mina, Abdul Azim Abdul Ghani, and Shamala Subramaniam. "Design of Cyberwar Laboratory Exercises to Implement Common Security Attacks against IEEE 802.11 Wireless Networks." Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–15. http://dx.doi.org/10.1155/2010/218271.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In wireless network communications, radio waves travel through free space; hence, the information reaches any receiving point with appropriate radio receivers. This aspect makes the wireless networks vulnerable to various types of attacks. A true understanding of these attacks provides better ability to defend the network against the attacks, thus eliminating potential threats from the wireless systems. This work presents a series of cyberwar laboratory exercises that are designed for IEEE 802.11 wireless networks security courses. The exercises expose different aspects of violations in security such as confidentiality, privacy, availability, and integrity. The types of attacks include traffic analysis, rogue access point, MAC filtering, replay, man-in-the-middle, and denial of service attacks. For each exercise, the materials are presented as open-source tools along with descriptions of the respective methods, procedures, and penetration techniques.
31

Agarwal, Pranay, Mohammedhusen Manekiya, Tahir Ahmad, Ashish Yadav, Abhinav Kumar, Massimo Donelli, and Saurabh Tarun Mishra. "A Survey on Citizens Broadband Radio Service (CBRS)." Electronics 11, no. 23 (December 1, 2022): 3985. http://dx.doi.org/10.3390/electronics11233985.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
To leverage the existing spectrum and mitigate the global spectrum dearth, the Federal Communications Commission of the United States has recently opened the Citizens Broadband Radio Service (CBRS) spectrum, spanning 3550–3700 MHz, for commercial cognitive operations. The CBRS has a three-tier hierarchical architecture, wherein the incumbents, including military radars, occupy the topmost tier. The priority access licenses (PAL) and general authorized access (GAA) are second and third tier, respectively, facilitating licensed and unlicensed access to the spectrum. This combination of licensed and unlicensed access to the spectrum in a three-tier model has opened novel research directions in optimal spectrum sharing as well as privacy preservation, and hence, several schemes have been proposed for the same. This article provides a detailed survey of the existing literature on the CBRS. We provide an overview of the CBRS ecosystem and discuss the regulation and standardization process and industrial developments on the CBRS. The existing schemes for optimal spectrum sharing and resource allocation in CBRS are discussed in detail. Further, an in-depth study of the existing literature on the privacy of incumbents, PAL devices, and GAA devices in CBRS is presented. Finally, we discuss the open issues in CBRS, which demand more attention and effort.
32

de Figueiredo, Felipe A. P., Ruben Mennes, Irfan Jabandžić, Xianjun Jiao, and Ingrid Moerman. "A Baseband Wireless Spectrum Hypervisor for Multiplexing Concurrent OFDM Signals." Sensors 20, no. 4 (February 17, 2020): 1101. http://dx.doi.org/10.3390/s20041101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The next generation of wireless and mobile networks will have to handle a significant increase in traffic load compared to the current ones. This situation calls for novel ways to increase the spectral efficiency. Therefore, in this paper, we propose a wireless spectrum hypervisor architecture that abstracts a radio frequency (RF) front-end into a configurable number of virtual RF front ends. The proposed architecture has the ability to enable flexible spectrum access in existing wireless and mobile networks, which is a challenging task due to the limited spectrum programmability, i.e., the capability a system has to change the spectral properties of a given signal to fit an arbitrary frequency allocation. The proposed architecture is a non-intrusive and highly optimized wireless hypervisor that multiplexes the signals of several different and concurrent multi-carrier-based radio access technologies with numerologies that are multiple integers of one another, which are also referred in our work as radio access technologies with correlated numerology. For example, the proposed architecture can multiplex the signals of several Wi-Fi access points, several LTE base stations, several WiMAX base stations, etc. As it able to multiplex the signals of radio access technologies with correlated numerology, it can, for instance, multiplex the signals of LTE, 5G-NR and NB-IoT base stations. It abstracts a radio frequency front-end into a configurable number of virtual RF front ends, making it possible for such different technologies to share the same RF front-end and consequently reduce the costs and increasing the spectral efficiency by employing densification, once several networks share the same infrastructure or by dynamically accessing free chunks of spectrum. Therefore, the main goal of the proposed approach is to improve spectral efficiency by efficiently using vacant gaps in congested spectrum bandwidths or adopting network densification through infrastructure sharing. We demonstrate mathematically how our proposed approach works and present several simulation results proving its functionality and efficiency. Additionally, we designed and implemented an open-source and free proof of concept prototype of the proposed architecture, which can be used by researchers and developers to run experiments or extend the concept to other applications. We present several experimental results used to validate the proposed prototype. We demonstrate that the prototype can easily handle up to 12 concurrent physical layers.
33

Bartzoudis, Nikolaos, José Rubio Fernández, David López-Bueno, Antonio Román Villarroel, and Angelos Antonopoulos. "Agile FPGA Computing at the 5G Edge: Joint Management of Accelerated and Software Functions for Open Radio Access Technologies." Electronics 13, no. 4 (February 9, 2024): 701. http://dx.doi.org/10.3390/electronics13040701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This paper presents ReproRun, a flexible and extensible run-time framework for the reconfiguration of functions in field programmable gate array (FPGA) devices used in popular software-defined radio (SDR) platforms. The FPGA devices embed a hardwired or soft processing system (PS) which communicates with the programmable logic (PL) using a standard embedded bus interface. In order to apply a seamless run-time partial reconfiguration, we made use of all the related building blocks, design guidelines, and tools offered by AMD-Xilinx. In ReproRun, each partial bitstream targeting a reconfigurable region (RR) of the PL area comes with its respective firmware (i.e., software functions) that runs on the PS side. Our work guarantees run-time updates of the firmware without interrupting the functionality of other software processes running in the PS or PL, by employing a specialized controller, denoted as Run-timE firmWare reconfIguration contRollEr (REWIRE). The latter leverages the open asymmetric multiprocessing framework (OpenAMP). The partial bitstreams and respective firmware are fetched from a remote location using the trivial file transfer protocol (TFTP). ReproRun can be applied in different FPGA accelerators residing in disaggregated open radio access network (RAN) equipment, adaptive radio access technologies, and Edge servers hosting virtualized functions.
34

Sylla, Tidiane, Leo Mendiboure, Sassi Maaloul, Hasnaa Aniss, Mohamed Aymen Chalouf, and Stéphane Delbruel. "Multi-Connectivity for 5G Networks and Beyond: A Survey." Sensors 22, no. 19 (October 7, 2022): 7591. http://dx.doi.org/10.3390/s22197591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
To manage a growing number of users and an ever-increasing demand for bandwidth, future 5th Generation (5G) cellular networks will combine different radio access technologies (cellular, satellite, and WiFi, among others) and different types of equipment (pico-cells, femto-cells, small-cells, macro-cells, etc.). Multi-connectivity is an emerging paradigm aiming to leverage this heterogeneous architecture. To achieve this, multi-connectivity proposes to enable UE to simultaneously use component carriers from different and heterogeneous network nodes: base stations, WiFi access points, etc. This could offer many benefits in terms of quality of service, energy efficiency, fairness, mobility, and spectrum and interference management. Therefore, this survey aims to present an overview of multi-connectivity in 5G networks and beyond. To do so, a comprehensive review of existing standards and enabling technologies is proposed. Then, a taxonomy is defined to classify the different elements characterizing multi-connectivity in 5G and future networks. Thereafter, existing research works using multi-connectivity to improve the quality of service, energy efficiency, fairness, mobility management, and spectrum and interference management are analyzed and compared. In addition, lessons common to these different contexts are presented. Finally, open challenges for multi-connectivity in 5G networks and beyond are discussed.
35

Rivas, F. Javier, Almudena Díaz, and Pedro Merino. "Obtaining More Realistic Cross-Layer QoS Measurements: A VoIP over LTE Use Case." Journal of Computer Networks and Communications 2013 (2013): 1–10. http://dx.doi.org/10.1155/2013/405858.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
We introduce a real-time experimentation testbed in this paper which enables more realistic analysis of quality of service (QoS) in LTE networks. This testbed is envisioned for the improvement of QoS and quality of experience (QoE) through the experimentation with real devices, services, and radio configurations. Radio configurations suggested in the literature typically arise from simulations; the testbed provides a real and controlled testing environment where such configurations can be validated. The added value of this testbed goes a long way not only in the provision of more realistic results but also in the provision of QoS and QoE cross-layer measurements through the correlation of information collected at different layers: from service and IP levels to radio and protocol parameters. Analyzing the interlayer dependencies will allow us to identify optimal settings for the radio access network and service parameters. This information can be used to suggest new cross-layer optimizations to further improve quality of experience of mobile subscribers. As a use case, we examine VoIP service over LTE, which is currently an open issue.
36

Ramon Fontes, Allan Martins, Vicente Sousa, Kaio Dantas, Lucas Medeiros, Pedro Alves, Marcelo Fernandes, et al. "Open-source emulation-based test environment to settle O-RAN-compliant trials." ITU Journal on Future and Evolving Technologies 4, no. 2 (June 23, 2023): 305–63. http://dx.doi.org/10.52953/vmbq6087.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Experimental tools are a key factor in both academic and industrial research communities to create design evaluations of new networking technologies that involve troubleshooting or changing the planning of deployed networks. Physical Software-Defined Radio (SDR) experimental platforms enable a design solution for the quick prototyping of wireless communication systems. However, SDR-based experimental platforms incur high costs, which leads to scalability limitations in the experimental settings. Having said this, network simulators, emulators, and new testbeds have attracted increasing attention. Emulation-based research prototyping can be distinguished from real communication networks and SDR-based platforms by allowing a tradeoff between cost and flexibility. This paper examines the Mininet-RAN emulation tool, which, as well as Radio Access Network (RAN) modeling, provides a way to test Open RAN Intelligent Controller (RIC) services without the need to deploy an entire RAN infrastructure. The Mininet-RAN creates virtual network elements, such as hosts, L2/L3 devices, controllers, and links, by combining some of the best emulator features, hardware testbeds, and simulators. By running the current code of standard practice Unix/Linux network applications and network stack, the Mininet-RAN enables real-world network data traffic patterns to be delivered to the RIC, regarding the most significant aspect of the dynamic generation of wireless system's KPIs. We provide the basic code of Mininet-RAN for the first two O-RAN Alliance-defined use cases involving V2X and UAV. The xApps are being implemented in O-RAN SC near-RT RIC, with Mininet-RAN which provides a closed-loop validation environment.
37

Korolkov, Roman, and Serhii Laptiev. "REAL SIMULATION OF A "WAR DRIVING" ATTACK ON A WIRELESS NETWORK." Cybersecurity: Education, Science, Technique 2, no. 18 (2022): 99–107. http://dx.doi.org/10.28925/2663-4023.2022.18.99107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The inevitable spread of wireless networks and the growing traffic in them can lead to an increase in information security incidents. The main threats are aimed at interception, violation of the confidentiality and integrity of transmitted data, attacks on the availability of nodes of the transmission channel and their substitution. Due to its characteristics, the wireless data transmission environment creates potential conditions for eavesdropping on network traffic and uncontrolled connection to the wireless network by attackers who are in its range. Wireless networks, unlike wired networks, are extremely vulnerable to possible attacks and unauthorized access due to the use of radio spectrum and the broadcast nature of the physical layer. To intercept data, it is enough to be in the range of the Wi-Fi network. Therefore, an attacker, being at a safe distance, can use wireless devices to carry out attacks. The article analyzes a cyberattack of the "War Driving" type on wireless networks. The analysis carried out in the article showed that there are open wireless networks. Wireless networks are open or because the administrators who configure them are not security aware. A full-scale simulation of a "War Driving" attack was carried out. Real-time simulation data show that 10.1% of networks do not use any encryption. The detection error of access points not using encryption is from 8% to 12%. This is a very good result and confirms the adequacy of the conducted full-scale modeling. Based on the analysis of the results of live simulation, recommendations have been developed to protect the wireless network from a "War Driving" attack. The developed recommendations will protect wireless networks from "War Driving" attacks
38

Kiela, Karolis, Marijan Jurgo, Vytautas Macaitis, and Romualdas Navickas. "5G Standalone and 4G Multi-Carrier Network-in-a-Box Using a Software Defined Radio Framework." Sensors 21, no. 16 (August 22, 2021): 5653. http://dx.doi.org/10.3390/s21165653.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In this work, an open Radio Access Network (RAN), compatible, scalable and highly flexible Software Defined Radio (SDR)-based Remote Radio Head (RRH) framework is proposed and designed. Such framework can be used to implement flexible wideband radio solutions, which can be deployed in any region, have common radio management features, and support various channel bandwidths. Moreover, it enables easier access for researchers to nonsimulated cellular networks, reduce system development time, provide test and measurement capabilities, and support existing and emerging wireless communication technologies. The performance of the proposed SDR framework is validated by creating a Network-in-a-Box (NIB) that can operate in multiband multicarrier 4G or 5G standalone (SA) configurations, with an output power of up to 33 dBm. Measurement results show, that the 4G and 5G NIB can achieve, respectively, up to 883 Mbps and 765 Mbps downlink data transfer speeds for a 100 MHz aggregated bandwidth. However, if six carriers are used in the 4G NIB, 1062 Mbps downlink data transfer speed can be achieved. When single user equipment (UE) is used, maximum uplink data transfer speed is 65.8 Mbps and 92.6 Mbps in case of 4G and 5G, respectively. The average packet latency in case of 5G is up to 45.1% lower than 4G. CPU load by the eNodeB and gNodeB is proportional to occupied bandwidth, but under the same aggregated DL bandwidth conditions, gNodeB load on the CPU is lower. Moreover, if only 1 UE is active, under same aggregated bandwidth conditions, the EPC CPU load is up to four times lower than the 5GC.
39

Usama, Muhammad, and Melike Erol-Kantarci. "A Survey on Recent Trends and Open Issues in Energy Efficiency of 5G." Sensors 19, no. 14 (July 15, 2019): 3126. http://dx.doi.org/10.3390/s19143126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The rapidly increasing interest from various verticals for the upcoming 5th generation (5G) networks expect the network to support higher data rates and have an improved quality of service. This demand has been met so far by employing sophisticated transmission techniques including massive Multiple Input Multiple Output (MIMO), millimeter wave (mmWave) bands as well as bringing the computational power closer to the users via advanced baseband processing units at the base stations. Future evolution of the networks has also been assumed to open many new business horizons for the operators and the need of not only a resource efficient but also an energy efficient ecosystem has greatly been felt. The deployment of small cells has been envisioned as a promising answer for handling the massive heterogeneous traffic, but the adverse economic and environmental impacts cannot be neglected. Given that 10% of the world’s energy consumption is due to the Information and Communications Technology (ICT) industry, energy-efficiency has thus become one of the key performance indicators (KPI). Various avenues of optimization, game theory and machine learning have been investigated for enhancing power allocation for downlink and uplink channels, as well as other energy consumption/saving approaches. This paper surveys the recent works that address energy efficiency of the radio access as well as the core of wireless networks, and outlines related challenges and open issues.
40

Srivastava, Vikas, Parulpreet Singh, and Praveen Srivastava. "Advancement of Full-Duplex Cognitive Radio Network: A Review." Journal of Physics: Conference Series 2327, no. 1 (August 1, 2022): 012061. http://dx.doi.org/10.1088/1742-6596/2327/1/012061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract Communication systems, with various pervasive applications, have become a crucial piece of day to day lives. Wireless systems request an ever-increasing number of phantom assets to help with the regularly expanding quantities of clients. As indicated, the present crunch can be fulfilled by use of cognitive radio networks (CRNs). At a given time, secondary users (SUs) in half-duplex (HD) CRNs can either transmit or detect the signal range. This activity confines the secondary users’ throughput because the secondary user cannot transmit during range detection. With advancement in self-interference separation (SIS) technique, full-duplex (FD) CRNconsider synchronous range detection and transmission at a given time on any channel. This FD activity builds throughput and diminishes crashes as compared to HD-CRNs. This paper presents a complete review of FD-CRN correspondences. This paper spread the supporting system models and transmitted and received radio wire structures. This paper describes various SIS approaches in FD-CRNs. Here, authors discuss range detection methods and security requirements for FD-CRNs and review significant advancement in full-duplex medium access control (FD-MAC) conventions as open issues, difficulties, and future research bearings to help FD activity in CRNs.
41

Verzun, Natalya, Mikhail Kolbanev, and Alexey Shamin. "The Architecture of the Access Protocols of the Global Infocommunication Resources." Computers 9, no. 2 (June 9, 2020): 49. http://dx.doi.org/10.3390/computers9020049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
One of the important functions of cyberspace is to provide people and devices with access to global infocommunication resources, and as the network infrastructure develops, the number of access options increases, including those based on wireless technologies. A wide variety of access technologies leads to the formation of heterogeneous broadcast networks. Following the concept of Always Best Connected and striving for rational use of access network resources, developers use Vertical Handover procedures today. This approach assumes the existence of a selection criterion that allows you to prefer a particular network to other networks from the number of available and able to provide the required connection and services, and a selection procedure that implements the process of calculating the characteristics of access in each of the acceptable options. When implementing a vertical handover, it should be taken into account that the rational choice depends on the moment of time and point of space at which the terminal device developed a request to establish a connection. The corresponding procedures can be implemented in accordance with decentralized or centralized architectures. In the first case, the choice is made by hardware and software of terminal devices. The disadvantage of this implementation is the complexity and, as a result, the rise in price of terminal devices, each of which requires a corresponding complexity of the selection procedure of the performance and memory reserve. Another negative consequence of the decentralized approach is a decrease in the last-mile network utilization rate due to the inability to make complex decisions. The article discusses the centralized architecture of access protocols to global infocommunication resources. In accordance with it, the access network is selected by a new centralized network device that was not previously used on communication networks. The protocols that this network element implements should be located between the first (physical) and second (channel) levels of the open system interaction model. The purpose of the study is to develop an effective architectural solution for access networks and create a mathematical model for evaluating the efficiency of using the last mile resources and the quality of user service. The object of research is architectural solutions for last-mile networks. The subject of research is models of the theory of tele-traffic that allow us to evaluate the qualitative characteristics of the corresponding process. To achieve this goal the following tasks were solved in the article: analysis of known approaches to selecting one of several available access networks; development of a centralized architecture that changes the basic model of interaction between open systems; description of the metadata exchange scenario between network elements of the new architecture; development of a mathematical model of the data transmission process in the access radio network; conducting numerical estimates of the probabilistic and temporal characteristics of the proposed procedures.
42

Gopi, B., J. Logeshwaran, and T. Kiruthiga. "An Innovation in the Development of a Mobile Radio Model for a Dual-Band Transceiver in Wireless Cellular Communication." BOHR International Journal of Computational Intelligence and Communication Network 1, no. 1 (2022): 20–25. http://dx.doi.org/10.54646/bijcicn.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A modern telephone can only be used if it is a dual-band transceiver. Also, an indispensable condition is the availability of Internet access. Modern cell phones can only be used for their intended purpose: making calls. Due to the fact that the operating system is preinstalled on devices, the list of possibilities for gadgets could be expanded almost indefinitely. So you can even do a full-fledged dual-band transceiver from a cell phone. In this paper, an innovation in the development of mobile radio models dual-band transceivers in wireless cellular communication is proposed. For the dual-band transceiver in the phone to work, you need an Internet connection. Progress in the development of technologies for mobile networks does not stand still, and with each new standard and technology for mobile networks, new opportunities for using the network open up for end subscribers. It is based on packet voice data transmission called push-to-talk.
43

Hadi, Teeb Hussein. "Types of Attacks in Wireless Communication Networks." Webology 19, no. 1 (January 20, 2022): 718–28. http://dx.doi.org/10.14704/web/v19i1/web19051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
One of the most important types that used to transfer data between nodes without using wires is a “wireless communication network”, where the transmission of data is censored remotely by using electromagnetic waves such as radio waves that usually implemented in the physical layer of the network. Continuous improvements in wireless network technology have reduced the security and speed differences between types of networks (wired and wireless), but in turn, increased security threats to wirelessly transmitted data. Wireless networks are weak in terms of "privacy protection" because anyone who is within the coverage area of a wireless network can attempt to break into that network. Hacking incidents have been reported frequently in places with shared free networks, and it has been observed that the places of open distributed networks of the Internet are most at risk of complete penetration of your phone or PC data. To solve this problem, several programs have been developed that provide protection for wireless networks that differ in terms of security. Some of them did not provide sufficient protection for wireless networks, such as Wired Equivalent Privacy (WEP), and others made progress in preventing intrusions compared to their predecessors, such as Wi-Fi Protected Access (WPA).
44

Jiang, Kejian, Chi Ma, Ruiquan Lin, Jun Wang, Weibing Jiang, and Haifeng Hou. "Free-Rider Games for Cooperative Spectrum Sensing and Access in CIoT Networks." Sensors 23, no. 13 (June 22, 2023): 5828. http://dx.doi.org/10.3390/s23135828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the rapid development of technologies such as wireless communications and the Internet of Things (IoT), the proliferation of IoT devices will intensify the competition for spectrum resources. The introduction of cognitive radio technology in IoT can minimize the shortage of spectrum resources. However, the open environment of cognitive IoT may involve free-riding problems. Due to the selfishness of the participants, there are usually a large number of free-riders in the system who opportunistically gain more rewards by stealing the spectrum sensing results from other participants and accessing the spectrum without spectrum sensing. However, this behavior seriously affects the fault tolerance of the system and the motivation of the participants, resulting in degrading the system’s performance. Based on the energy-harvesting cognitive IoT model, this paper considers the free-riding problem of Secondary Users (SUs). Since free-riders can harvest more energy in spectrum sensing time slots, the application of energy harvesting technology will exacerbate the free-riding behavior of selfish SUs in Cooperative Spectrum Sensing (CSS). In order to prevent the low detection performance of the system due to the free-riding behavior of too many SUs, a penalty mechanism is established to stimulate SUs to sense the spectrum normally during the sensing process. In the system model with multiple primary users (PUs) and multiple SUs, each SU considers whether to free-ride and which PU’s spectrum to sense and access in order to maximize its own interests. To address this issue, a two-layer game-based cooperative spectrum sensing and access method is proposed to improve spectrum utilization. Simulation results show that compared with traditional methods, the average throughput of the proposed TL-CSAG algorithm increased by 26.3% and the proposed method makes the SUs allocation more fair.
45

Kravchuk, Serhii, Liana Afanasieva, and Irina Kravchuk. "INVESTIGATION OF A MILLIMETER-WAVE RADIO LINK CHARACTERISTICS OF IEEE 802.11AD STANDARD IN URBAN AREAS." Information and Telecommunication Sciences, no. 1 (June 29, 2021): 5–11. http://dx.doi.org/10.20535/2411-2976.12021.5-11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Background. The explosive growth in the use of mobile broadband is significantly increasing the bandwidth requirements. Millimeter-wave spectrum is necessary for 5G networks to achieve data transfer rates of the order of Gb/s, in particular, for the provision of 3D video services, and the use radio modules for millimeter-wave frequencies as picocells in the streets will expand the capabilities of existing cellular networks and provide an increase in bandwidth. Therefore, the study of the characteristics of this spectrum is an urgent task today. Objective. The purpose of the paper is to present the results of studying the characteristics of a millimeter-wave radio link to ensure high-speed user access to IP data transmission networks and the possibility of using the IEEE 802.11ad standard in open areas. Methods. Structural and functional methods of constructing a millimeter-wave wireless network in urban areas based on IEEE 802.11ad standard hardware are investigated. Results. The studies were carried out using a test bench with a point-to-point topology deployed in an urban environment (Kiev) with the line of sight without significant obstacles. The studies tested the possibility of using for millimeter-wave hardware technologies of the IEEE 802.11ad standard, which is used indoors, for applications in urban areas. The use of a narrow beam antenna based on an antenna array allows adaptive control of the radiation pattern to bypass small obstacles blocking direct transmission, which allows reducing interference and receive/transmit a signal. Conclusions. Experimental testing of the hardware capabilities of the IEEE 802.11ad standard has been carried out. Scenarios for constructing a millimeter-wave radio link under various weather conditions have been worked out. Keywords: millimeter-wave; bandwidth; IEEE 802.11ad standard; 5G networks
46

Cristiano Bonato Both, Joao Borges, Luan Gon�alves, Cleverson Nahum, Ciro Macedo, Aldebaro Klautau, and Kleber Cardoso. "System intelligence for UAV-based mission critical services with challenging 5G/B5G connectivity." ITU Journal on Future and Evolving Technologies 3, no. 2 (June 23, 2022): 359–73. http://dx.doi.org/10.52953/wwdq6893.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Unmanned Aerial Vehicles (UAVs) and communication systems are fundamental elements in mission critical services, such as search and rescue. In this article, we introduce an architecture for managing and orchestrating 5G and beyond networks that operate over a heterogeneous infrastructure with UAVs' aid. UAVs are used for collecting and processing data, as well as improving communications. The proposed System Intelligence (SI) architecture was designed to comply with recent standardization works, especially the ETSI Experiential Networked Intelligence specifications. Another contribution of this article is an evaluation using a testbed based on a virtualized non-standalone 5G core and a 4G Radio Access Network (RAN) implemented with open-source software. The experimental results indicate, for instance, that SI can substantially improve the latency of UAV-based services by splitting deep neural networks between UAVs and edge or cloud equipment. Other experiments explore the slicing of RAN resources and efficient placement of virtual network functions to assess the benefits of incorporating intelligence in UAV-based mission critical services.
47

Lipps, Christoph, Annika Tjabben, Matthias Rüb, Jan Herbst, Sogo Pierre Sanon, Rekha Reddy, Yorman Munoz, and Hans D. Schotten. "Designing Security for the Sixth Generation: About Necessity, Concepts and Opportunities." European Conference on Cyber Warfare and Security 22, no. 1 (June 19, 2023): 267–75. http://dx.doi.org/10.34190/eccws.22.1.1207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Intelligent, comprehensive and, above all, secure wireless interconnection is the driving force behind technological progress. To ensure this, the development towards Sixth Generation (6G) Wireless Systems has been launched and is scheduled to be operational by 2030. This data technology of the future turns 6G into the infrastructure of a new generation of mobile, intelligent, and context-sensitive services, available everywhere and featuring high trustworthiness and performance, relying on both, network-side and off-network context sources. In addition, the networks themselves ought to become intelligent and thus more efficient and resource-saving, which requires a high degree of automated utilization of Artificial Intelligence (AI). Building upon the principles of information and communication theory for both the physical (bit)-transmission layer (PHY) and media access, new communication concepts for 6G will be developed providing the foundations for research into new single and multi-user operation, access and core networks. The flip side of this coin of opportunities: Sophisticated technology inevitably leads to additional security vulnerabilities, open access systems and Open-Radio Access Network (O-RAN) approaches imply new attack vectors. The holistic interconnection of everything renders it ever more attractive to attackers to harm systems, and create damage. Furthermore, enhanced computational power along with quantum computers make conventional systems more vulnerable than ever, and the value of the transmitted data increases tremendously: It is not only machine and sensor data, but also very personal and healthcare data transmitted with 6G. Therefore, the aim is to build a resilient and secure 6G system capable of recognizing attacks and uncertainties, flexibly absorbing them, recovering in a timely and sustainable manner, and compensating for impaired functionality through transformation. This holistic resilience-by-design approach is based, among other things, on technology such as Quantum Key Distribution (QKD) and Post Quantum-Crypto to achieve end-to-end security, Reconfigurable Intelligent Surfaces (RISs) to rely, control and manipulate the wireless transmission channel, Wireless Optical Communication (WOC), Physical Layer Security (PhySec), but also Body Area Networks (BANs), the integration of the human body relying on biometrics and the Tactile Internet (TI). These concepts will be discussed and shed light on in the scope of this work.
48

P. de Figueiredo, Felipe A., Dragoslav Stojadinovic, Prasanthi Maddala, Ruben Mennes, Irfan Jabandžić, Xianjun Jiao, and Ingrid Moerman. "SCATTER PHY: An Open Source Physical Layer for the DARPA Spectrum Collaboration Challenge." Electronics 8, no. 11 (November 14, 2019): 1343. http://dx.doi.org/10.3390/electronics8111343.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
DARPA, the Defense Advanced Research Projects Agency from the United States, has started the Spectrum Collaboration Challenge with the aim to encourage research and development of coexistence and collaboration techniques of heterogeneous networks in the same wireless spectrum bands. Team SCATTER has been participating in the challenge since its beginning, back in 2016. SCATTER’s open-source software defined physical layer (SCATTER PHY) has been developed as a standalone application, with the ability to communicate with higher layers through a set of well defined messages (created with Google’s Protocol buffers) and that exchanged over a ZeroMQ bus. This approach allows upper layers to access it remotely or locally and change all parameters in real time through the control messages. SCATTER PHY runs on top of USRP based software defined radio devices (i.e., devices from Ettus or National Instruments) to send and receive wireless signals. It is a highly optimized and real-time configurable SDR based PHY layer that can be used for the research and development of novel intelligent spectrum sharing schemes and algorithms. The main objective of making SCATTER PHY available to the research and development community is to provide a solution that can be used out of the box to devise disruptive algorithms and techniques to optimize the sub-optimal use of the radio spectrum that exists today. This way, researchers and developers can mainly focus their attention on the development of smarter (i.e., intelligent algorithms and techniques) spectrum sharing approaches. Therefore, in this paper, we describe the design and main features of SCATTER PHY and showcase several experiments performed to assess the effectiveness and performance of the proposed PHY layer.
49

Fiandrino, Claudio, Leonardo Bonati, Salvatore D'Oro, Michele Polese, Tommaso Melodia, and Joerg Widmer. "EXPLORA: AI/ML EXPLainability for the Open RAN." Proceedings of the ACM on Networking 1, CoNEXT3 (November 27, 2023): 1–26. http://dx.doi.org/10.1145/3629141.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Open Radio Access Network (RAN) paradigm is transforming cellular networks into a system of disaggregated, virtualized, and software-based components. These self-optimize the network through programmable, closed-loop control, leveraging Artificial Intelligence (AI) and Machine Learning (ML) routines. In this context, Deep Reinforcement Learning (DRL) has shown great potential in addressing complex resource allocation problems. However, DRL-based solutions are inherently hard to explain, which hinders their deployment and use in practice. In this paper, we propose EXPLORA, a framework that provides explainability of DRL-based control solutions for the Open RAN ecosystem. EXPLORA synthesizes network-oriented explanations based on an attributed graph that produces a link between the actions taken by a DRL agent (i.e., the nodes of the graph) and the input state space (i.e., the attributes of each node). This novel approach allows EXPLORA to explain models by providing information on the wireless context in which the DRL agent operates. EXPLORA is also designed to be lightweight for real-time operation. We prototype EXPLORA and test it experimentally on an O-RAN-compliant near-real-time RIC deployed on the Colosseum wireless network emulator. We evaluate EXPLORA for agents trained for different purposes and showcase how it generates clear network-oriented explanations. We also show how explanations can be used to perform informative and targeted intent-based action steering and achieve median transmission bitrate improvements of 4% and tail improvements of 10%.
50

Hamdan, Mutasem Q., Haeyoung Lee, Dionysia Triantafyllopoulou, Rúben Borralho, Abdulkadir Kose, Esmaeil Amiri, David Mulvey, et al. "Recent Advances in Machine Learning for Network Automation in the O-RAN." Sensors 23, no. 21 (October 28, 2023): 8792. http://dx.doi.org/10.3390/s23218792.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The evolution of network technologies has witnessed a paradigm shift toward open and intelligent networks, with the Open Radio Access Network (O-RAN) architecture emerging as a promising solution. O-RAN introduces disaggregation and virtualization, enabling network operators to deploy multi-vendor and interoperable solutions. However, managing and automating the complex O-RAN ecosystem presents numerous challenges. To address this, machine learning (ML) techniques have gained considerable attention in recent years, offering promising avenues for network automation in O-RAN. This paper presents a comprehensive survey of the current research efforts on network automation usingML in O-RAN.We begin by providing an overview of the O-RAN architecture and its key components, highlighting the need for automation. Subsequently, we delve into O-RAN support forML techniques. The survey then explores challenges in network automation usingML within the O-RAN environment, followed by the existing research studies discussing application of ML algorithms and frameworks for network automation in O-RAN. The survey further discusses the research opportunities by identifying important aspects whereML techniques can benefit.

To the bibliography