July 2024
·
4 Reads
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
July 2024
·
4 Reads
June 2024
·
22 Reads
·
1 Citation
April 2024
·
20 Reads
December 2023
·
97 Reads
·
3 Citations
Sensors
After first being standardized by the 3rd Generation Partnership Project (3GPP) in Release 15, 5th Generation (5G) mobile systems have been rapidly deployed worldwide [...]
May 2023
·
31 Reads
·
13 Citations
April 2023
·
107 Reads
·
7 Citations
Sensors
Narrowband Internet of Things (NB-IoT) has quickly become a leading technology in the deployment of IoT systems and services, owing to its appealing features in terms of coverage and energy efficiency, as well as compatibility with existing mobile networks. Increasingly, IoT services and applications require location information to be paired with data collected by devices; NB-IoT still lacks, however, reliable positioning methods. Time-based techniques inherited from long-term evolution (LTE) are not yet widely available in existing networks and are expected to perform poorly on NB-IoT signals due to their narrow bandwidth. This investigation proposes a set of strategies for NB-IoT positioning based on fingerprinting that use coverage and radio information from multiple cells. The proposed strategies were evaluated on two large-scale datasets made available under an open-source license that include experimental data from multiple NB-IoT operators in two large cities: Oslo, Norway, and Rome, Italy. Results showed that the proposed strategies, using a combination of coverage and radio information from multiple cells, outperform current state-of-the-art approaches based on single cell fingerprinting, with a minimum average positioning error of about 20 m when using data for a single operator that was consistent across the two datasets vs. about 70 m for the current state-of-the-art approaches. The combination of data from multiple operators and data smoothing further improved positioning accuracy, leading to a minimum average positioning error below 15 m in both urban environments.
October 2022
·
33 Reads
SSRN Electronic Journal
October 2022
·
32 Reads
·
5 Citations
Computer Communications
Millimeter-wave (mmWave) radio is a key building block in 5G and beyond cellular networks. However, mmWave channels are very sensitive to environmental conditions and depend on Line-of-Sight connections to provide very high data rates. Achieving reliable, consistent communication — i.e., a steady link rate together with low delay — over mmWave links is therefore a challenging problem. The goal of this work is to explore the use of predictive control to manage and simultaneously use multiple available mmWave paths to achieve reliable consistent communication by means of a multipath proxy. We investigate transient solutions of Markov Modulated Fluid Queues (MMFQ) to model the short-term evolution of the proxy’s packet queue, consistent with the use of Markovian models to capture the behavior of mmWave channel blocking. We propose a combination of models that can be solved using newly proposed matrix-analytic techniques in a timely enough manner for use in real-time control. This gives us a prediction, over a short time horizon, of either proxy queue distributions or probabilities of reaching particular proxy buffer levels. Thus, it enables the proxy to make preemptive path decisions in order to maintain a desired Quality of Service. A proof-of-concept simulation study demonstrates the efficacy of our proposed MMFQ-based predictive approach over both static and purely reactive control approaches. Further, we explore the potential benefits of a hybrid approach to path management, combining both predictive and reactive control. This can allow the controller to cater for unforeseen events that cannot be forecast by the predictive controller, mitigating the resulting extra queuing and corresponding delay spikes. <https://davidahayes.owlstown.net/publications/35029-investigating-predictive-model-based-control-to-achieve-reliable-consistent-multipath-mmwave-communication>
October 2022
·
20 Reads
·
6 Citations
Computer Networks
The advance of mobile network technologies and components heavily relies on data-driven techniques. This is especially true for fifth generation (5G) and the upcoming sixth generation (6G) networks, as the optimization of network components and protocols is expected to be fueled by artificial intelligence (AI) based solutions. When using real-world radio access measurement traces, the identity of individual users is not directly accessible because at runtime operation Base Stations (BSs) assign Radio Network Temporary Identifiers (RNTIs) to users. RNTIs are not bound to a user but are reused upon expiration of an inactivity timer, whose duration is operator dependent. This implies that, over time, multiple users are mapped to the same RNTI. In fact, the allocation of RNTIs to users is implemented in diverse and proprietary ways by operators and equipment vendors. Distinguishing individual users within the RNTI space is a non-trivial task and key to analyze traffic traces properly. In this paper, we make the following contributions: (i) we propose and validate two complementary methodologies to identify the RNTI inactivity threshold, and we characterize (ii) the RNTI allocation process of network operators, and (iii) the user traffic patterns given the specific RNTI allocation process. Our study is based on a large dataset we collected from production BSs of several mobile network operators across five different countries. We find that there exist heterogeneous strategies for RNTI allocation that BSs dynamically use depending on the traffic load and daytime. We further observe that the RNTI expiration threshold is in the order of minutes, and demonstrate how using thresholds around 10 s, as in the vast majority of the literature, can bias subsequent analyses. Overall, our work provides an important step towards dependable mobile network trace analysis, and lays solid foundations to research relying on traffic traces for data-driven analysis.
September 2022
·
49 Reads
·
5 Citations
... The server's algorithm then estimates the location and sends it back to the user's device. We have selected the fingerprinting-based positioning method as it is popular in the indoor positioning community and also is widely used within IoT solutions [6]. ...
June 2024
... In the changing world of telecommunications, radio access networks (RAN) play a pivotal role in facilitating smooth wireless communication linking countless devices. As RAN technology progresses it becomes ever more important to have security and privacy measures, in place to protect against emerging risks and vulnerabilities [1]- [3]. Security, in the RAN has always been a focus of interest for network operators, service providers and researchers alike. ...
December 2023
Sensors
... Further, 6G will integrate advanced technologies including terahertz communications and AI to offer even more data throughput and quality of service with much ease comparable to previous generations [106]. Although 5G and 6G have promising prospects, many challenges need to be met for them to meet future demands [109]. The expected increase in data traffic raises an issue of whether added capacity enhancements will be enough to make effective management of both data and signaling demand [110]. ...
May 2023
... Journal paper [6] describes narrowband Internet of Things (NB-IoT) positioning. Used data was collected from two cities using the dedicated scanner device. ...
April 2023
Sensors
... The MONROE testbed and its operation presented in [51,54,93,94] is the first open access European transnational hardware-based platform for independent, multihomed, large-scale experimentation in MBB measurements. Figure 9 shows the overview of the ...
September 2022
... For example, minute-level data can be used to optimize network deployment planning [9,14], routing [13], and to infer human and economic activities [37]. Similarly, millisecond-level data can be used to optimize resource allocation [7], channel sounding [12], congestion control over mobile networks [35] or to understand specific mechanisms like network ID assignment to users [2]. ...
October 2022
Computer Networks
... Model Predictive Control (MPC) is a well-established control system design technique which is based on repeated (at properly selected MPC instants) real-time optimization of a mathematical system model [2]- [5]. Aligned with the rise of computational power, the popularity of MPC has increased in recent years with novel application areas including green communications and networks [6], [7]. Based on a system model, MPC predicts the future system behavior up to a finite time horizon to obtain the optimum control actions. ...
October 2022
Computer Communications
... A literatura apresenta propostas de frameworks que viabilizam a análise de dados de rede 5G. Os autores em [Aumayr et al. 2022] apresentam uma arquitetura de Analytics flexível e escalável, baseada em microsserviços. Testes foram realizados em um núcleo 5G NSA, 5GENESIS. ...
January 2022
Computer Networks
... This paper presents the PoLicy-based Architecture for Network Slicing (PLANS), an extensive policy framework for network slice management. We build upon our previous work [1], where we extended the network slice management concept to include the dynamic configuration of the network stack on the UE devices. In this work, we consider a more comprehensive, policy-based framework where policy engines installed inside the network and on the UE devices cooperate to flexibly manage the network's resources. ...
August 2021
... Thus, not only department stores or stadiums but also cellular network providers may be interested on deploying beacons on their premises, since it will enable performance analysis from the user's perspective. This approach has also been studied in the literature with different perspectives, e.g., to monitor social events' impact on a network [15]. Moreover, Internet of Things (IoT) devices are also envisioned as a source of network information in [16]. ...
May 2021
Sensors