Archive

  • Select all
    |
    FEATURE TOPIC: INTEGRATED TERRESTRIALSATELLITENETWORKS: PART TWO
  • FEATURE TOPIC: INTEGRATED TERRESTRIALSATELLITENETWORKS: PART TWO
    Cuiqin Dai, Guimin Zheng, Qianbin Chen
    2018, 15(8): 1-10.
    Abstract ( )   Knowledge map   Save
    Constellations design for regional terrestrial-satellite network can strengthen the coverage for incomplete terrestrial cellular network. In this paper, a regional satellite constellation design scheme with multiple feature points and multiple optimization indicators is proposed by comprehensively considering multi-objective optimization and genetic algorithm, and “the Belt and Road” model is presented in the way of dividing over 70 nations into three regular target areas. Following this, we formulate the optimization model and devise a multi-objective genetic algorithm suited for the regional area with the coverage rate under simulating, computing and determining. Meanwhile, the total number of satellites in the constellation is reduced by calculating the ratio of actual coverage of a single-orbit constellation and the area of targets. Moreover, the constellations’ performances of the proposed scheme are investigated with the connection of C++ and Satellite Tool Kit (STK). Simulation results show that the designed satellite constellations can achieve a good coverage of the target areas.
  • FEATURE TOPIC: INTEGRATED TERRESTRIALSATELLITENETWORKS: PART TWO
    Luca Boero, Mario Marchese, Fabio Patrone
    2018, 15(8): 11-21.
    Abstract ( )   Knowledge map   Save
    Satellite communication networks have been evolving from standalone networks with ad-hoc infrastructures to possibly interconnected portions of a wider Future Internet architecture. Experts belonging to the fifth-generation (5G) standardization committees are considering satellites as a technology to integrate in the 5G environment. Software Defined Networking (SDN) is one of the paradigms of the next generation of mobile and fixed communications. It can be employed to perform different control functionalities, such as routing, because it allows traffic flow identification based on different parameters and traffic flow management in a centralized way. A centralized set of controllers makes the decisions and sends the corresponding forwarding rules for each traffic flow to the involved intermediate nodes that practically forward data up to the destination. The time to perform this process in integrated terrestrial-satellite networks could be not negligible due to satellite link delays. The aim of this paper is to introduce an SDN-based terrestrial satellite network architecture and to estimate the mean time to deliver the data of a new traffic flow from the source to the destination including the time required to transfer SDN control actions. The practical effect is to identify the maximum performance than can be expected.
  • FEATURE TOPIC: INTEGRATED TERRESTRIALSATELLITENETWORKS: PART TWO
    Adam Kapovits, Marius-Iulian Corici, Ilie-Daniel Gheorghe-Pop, Anastasius Gavras, Frank Burkhardt, Thomas Schlichter, Stefan Covaci
    2018, 15(8): 22-38.
    Abstract ( )   Knowledge map   Save
    In this paper we evaluate the feasibility of seamless and efficient integration of terrestrial communication systems with satellite networks. This aspect is considered by standardisation bodies such as ETSI [1], 5G-PPP [2] and 3GPP [3]. A comprehensive system is designed and implemented in an emulation prototype, including standard 3GPP LTE core network functionality [4] with its different layers: networking, data forwarding, control, management and monitoring and is validated through performance measurements. This work is a technical feasibility study of extending terrestrial communication systems with satellite networks as backhaul, increasing the energy efficiency, network robustness during natural disasters as well as being an alternative for peak-time data forwarding of the terrestrial communication services. Due to its global coverage property, terrestrial-satellite integration provides an obvious extension of communication services towards isolated and remote areas and an alternative for rural or highly distributed/highly mobile enterprise networks.
  • COMMUNICATIONS THEORIES & SYSTEMS
  • COMMUNICATIONS THEORIES & SYSTEMS
    Ping Zhou, Yinghua Lv, Zhihong Chen, Hongping Xu
    2018, 15(8): 39-53.
    Abstract ( )   Knowledge map   Save
    With the development of EMC technology, EMC assessment has become increasingly important in EMC design. Although numerous EMC assessment models are available today, few of them can provide a tradeoff between efficiency and accuracy for the specific case of military vehicular communication systems. Face to this situation, a modified four-level assessment model is proposed in the paper. First, the development of EMC assessment technology is briefly reviewed, and the theoretical mechanism of EMI environment is introduced. Then, the architecture of the proposed model is outlined, and the assessment methods are explored. To demonstrate the application of it, an example involving a communication system in a military vehicle is presented. From the physical layer to the signal layer, a hierarchical assessment on the entire system is successfully performed based on the proposed model, and we can make a qualitative EMC assessment on the EMC performance of the system. Based on a comparison with the traditional model, we conclude that the proposed model is more accurate, more efficient and less time-consuming, which is suitable for the EMC assessment on military vehicular communication systems. We hope that the proposed model will serve as a useful reference for system-level EMC assessments for other systems.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Yu Zeng, Ting Zhou, Honglin Hu, Yang Yang, Jinfeng Tian, Zhenhong Li
    2018, 15(8): 54-66.
    Abstract ( )   Knowledge map   Save
    The growth of the wireless and mobile communication data traffic has brought severe challenges to the present telecommunication systems. To meet the ever-increasing mobile traffic demand in the next 5th generation (5G) communication systems, deploying 5G in the unlicensed spectrum (5G-U), has been regarded as a promising technology. The Third Generation Partnership Project (3GPP) has specified the standardization of the Licensed Assisted Access (LAA) and its extension enhanced LAA (eLAA), to opportunistically transmit in the unlicensed spectrum. The LAA/eLAA systems share unlicensed spectrum resource with other networks, e.g., the Wi-Fi systems. In this article, we analyze the coexistence between the eLAA and the Wi-Fi systems in the unlicensed spectrum. We firstly establish the system model where the eLAA coexists with the Wi-Fi systems. Then, we theoretically derive and figure out the unfairness in the multi-channel occupancy rate between the eLAA and the Wi-Fi systems. After that, we propose a weight based channel selection method to improve the fairness of the coexistence. The numerical results demonstrate that by avoiding contentions and declining collisions, our method not only enhances the fairness, but also improves the overall unlicensed spectrum usage rate.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Xuehua Tang, Zhongyuan Wang, Xiaojun Li, Zhen Han, Zheng He, Youming Fu
    2018, 15(8): 67-76.
    Abstract ( )   Knowledge map   Save
    Software performance evaluation in multimedia communication systems is typically formulated into a multi-layered client-server queuing network (MLCSQN) problem. However, the existing analytical methods to MLCSQN model cannot provide satisfactory solution in terms of accuracy, convergence and consideration of interlocking effects. To this end, this paper proposes a heuristic solving method for MLCSQN model to boost the performance prediction of distributed multimedia software systems. The core concept of this method is referred to as the basic model, which can be further decomposed into two sub-models: client sub-model and server sub-model. The client sub-model calculates think time for server sub-model, and the server sub-model calculates waiting time for client sub-model. Using a breadth-first traversal from leaf nodes to the root node and vice versa, the basic model is then adapted to MLCSQN, with net sub-models iteratively resolved. Similarly, the interlocking problem is effectively addressed with the help of the basic model. This analytical solver enjoys advantages of fast convergence, independence on specific average value analysis (MVA) methods and eliminating interlocking effects. Numerical experimental results on accuracy and computation efficiency verify its superiority over anchors.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Shuying Zhang, Xiaohui Zhao
    2018, 15(8): 77-91.
    Abstract ( )   Knowledge map   Save
    We propose a distributed closed-loop power control scheme for a cognitive radio network (CRN) based on our developed state space model of the CRN. The whole power control process is separated into outer control loop and inner control loop in order to solve different problem. In outer loop, the interference temperature (IT) constraint is transformed to a performance index minimized by a state feedback controller to obtain an appropriate target signal to interference plus noise ratio (SINR) of secondary user (SU). For ideal channel model and random time-varying channel model, our designed controller is a linear quadratic regulator (LQR) and a linear quadratic Gaussian (LQG) regulator respectively. While in inner loop, SU controls its transmit power to make the instantaneous SINR track the corresponding target and ensure the IT constraint under the limited threshold. The closed-loop stability of the CRN is proved and the performance of proposed control scheme is presented by computer simulations, which shows that this scheme can effectively guarantee both the requirement of SINR and IT constraint for all SUs.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Lianxin Yang, Dan Wu, Hongkui Shi, Yanshan Long, Yueming Cai
    2018, 15(8): 92-107.
    Abstract ( )   Knowledge map   Save
    Joint mode selection and link allocation are crucial to achieve the advantage of Device-to-Device (D2D) communications in improving spectral efficiency. In practice, cellular users tend to not be totally altruistic or absolutely selfish. How to stimulate them to devote their links and how to allocate their links to D2D pair candidates efficiently are two main challenges. In this paper, we encourage cellular users through the variable payment with regard to the social tie strength between cellular users and D2D pair candidates. In particular, the social tie strength is inferred through a graph inference model and its impact on the payment is quantified as a negative exponential function. Then, we propose a resource scheduling optimization model based on the non-transferable utility coalition formation game, and a distributed coalition formation algorithm based on the Pareto preference and merge-and-split rule. From them, the final coalition structure is obtained, which reflects the strategy of mode selection and link allocation. Numerical results are presented to verify the effectiveness of our proposed scheme.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Tao Zhou, Cheng Tao, Liu Liu, Kai Liu
    2018, 15(8): 108-117.
    Abstract ( )   Knowledge map   Save
    This paper investigates the cross-correlation characteristics of large-scale parameters (LSPs) and small-scale fading (SSF) for high-speed railway (HSR) multi-link propagation scenarios, based on realistic measurements conducted on Beijing to Tianjin HSR line in China. A long-term evolution-based channel sounding system is utilized in the measurements to obtain the channel data. By applying a proposed time-delay based dynamic partition method, multi-link channel impulse responses are extracted from the raw channel data. Then, the statistical results of LSPs, including shadow fading, K-factor, and root-mean-square delay spread are derived and the cross-correlation coefficients of these LPSs are calculated. Moreover, the SSF spatial correlation and cross-correlation of SSF are analyzed. These results can be used to exploit multi-link channel model and to optimize the next-generation HSR communication system.
  • COMMUNICATIONS THEORIES & SYSTEMS
    Junsheng Mu, Xiaojun Jing, Hai Huang, Ning Gao
    2018, 15(8): 118-125.
    Abstract ( )   Knowledge map   Save
    As a crucial component in Cognitive Radio (CR) networks, spectrum sensing has been attracting lots of attention. Some conventional methods for spectrum sensing are sensitive to uncertain signal and noise, its applicability is limited thereof. In this paper, a novel blind spectrum sensing method is proposed, where low-rank and sparse matrix decomposition is applied to the observation signal of a CR in the frequency domain. Then the ratio of the energy of the sparse part and the received signal in the time domain is considered as the criterion to decide whether the radio frequency band is idle by means of a comparison with a predefined threshold. The proposed method is independent of prior knowledge of signal and white noise, and has a better detection performance. Simulation experiments verify the performance of the proposed method in additive white Gaussian noise (AWGN), Rayleighand Rician channels.
  • SECURITY & MANAGEMENT
  • SECURITY & MANAGEMENT
    Tayyaba Zeb, Muhammad Yousaf, Humaira Afzal, Muhammad Rafiq Mufti
    2018, 15(8): 126-140.
    Abstract ( )   Knowledge map   Save
    Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the InfoSec Research Council’s hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure (ARM), Performance Improvement Factor (PIF), and Cost/Benefit Measure (CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine (VM) migration protocol as the target of assessment. The virtualization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol.
  • SECURITY & MANAGEMENT
    An Li, Wenjing Zhang
    2018, 15(8): 141-151.
    Abstract ( )   Knowledge map   Save
    To further promote the achievable average secrecy rate for UAV-ground communications, a UAV-aided mobile jamming strategy was proposed in this paper. Specifically, an additional cooperative UAV is employed as a mobile jammer to transmit the jamming signal to help keep the source UAV closer to the ground destination, thus establishing more favorable legitimate link and enhancing the secrecy performance. We aimed to maximize the achievable secrecy rate by jointly optimizing the trajectories and transmit power of both source UAV and jammer UAV. To solve the considered non-convex optimization problem, we presented a block coordinate descent based iterative algorithm to address a sequence of approximated convex problems for the optimized parameter block by block to find a local optimal solution. Numerical results verify that the proposed algorithm can achieve significant secrecy rate gain compared to all the benchmark schemes.
  • SECURITY & MANAGEMENT
    Xuchen Lin, Ting-Jie Lv, Xia Chen
    2018, 15(8): 152-173.
    Abstract ( )   Knowledge map   Save
    The telecommunications industry has been undergoing tremendous technological changes, and owning to continuous technological advancement, it has maintained sustained prosperity and development. In this paper, the interplay between technology, market and government in telecommunications is discussed briefly, and then we introduce technology and government into the traditional SCP (Structure - Conduct - Performance) paradigm to develop an industry analysis framework called TGM(SCP) (Technology - Government - Market (Structure - Conduct - Performance)). Based on this framework, we present the spiral coevolution model which elaborates on the interaction mechanism of technological innovation with government regulation and market dynamics from the perspective of industry evolution. Our study indicates that the development of the telecommunications industry is the result of the coevolution of technology, government regulation and market forces, and among the three actors, technology is the fundamental driving force. Relative to the “invisible hand” (market) and “visible hand” (government), we conceptualize technology as the “third hand”, which fundamentally drives the development of telecommunications industry in coordination with the other two hands. We also provide several policy implications regarding these findings.
  • SECURITY & MANAGEMENT
    Zhaofeng Ma, Weihua Huang, Wei Bi, Hongmin Gao, Zhen Wang
    2018, 15(8): 174-188.
    Abstract ( )   Knowledge map   Save
    Upon flaws of current blockchain platforms of heavyweight, large capacity of ledger, and time-consuming of synchronization of data, in this paper, we proposed a new paradigm of master-slave blockchain scheme (MSB) for pervasive computing that suitable for general PC, mobile device such as smart phones or PADs to participants in the working of mining and verification, in which we separated traditional blockchain model in 2 layer defined as master node layer and a series of slavery agents layer, then we proposed 2 approaches for partially computing model(PCM) and non-computing of model(NCM) in the MSB blockchain, Finally large amounts of simulations manifest the proposed master-slave blockchain scheme is feasible, extendible and suitable for pervasive computing especially in the 5G generation environment, and can apply in the DRM-related applications.
  • EMERGING TECHNOLOGIES & APPLICATIONS
  • EMERGING TECHNOLOGIES & APPLICATIONS
    Weiwei Xia, Lianfeng Shen
    2018, 15(8): 189-204.
    Abstract ( )   Knowledge map   Save
    The problem of joint radio and cloud resources allocation is studied for heterogeneous mobile cloud computing networks. The objective of the proposed joint resource allocation schemes is to maximize the total utility of users as well as satisfy the required quality of service (QoS) such as the end-to-end response latency experienced by each user. We formulate the problem of joint resource allocation as a combinatorial optimization problem. Three evolutionary approaches are considered to solve the problem: genetic algorithm (GA), ant colony optimization with genetic algorithm (ACO-GA), and quantum genetic algorithm (QGA). To decrease the time complexity, we propose a mapping process between the resource allocation matrix and the chromosome of GA, ACO-GA, and QGA, search the available radio and cloud resource pairs based on the resource availability matrixes for ACO-GA, and encode the difference value between the allocated resources and the minimum resource requirement for QGA. Extensive simulation results show that our proposed methods greatly outperform the existing algorithms in terms of running time, the accuracy of final results, the total utility, resource utilization and the end-to-end response latency guaranteeing.
  • EMERGING TECHNOLOGIES & APPLICATIONS
    Jingtao Su, Shengsong Yang, Haitao Xu, Xianwei Zhou
    2018, 15(8): 205-214.
    Abstract ( )   Knowledge map   Save
    In this paper, a Stackelberg differential game based approach is proposed to solve the bandwidth allocation problems in satellite communication network. All the satellites are divided into two groups, one has high download requirements, and the other one has low download requirements. Each satellites group has its own controller for bandwidth allocation, and can get payments from the satellites for the allocated resources. The relationships between the controllers and satellites are formed as a Stackelberg game. In our model, differential equation is introduced to describe the bandwidth dynamics for the whole satellite communication network. Combine the differential equation and Stackelberg game together, we can formulate the bandwidth allocation problems in satellite communication network as a Stackelber differential game. The solutions to the proposed game is solved based the Bellman dynamic equations. Numerical simulations are given to prove the effeteness and correctness of the proposed approach.