Pub Date : 2017-08-17DOI: 10.1109/EUROCON.2017.8011182
Yushi Chen, J. Milanović
Integration of critical infrastructures contributes to an increasing complexity and heterogeneity of their interdependencies, which results in a more detailed analysis process with emphasis on a certain aspect of the interactions such as cascading effects rather than the overarching system modelling and simulation. When external disturbances like natural disasters and intentional attacks take place, induced cascading failures are more likely to happen in large scale than they used to be. Their propagation paths and time-dependent behaviours are largely unknown to the area researchers and post-disaster consequences are rather difficult to quantify. This paper is presenting critical appraisal of existing methodologies for modelling cascading failures in interconnected systems. General explanations of the most widely used methodologies are firstly illustrated with the emphasis on their advantages and disadvantages and with the aim of choosing appropriate modelling and simulation methods for study of cascading failures in coupled electric power grids and telecommunication systems.
{"title":"Critical appraisal of tools and methodologies for studies of cascading failures in coupled critical infrastructure systems","authors":"Yushi Chen, J. Milanović","doi":"10.1109/EUROCON.2017.8011182","DOIUrl":"https://doi.org/10.1109/EUROCON.2017.8011182","url":null,"abstract":"Integration of critical infrastructures contributes to an increasing complexity and heterogeneity of their interdependencies, which results in a more detailed analysis process with emphasis on a certain aspect of the interactions such as cascading effects rather than the overarching system modelling and simulation. When external disturbances like natural disasters and intentional attacks take place, induced cascading failures are more likely to happen in large scale than they used to be. Their propagation paths and time-dependent behaviours are largely unknown to the area researchers and post-disaster consequences are rather difficult to quantify. This paper is presenting critical appraisal of existing methodologies for modelling cascading failures in interconnected systems. General explanations of the most widely used methodologies are firstly illustrated with the emphasis on their advantages and disadvantages and with the aim of choosing appropriate modelling and simulation methods for study of cascading failures in coupled electric power grids and telecommunication systems.","PeriodicalId":114100,"journal":{"name":"IEEE EUROCON 2017 -17th International Conference on Smart Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125114210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-17DOI: 10.1109/EUROCON.2017.8011079
R. Umair, Kamal Shahid, R. Olsen
The trend of producing energy from Renewable Generation (ReGen) plants is greatly increasing. This leads to the objective of building future power generation system entirely based on renewable sources. Since the power output of ReGen plants, such as wind power plants (WPP), varies continuously and thereby the voltages in the distribution grid, an effective control system is required, to govern the production from all ReGen plants. For this, control messages must be exchanged between the grid assets with reliable information to achieve optimum efficiency. This raises a challenge to assess information reliability and evaluate the performance of a controller. Therefore, considering the dynamic nature of information, this paper analyzes the information reliability in terms of correct and timely delivery of message signals, for remote control of a WPP using IEC-61850 MMS in a smart grid scenario. Based on this measure, the quality of controller performance is also calculated over various imperfect network conditions.
{"title":"Information reliability in smart grid scenario over imperfect communication networks using IEC-61850 MMS","authors":"R. Umair, Kamal Shahid, R. Olsen","doi":"10.1109/EUROCON.2017.8011079","DOIUrl":"https://doi.org/10.1109/EUROCON.2017.8011079","url":null,"abstract":"The trend of producing energy from Renewable Generation (ReGen) plants is greatly increasing. This leads to the objective of building future power generation system entirely based on renewable sources. Since the power output of ReGen plants, such as wind power plants (WPP), varies continuously and thereby the voltages in the distribution grid, an effective control system is required, to govern the production from all ReGen plants. For this, control messages must be exchanged between the grid assets with reliable information to achieve optimum efficiency. This raises a challenge to assess information reliability and evaluate the performance of a controller. Therefore, considering the dynamic nature of information, this paper analyzes the information reliability in terms of correct and timely delivery of message signals, for remote control of a WPP using IEC-61850 MMS in a smart grid scenario. Based on this measure, the quality of controller performance is also calculated over various imperfect network conditions.","PeriodicalId":114100,"journal":{"name":"IEEE EUROCON 2017 -17th International Conference on Smart Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128265496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-08-17DOI: 10.1109/EUROCON.2017.8011177
Wentao Zhu, J. Milanović
Cyber-physical system studies request revolutionary methods to identify the vulnerability of the system in order to develop risk assessment and countermeasures and consequently reduce the vulnerabilities. One possible approach to analyze cyber-physical system vulnerability is to study their topology and therefore to quantify the interdependencies on the physical side and on the cyber side. This paper presents a three-dimensional Complex Network model for a coupled electric power system and information and communication technology network, where power buses and communication network routers/multiplexers are modelled as nodes while power lines and communication channels are modelled as edges. The vulnerability of each system component may vary under different system operating conditions due to the change of system's structure. Therefore a Vulnerability-weighted Node Degree is introduced to assess the vulnerability of each component under two characteristic power system operating conditions. The most vulnerable components are identified using Vulnerability-weighted Node Degree and the consequences of failure of these components are demonstrated with Node Removal method.
{"title":"Cyber-physical system failure analysis based on Complex Network theory","authors":"Wentao Zhu, J. Milanović","doi":"10.1109/EUROCON.2017.8011177","DOIUrl":"https://doi.org/10.1109/EUROCON.2017.8011177","url":null,"abstract":"Cyber-physical system studies request revolutionary methods to identify the vulnerability of the system in order to develop risk assessment and countermeasures and consequently reduce the vulnerabilities. One possible approach to analyze cyber-physical system vulnerability is to study their topology and therefore to quantify the interdependencies on the physical side and on the cyber side. This paper presents a three-dimensional Complex Network model for a coupled electric power system and information and communication technology network, where power buses and communication network routers/multiplexers are modelled as nodes while power lines and communication channels are modelled as edges. The vulnerability of each system component may vary under different system operating conditions due to the change of system's structure. Therefore a Vulnerability-weighted Node Degree is introduced to assess the vulnerability of each component under two characteristic power system operating conditions. The most vulnerable components are identified using Vulnerability-weighted Node Degree and the consequences of failure of these components are demonstrated with Node Removal method.","PeriodicalId":114100,"journal":{"name":"IEEE EUROCON 2017 -17th International Conference on Smart Technologies","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-08-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127977603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-06DOI: 10.1109/EUROCON.2017.8011211
S. Filiposka, A. Mishev, K. Gilly
The problem of efficient resource management in large cloud data centres is well recognised in the cloud management community. With the rising demand for cloud services and expansion of the size and distribution of data centres, the repercussions of not taking into account all parameters of interest while allocating resources are becoming significant. Hence, one of the major issues today is how to reconcile between performance and energy efficiency so that customers can exploit the provided resources to their maximum while the provider still keeps a well balanced approach that ensures low cost and optimal power consumption. The main goal of this paper is to investigate what can be expected of performance optimisation allocation techniques from a power consumption perspective. The presented results show that careful design of resource allocation algorithms can lead towards solutions that are not only high performing, but are also good in efficient power consumption.
{"title":"Balancing high performance and energy efficiency in cloud allocation problems","authors":"S. Filiposka, A. Mishev, K. Gilly","doi":"10.1109/EUROCON.2017.8011211","DOIUrl":"https://doi.org/10.1109/EUROCON.2017.8011211","url":null,"abstract":"The problem of efficient resource management in large cloud data centres is well recognised in the cloud management community. With the rising demand for cloud services and expansion of the size and distribution of data centres, the repercussions of not taking into account all parameters of interest while allocating resources are becoming significant. Hence, one of the major issues today is how to reconcile between performance and energy efficiency so that customers can exploit the provided resources to their maximum while the provider still keeps a well balanced approach that ensures low cost and optimal power consumption. The main goal of this paper is to investigate what can be expected of performance optimisation allocation techniques from a power consumption perspective. The presented results show that careful design of resource allocation algorithms can lead towards solutions that are not only high performing, but are also good in efficient power consumption.","PeriodicalId":114100,"journal":{"name":"IEEE EUROCON 2017 -17th International Conference on Smart Technologies","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122290222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-06DOI: 10.1109/EUROCON.2017.8011112
A. Eissa, M. A. Ibrahem, Mahmoud A. Elmohr, Y. Zamzam, Ahmed El-Yamany, Sameh El-Ashry, Mostafa Khamis, A. Shalaby
Network on Chip (NoC) has emerged as an interconnection solution for the modern digital systems, especially for System on Chip (SoC), due to the large number of IPs in the system that need to communicate. Various systems and routers have been introduced; hence the need to make a reusable verification environment to test both single routers and networks. In this paper, we propose a reusable verification environment for NoC platforms using the Universal Verification Methodology (UVM) that tests and verifies both routers and networks in an easily modifiable manner to fit various routers and networks. The environment also evaluates performance parameters such as injection rate, throughput and latency.
{"title":"A reusable verification environment for NoC platforms using UVM","authors":"A. Eissa, M. A. Ibrahem, Mahmoud A. Elmohr, Y. Zamzam, Ahmed El-Yamany, Sameh El-Ashry, Mostafa Khamis, A. Shalaby","doi":"10.1109/EUROCON.2017.8011112","DOIUrl":"https://doi.org/10.1109/EUROCON.2017.8011112","url":null,"abstract":"Network on Chip (NoC) has emerged as an interconnection solution for the modern digital systems, especially for System on Chip (SoC), due to the large number of IPs in the system that need to communicate. Various systems and routers have been introduced; hence the need to make a reusable verification environment to test both single routers and networks. In this paper, we propose a reusable verification environment for NoC platforms using the Universal Verification Methodology (UVM) that tests and verifies both routers and networks in an easily modifiable manner to fit various routers and networks. The environment also evaluates performance parameters such as injection rate, throughput and latency.","PeriodicalId":114100,"journal":{"name":"IEEE EUROCON 2017 -17th International Conference on Smart Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128414971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-06DOI: 10.1109/EUROCON.2017.8011084
O. Tahan, Rim Hawchar, F. Matar, M. Ghantous
Physical exercising has always had an important impact on humans' health. Lack of motivation is one of the major reasons that keeps a person from exercising. To overcome this problem, new solutions are needed to provide weight watchers and fitness seekers motivation to exercise indoors. This paper presents iGym, a low cost and flexible system that enhances humans' workout experience. This system lets treadmills' users, spinning bikes and stair steppers enjoy their exercising sessions by projecting a walking or cycling scenery in front of them. Hence, this system allows the user of such machines to discover the cities of the world and nature sceneries while exercising at home or at the gym. With the help of his smartphone, the user only needs to select the path he would like to discover. This path will be displayed on a TV screen or large screen in front of him. To synchronize the real traveled distance to the one projected in the scenery, the speed of movement in the scenery is adjusted in real-time per the walking and running speed of the user. The speed of the user is acquired using his smartphone. Our project implies an interconnection of a Raspberry Pi with a Smartphone application and a server. This system has been implemented and several tests were conducted to prove its correct functionality.
{"title":"iGym—A RaspberryPi-smartphone hybrid system for better entertaining treadmill users","authors":"O. Tahan, Rim Hawchar, F. Matar, M. Ghantous","doi":"10.1109/EUROCON.2017.8011084","DOIUrl":"https://doi.org/10.1109/EUROCON.2017.8011084","url":null,"abstract":"Physical exercising has always had an important impact on humans' health. Lack of motivation is one of the major reasons that keeps a person from exercising. To overcome this problem, new solutions are needed to provide weight watchers and fitness seekers motivation to exercise indoors. This paper presents iGym, a low cost and flexible system that enhances humans' workout experience. This system lets treadmills' users, spinning bikes and stair steppers enjoy their exercising sessions by projecting a walking or cycling scenery in front of them. Hence, this system allows the user of such machines to discover the cities of the world and nature sceneries while exercising at home or at the gym. With the help of his smartphone, the user only needs to select the path he would like to discover. This path will be displayed on a TV screen or large screen in front of him. To synchronize the real traveled distance to the one projected in the scenery, the speed of movement in the scenery is adjusted in real-time per the walking and running speed of the user. The speed of the user is acquired using his smartphone. Our project implies an interconnection of a Raspberry Pi with a Smartphone application and a server. This system has been implemented and several tests were conducted to prove its correct functionality.","PeriodicalId":114100,"journal":{"name":"IEEE EUROCON 2017 -17th International Conference on Smart Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115790898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-06DOI: 10.1109/EUROCON.2017.8011200
A. Galassini, A. Costabeber, C. Gerada
The growth of electrification transportation systems is an opportunity for delving into new feasible solutions for more reliable and fault tolerant arrangements. So far, many investigations distant from the market have been carried out. Most of the works are looking at new control strategies adding extra components increasing manufacturing efforts and costs. Considering a nine phase synchronous multi-three phase electrical motor with disconnected neutral points, this manuscript compares the common speed reference configuration (where all the drives are configured in speed mode) and the torque follower configuration (where one drive is in speed mode and all the others are in torque mode). Furthermore, a post-fault operation in open-circuit condition is proposed. Analytical equations and experimental validation in nominal and fault condition are given by means of Matlab/Simulink simulations and by experimental on a 22kW test rig.
{"title":"Speed control for multi-three phase synchronous electrical motors in fault condition","authors":"A. Galassini, A. Costabeber, C. Gerada","doi":"10.1109/EUROCON.2017.8011200","DOIUrl":"https://doi.org/10.1109/EUROCON.2017.8011200","url":null,"abstract":"The growth of electrification transportation systems is an opportunity for delving into new feasible solutions for more reliable and fault tolerant arrangements. So far, many investigations distant from the market have been carried out. Most of the works are looking at new control strategies adding extra components increasing manufacturing efforts and costs. Considering a nine phase synchronous multi-three phase electrical motor with disconnected neutral points, this manuscript compares the common speed reference configuration (where all the drives are configured in speed mode) and the torque follower configuration (where one drive is in speed mode and all the others are in torque mode). Furthermore, a post-fault operation in open-circuit condition is proposed. Analytical equations and experimental validation in nominal and fault condition are given by means of Matlab/Simulink simulations and by experimental on a 22kW test rig.","PeriodicalId":114100,"journal":{"name":"IEEE EUROCON 2017 -17th International Conference on Smart Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115315412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-06DOI: 10.1109/EUROCON.2017.8011213
Elena Karafiloski, A. Mishev
The popularity of Blockchain technology and the huge extent of its application, results with much ongoing research in different practical and scientific areas. Although still new and in experimenting phase, the Blockchain is being seen as a revolutionary solution, addressing modern technology concerns like decentralization, trust, identity, data ownership and data-driven decisions. At the same time, the world is facing an expansion in quantity and diversity of digital data that are generated by both users and machines. While actively searching for the best way to store, organize and process Big Data, the Blockchain technology comes in providing significant input. Its proposed solutions about decentralized management of private data, digital property resolution, IoT communication and public institutions' reforms are having significant impact on how Big Data may evolve. This paper presents the novel solutions associated with some of the Big Data areas that can be empowered by the Blockchain technology.
{"title":"Blockchain solutions for big data challenges: A literature review","authors":"Elena Karafiloski, A. Mishev","doi":"10.1109/EUROCON.2017.8011213","DOIUrl":"https://doi.org/10.1109/EUROCON.2017.8011213","url":null,"abstract":"The popularity of Blockchain technology and the huge extent of its application, results with much ongoing research in different practical and scientific areas. Although still new and in experimenting phase, the Blockchain is being seen as a revolutionary solution, addressing modern technology concerns like decentralization, trust, identity, data ownership and data-driven decisions. At the same time, the world is facing an expansion in quantity and diversity of digital data that are generated by both users and machines. While actively searching for the best way to store, organize and process Big Data, the Blockchain technology comes in providing significant input. Its proposed solutions about decentralized management of private data, digital property resolution, IoT communication and public institutions' reforms are having significant impact on how Big Data may evolve. This paper presents the novel solutions associated with some of the Big Data areas that can be empowered by the Blockchain technology.","PeriodicalId":114100,"journal":{"name":"IEEE EUROCON 2017 -17th International Conference on Smart Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122485820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-06DOI: 10.1109/EUROCON.2017.8011070
Faraz Fatemi Moghaddam, P. Wieder, R. Yahyapour
Security and privacy challenges are the most important obstacles for the advancement of IT-based on-demand services and cloud computing as an emerging technology. To ensure data confidentiality and fine-grained access control in cloud-based environments, stored data and resources needs to be re-encrypted periodically or based on special mechanisms such as revoked user-based or manual re-encryption. Managing the process of re-encryption is a challenging issue that involves many limitations such as time management, resource confidentiality, and level of access. Accordingly, a multi-level re-encryption model based on policy management has been presented in this paper to ensure data security in clouds. The proposed model uses a policy-based ontology to generate, manage and apply re-encryption policies based on the characteristics of resources, sensitivity of data and capabilities of service provider. The results of comprehensive performance and security analysis of proposed model shows this model increases the reliability of re-encryption processes in cloud storages considerably and provides an efficient policy management for re-encryption tasks.
{"title":"POBRES: Policy-based re-encryption schema for secure resource management in clouds","authors":"Faraz Fatemi Moghaddam, P. Wieder, R. Yahyapour","doi":"10.1109/EUROCON.2017.8011070","DOIUrl":"https://doi.org/10.1109/EUROCON.2017.8011070","url":null,"abstract":"Security and privacy challenges are the most important obstacles for the advancement of IT-based on-demand services and cloud computing as an emerging technology. To ensure data confidentiality and fine-grained access control in cloud-based environments, stored data and resources needs to be re-encrypted periodically or based on special mechanisms such as revoked user-based or manual re-encryption. Managing the process of re-encryption is a challenging issue that involves many limitations such as time management, resource confidentiality, and level of access. Accordingly, a multi-level re-encryption model based on policy management has been presented in this paper to ensure data security in clouds. The proposed model uses a policy-based ontology to generate, manage and apply re-encryption policies based on the characteristics of resources, sensitivity of data and capabilities of service provider. The results of comprehensive performance and security analysis of proposed model shows this model increases the reliability of re-encryption processes in cloud storages considerably and provides an efficient policy management for re-encryption tasks.","PeriodicalId":114100,"journal":{"name":"IEEE EUROCON 2017 -17th International Conference on Smart Technologies","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116944408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-07-06DOI: 10.1109/EUROCON.2017.8011074
W. H. Al-Zubaedi, H. Al-Raweshidy
This paper introduces a cost effective scheme for a Cloud Radio Access Network (C-RAN) based on virtualization, which is a technology used to reduce Power Consumption (PC) in the Base Band Unit (BBU pool). The BBU's function is proposed to be as a software application running in a servers, which is called the virtual BBU (vBBU). To asses the proposal scheme, a power model of the BBU pool is proposed for C-RAN architecture. This provides a parametrized and optimized linear power model, which cover all the individual aspects in the C-RAN system relevant for the PC analysis in the BBU pool. Moreover, in this work a New Minimum Bin Slack (NMBS) algorithm is proposed, which combines with the Bin Packing Method (BPM) to minimize the number of vBBUs. The NMBS is aimed at matching the right amount of baseband processing load of Remote Radio Heads (RRHs) with load balancing as much as possible among all of the vBBUs, and switching off others. The baseband processing procedure for each vBBU is divided into N tasks, which can be processed by multiple vBBUs so as to offer system flexibility. The proposed architecture is based on integer linear programming for finding the minimum number of vBBUs. The simulation results show the NMBS effectively decreases the number of active vBBUs and decreases the PC in C-RAN when compared with other algorithms. In addition, this algorithm reduced the average PC in the BBU pool by 65%, 6%, and 3% less than for the Distributed Baseline (DB), the First Fit Decreasing (FFD) algorithm and the Heuristic Simulating Annealing (HSA) algorithm, respectively.
{"title":"A parameterized and optimized BBU pool virtualization power model for C-RAN architecture","authors":"W. H. Al-Zubaedi, H. Al-Raweshidy","doi":"10.1109/EUROCON.2017.8011074","DOIUrl":"https://doi.org/10.1109/EUROCON.2017.8011074","url":null,"abstract":"This paper introduces a cost effective scheme for a Cloud Radio Access Network (C-RAN) based on virtualization, which is a technology used to reduce Power Consumption (PC) in the Base Band Unit (BBU pool). The BBU's function is proposed to be as a software application running in a servers, which is called the virtual BBU (vBBU). To asses the proposal scheme, a power model of the BBU pool is proposed for C-RAN architecture. This provides a parametrized and optimized linear power model, which cover all the individual aspects in the C-RAN system relevant for the PC analysis in the BBU pool. Moreover, in this work a New Minimum Bin Slack (NMBS) algorithm is proposed, which combines with the Bin Packing Method (BPM) to minimize the number of vBBUs. The NMBS is aimed at matching the right amount of baseband processing load of Remote Radio Heads (RRHs) with load balancing as much as possible among all of the vBBUs, and switching off others. The baseband processing procedure for each vBBU is divided into N tasks, which can be processed by multiple vBBUs so as to offer system flexibility. The proposed architecture is based on integer linear programming for finding the minimum number of vBBUs. The simulation results show the NMBS effectively decreases the number of active vBBUs and decreases the PC in C-RAN when compared with other algorithms. In addition, this algorithm reduced the average PC in the BBU pool by 65%, 6%, and 3% less than for the Distributed Baseline (DB), the First Fit Decreasing (FFD) algorithm and the Heuristic Simulating Annealing (HSA) algorithm, respectively.","PeriodicalId":114100,"journal":{"name":"IEEE EUROCON 2017 -17th International Conference on Smart Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126845046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}