Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651674
Vaishnavi Jootu Sethuram
NOMA (Non Orthogonal Multiple Access)/MUST (Multi-User Superposition Transmission) is one of the major candidates for next generation wireless access technologies as they provide better user fairness and improved spectral efficiency. Successive Interference Cancellation (SIC) receivers enable multiple users to be scheduled in the same time-frequency resources while differentiated in power domain. Two user Power Domain NOMA (PD-NOMA) analysis clearly shows that the SNR difference between the users is very important in order to achieve inter-user interference cancellation. Hence user selection or pairing becomes crucial and can lead to heavy co-channel interference when users are paired wrongly. In order to overcome this problem, a new method of NOMA is proposed where the user pairing can be arbitrary, but an advanced receiver technique is used which enables successful decoding of the desired user’s data. A novel Gaussian Mixture based receiver is proposed. It is shown that the error rate performance of this detector is very close to that of a joint detector and the proposed technique can be used both in uplink and downlink directions. Another key contribution of this work is to show the over-modeling technique which enables the decoder to operate without having to know any prior information about the interferers. This enables a practical approach to build Gaussian Mixture Model (GMM) based receivers for a variety of interference scenarios.
{"title":"A Novel Receiver Technique to enable NOMA Without User Selection","authors":"Vaishnavi Jootu Sethuram","doi":"10.1109/CCNC.2019.8651674","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651674","url":null,"abstract":"NOMA (Non Orthogonal Multiple Access)/MUST (Multi-User Superposition Transmission) is one of the major candidates for next generation wireless access technologies as they provide better user fairness and improved spectral efficiency. Successive Interference Cancellation (SIC) receivers enable multiple users to be scheduled in the same time-frequency resources while differentiated in power domain. Two user Power Domain NOMA (PD-NOMA) analysis clearly shows that the SNR difference between the users is very important in order to achieve inter-user interference cancellation. Hence user selection or pairing becomes crucial and can lead to heavy co-channel interference when users are paired wrongly. In order to overcome this problem, a new method of NOMA is proposed where the user pairing can be arbitrary, but an advanced receiver technique is used which enables successful decoding of the desired user’s data. A novel Gaussian Mixture based receiver is proposed. It is shown that the error rate performance of this detector is very close to that of a joint detector and the proposed technique can be used both in uplink and downlink directions. Another key contribution of this work is to show the over-modeling technique which enables the decoder to operate without having to know any prior information about the interferers. This enables a practical approach to build Gaussian Mixture Model (GMM) based receivers for a variety of interference scenarios.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125423546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651877
Go Yamanaka, T. Nishio, M. Morikura, Koji Yamamoto, Yuichi Maki, Shin'ichiro Eitoku, Takuya Indo
This paper proposes a camera-based geo-fencing system for wireless local area networks (WLANs) which enables geo-location based wireless access control to intuitively manage the area where the WLANs are available. The proposed system leverages camera to localize WLAN users accurately and estimates the proximity of users to objects in the real world. Meanwhile, conventional geo-location based access control suffers from low accuracy of RSSI based localization. As an example of geo-location based access control, we execute a WLAN activation control which allows STAs to pre-activate WLAN and associates with access points (APs) so that the power consumption and time to obtain contents are reduced. Experimental results show the feasibility of camera-based geo-fencing.
{"title":"Geo-Fencing in Wireless LANs with Camera for Location-Based Access Control","authors":"Go Yamanaka, T. Nishio, M. Morikura, Koji Yamamoto, Yuichi Maki, Shin'ichiro Eitoku, Takuya Indo","doi":"10.1109/CCNC.2019.8651877","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651877","url":null,"abstract":"This paper proposes a camera-based geo-fencing system for wireless local area networks (WLANs) which enables geo-location based wireless access control to intuitively manage the area where the WLANs are available. The proposed system leverages camera to localize WLAN users accurately and estimates the proximity of users to objects in the real world. Meanwhile, conventional geo-location based access control suffers from low accuracy of RSSI based localization. As an example of geo-location based access control, we execute a WLAN activation control which allows STAs to pre-activate WLAN and associates with access points (APs) so that the power consumption and time to obtain contents are reduced. Experimental results show the feasibility of camera-based geo-fencing.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129371371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651751
Igor Ivkic, A. Mauthe, Markus Tauber
In times of Industry 4.0 and cyber-physical systems (CPS) providing security is one of the biggest challenges. A cyber attack launched at a CPS poses a huge threat, since a security incident may affect both the cyber and the physical world. Since CPS are very flexible systems, which are capable of adapting to environmental changes, it is important to keep an overview of the resulting costs of providing security. However, research regarding CPS currently focuses more on engineering secure systems and does not satisfactorily provide approaches for evaluating the resulting costs. This paper presents an interaction-based model for evaluating security costs in a CPS. Furthermore, the paper demonstrates in a use case driven study, how this approach could be used to model the resulting costs for guaranteeing security.
{"title":"Towards a Security Cost Model for Cyber-Physical Systems","authors":"Igor Ivkic, A. Mauthe, Markus Tauber","doi":"10.1109/CCNC.2019.8651751","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651751","url":null,"abstract":"In times of Industry 4.0 and cyber-physical systems (CPS) providing security is one of the biggest challenges. A cyber attack launched at a CPS poses a huge threat, since a security incident may affect both the cyber and the physical world. Since CPS are very flexible systems, which are capable of adapting to environmental changes, it is important to keep an overview of the resulting costs of providing security. However, research regarding CPS currently focuses more on engineering secure systems and does not satisfactorily provide approaches for evaluating the resulting costs. This paper presents an interaction-based model for evaluating security costs in a CPS. Furthermore, the paper demonstrates in a use case driven study, how this approach could be used to model the resulting costs for guaranteeing security.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131478104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651782
I. Ullah, Q. Mahmoud
In this paper we propose a two-level hybrid anomalous activity detection model for intrusion detection in IoT networks. The level-1 model uses flow-based anomaly detection, which is capable of classifying the network traffic as normal or anomalous. The flow-based features are extracted from the CICIDS2017 and UNSW-15 datasets. If an anomaly activity is detected then the flow is forwarded to the level-2 model to find the category of the anomaly by deeply examining the contents of the packet. The level-2 model uses Recursive Feature Elimination (RFE) to select significant features and Synthetic Minority Over-Sampling Technique (SMOTE) for oversampling and Edited Nearest Neighbors (ENN) for cleaning the CICIDS2017 and UNSW-15 datasets. Our proposed model precision, recall and F score for level-1 were measured 100% for the CICIDS2017 dataset and 99% for the UNSW-15 dataset, while the level-2 model precision, recall, and F score were measured at 100 % for the CICIDS2017 dataset and 97 % for the UNSW-15 dataset. The predictor we introduce in this paper provides a solid framework for the development of malicious activity detection in IoT networks.
{"title":"A Two-Level Hybrid Model for Anomalous Activity Detection in IoT Networks","authors":"I. Ullah, Q. Mahmoud","doi":"10.1109/CCNC.2019.8651782","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651782","url":null,"abstract":"In this paper we propose a two-level hybrid anomalous activity detection model for intrusion detection in IoT networks. The level-1 model uses flow-based anomaly detection, which is capable of classifying the network traffic as normal or anomalous. The flow-based features are extracted from the CICIDS2017 and UNSW-15 datasets. If an anomaly activity is detected then the flow is forwarded to the level-2 model to find the category of the anomaly by deeply examining the contents of the packet. The level-2 model uses Recursive Feature Elimination (RFE) to select significant features and Synthetic Minority Over-Sampling Technique (SMOTE) for oversampling and Edited Nearest Neighbors (ENN) for cleaning the CICIDS2017 and UNSW-15 datasets. Our proposed model precision, recall and F score for level-1 were measured 100% for the CICIDS2017 dataset and 99% for the UNSW-15 dataset, while the level-2 model precision, recall, and F score were measured at 100 % for the CICIDS2017 dataset and 97 % for the UNSW-15 dataset. The predictor we introduce in this paper provides a solid framework for the development of malicious activity detection in IoT networks.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128731692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651672
Youngnam Han
The fifth-generation (5G) communication systems are expected to be an important connecting infrastructure for information and knowledge exchanges among people, machines, sensors, devices, and even environments. The technical specifications for 5G communication systems are being made to satisfy performance requirements that are defined in ITU-R documents. In addition, the key performance indicators in 5G communication systems include peak and average data rate, mobility, energy efficiency, spectral efficiency, latency, connection density, and so on. These performance metrics need to be evaluated by simulators at different levels. Therefore, simulators play an important role in evaluating the performance of 5G communication systems as well as an individual technique. Most research institutes, universities, and industries have their own simulators, but with different levels of assumption and implementation depth according to technical needs of individual organization, which makes a fair comparison impossible.
{"title":"5G K-Simulator and TestBench Demonstration Proposal","authors":"Youngnam Han","doi":"10.1109/CCNC.2019.8651672","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651672","url":null,"abstract":"The fifth-generation (5G) communication systems are expected to be an important connecting infrastructure for information and knowledge exchanges among people, machines, sensors, devices, and even environments. The technical specifications for 5G communication systems are being made to satisfy performance requirements that are defined in ITU-R documents. In addition, the key performance indicators in 5G communication systems include peak and average data rate, mobility, energy efficiency, spectral efficiency, latency, connection density, and so on. These performance metrics need to be evaluated by simulators at different levels. Therefore, simulators play an important role in evaluating the performance of 5G communication systems as well as an individual technique. Most research institutes, universities, and industries have their own simulators, but with different levels of assumption and implementation depth according to technical needs of individual organization, which makes a fair comparison impossible.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121176884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651673
Kostas Chounos, Stratos Keranidis, A. Apostolaras, T. Korakis
In this paper, we present a UE-driven light-weight mechanism for fast handover decision and efficient WLAN selection in the context of 5G networks. As the network deployments are expected to be denser and the mobile user will be offered a multitude of alternative short coverage range options to have her mobile traffic served, her roaming decision will be performance critical. While the current 3GPP standardization considers the use of network performance statistics of nearby WLANs for the UE-driven roaming selection to address the uncertainty of the shared wireless medium, their collection and processing inevitably affects the mobile user performance and inserts an accuracy-performance tradeoff. We introduce a spectrum assessment framework, that is based on commercial hardware and open-source software, to evaluate the conditions on the nearby WLANs and let the UE to infer their performance with minimum overhead relying on Duty Cycle evaluation and the RSSI metrics. Our ready-to-be deployed solution leverages the use of off-the-shelf equipment and commercial devices and enables fast decision procedures for the WLAN selection with low collection and processing overhead. We evaluate our mechanism by conducting testbed experiments. The results reveal performance gains in terms of UE’s achieved throughput when enabling the proposed framework to infer the spectral WLAN conditions and decide for the AP to roam.
{"title":"Fast Spectral Assessment for Handover Decisions in 5G Networks","authors":"Kostas Chounos, Stratos Keranidis, A. Apostolaras, T. Korakis","doi":"10.1109/CCNC.2019.8651673","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651673","url":null,"abstract":"In this paper, we present a UE-driven light-weight mechanism for fast handover decision and efficient WLAN selection in the context of 5G networks. As the network deployments are expected to be denser and the mobile user will be offered a multitude of alternative short coverage range options to have her mobile traffic served, her roaming decision will be performance critical. While the current 3GPP standardization considers the use of network performance statistics of nearby WLANs for the UE-driven roaming selection to address the uncertainty of the shared wireless medium, their collection and processing inevitably affects the mobile user performance and inserts an accuracy-performance tradeoff. We introduce a spectrum assessment framework, that is based on commercial hardware and open-source software, to evaluate the conditions on the nearby WLANs and let the UE to infer their performance with minimum overhead relying on Duty Cycle evaluation and the RSSI metrics. Our ready-to-be deployed solution leverages the use of off-the-shelf equipment and commercial devices and enables fast decision procedures for the WLAN selection with low collection and processing overhead. We evaluate our mechanism by conducting testbed experiments. The results reveal performance gains in terms of UE’s achieved throughput when enabling the proposed framework to infer the spectral WLAN conditions and decide for the AP to roam.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122275104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651816
Yuji Mizutani, K. Mizutani, T. Matsumura, H. Harada
The enhanced universal filtered-DFTs-OFDM (eUF-DFTs-OFDM) has been proposed for reducing the out-of-band emission (OOBE) drastically with low peak-to-average power ratio (PAPR). However, this scheme has high complexity due to the time-domain convolution of LPF. In this paper, we propose a new time-domain windowing function for the universal time-domain windowed-DFTs-OFDM (UTW-DFTs-OFDM) to reduce the OOBE with low PAPR and low implementation complexity by using a time response of the LPF for the eUF-DFTs-OFDM. The performance of the proposed time-domain window function is evaluated by simulation in terms of OOBE, PAPR, block error rate (BLER), and implementation complexity with the LTE uplink parameters. As a result, we achieve almost same performance as the eUF-DFTs-OFDM with the significant reduction of the number of multipliers used for wave-shaping.
{"title":"A Low-pass Filtered Time-domain Window for DFTs-OFDM to Reduce Out-of-band Emission with Low Complexity","authors":"Yuji Mizutani, K. Mizutani, T. Matsumura, H. Harada","doi":"10.1109/CCNC.2019.8651816","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651816","url":null,"abstract":"The enhanced universal filtered-DFTs-OFDM (eUF-DFTs-OFDM) has been proposed for reducing the out-of-band emission (OOBE) drastically with low peak-to-average power ratio (PAPR). However, this scheme has high complexity due to the time-domain convolution of LPF. In this paper, we propose a new time-domain windowing function for the universal time-domain windowed-DFTs-OFDM (UTW-DFTs-OFDM) to reduce the OOBE with low PAPR and low implementation complexity by using a time response of the LPF for the eUF-DFTs-OFDM. The performance of the proposed time-domain window function is evaluated by simulation in terms of OOBE, PAPR, block error rate (BLER), and implementation complexity with the LTE uplink parameters. As a result, we achieve almost same performance as the eUF-DFTs-OFDM with the significant reduction of the number of multipliers used for wave-shaping.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126579746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651800
N. Kamiyama, Yutaro Hosokawa
Recently, the virtualized CDN such as Amazon CloudFront has been widely used. In the virtualized CDN, cache servers are provided on virtual machines of cloud datacenters. Using the virtualized CDN, content providers can flexibly select the regions of using cache servers according to the geographical demand pattern of their users, so content providers can expect to reduce the cost of using CDN. However, to maximize the profit of content providers, they need to carefully select the locations of cache servers which affect the quality perceived by users as well as the total cost. In this paper, we propose a method of optimally selecting the geographical regions to use cache servers in the virtualized CDN maximizing the profit of the content providers.
{"title":"Optimally Designing Virtualized CDN Maximizing Profit of Content Providers","authors":"N. Kamiyama, Yutaro Hosokawa","doi":"10.1109/CCNC.2019.8651800","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651800","url":null,"abstract":"Recently, the virtualized CDN such as Amazon CloudFront has been widely used. In the virtualized CDN, cache servers are provided on virtual machines of cloud datacenters. Using the virtualized CDN, content providers can flexibly select the regions of using cache servers according to the geographical demand pattern of their users, so content providers can expect to reduce the cost of using CDN. However, to maximize the profit of content providers, they need to carefully select the locations of cache servers which affect the quality perceived by users as well as the total cost. In this paper, we propose a method of optimally selecting the geographical regions to use cache servers in the virtualized CDN maximizing the profit of the content providers.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127149842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651820
M. Furini, Jessica Martini, M. Montangero
Streaming music platforms have changed the way people listen to music. Today, we can access to millions of songs with a simple internet-connected device. The drawback is that the selection of what to listen is a long, tedious, ant time-consuming process. This is why, nowadays, we choose playlists instead of songs. Unfortunately, since there are thousands of playlists, the selection process can once again be long, tedious, and time-consuming. In this paper, we design a system to facilitate the listening and discovering of new music. The system automatically generates user-tailored and time-sensitive music playlists and proposes a single playlist to play when the user accesses to a music platform. The system understands the user’s listening habits by analyzing the low-level features of songs recently played by the user and by using two different clustering algorithms. A novel designed method uses these data to produce a playlist that expands the user’s musical knowledge keeping in mind that a good playlist must contain a mix of new and known music and artists. An implementation based on the Spotify API proved the effectiveness of the approach and showed that the proposal might provide benefits to both users (no time wasted to select what to play) and to music platforms (playing of music that otherwise would remain unknown to users).
{"title":"Automated Generation of User-Tailored and Time-Sensitive Music Playlists","authors":"M. Furini, Jessica Martini, M. Montangero","doi":"10.1109/CCNC.2019.8651820","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651820","url":null,"abstract":"Streaming music platforms have changed the way people listen to music. Today, we can access to millions of songs with a simple internet-connected device. The drawback is that the selection of what to listen is a long, tedious, ant time-consuming process. This is why, nowadays, we choose playlists instead of songs. Unfortunately, since there are thousands of playlists, the selection process can once again be long, tedious, and time-consuming. In this paper, we design a system to facilitate the listening and discovering of new music. The system automatically generates user-tailored and time-sensitive music playlists and proposes a single playlist to play when the user accesses to a music platform. The system understands the user’s listening habits by analyzing the low-level features of songs recently played by the user and by using two different clustering algorithms. A novel designed method uses these data to produce a playlist that expands the user’s musical knowledge keeping in mind that a good playlist must contain a mix of new and known music and artists. An implementation based on the Spotify API proved the effectiveness of the approach and showed that the proposal might provide benefits to both users (no time wasted to select what to play) and to music platforms (playing of music that otherwise would remain unknown to users).","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125988437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-01DOI: 10.1109/CCNC.2019.8651808
D. Kurita, Daisuke Kitayama, K. Tateishi, A. Harada, Y. Kishiyama, Shoji Itoh, H. Murai, Jong-Kae Fwu, Xiangyang Zhuang, K. Stewart, A. Simonsson, Peter Ökvist
This paper presents outdoor field experimental results in the 28-GHz frequency band of a 5G radio access system where base stations (BSs) are installed on buildings to deploy a 5G trial area in the Tokyo Odaiba waterfront area. This is an early field trial assessment of key 5G features such as BS and mobile station (MS) beam tracking, being deployed in dense urban areas. In the trial area, a variety of key 5G technologies and conditions are evaluated such as BS and MS massive multiple-input multiple-output (MIMO) antennas, beamforming and tracking, use of the high 28-GHz frequency, the wide frequency bandwidth of 400 MHz, intra-baseband unit (BBU) hand over (HO), and a coverage area in a realistic urban deployment with four different trial courses. Experimental results show that throughput exceeding 1 Gbps is achieved in the experiment area, and approximately 200 Mbps is achieved at 500 m away from the BS. We confirm that beam tracking and intra-BBU HO operate effectively while compensating for high path loss in the 28-GHz band to achieve a coverage area of 500 m. On the other hand, line of sight (LoS) and Non-LoS conditions are critical to 5G performance in the 28-GHz band, and we find that 5G connections may drop behind trees, buildings, and/or under a footbridge. The trial results show that the downlink throughput exceeds 50 Mbps in 85%, 50%, 70%, and 33% of the four different trial courses, respectively.
{"title":"Outdoor Experiments on 5G Radio Access Using BS and UE Beamforming in 28-GHz Frequency Band","authors":"D. Kurita, Daisuke Kitayama, K. Tateishi, A. Harada, Y. Kishiyama, Shoji Itoh, H. Murai, Jong-Kae Fwu, Xiangyang Zhuang, K. Stewart, A. Simonsson, Peter Ökvist","doi":"10.1109/CCNC.2019.8651808","DOIUrl":"https://doi.org/10.1109/CCNC.2019.8651808","url":null,"abstract":"This paper presents outdoor field experimental results in the 28-GHz frequency band of a 5G radio access system where base stations (BSs) are installed on buildings to deploy a 5G trial area in the Tokyo Odaiba waterfront area. This is an early field trial assessment of key 5G features such as BS and mobile station (MS) beam tracking, being deployed in dense urban areas. In the trial area, a variety of key 5G technologies and conditions are evaluated such as BS and MS massive multiple-input multiple-output (MIMO) antennas, beamforming and tracking, use of the high 28-GHz frequency, the wide frequency bandwidth of 400 MHz, intra-baseband unit (BBU) hand over (HO), and a coverage area in a realistic urban deployment with four different trial courses. Experimental results show that throughput exceeding 1 Gbps is achieved in the experiment area, and approximately 200 Mbps is achieved at 500 m away from the BS. We confirm that beam tracking and intra-BBU HO operate effectively while compensating for high path loss in the 28-GHz band to achieve a coverage area of 500 m. On the other hand, line of sight (LoS) and Non-LoS conditions are critical to 5G performance in the 28-GHz band, and we find that 5G connections may drop behind trees, buildings, and/or under a footbridge. The trial results show that the downlink throughput exceeds 50 Mbps in 85%, 50%, 70%, and 33% of the four different trial courses, respectively.","PeriodicalId":285899,"journal":{"name":"2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126470193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}