Do you want to publish a course? Click here

UNBLOCK: Low Complexity Transient Blockage Recovery for Mobile mm-Wave Devices

80   0   0.0 ( 0 )
 Added by Santosh Ganji
 Publication date 2021
and research's language is English




Ask ChatGPT about the research

Directional radio beams are used in the mm-Wave band to combat the high path loss. The mm-Wave band also suffers from high penetration losses from drywall, wood, glass, concrete, etc., and also the human body. Hence, as a mobile user moves, the Line of Sight (LoS) path between the mobile and the Base Station (BS) can be blocked by objects interposed in the path, causing loss of the link. A mobile with a lost link will need to be re-acquired as a new user by initial access, a process that can take up to a second, causing disruptions to applications. UNBLOCK is a protocol that allows a mobile to recover from transient blockages, such as those caused by a human hand or another human walking into the line of path or other temporary occlusions by objects, which typically disappear within the order of $100$ ms, without having to go through re-acquisition. UNBLOCK is based on extensive experimentation in office type environments which has shown that while a LoS path is blocked, there typically exists a Non-LoS path, i.e., a reflected path through scatterers, with a loss within about $10$ dB of the LoS path. UNBLOCK proactively keeps such a NLoS path in reserve, to be used when blockage happens, typically without any warning. UNBLOCK uses this NLoS path to maintain time-synchronization with the BS until the blockage disappears, as well as to search for a better NLoS path if available. When the transient blockage disappears, it reestablishes LoS communication at the epochs that have been scheduled by the BS for communication with the mobile.



rate research

Read More

Future networks of unmanned aerial vehicles (UAVs) will be tasked to carry out ever-increasing complex operations that are time-critical and that require accurate localization performance (e.g., tracking the state of a malicious user). Since there is the need to preserve low UAV complexity while tackling the challenging goals of missions in effective ways, one key aspect is the UAV intelligence (UAV-I). The UAVs intelligence includes the UAVs capability to process information and to make decisions, e.g., to decide where to sense and whether to delegate some tasks to other network entities. In this paper, we provide an overview of possible solutions for the design of UAVs of low complexity, showing some of the needs of the UAVs for running efficient localization operations, performed either as a team or individually. Further, we focus on different network configurations, which possibly include assistance with edge computing. We also discuss open problems and future perspectives for these settings.
160 - Mushu Li , Nan Cheng , Jie Gao 2020
In this paper, we study unmanned aerial vehicle (UAV) assisted mobile edge computing (MEC) with the objective to optimize computation offloading with minimum UAV energy consumption. In the considered scenario, a UAV plays the role of an aerial cloudlet to collect and process the computation tasks offloaded by ground users. Given the service requirements of users, we aim to maximize UAV energy efficiency by jointly optimizing the UAV trajectory, the user transmit power, and computation load allocation. The resulting optimization problem corresponds to nonconvex fractional programming, and the Dinkelbach algorithm and the successive convex approximation (SCA) technique are adopted to solve it. Furthermore, we decompose the problem into multiple subproblems for distributed and parallel problem solving. To cope with the case when the knowledge of user mobility is limited, we adopt a spatial distribution estimation technique to predict the location of ground users so that the proposed approach can still be applied. Simulation results demonstrate the effectiveness of the proposed approach for maximizing the energy efficiency of UAV.
This paper describes a new architecture for transient mobile networks destined to merge existing and future network architectures, communication implementations and protocol operations by introducing a new paradigm to data delivery and identification. The main goal of our research is to enable seamless end-to-end communication between mobile and stationary devices across multiple networks and through multiple communication environments. The architecture establishes a set of infrastructure components and protocols that set the ground for a Persistent Identification Network (PIN). The basis for the operation of PIN is an identification space consisting of unique location independent identifiers similar to the ones implemented in the Handle system. Persistent Identifiers are used to identify and locate Digital Entities which can include devices, services, users and even traffic. The architecture establishes a primary connection independent logical structure that can operate over conventional networks or more advanced peer-to-peer aggregation networks. Communication is based on routing pools and novel protocols for routing data across several abstraction levels of the network, regardless of the end-points current association and state...
A significant portion of the 5th generation of wireless networks will operate in the mm-wave bands. One of the several challenges associated with mm-wave propagation is to overcome shadowing due to signal blockage caused by environmental objects. Particularly susceptible are nodes in a device-to-device network that typically operate at low power and in a blockage prone environment such as crowded open areas. In this work, we provide an insight into the effect of blockages on the signal quality for an open area device-to-device scenario. We propose a blockage model based on the homogeneous Poisson Point Process. The model provides the average signal attenuation as a soft metric that quantifies the extent of blockage. This not only indicates whether the signal is blocked but also measures how much the signal is attenuated due to one or more blockers. The analytical results are confirmed with the help of Monte Carlo simulations for real-world blocker placement in the environment.
The use of extremely high frequency (EHF) or millimeter-wave (mmWave) band has attracted significant attention for the next generation wireless access networks. As demonstrated by recent measurements, mmWave frequencies render themselves quite sensitive to blocking caused by obstacles like foliage, humans, vehicles, etc. However, there is a dearth of analytical models for characterizing such blocking and the consequent effect on the signal reliability. In this paper, we propose a novel, general, and tractable model for characterizing the blocking caused by humans (assuming them to be randomly located in the environment) to mmWave propagation as a function of system parameters like transmitter-receiver locations and dimensions, as well as density and dimensions of humans. Moreover, the proposed model is validated using a ray-launcher tool. Utilizing the proposed model, the blockage probability is shown to increase with human density and separation between the transmitter-receiver pair. Furthermore, the developed analysis is shown to demonstrate the existence of a transmitter antenna height that maximizes the received signal strength, which in turn is a function of the transmitter-receiver distance and their dimensions.
comments
Fetching comments Fetching comments
Sign in to be able to follow your search criteria
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا