ترغب بنشر مسار تعليمي؟ اضغط هنا

A Survey of Mobile WiMAX IEEE 802.16m Standard

94   0   0.0 ( 0 )
 نشر من قبل Rdv Ijcsis
 تاريخ النشر 2010
  مجال البحث الهندسة المعلوماتية
والبحث باللغة English




اسأل ChatGPT حول البحث

IEEE 802.16m amends the IEEE 802.16 Wireless MAN-OFDMA specification to provide an advanced air interface for operation in licenced bands. It will meet the cellular layer requirements of IMT-Advanced next generation mobile networks. It will be designed to provide significantly improved performance compared to other high rate broadband cellular network systems. For the next generation mobile networks, it is important to consider increasing peak, sustained data reates, corresponding spectral efficiencies, system capacity and cell coverage as well as decreasing latency and providing QoS while carefully considering overall system complexity. In this paper we provide an overview of the state-of-the-art mobile WiMAX technology and its development. We focus our discussion on Physical Layer, MAC Layer, Schedular,QoS provisioning and mobile WiMAX specification.

قيم البحث

اقرأ أيضاً

In the last few years there has been significant growth in the area of wireless communication. IEEE 802.16/WiMAX is the network which is designed for providing high speed wide area broadband wireless access; WiMAX is an emerging wireless technology f or creating multi-hop Mesh network. Future generation networks will be characterized by variable and high data rates, Quality of Services (QoS), seamless mobility both within a network and between networks of different technologies and service providers. A technology is developed to accomplish these necessities is regular by IEEE, is 802.16, also called as WiMAX (Worldwide Interoperability for Microwave Access). This architecture aims to apply Long range connectivity, High data rates, High security, Low power utilization and Excellent Quality of Services and squat deployment costs to a wireless access technology on a metropolitan level. In this paper we have observed the performance analysis of location based resource allocation for WiMAX and WLAN-WiMAX client and in second phase we observed the rate-adaptive algorithms. We know that base station (BS) is observed the ranging first for all subscribers then established the link between them and in final phase they will allocate the resource with Subcarriers allocation according to the demand (UL) i.e. video, voice and data application. We propose linear approach, Active-Set optimization and Genetic Algorithm for Resource Allocation in downlink Mobile WiMAX networks. Purpose of proposed algorithms is to optimize total throughput. Simulation results show that Genetic Algorithm and Active-Set algorithm performs better than previous methods in terms of higher capacities but GA have high complexity then active set.
76 - Qiao Qu , Bo Li , Mao Yang 2018
With the ever-increasing demand for wireless traffic and quality of serives (QoS), wireless local area networks (WLANs) have developed into one of the most dominant wireless networks that fully influence human life. As the most widely used WLANs stan dard, Institute of Electrical and Electronics Engineers (IEEE) 802.11 will release the upcoming next generation WLANs standard amendment: IEEE 802.11ax. This article comprehensively surveys and analyzes the application scenarios, technical requirements, standardization process, key technologies, and performance evaluations of IEEE 802.11ax. Starting from the technical objectives and requirements of IEEE 802.11ax, this article pays special attention to high-dense deployment scenarios. After that, the key technologies of IEEE 802.11ax, including the physical layer (PHY) enhancements, multi-user (MU) medium access control (MU-MAC), spatial reuse (SR), and power efficiency are discussed in detail, covering both standardization technologies as well as the latest academic studies. Furthermore, performance requirements of IEEE 802.11ax are evaluated via a newly proposed systems and link-level integrated simulation platform (SLISP). Simulations results confirm that IEEE 802.11ax significantly improves the user experience in high-density deployment, while successfully achieves the average per user throughput requirement in project authorization request (PAR) by four times compared to the legacy IEEE 802.11. Finally, potential advancement beyond IEEE 802.11ax are discussed to complete this holistic study on the latest IEEE 802.11ax. To the best of our knowledge, this article is the first study to directly investigate and analyze the latest stable version of IEEE 802.11ax, and the first work to thoroughly and deeply evaluate the compliance of the performance requirements of IEEE 802.11ax.
The term Tactile Internet broadly refers to a communication network which is capable of delivering control, touch, and sensing/actuation information in real-time. The Tactile Internet is currently a topic of interest for various standardization bodie s. The emerging IEEE P1918.1 standards working group is focusing on defining a framework for the Tactile Internet. The main objective of this article is to present a reference architecture for the Tactile Internet based on the latest developments within the IEEE P1918.1 standard. The article provides an in-depth treatment of various architectural aspects including the key entities, the interfaces, the functional capabilities and the protocol stack. A case study has been presented as a manifestation of the architecture. Performance evaluation demonstrates the impact of functional capabilities and the underlying enablers on user-level utility pertaining to a generic Tactile Internet application.
The rapid involution of the mobile generation with incipient data networking capabilities and utilization has exponentially increased the data traffic volumes. Such traffic drains various key issues in 5G mobile backhaul networks. Security of mobile backhaul is of utmost importance; however, there are a limited number of articles, which have explored such a requirement. This paper discusses the potential design issues and key challenges of the secure 5G mobile backhaul architecture. The comparisons of the existing state-of-the-art solutions for secure mobile backhaul, together with their major contributions have been explored. Furthermore, the paper discussed various key issues related to Quality of Service (QoS), routing and scheduling, resource management, capacity enhancement, latency, security-management, and handovers using mechanisms like Software Defined Networking and millimeter Wave technologies. Moreover, the trails of research challenges and future directions are additionally presented.
In recent years, mobile devices are equipped with increasingly advanced sensing and computing capabilities. Coupled with advancements in Deep Learning (DL), this opens up countless possibilities for meaningful applications. Traditional cloudbased Mac hine Learning (ML) approaches require the data to be centralized in a cloud server or data center. However, this results in critical issues related to unacceptable latency and communication inefficiency. To this end, Mobile Edge Computing (MEC) has been proposed to bring intelligence closer to the edge, where data is produced. However, conventional enabling technologies for ML at mobile edge networks still require personal data to be shared with external parties, e.g., edge servers. Recently, in light of increasingly stringent data privacy legislations and growing privacy concerns, the concept of Federated Learning (FL) has been introduced. In FL, end devices use their local data to train an ML model required by the server. The end devices then send the model updates rather than raw data to the server for aggregation. FL can serve as an enabling technology in mobile edge networks since it enables the collaborative training of an ML model and also enables DL for mobile edge network optimization. However, in a large-scale and complex mobile edge network, heterogeneous devices with varying constraints are involved. This raises challenges of communication costs, resource allocation, and privacy and security in the implementation of FL at scale. In this survey, we begin with an introduction to the background and fundamentals of FL. Then, we highlight the aforementioned challenges of FL implementation and review existing solutions. Furthermore, we present the applications of FL for mobile edge network optimization. Finally, we discuss the important challenges and future research directions in FL
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا