127,99 €
The third edition of this popular reference covers enabling technologies for building up 5G wireless networks. Due to extensive research and complexity of the incoming solutions for the next generation of wireless networks it is anticipated that the industry will select a subset of these results and leave some advanced technologies to be implemented later,. This new edition presents a carefully chosen combination of the candidate network architectures and the required tools for their analysis. Due to the complexity of the technology, the discussion on 5G will be extensive and it will be difficult to reach consensus on the new global standard. The discussion will have to include the vendors, operators, regulators as well as the research and academic community in the field. Having a comprehensive book will help many participants to join actively the discussion and make meaningful contribution to shaping the new standard.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 1632
Veröffentlichungsjahr: 2016
Cover
Title Page
Preface
1 Introduction
1.1 Network Model
1.2 Network Connectivity
1.3 Wireless Network Design with Small World Properties
1.4 Frequency Channels Backup
1.5 Generalized Network Model
1.6 Routing Protocols Over
s
-Lattice Network
1.7 Network Performance
1.8 Node, Route, Topology, and Network Robustness
1.9 Power Consumption
1.10 Protocol Complexity
1.11 Performance Evaluation
1.12 Book Layout
Appendix A.1
References
2 Adaptive Network Layer
2.1 Graphs and Routing Protocols
2.2 Graph Theory
2.3 Routing with Topology Aggregation
References
3 Mobility Management
3.1 Cellular Networks
3.2 Cellular Systems with Prioritized Handoff
3.3 Cell Residing Time Distribution
3.4 Mobility Prediction in Pico- and Micro-Cellular Networks
Appendix A.3 Distance Calculation in an Intermediate Cell
References
4 Ad Hoc Networks
4.1 Routing Protocols
4.2 Hybrid Routing Protocol
4.3 Scalable Routing Strategies
4.4 Multipath Routing
4.5 Clustering Protocols
4.6 Cashing Schemes for Routing
4.7 Distributed QoS Routing
References
5 Sensor Networks
5.1 Introduction
5.2 Sensor Network Parameters
5.3 Sensor Network Architecture
5.4 Mobile Sensor Network Deployment
5.5 Directed Diffusion
5.6 Aggregation in Wireless Sensor Networks
5.7 Boundary Estimation
5.8 Optimal Transmission Radius in Sensor Networks
5.9 Data Funneling
5.10 Equivalent Transport Control Protocol in Sensor Networks
References
6 Security
6.1 Authentication
6.2 Security Architecture
6.3 Key Management
6.4 Security in Ad Hoc Networks
6.5 Security in Sensor Networks
References
7 Network Economics
7.1 Fundamentals of Network Economics
7.2 Wireless Network Microeconomics: Data Sponsoring
7.3 Spectrum Pricing for Market Equilibrium
7.4 Sequential Spectrum Sharing
7.5 Data Plan Trading
References
8 Multi-Hop Cellular Networks
8.1 Modeling Multi-Hop Multi-Operator Multi-Technology Wireless Networks
8.2 Technology Background
8.3 System Model and Notation
8.4 m
3
Route Discovery Protocols
8.5 Performance of m
3
Route Discovery Protocols
8.6 Protocol Complexity
8.7 Traffic Offloading Incentives
8.8 Performance Illustrations
References
9 Cognitive Networks
9.1 Technology Background
9.2 Spectrum Auctions for Multi-hop Cognitive Networks
9.3 Compound Auctioning in Multi-hop Cognitive Cellular Networks
References
10 Stochastic Geometry
10.1 Background Theory
References
11 Heterogeneous Networks
11.1 Preliminaries
11.2 Self-Organized Small Cell Networks
11.3 Dynamic Network Architecture
11.4 Economics of Heterogeneous Networks
References
12 Access Point Selection
12.1 Background Technology
12.2 Network Selection Game
12.3 Joint Access Point Selection and Power Allocation
12.4 Joint AP Selection and Beamforming Optimization
References
13 Self-Organizing Networks
13.1 Self-Organizing Network Optimization
13.2 System Model
13.3 Joint Optimization of Tilts and AP Association
References
14 Complex Networks
14.1 Evolution Towards Large-Scale Networks
14.2 Network Characteristics
14.3 Random Graphs
References
15 Massive MIMO
15.1 Linearly Precoded Multicellular Downlink System
15.2 System Model
15.3 Optimization for Perfect Channel State Information
15.4 Robust Designs for WSRM Problem
Appendix A.15
Appendix B.15
References
16 Network Optimization Theory
16.1 Introduction
16.2 Layering as Optimization Decomposition
16.3 Cross-Layer Optimization
16.4 Optimization Problem Decomposition Methods
References
17 Network Information Theory
17.1 Capacity of Ad Hoc Networks
17.2 Information Theory and Network Architectures
17.3 Cooperative Transmission in Wireless Multihop
Ad Hoc
Networks
References
18 Stability of Advanced Network Architectures
18.1 Stability of Cooperative Cognitive Wireless Networks
18.2 System Model
18.3 System Optimization
18.4 Optimal Control Policy
18.5 Achievable Rates
18.6 Stabilizing Transmission Policies
References
19 Multi-Operator Spectrum Sharing
19.1 Business Models for Spectrum Sharing
19.2 Spectrum Sharing in Multi-hop Networks
References
20 Large Scale Networks and Mean Field Theory
20.1 MFT for Large Heterogeneous Cellular Networks
20.2 Large Scale Network Model Compression
20.3 Mean Field Theory Model of Large Scale DTN Networks
20.4 Mean Field Modeling of Adaptive Infection Recovery in Multicast DTN Networks
20.5 Mean Field Theory for Scale-Free Random Networks
20.6 Spectrum Sharing and MFT
20.7 Modeling Dynamics of Complex System
Appendix A.20 Iterative Algorithm to Solve Systems of Nonlinear ODEs (DiNSE-Algorithm)
Appendix B.20 Infection Rate of Destinations for DNCM
Appendix C.20 Infection Rate for Basic Epidemic Routing
References
21 mmWave Networks
21.1 mmWave Technology in Subcellular Architecture
21.2 Microeconomics of Dynamic mmWave Networks
References
22 Cloud Computing in Wireless Networks
22.1 Technology Background
22.2 System Model
22.3 System Optimization
22.4 Dynamic Control Algorithm
22.5 Achievable Rates
22.6 Stabilizing Control Policies
References
23 Wireless Networks and Matching Theory
23.1 Background Technology: Matching Markets
23.2 Distributed Stable Matching in Multiple Operator Cellular Network with Traffic Offloading
23.3 College Admissions Game Model for Cellular Networks with Traffic Offloading
23.4 Many to Many Matching Games for Caching in Wireless Networks
23.5 Many to One Matching with Externalities in Cellular Networks with Traffic Offloading
23.6 Security in Matching of Device to Device Pairs in Cellular Networks
References
24 Dynamic Wireless Network Infrastructure
24.1 Infrastructure Sharing in Multi-Operator Cellular Networks
24.2 User Provided Connectivity
24.3 Network Virtualization
24.4 Software Defined Networks
24.5 SDN Security
References
Index
End User License Agreement
Chapter 03
Table 3.3.1 Goodness of fit (
G
) of the approximation given by (3.2.8) for the cumulative distribution function of the channel holding time in a cell
Chapter 04
Table 4.2.1 Simulation parameters
Table 4.3.1 Node density
Table 4.7.1 The data structure carried by a probe
p
Chapter 05
Table 5.2.1 Frequency bands available for ISM applications
Table 5.3.1 Categorization of MAC protocols
Chapter 06
Table 6.2.1 Special
Z
symbols
Table 6.3.1 Generic point to point key distribution
Table 6.3.2 Point to point key distribution
Table 6.3.3 Point to point key distribution
Chapter 08
Table 8.8.1 Description of the scenarios
Table 8.8.2 Offloading scenarios as shown in Figure 8.8.5
Chapter 11
Table 11.3.1 Simulation parameters
Table 11.3.2 GA parameters
Table 11.3.3 Topology reconfiguration scenarios
Chapter 17
Table 17.3.1 Simulation parameters
Chapter 21
Table 21.1.1 Probability mass function of
D
ℓ
and
[1]
Chapter 01
Figure 1.1.1 Macro cell tessellation
Figure 1.2.1 Connectivity alternatives (the direction of the adjacent users is chosen in increasing order of distance from the BS)
Figure 1.3.1
s-Lattice
parameters
Figure 1.3.2
s-Lattice
connection model for: (a) user 2 and (b) user 3
Figure 1.3.3
2ws-Lattice
Figure 1.5.1 Connectivity alternatives for the generalized model (the direction of the adjacent users is chosen randomly)
Figure 1.10.1 Transitions of the route discovery protocol from a given subcell
i
to its neighboring cells
jk
Figure 1.11.1
l
given by (1.7.8) versus N for
p
= 0.5 and different 2 layer (2L) protocols
Figure 1.11.2 Average
τ
versus
N
for different
p
wlan
Figure 1.11.3 Clustering coefficient versus
p
and
N
= 200
Figure 1.11.4 Average node robustness versus
p
for one layer and two layer protocols (
H
= 4)
Figure 1.11.5 Route robustness
B
versus the subcell index for
p
= 0.5
Figure 1.11.6 Network robustness
ξ
l
versus the number of frequency channels
k
f
where
ξ
is given by (1.3.1).
c
= 50,
n
p
= 20,
b
p
= 10,
n
s
= 25,
b
s
variable,
p
= 0.5 and 0.9,
l
= 5.72,
p
= 0.5, 2LR protocol
Figure 1.11.7 Power consumption versus
N
Figure 1.11.8 Complexity Δ versus the subcell index for
p
= 0.5
Figure 1.11.9 Utility versus
s
for different values of
p
return
and
k
f
= 7
Figure 1.11.10 Utility defined by (1.4.5a) versus
s
for
p
return
= 0.7 and
n
s
= 10
Chapter 02
Figure 2.1.1 Directed graph
Figure 2.1.2 Undirected graph
Figure 2.1.3 Weighted graphs
Figure 2.1.4 Illustration of a walk
Figure 2.1.5 Complete graphs: (a) V nodes and V(V – 1) edges: three nodes and 3 × 2 edges. (b) V nodes and V(V – 1)/2 edges: four nodes and 4 × 3/2 edges
Figure 2.1.6 Connected graphs
Figure 2.1.7 Bipartite graph
Figure 2.1.8 Tree
Figure 2.1.9 Spanning trees
Figure 2.1.10 Minimum spanning tree
Figure 2.1.11 MST solution via Prim’s algorithm
Figure 2.1.12 MST solution via Kruskal’s algorithm
Figure 2.1.13 Example of the distributed algorithm
Figure 2.1.14 Examples of minimum spanning tree and shortest path spanning tree
Figure 2.1.15 Example of Dijkstra algorithm
Figure 2.1.16 A MST for the basic graph in Figure 2.1.15
Figure 2.1.17 (a) An illustration for Bellman–Ford algorithm (b) An example of Floyd–Warshall algorithm
Figure 2.1.18 Distributed Bellman–Ford algorithm example
Figure 2.1.19 Simple rerouting case
Figure 2.1.20 Routing loop case
Figure 2.1.21 Count to infinity problem
Figure 2.1.22 Split Horizon algorithm
Figure 2.1.23 Example where Split Horizon fails
Figure 2.3.1 Network example
Figure 2.3.2 Aggregated network from Figure 2.3.1 with a complete view of domain A
Figure 2.3.3 Topology aggregation. (a) Domain F. (b) Mesh of the borders. (c) Star representation. (d) Star representation with bypasses
Chapter 03
Figure 3.1.1 Components of location management process
Figure 3.1.2 Components of handoff management
Figure 3.1.3 Location management SS7 signaling network
Figure 3.1.4 Location registration procedures
Figure 3.1.5 Call delivery procedures
Figure 3.1.6 Pointer forwarding strategy
Figure 3.1.7 Local anchoring scheme
Figure 3.1.8 Time-based location update scheme
Figure 3.1.9 Movement-based location update scheme
Figure 3.1.10 Distance-based location update scheme
Figure 3.1.11 Mobile IP architecture
Figure 3.1.12 Mobile IP location management
Figure 3.1.13 Mobile IP location registration
Figure 3.1.14 Mobile IP location management operations
Figure 3.1.15 Mobile IP smooth handoff with fresh binding at previous FA
Figure 3.1.16 Mobile IP smooth handoff without fresh binding at previous FA
Figure 3.1.17 ATM location management techniques
Figure 3.1.18 Two-tier database scheme
Figure 3.1.19 LR Hierarchy: WATM LRs scheme
Figure 3.1.20 WATM handoff management techniques
Figure 3.2.1 State-transition diagram for Channel Reservation – CR handoffs
Figure 3.2.2 Call flow diagram for channel reservation with queueing – CRQ handoffs
Figure 3.2.3 State-transition diagram for CRQ Priority Scheme
Figure 3.2.4 Blocking and forced termination probabilities for CRQ Priority Scheme
Figure 3.2.5 Blocking and forced termination probabilities for CRQ systems with 20 channels/cell,
R
= 2 mi
Figure 3.2.6 Blocking and forced terminations for priority CR and CRQ schemes (20 channels/cell, one handoff channel/cell,
R
= 2 mi)
Figure 3.3.1 Illustration of distance from point A in cell (where call is originated), to point C on cell boundary (where mobile exits from cell)
Figure 3.3.2 Illustration of distance from cell entering point (A on cell boundary), to to cell exiting point (C on cell boundary)
Figure 3.3.3 Mean channel holding time (s) in cell versus R (average call duration = 120 s)
Figure 3.4.1 Parameters used to calculate the directional probability
Figure 3.4.2 Definition of the MLC
Figure 3.4.3 Distance Y in originating cell
k
Figure 3.4.4 Distance Y in an intermediate cell
k
Figure 3.4.5 Blocking ratio in three systems
Figure 3.4.6 Utilization in three systems
Chapter 04
Figure 4.1.1 Illustration of dynamic topology
Figure 4.1.2 Proactive/timer: route updates routes -----, data
Figure 4.1.3 Reactive/on demand: route REQ , route REP , data flow
Figure 4.1.4 (a) Proactive/timer protocol operation when the topology is changed. (b) Reactive/on demand protocol operation when the topology is changed
Figure 4.1.5 Classification of ad hoc routing protocols. ABR, associativity based routing; AODV, ad hoc on-demand distance vector; CGSR, cluster head gateway switch routing; DSDV, destination-sequenced distance-vector; DSR, dynamic source routing; LMR, lightweight mobile routing; SSR, signal stability-routing; TORA, temporally ordered routing algorithm; WRP, wireless routing protocol
Figure 4.1.6 Illustration of route updating process
Figure 4.1.7 Illustration of route updating process after A moves
Figure 4.1.8 DSR – route discovery
Figure 4.1.9 DSR – route discovery decision process at source A
Figure 4.1.10 DSR – route discovery decision process at an intermediate node
Figure 4.1.11 DSR – optimizations
Figure 4.1.12 Learning about the routs by “listening.”
Figure 4.1.13 AODV – path finding
Figure 4.1.14 Temporally order routing algorithm (TORA)
Figure 4.1.15 TORA – route creation
Figure 4.1.16 TORA – route creation (visualization)
Figure 4.1.17 TORA – maintaining routes link failure with no reaction
Figure 4.1.18 TORA – re-establishing routes after link failure of last downstream link
Figure 4.2.1 A routing zone of radius
r
= 2 hops
Figure 4.2.2 Illustration of IERP operation
Figure 4.2.3 Guiding the search in desirable directions
Figure 4.2.4 Loop-back termination
Figure 4.2.5 Early termination
Figure 4.2.6 Query detection (QD1/QD2)
Figure 4.2.7 Selective broadcasting
Figure 4.2.8 The position of the routing functions in the protocol stack
Figure 4.2.9 IARP traffic generated per neighbor
Figure 4.2.10 ZRP traffic per node (
N
= 1000 nodes,
v
= 0 : 5 neighbors/s)
Figure 4.3.1 The network hierarchical structure
Figure 4.3.2 Three layers network hierarchical structure
Figure 4.3.3 Physical multilevel clustering
Figure 4.3.4 System performance versus the routing information refresh rate with
v
= 90 km/h
Figure 4.3.5 Optimum routing information refresh rate versus mobility
Figure 4.3.6 Illustration of a fisheye
Figure 4.3.7 Message reduction using fisheye
Figure 4.3.8 Control O/H versus number of nodes
Figure 4.5.1 Distributed clustering algorithm (cluster ID – cid) [65]
Figure 4.5.2 System topology
Figure 4.5.3 Clustering
Figure 4.5.4 Ad hoc mobility model node movement: (a) epoch random mobility vectors (b) and hoc mobility model node movement
Figure 4.5.5 Simulation results: (a) cluster size (
R
= 1000 m), (b) cluster size (
R
= 500 m), (c) cluster survival (
R
= 1000 m), (d) cluster survival (
R
= 500 m)
Figure 4.5.6 Logical relationships among MANET network layer entities
Figure 4.6.1 An example of values of data structures used in C-ZRP,
k
= 2
Figure 4.6.2 An example of interzone path creation and deletion. (a) Node
B
2
injects the external routes to nodes
S,B1,B3,B4,D
into its zone. (b) Node
Y
creates a set of entries into its own EZT. (c)
Y
now has two routes to node.
B1
Figure 4.6.3 An example of (a) injection and (b) deletion of external nodes
Figure 4.7.1 Generation of probes
p
(number of tokens)
Figure 4.7.2 Two token curves. Curve (a) is chosen for simplicity and efficient computation. Curve (b) determines the number of optimization tokens
O
, based on the delay requirement
D
Figure 4.7.3 Two token curves as functions of
B
Figure 4.7.4 Success ratio. Imprecision rate: (a) 5% and (b) 50%
Figure 4.7.5 Messages overhead (imprecision rate: 10%)
Figure 4.7.6 Cost per established path (imprecision rate: 5%)
Figure 4.7.7 Cost per established path (imprecision rate: 50%)
Chapter 05
Figure 5.1.1 Battlefield surveillance
Figure 5.2.1 Sensor network topology
Figure 5.3.1 The sensor networks protocol stack
Figure 5.3.2 Classification of MAC schemes
Figure 5.3.3 Multi-hop routing due to limited transmission range
Figure 5.3.4 Broadcasting an interest (are there any soldiers in the area?) and advertising (there are soldiers in the area)
Figure 5.3.5 Data aggregation
Figure 5.3.6 Data funneling: (a) Setup phase (b) Data communication phase
Figure 5.3.7 Event to sink reliable transport (ESRT)
Figure 5.5.1 Diffusion: (a) gradient establishment, (b) reinforcement, (c) multiple sources, (d) multiple sinks, (e) repair
Figure 5.6.1 An admissible flow network
G
with lifetime 50 rounds and two aggregation trees
A
1
and
A
2
with lifetimes 30 and 20 rounds respectively. The depth of the schedule with aggregation trees
A
1
and
A
2
is 2
Figure 5.7.1 Sensing an inhomogeneous field. (a) Points are sensor locations. The environment has two conditions indicated by the gray and white regions of the square. (b) The sensor network domain is partitioned into square cells. (c) Sensors within the network operate collaboratively to determine a pruned partition that matches the boundary. (d) Final approximation to the boundary between the two regions which is transmitted to a remote point
Figure 5.7.2 Effect of sensor network density (resolution) on boundary estimation. Column 1 – noisy set of measurements, column 2 – estimated boundary, and column 3 – associated partition [118]
Figure 5.8.1 Different regions to calculate the number of neighbors versus the transmission radius of the node
Figure 5.8.2 The overlapping area between the transmission radius coverage and the effective area of the network
Figure 5.8.3 Analytical curve for the settling time, which is the sum of the reception and contention times
Chapter 06
Figure 6.1.1 Authentication protocols: (a) one-way authentication of A, (b) one-way authentication of B, (c) two-way authentication, (d) two-way authentication with three messages
Figure 6.1.2 An oracle session attack
Figure 6.1.3 Improved two-way protocol
Figure 6.1.4 A parallel session attack
Figure 6.1.5 An asymmetric two-way authentication
Figure 6.1.6 An offset attack (through a parallel session)
Figure 6.1.7 P1: Resistance to replay attacks through use of nonces. P2: Use of symmetric cryptography. P3: Resistance to parallel session attacks. P4: Resistance to selected text and offset attacks. P5: Minimal number of encryptions
Figure 6.1.8 (a) Operation of public key encryption system. (b) Numerical example of operation of public key encryption system
Figure 6.4.1 The configuration of a key management service
Figure 6.4.2 Threshold signature with three servers
Figure 6.4.3 The creation of nodes’ updated and non-updated repositories (where
). See the text box for an explanation of steps 1–3
Figure 6.4.4 A certificate graph and paths of certificates between users
u
and
v
in their merged updated local repositories
Figure 6.5.1 A laptop-class adversary using a wormhole to create a sinkhole in TinyOS beaconing
Chapter 07
Figure 7.1.1 Selfish users choose
x
′, the socially optimal choice is
x
*
Figure 7.1.2 The best response functions intersect at the unique pure-strategy Nash equilibrium (0,
B
/
b
)
Figure 7.1.3 The social welfare under the Nash equilibrium and its maximum value
Figure 7.1.4 Model to study the impact of network neutrality
Figure 7.1.5 Ratios of investments, revenues, and user demand (neutral/non-neutral) as a function of
a
for
v
= 0.5 and
w
= 0.3
Figure 7.3.1 Total profit and solutions of market equilibrium, competitive, and cooperative pricing models.
Chapter 08
Figure 8.3.1 Multi-hop, multi-operator, and multi-technology (m
3
) wireless network
Figure 8.4.1 Relaying alternatives for MDR
Figure 8.4.2 Routing/scheduling for m
3
network by using clustering factor
K
= 7
Figure 8.4.3 Modeling limited interference routing/scheduling (LIR)
Figure 8.4.4 Relaying transmission probabilities for initial state
ss
(1)
Figure 8.4.5 Relaying transmission probabilities for initial state
ss
(2)
Figure 8.5.1 m
3
scenario
Figure 8.6.1 Transitions of the route discovery protocol from a given subcell
i
to its neighboring cells
j
k
for MDR
Figure 8.6.2 Transitions of the route discovery protocol from a given subcell
i
to its neighboring cells
j
k
for LIR
Figure 8.8.1 Δ
i
versus the subcell index
i
for MDR and the scenario shown in Figure 8.4.4
Figure 8.8.2 Δ
i
versus the subcell index
i
for LIR and the scenario shown in Figure 8.4.4
Figure 8.8.3
τ
i
versus the subcell index
i
for MDR and the scenario shown in Figure 8.4.4
Figure 8.8.4
τ
i
versus the subcell index
i
for LIR and the scenario shown in Figure 8.4.4
Figure 8.8.5
B
i
versus the subcell index
i
for the scenario shown in Figure 8.4.4
Figure 8.8.6 Routing/scheduling scenario for m
3
network by using clustering factor
K
= 7
Figure 8.8.7 Network capacity
Figure 8.8.8 Throughput
Figure 8.8.9 m
3
network topology
Figure 8.8.10 Δ
U
and Δ
U
1 versus the price
χ
for scenarios 1 and 3 presented in Figure 8.8.5 and Table 8.8.2
Figure 8.8.11 The optimum price
χ
* for scenarios 1–7 presented in Figure 8.8.5 and Table 8.8.2
Figure 8.8.12 Optimum price
χ
* versus the number of new calls in the WLAN
Chapter 09
Figure 9.2.1 A secondary spectrum market with three SNs and two channels
Figure 9.2.2 Procedure of channel assignment. Dots and squares represent source and destination nodes respectively. (a) Assign channels to SN
a
. (b) Assign channels to SN
b
. (c) Assign channels to SN
d
Figure 9.2.3 Auction efficiency with different number of bidders enrolled
Figure 9.3.1 Network model with N cell reuse pattern for
K
= 7
Figure 9.3.2 (a) Markov model of the different transmission trials in a subcell. (b) Markov model state transition probabilities
Figure 9.3.3 Static group-bidding scheme based on
K
reuse pattern
Figure 9.3.4 Markov model state transition probabilities with m2m connections
Figure 9.3.5 (a)
p
b
′
defined by (9.3.6) versus
b
′, (b)
p
return
defined by (9.3.8) versus
b
′
Figure 9.3.6
p
bs
versus
p
for different values of
b
′
Figure 9.3.7 Delay
τ
versus
p
for different values of
b
′
Figure 9.3.8 Valuation
V
defined by (9.3.13) versus
b
′ for different values of
p
Figure 9.3.9 Utility defined by (9.3.18) versus
b
′ for different values of
p
Figure 9.3.10 Bid defined by (9.3.15) and tip defined by (9.3.16) versus
b
′
Figure 9.3.11 Auction efficiency comparison for different network size
Figure 9.3.12 Overall price versus
b
′
Figure 9.3.13 Utility versus
b
′ when
Figure 9.3.14 Utility obtained for different number of winner groups
S
Figure 9.3.15
β
m
versus subcell index
m
Figure 9.3.16
U
m
versus subcell index
m
Figure 9.3.17 Percentage of truthful and non-truthful bidders
Figure 9.3.18
β
m
versus subcell index
m
Figure 9.3.19
U
m
versus subcell index
m
Figure 9.3.20
p
bs
/
m2m
versus
p
for different values of
b
′
Figure 9.3.21 Delay
τ
versus
p
m2m
Figure 9.3.22 Utility defined by (9.3.18) versus
b
′ when
β
= 0.4,
θ
= 0.6,
γ
= 1/10
Figure 9.3.23 Cost defined by (9.3.14a) versus
b
′ when
β
= 0.4,
θ
= 0.6
Chapter 10
Figure 10.1.1 (a) Cellular network modeled via the PPP, (b) Cellular network modeled via the HCPP
Figure 10.1.2 The network modeled as a weighted Voronoi tessellation (the square shapes represent the macro BSs and the dots represent the small BSs)
Chapter 11
Figure 11.1.1 The network modeled as a weighted Voronoi tessellation (the larger dots represent the MBSs with the coverage within the Voronoi cell, white circles coverage of the small cell)
Figure 11.1.2 The network modeled as a superposition of two independent Voronoi tessellations: the diamond-shaped dots with the dashed Voronoi cells represent the macro network tier, and the circular dots with the solid Voronoi cells represent the small cell network tier
Figure 11.3.1 Dynamic network architecture: (a) possible realization of DNA macro network, (b) clustering DNA macro network, (c) formal cluster separation in DNA network for different frequencies (
f
k
,
k
= 1,2,3), and example of transmission between a cluster of DNA networks
Figure 11.3.2 DNA network model with
T/W
(
r
)/
I
(
Q
) contract with: (a) wired Internet and (b) wireless Internet
Figure 11.3.3 Illustration of the genetic operators: (a) crossover and (b) mutation
Figure 11.3.4 Interaction of the 2L-AAC scheme and the optimization problem
Figure 11.3.5 Simulation scenario with index of user
i
= 1, …,
N
and AP
j
= 1, …,
K
Figure 11.3.6 Utility defined by (11.3.6) for the optimum topology versus
N
Figure 11.3.7 Number of topologies
G
generated to solve (11.3.7) versus
N
Figure 11.3.8 Running time
T
c
needed to obtain the optimum topology by (11.3.7) versus
N
Figure 11.3.9 Utility defined by (11.3.7) for the optimum topology versus
K
and
N
= 6
Figure 11.3.10 Optimum
M
versus
K
for the optimization problem defined by (11.3.7)
Figure 11.3.11
M
and
K
versus the QoS constraint
γ
Figure 11.3.12 Success rate versus
G
when the initial population is randomly chosen
Figure 11.3.13
ξ
i
versus
p
i
I
for static and dynamic model of traffic volume
Figure 11.3.14 Contract price recovery
∊
i
versus
p
i
I
Figure 11.3.15 Dynamic topology and architecture reconfiguration scenarios
Chapter 12
Figure 12.2.1 A network with two access points
Figure 12.2.2 Average throughput (BE) per user in a network with two AP,
n
= 20 strongly asymmetric settings, versus the UDP load
Figure 12.3.1 Comparison of convergence speed by the Si-/Se-JASPA, J-JASPA, and Si-JASPA with connection costs
Figure 12.4.1 Network model with possible connections
Figure 12.4.2 (a) Network partitioned into different clusters. (b) DNA network considered
Figure 12.4.3 Convergence property of the SJOA
Figure 12.4.4 The variation of the achieved sum rate and convergence of the JSBOA over different dynamic behavior of the system
Figure 12.4.5 Sum rate comparison for JSBOA over exhaustive search (Exha) and conventional model (path lost; PL)
Chapter 14
Figure 14.1.1 Network model
Figure 14.1.2 Examples of various types of networks. (a) An undirected network with only a single type of vertex and a single type of edge. (b) A network with a number of discrete vertex and edge types. (c) A network with varying vertex and edge weights. (d) A directed network in which each edge has a direction
Figure 14.3.1 The mean component size (solid line), excluding the giant component if there is one, and the giant component size (dotted line), for the Poisson random graph, Equations 14.3.3 and 14.3.4
Chapter 15
Figure 15.1.1 Antenna patterns for 25 × 25 array
Figure 15.1.2 Antenna patterns for 30 × 30 array
Figure 15.4.1 Illustration of a two-cell system model with four users. The dotted-dashed lines indicate the inter-cell interference, while the solid lines show the broadcast part of the signal transmitted by each BS
Figure 15.4.2 Worst case sum rate of different schemes as a function of
ρ
for box uncertainty set. The zero-forcing strategy is adopted from Refs. [3, 4] at
SNR
= 10 dB
Chapter 16
Figure 16.2.1 Logical topology graph of a network illustrating contention
Figure 16.2.2 Contention graph derived from the logical topology graph shown in Figure 16.2.1
Figure 16.2.3 Bipartite graph between maximal cliques and links in the contention graph from Figure 16.2.2
Figure 16.2.4 Comparison of network utilities in a numerical example
Figure 16.4.1 Schematic illustrating optimization problem decomposition
Figure 16.4.2 Multilevel decomposition
Chapter 17
Figure 17.1.1 A tessellation of the surface
S
2
of the sphere
Figure 17.3.1 Nodes in the ring Δ
r
transmit approximately simultaneously
Figure 17.3.2 Connectivity ratio versus number of nodes in the network
Figure 17.3.3 Delivery ratio versus number of nodes in the network
Figure 17.3.4 End to end delay versus number of nodes in the network
Chapter 18
Figure 18.2.1 Cooperative control options of a cooperative pair (
i, j
) in subframe
n
ij
Figure 18.5.1 Network stability regions
Figure 18.6.1 Histogram of cooperative control
Chapter 19
Figure 19.1.1 Capacity aggregation – a model
Figure 19.1.2 Capacity borrowing/leasing – BL model
Figure 19.1.3 Cognitive networks – C model
Figure 19.1.4 Partial cognitive networks – PC model
Figure 19.1.5 Mutually cognitive networks – MC model
Figure 19.1.6 Spectra aggregation in heterogeneous network: (a) CW mode, (b) CWC mode
Figure 19.1.7 Channel lending with pricing
Figure 19.1.8 Mutual channel leasing with pricing
Figure 19.1.9 Markov model representation of the two-operator voice traffic system
Figure 19.10 (a) BL system model with pricing (b) MBL system model with pricing
Figure 19.1.11 Conditional probability of benefiting for data traffic in A mode for
Figure 19.1.12 Conditional probability of benefiting for voice traffic in A mode for
Figure 19.1.13 Helping probabilities in B/L system for
c
= 20
Figure 19.1.14 Channel corruption probability in cognitive mode for
c
= 20
Figure 19.1.15 The system queue length in aggregate A mode and conventional C mode
Figure 19.1.16 The system waiting time CDF for
c
= 10 in A mode
Figure 19.1.17 Steady state probability density function for the BL system with pricing (voice traffic),
,
and
c
= 10
Figure 19.1.18 2D Steady state probability density function for the BL system with pricing (voice traffic)
Figure 19.1.19 Spectrum utilization factor: (a) analytical results, (b) analytical and simulation results
Figure 19.1.20 Spectra utilization factor in cognitive networks
Figure 19.2.1 Channel lending with pricing
Figure 19.2.2 Mutual channel lending with pricing
Figure 19.2.3 State transition diagram: (a) with DTA, (b) with dropping queue management algorithms, (c) for double threshold queue management algorithm
Figure 19.2.4 Two-dimensional Markov chain state transition diagram for: (a) MCBL model without buffer, (b) ACBL model without buffer
Figure 19.2.5 Averaged-Time model state transition diagram
Figure 19.2.6 Possibilities for transition when buffer is full
Figure 19.2.7 Possibilities for transition when buffer is full
Figure 19.2.8 Joint state probability distribution function for Averaged-Time model with priority operator,
Figure 19.2.9 Joint state probability distribution function for Averaged-Time model with priority operator,
Figure 19.2.10 Joint state probability distribution function for Averaged-Time with priority operator,
Figure 19.2.11 Average packet dropping rate for Averaged-Time model with priority operator,
Figure 19.2.12 Joint state probability distribution function for Averaged-Time model with proportional drop
,
Figure 19.2.13 Joint state probability distribution function for Averaged-Time model with proportional drop
,
Figure 19.2.14 Joint state probability distribution function for Averaged-Time model with proportional drop
,
Figure 19.2.15 Joint state probability distribution function for Averaged-Time model with proportional drop
,
Figure 19.2.16 Average packet dropping rate for Averaged-Time model with proportional dropping algorithm,
Chapter 20
Figure 20.2.1 The local model describing the set of states
ℵ
Figure 20.4.1 Polymorphic infection process
Figure 20.4.2 Heterogeneous DTN architecture
Figure 20.4.3 Average delivery delay versus
D
Figure 20.4.4 Average delivery delay
and lifetime
L
versus
D
Figure 20.4.5 Average number of copies
E
[
G
L
] and
versus
D
Figure 20.4.6 Infection rate of destinations infected by
f
,
D
f
(
t
), versus
t
for DNCM
Figure 20.4.7 Average delivery delay
R
a
(
t
) versus
t
for: (a) immune, (b) immune TX, (c) vaccine for different values of
p
r
(
t
), and (d) timeout recovery scheme
Figure 20.4.8 Average delivery delay
R
f
(
t
) versus
t
for (a) immune, (b) immune TX, (c) vaccine for different values of
p
r
(
t
), and (d) timeout recovery scheme
Figure 20.4.9 Average delivery delay
E
[
T
f
D
] versus
t
for (a) immune, (b) immune TX, (c) vaccine for different values of
p
r
(
t
), and (d) timeout recovery scheme
Figure 20.4.10 Average delay
versus
D
for different percentages of mobile users
m
Figure 20.4.11 Average delay
versus
D
for immune_TX and different values of
p
r
(
t
)
Figure 20.5.1 Illustrations of network growth: (a) Erdos–Renyi (ER) model, (b) Watts–Strogatz (WS) model
Figure 20.5.2 BA model for
m
0
= 3 and
m
= 2
Figure 20.5.3 BA/A model for
m
0
= 3 and
m
= 2
Figure 20.5.4 BA/B model for
m
0
= 3 and
m
= 2
Figure 20.7.1 Connectivity of nodes of time varying relevancy
r
(
t
) over time for
α
= 1 and 4
Figure 20.7.2 Connectivity of nodes of time varying relevancy
r
(
t
) in time with
Figure 20.7.3 Preferred attachments by relevancy (
r
+
attachments) and previous connectivity (
r
–
attachments)
Figure 20.7.4 Time variation of the connectivity
Figure 20.7.5 Time variation of the network connectivity mismatch
Figure 20.7.6 Average network connectivity mismatch
Chapter 21
Figure 21.1.1 Network model, the beamforming patterns
G
M
,
m
,
θ
(
ϕ
), where
M
is the main lobe directivity gain,
m
is the back lobe gain,
θ
is the beamwidth of the main lobe, and
ϕ
is the angle off the boresight direction
Figure 21.2.1 Interference model
Figure 21.2.2 Spatial selection probability of
AP
i
by terminals versus the average sharing rates of competing APs
Figure 21.2.3 The spatial revenue of operator versus incentive rate
Figure 21.2.4 The spatial revenue of operator versus user density (
λ
u
)
Chapter 22
Figure 22.2.1 Cloud with a VDC
Chapter 24
Figure 24.3.1 A Web services based SOA implementation
Figure 24.3.2 Illustration of a network virtualization environment
Figure 24.3.3 Service-oriented network virtualization
Figure 24.4.1 SDN Network Architecture
Cover
Table of Contents
Begin Reading
iii
iv
xv
1
3
2
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
603
604
605
606
607
608
609
610
611
612
613
614
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
Third Edition
Savo Glisic
University of Oulu, Finland
This edition first published 2016© 2016 John Wiley & Sons, Ltd.
First Edition published in 2006
Registered OfficeJohn Wiley & Sons, Ltd, The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom
For details of our global editorial offices, for customer services and for information about how to apply for permission to reuse the copyright material in this book please see our website at www.wiley.com.
The right of the author to be identified as the author of this work has been asserted in accordance with the Copyright, Designs and Patents Act 1988.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior permission of the publisher.
Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books.
Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. The publisher is not associated with any product or vendor mentioned in this book
Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. It is sold on the understanding that the publisher is not engaged in rendering professional services and neither the publisher nor the author shall be liable for damages arising herefrom. If professional advice or other expert assistance is required, the services of a competent professional should be sought.
Library of Congress Cataloging-in-Publication data applied for
ISBN: 9781119096856
A catalogue record for this book is available from the British Library.
Wireless communications has been developed so far through generations 1G to 4G with exclusive focus on improving the physical layer. This concept has at least two drawbacks: first, wireless channels cannot compete with optical networks when it comes to network capacity; second, the advantages of user mobility have not been emphasized enough. In the scenarios of future dense networks with a significant increase of user terminals and access points, wireless links in the wireless access concept in 5G will become shorter and shorter, asking for more frequent handoffs which jeopardize the reliability of the connections.
A significant part of the future networks will handle Internet of Things and People (IoTP) communications, where sophisticated physical layer solutions cannot be used. Human body implants will use simple solutions. For these reasons there is a common understanding that 5G will be about wireless networks rather than about wireless access to the networks. In the research of the enabling technologies for 5G, different communities focus on different solutions. Small cell technology, mmWave physical layer, cognitive networks, massive MIMO, spectra and infrastructure sharing in multi-operator network management, dynamic network architecture, user provided networks, and so on.
In the design and analysis of these networks a number of powerful analytical tools are used, like: convex, dynamic and stochastic optimization, stochastic geometry, mean field theory, matching theory, and game theory, as well as a number of tools used in economics/microeconomics.
This book advocates a concept where all these technologies will be simultaneously present in the future wireless networks and focuses on three main issues:
Design of heterogeneous networks that include all or a number of these technologies at the same time.
Optimization of such complex networks.
Design of efficient business models to exploit the limited resources of these networks.
Hence the subtitle of this book: Technology and Business Models.
The book is dedicated to the young generation of open-minded researchers, network designers, and managers who will make it happen.
Savo Glisic
In the process of evolving towards 5G networks, wireless networks are becoming more complex in both, the number of different functionalities they provide as well as in the number of users they serve [1]. Future 5G networks are expected to be highly heterogeneous (see Chapter 11) and to integrate cognitive network concepts [2, 3] (Chapter 9), heterogeneous solutions for the offload of cellular network traffic to WLANs [4, 5], multi-hop cellular networks (Chapter 8) including combinations of ad hoc (Chapter 4) and cellular networks [6, 7], and mobile to mobile (m2m) communications [8]. In order to analyze and control these networks, evolving towards complex networks structures, efficient modeling tools are needed.
Complex network theory (Chapter 14) has emerged in recent years as a powerful tool for modeling large topologies observed in current networks [9]. For instance, the World Wide Web behaves like a power-law node degree distributed network, wireless sensor networks like lattice networks, and relations between social acquaintances like small world networks. The concept of small world networks was first introduced by Watts and Strogatz [10] where a small world network is constructed via rewiring a few links in an existing regular network (such as a ring lattice graph). Later on, Newman-Watt [11] suggested a small world network constructed by adding a few new links (shortcuts) without rewiring existing links. The concept of small world can be introduced to wireless networks, typically to reduce the path length, and thus provide better throughput and end to end delay.
Several works have addressed the question of how to construct a wireless network topology in ad hoc and sensor networks (Chapter 5) in such a way that the small world feature is preserved [12–16]. Long range shortcuts can be created by adding wired links [17], directional beamforming [18] or using multiple frequency channels [19] concepts. In Ref. [9] it was demonstrated that small world networks are more robust to perturbations than other network architectures. Therefore, any network with this property would have the advantage of resiliency where the random omission of some vertices does not increase significantly the average path length or decrease the clustering coefficient. These features are highly desirable in future wireless networks where the availability of links and nodes can be uncertain. For these reasons, in this book we are interested to redesign heterogeneous wireless networks by including small world properties and frequency channels backups.
The considered network model, that we envision for 5G and further to 6G, includes the multi-hop concept to model future networks with dense user populations and enables mobile to mobile (m2m) connections which are already standardized. We see multi-hop cellular networks as an extension or generalization of the existing m2m concept. The potential users acting as relays may belong to different operators and as such may or may not want to cooperate. Consequently, the existence of those links will be uncertain. Some subareas of the cell will be covered by other technologies such as femto cells, small cells, or WLANs enabling the possibility for the cellular system to offload the traffic. The existence of those links depends on the relaying distance and coverage of the WLAN, as well as the cooperation agreement between the operators. In such a complex network, cognitive links might also be available with limited certainty due to unpredictable activity of the primary user (PU). Complex network theory will be used to aggregate all these characteristics of the network into a unified model enabling a tractable analysis of the overall system performance.
Despite of the extensive work in each of the previous fields, to the best of our knowledge, our book is the first to provide a unified model of the network that will include simultaneously all those technologies. The dynamic characteristics of the network results into a dynamic network topology. The work developed by [20] represents the first attempt to model the link uncertainty by complex networks concepts, although in this work, the uncertainty was a consequence only of fading and dynamic channel access. More specifically, our book emphasizes the following aspects of the design and analysis of complex heterogeneous wireless networks:
A unified model for heterogeneous wireless complex networks based on the probabilistic characterization of the node/link uncertainty. The model captures the existence of uncertain and time varying links and nodes inherently present in the latest solutions in wireless networks.
Analytical tools for the unified analysis of the multi-operator collaboration, m2m transmission, different traffic offloading options, and channel availability in cognitive heterogeneous networks.
Redesign of heterogeneous networks by using specific techniques to systematically add, in a controlled way, network redundancy in order to increase the network robustness to link/node failures.
Traffic distribution aware rewiring of the heterogeneous network.
A set of new routing protocols for such network.
Comprehensive analysis of the network in terms of average path length, clustering, robustness, power consumption, and complexity.
In this introduction we start with a general model of the future wireless network, referred to as generic network model, and later in separate chapters we elaborate in more detail each component of such network.
We start by considering a macro cellular network where users transmit uplink by relaying to their adjacent users (neighbors) on the way to the base station (BS). Multi-hop transmission is modeled by considering a virtual cell tessellation scheme presented in Figure 1.1.1, where the macro cell of radius R is divided into inner hexagonal subcells of radius r < R. This partition is not physically implemented in the network but rather used to capture the mutual relations between the terminals in the cell that are potentially available for relaying each other’s messages. For this purpose, it is assumed that, if available, a potential, ready to cooperate transmitter/receiver is on average situated in the center of each subcell.
Figure 1.1.1 Macro cell tessellation
We assume that within a cell the BS is surrounded by H concentric rings of subcells. For the example in Figure 1.1.1, H = 3. The shortest path (in hop count) between the user location and the BS is given by the hop index h, h = 1, … , H. Due to the terminal unavailability, there may be routes towards the BS where the length of the path is longer than h. The number of subcells per ring is nh = 6∙h and the number of subcells per cell is N = 3H(H + 1).
In the sequel, we present a number of characteristics of heterogeneous networks that lead to the uncertain existence of nodes and links. Node percolation will be used to model and quantify the unavailability of users to relay as a consequence of lack of coverage or terminals belonging to a different operator with no mutual agreement for cooperation. When cognitive links are used, link percolation is used to model the link unavailability due to the return of the PU to the channel. These options will be elaborated in detail in the subsequent subsections.
Here we model the scenario where a number of operators coexist in the cellular network. It is assumed that a single operator i has a terminal available in a given subcell with probability . In a multi-operator cooperative network, a terminal will be available for relaying in the same subcell if at least one operator has a terminal at that location. This will occur with probability .
This probability is higher for higher number of operators willing to cooperate. In general, this will result into a reduction of the relaying route length. If the operators cooperate and let their users to flexibly connect to the BS that is more convenient to them, the network capacity of both operators will be improved. Thus, a better performance of the network will be obtained in the multi-operator cooperative scenario, as will be shown later in this chapter. The node unavailability for the message forwarding in complex network terminology is referred to as node (or site) percolation.
In general multiple technologies will be available in a heterogeneous network. Each technology has its own characteristics which enables more appropriate AP choice at a specific place and time based on the users’ requirements. Figure 1.1.1 shows an example of a cellular network overlapping in coverage with a WLAN. In the analysis, we will be interested to generalize this model as follows. The relative coverage between the cellular network and other access technologies, that is WLAN will be characterized by probability pwlan which is the probability that in the next hop the connection will have the opportunity to make a handoff to a different technology and so, terminate the route. The probability pwlan = A/A is calculated as the ratio between the coverage areas of other technologies Ah and the coverage area of cellular network Ac. This can be easily generalized to introduce other traffic offloading options like small/femto cells or other multitier elements like micro and pico cells.
In the analysis, we will consider the possibility that every next relay on the route will be a final destination of an m2m link with probability pm2m. This parameter depends on the probability that the session is within the same cell and parameter N representing the number of subcells in the network.
The simplest model will assume that for a specific session pm2m (Nm2m/N)/Nm2m = 1/N, where Nm2m is the average number of m2m connections per cell. Nm2m/N represents the probability that the given adjacent node is a sink for an m2m connection and 1/N is the probability that it is a sink for a specific session out of Nm2m such sessions.
In the case that cognitive links are used for relaying, which means that we are establishing the routes for the secondary users (SUs; belonging to a secondary operator, SO), there are two related problems that should be considered. The first one is the link availability at the moment when routing/relaying decision is being made and the second one is the PU return probability that will interrupt the ongoing relaying and force the SU user to try it again with a new option.
We assume that spectrum sensing is perfect [3]. Since this problem belongs to the physical layer technology and has been extensively covered in the literature we will not discuss it within this book. We also consider that due to the uncertainty of the PU’s activities, the SO cannot obtain spectrum availability information in advance for the entire message transmission period. We model this uncertainty by defining a probability of return of the PU to the channel currently allocated to the SU, denoted as preturn.
Let us assume that call/data session arrivals follow a Poisson distribution with rate λp and λs for the PU and SU, respectively. The average probability that in a given moment np out of c channels are being used in PO network (the system is in state np) can be obtained as a solution of birth death equations for conventional M/M/c system for data session and M/M/c/c system for voice applications [21].
We assume that the average service time of the SU is 1/μs so that, the probability of having kp new PU arriving within that time is [21]
The probability that a specific channel among c – np
