Accomodation of power system constraints with the market mechanism is encountered as a major challenge along the way toward implementation of different electricity market designs. Allocation of fixe or flow-dependent ...Accomodation of power system constraints with the market mechanism is encountered as a major challenge along the way toward implementation of different electricity market designs. Allocation of fixe or flow-dependent inter-zone trading capacities by the PX (power exchange) can not be accepted unreservedly. The paper is meant to show that a nodal electricity market design that is based on bids for local energy and a regulated transmission access including allocation of "entry-exit" transmission capacity would be the desired solution. The market players could easily optimize their portfolio while the TSOs (transmission system operators) are requested to mobilize the network's in-built flexibility to increase the cross zonal capacity. In the proposed market design, the PX's allocation of trading capacity is clearly separate from the TSO's management of the power system operational constraint5. Clear operator roles would enlarge access to electricity market as well as market integration of variable RESs (renewable energy sources) that are critically dependent on short notice access to regionat markets,展开更多
Ultra-densification of radio access network(RAN)is a key to efficiently support the exponentially growing mobile data traffic in 5 G era.Furthermore,extremely high frequency band like mm Wave band was utilized to solv...Ultra-densification of radio access network(RAN)is a key to efficiently support the exponentially growing mobile data traffic in 5 G era.Furthermore,extremely high frequency band like mm Wave band was utilized to solve the bandwidth shortage problem.However,untra-dense reusing the same radio resource produced severe interference.And the mm Wave link was very harsh due to frequent blockage by obstacles.Therefore a new RAN architecture needed to be introduced to realize ultra-reliable communications in such a severe radio propagation environment.An architecture of distributed MIMO based RAN was presented.Then,enhanced interference coordination(e IC)was described.Finally,the effectiveness of distributed MIMO based RAN with e IC by computer simulation was showed.展开更多
Due to the limited uplink capability in heterogeneousnetworks (HetNets), the decoupled uplinkand downlink access (DUDA) mode has recently beenproposed to improve the uplink performance. In thispaper, the random discon...Due to the limited uplink capability in heterogeneousnetworks (HetNets), the decoupled uplinkand downlink access (DUDA) mode has recently beenproposed to improve the uplink performance. In thispaper, the random discontinuous transmission (DTX)at user equipment (UE) is adopted to reduce the interferencecorrelation across different time slots. By utilizingstochastic geometry, we analytically derive themean local delay and energy efficiency (EE) of an uplinkHetNet with UE random DTX scheme under theDUDA mode. These expressions are further approximatedas closed forms under reasonable assumptions.Our results reveal that under the DUDA mode, there isan optimal EE with respect to mute probability underthe finite local delay constraint. In addition, with thesame finite mean local delay as under the coupled uplinkand downlink access (CUDA) mode, the HetNetsunder the DUDA mode can achieve a higher EE witha lower mute probability.展开更多
A multiple access protocol is proposed to greatly improve multiple access performance of wireless networks with long propagation delay. All the nodes with packets to send can make rapid successful reservation in acces...A multiple access protocol is proposed to greatly improve multiple access performance of wireless networks with long propagation delay. All the nodes with packets to send can make rapid successful reservation in access reservation mini-slots, which is adaptively adjusted according to current traffic load and idle channel resources. A Central Control Node (CCN) coordinates channel reservation and allocates on-demand channel resources to the successfully accessed nodes on two channels. Each node can employ only one handshake to accomplish each communication session, and transmit one or multiple data packets piggybacked with acknowledgment (ACK) information to one or multiple destination nodes in each frame until the end of their communication sessions, which greatly minimizes the impact of long propagation delay caused by handshakes and improves channel efficiency. Simulation results show that the proposed protocol obviously outperforms the Centralized Scheduling-based Medium Access Control (CSMAC) protocol, especially in the presence of long propagation delay.展开更多
Rate splitting multiple access(RSMA)has shown great potentials for the next generation communication systems.In this work,we consider a two-user system in hybrid satellite terrestrial network(HSTN)where one of them is...Rate splitting multiple access(RSMA)has shown great potentials for the next generation communication systems.In this work,we consider a two-user system in hybrid satellite terrestrial network(HSTN)where one of them is heavily shadowed and the other uses cooperative RSMA to improve the transmission quality.The non-convex weighted sum rate(WSR)problem formulated based on this model is usually optimized by computational burdened weighted minimum mean square error(WMMSE)algorithm.We propose to apply deep unfolding to solve the optimization problem,which maps WMMSE iterations into a layer-wise network and could achieve better performance within limited iterations.We also incorporate momentum accelerated projection gradient descent(PGD)algorithm to circumvent the complicated operations in WMMSE that are not amenable for unfolding and mapping.The momentum and step size in deep unfolding network are selected as trainable parameters for training.As shown in the simulation results,deep unfolding scheme has WSR and convergence speed advantages over original WMMSE algorithm.展开更多
The cloud radio access network(C-RAN) has recently been proposed as an important component of the next generation wireless networks providing opportunities for improving both spectral and energy effi ciencies. The per...The cloud radio access network(C-RAN) has recently been proposed as an important component of the next generation wireless networks providing opportunities for improving both spectral and energy effi ciencies. The performance of this network structure is however constrained by severe inter-cell interference due to the limited capacity of fronthaul between the radio remote heads(RRH) and the base band unit(BBU) pool. To achieve performance improvement taking full advantage of centralized processing capabilities of C-RANs,a set of RRHs can jointly transmit data to the same UE for improved spectral effi ciency. In this paper,a user centralized joint coordinated transmission(UC-JCT) scheme is put forth to investigate the downlink performance of C-RANs. The most important benefit the proposed strategy is the ability to translate what would have been the most dominant interfering sources to usable signal leading to a signifi cantly improved performance. Stochastic geometry is utilized to model the randomness of RRH location and provides a reliable performance analysis. We derive an analytical expression for the closed integral form of the coverage probability of a typical UE. Simulation results confirm the accuracy of our analysis and demonstrate that significant performance gain can be achieved from the proposed coordination schemes.展开更多
A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public wh...A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public which may be non-secure network into those of a private secure network through using encrypted tunnels. This work customized a standard VPN to a newly one called EEVPN (Effective Extensive VPN). It transmits a small data size in through a web based system in a reasonable time without affecting the security level. The proposed EEVPN is more effective where it takes small data transmission time with achieving high level of security. Also, the proposed EEVPN is more extensive because it is not built for a specific environment.展开更多
With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality...With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the in- ternal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that if one vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem. To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC—the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC’s constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.展开更多
Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via vario...Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.展开更多
The underwater wireless communication with the complexity of attenuation and low propagation speed makes resource constraints in networking sensor nodes and sink.Underwater Sensor Transmission with Attenuation Calcula...The underwater wireless communication with the complexity of attenuation and low propagation speed makes resource constraints in networking sensor nodes and sink.Underwater Sensor Transmission with Attenuation Calculation using Non Orthogonal Multiple Access(UWSTAC-NOMA)protocol has been proposed.This protocol calculates channel gain along with attenuation in underwater channels and provides internetworking sensor for rate allocation minimizing interference.Successive Interference Cancellation has been used at the receiving sensor to decode the information sent.The network level performance of sensors and increasing the data rate improves the overall throughput.Simultaneously,connecting several sensors to sink based on its depth region of deployment has been achieved using Underwater Sensor Transmission with Attenuation Calculation using Non Orthogonal Multiple Access(UWSTAC-NOMA).The analytical background of attenuation never confuted the simulation results of the proposed protocol in NS2 simulator.Simulation results shows that the throughput,average bit error rate and residual energy of sink performance.展开更多
We discuss the concept of coarse wavelength-division multiplexing (CWDM) for metro networks. After reviewing the requirements on components such as lasers and fiber, we propose different architectures for a flexible u...We discuss the concept of coarse wavelength-division multiplexing (CWDM) for metro networks. After reviewing the requirements on components such as lasers and fiber, we propose different architectures for a flexible upgrade of existing CWDM systems.展开更多
This paper develops a prototype to demonstrate a full-duplex wireless visible light communication (VLC) system based on Universal Serial Bus (USB) port. Combing with a USB 2.0 port on one board, it can achieve up to 2...This paper develops a prototype to demonstrate a full-duplex wireless visible light communication (VLC) system based on Universal Serial Bus (USB) port. Combing with a USB 2.0 port on one board, it can achieve up to 2 Mbps bit rates error free, which is mainly limited to the USB bridge circuit, between two computers for data transmission, such as text, audio and video. Hyper Terminal and self-written software are used to allow setting the transmission data rate, control bits, check bits and achieve real-time transmission between any two mobile devices with a USB port. The work is based on the research of VLC local access network. This paper also shows the experimental results and the relationship between system transmission eye diagram and bit rate.展开更多
文摘Accomodation of power system constraints with the market mechanism is encountered as a major challenge along the way toward implementation of different electricity market designs. Allocation of fixe or flow-dependent inter-zone trading capacities by the PX (power exchange) can not be accepted unreservedly. The paper is meant to show that a nodal electricity market design that is based on bids for local energy and a regulated transmission access including allocation of "entry-exit" transmission capacity would be the desired solution. The market players could easily optimize their portfolio while the TSOs (transmission system operators) are requested to mobilize the network's in-built flexibility to increase the cross zonal capacity. In the proposed market design, the PX's allocation of trading capacity is clearly separate from the TSO's management of the power system operational constraint5. Clear operator roles would enlarge access to electricity market as well as market integration of variable RESs (renewable energy sources) that are critically dependent on short notice access to regionat markets,
基金The Research and Development for Further Advancement of the 5th Generation Mobile Communication System(No.JP1000254)。
文摘Ultra-densification of radio access network(RAN)is a key to efficiently support the exponentially growing mobile data traffic in 5 G era.Furthermore,extremely high frequency band like mm Wave band was utilized to solve the bandwidth shortage problem.However,untra-dense reusing the same radio resource produced severe interference.And the mm Wave link was very harsh due to frequent blockage by obstacles.Therefore a new RAN architecture needed to be introduced to realize ultra-reliable communications in such a severe radio propagation environment.An architecture of distributed MIMO based RAN was presented.Then,enhanced interference coordination(e IC)was described.Finally,the effectiveness of distributed MIMO based RAN with e IC by computer simulation was showed.
基金supported in part by the National Key R&D Program of China under Grant 2021YFB 2900304the Shenzhen Science and Technology Program under Grants KQTD20190929172545139 and ZDSYS20210623091808025.
文摘Due to the limited uplink capability in heterogeneousnetworks (HetNets), the decoupled uplinkand downlink access (DUDA) mode has recently beenproposed to improve the uplink performance. In thispaper, the random discontinuous transmission (DTX)at user equipment (UE) is adopted to reduce the interferencecorrelation across different time slots. By utilizingstochastic geometry, we analytically derive themean local delay and energy efficiency (EE) of an uplinkHetNet with UE random DTX scheme under theDUDA mode. These expressions are further approximatedas closed forms under reasonable assumptions.Our results reveal that under the DUDA mode, there isan optimal EE with respect to mute probability underthe finite local delay constraint. In addition, with thesame finite mean local delay as under the coupled uplinkand downlink access (CUDA) mode, the HetNetsunder the DUDA mode can achieve a higher EE witha lower mute probability.
基金supported by National Science Foundation for Innovative Research Groups of China under Grant No.60921001National Natural Science Foundation of China under Grant No.60933012+2 种基金National Science and Technology Major Project of China under Grant No.2009ZX03006-001-003, 2010ZX03003-003-03China Fundamental Research Funds for the Central Universities under Grant No.YWF-10-01-A16NSBS Program of Beihang University,China under Grant No.221235
文摘A multiple access protocol is proposed to greatly improve multiple access performance of wireless networks with long propagation delay. All the nodes with packets to send can make rapid successful reservation in access reservation mini-slots, which is adaptively adjusted according to current traffic load and idle channel resources. A Central Control Node (CCN) coordinates channel reservation and allocates on-demand channel resources to the successfully accessed nodes on two channels. Each node can employ only one handshake to accomplish each communication session, and transmit one or multiple data packets piggybacked with acknowledgment (ACK) information to one or multiple destination nodes in each frame until the end of their communication sessions, which greatly minimizes the impact of long propagation delay caused by handshakes and improves channel efficiency. Simulation results show that the proposed protocol obviously outperforms the Centralized Scheduling-based Medium Access Control (CSMAC) protocol, especially in the presence of long propagation delay.
基金sponsored by National Natural Science Foundation of China (No. 61871422, No.62027801)
文摘Rate splitting multiple access(RSMA)has shown great potentials for the next generation communication systems.In this work,we consider a two-user system in hybrid satellite terrestrial network(HSTN)where one of them is heavily shadowed and the other uses cooperative RSMA to improve the transmission quality.The non-convex weighted sum rate(WSR)problem formulated based on this model is usually optimized by computational burdened weighted minimum mean square error(WMMSE)algorithm.We propose to apply deep unfolding to solve the optimization problem,which maps WMMSE iterations into a layer-wise network and could achieve better performance within limited iterations.We also incorporate momentum accelerated projection gradient descent(PGD)algorithm to circumvent the complicated operations in WMMSE that are not amenable for unfolding and mapping.The momentum and step size in deep unfolding network are selected as trainable parameters for training.As shown in the simulation results,deep unfolding scheme has WSR and convergence speed advantages over original WMMSE algorithm.
基金supported in part by the National Natural Science Foundation of China (Grant No. 61222103)the Beijing Natural Science Foundation (Grant No. 4131003)+1 种基金the Specialized Research Fund for the Doctoral Program of Higher Education (SRFDP) (Grant No. 20120005140002)the National High Technology Research and Development Program (863 Program) of China under Grant No. 2014AA01A707
文摘The cloud radio access network(C-RAN) has recently been proposed as an important component of the next generation wireless networks providing opportunities for improving both spectral and energy effi ciencies. The performance of this network structure is however constrained by severe inter-cell interference due to the limited capacity of fronthaul between the radio remote heads(RRH) and the base band unit(BBU) pool. To achieve performance improvement taking full advantage of centralized processing capabilities of C-RANs,a set of RRHs can jointly transmit data to the same UE for improved spectral effi ciency. In this paper,a user centralized joint coordinated transmission(UC-JCT) scheme is put forth to investigate the downlink performance of C-RANs. The most important benefit the proposed strategy is the ability to translate what would have been the most dominant interfering sources to usable signal leading to a signifi cantly improved performance. Stochastic geometry is utilized to model the randomness of RRH location and provides a reliable performance analysis. We derive an analytical expression for the closed integral form of the coverage probability of a typical UE. Simulation results confirm the accuracy of our analysis and demonstrate that significant performance gain can be achieved from the proposed coordination schemes.
文摘A Virtual Private Network (VPN) allows the provisioning of private network services for an organization over a public network such as the Internet. In other words a VPN can transform the characteristics of a public which may be non-secure network into those of a private secure network through using encrypted tunnels. This work customized a standard VPN to a newly one called EEVPN (Effective Extensive VPN). It transmits a small data size in through a web based system in a reasonable time without affecting the security level. The proposed EEVPN is more effective where it takes small data transmission time with achieving high level of security. Also, the proposed EEVPN is more extensive because it is not built for a specific environment.
基金Project (No. 60373088) supported by the National Natural ScienceFoundation of China
文摘With the rapid development of Virtual Private Network (VPN), many companies and organizations use VPN to implement their private communication. Traditionally, VPN uses security protocols to protect the confidentiality of data, the message integrity and the endpoint authentication. One core technique of VPN is tunneling, by which clients can access the in- ternal servers traversing VPN. However, the tunneling technique also introduces a concealed security hole. It is possible that if one vicious user can establish tunneling by the VPN server, he can compromise the internal servers behind the VPN server. So this paper presents a novel Application-layer based Centralized Information Access Control (ACIAC) for VPN to solve this problem. To implement an efficient, flexible and multi-decision access control model, we present two key techniques to ACIAC—the centralized management mechanism and the stream-based access control. Firstly, we implement the information center and the constraints/events center for ACIAC. By the two centers, we can provide an abstract access control mechanism, and the material access control can be decided dynamically by the ACIAC’s constraint/event mechanism. Then we logically classify the VPN communication traffic into the access stream and the data stream so that we can tightly couple the features of VPN communication with the access control model. We also provide the design of our ACIAC prototype in this paper.
文摘Remote access is a means of accessing resources outside one’s immediate physical location. This has made employee mobility more effective and productive for most organizations. Remote access can be achieved via various channels of remote communication, the most common being Virtual Private Networks (VPNs). The demand for remote access is on the rise, especially during the Covid-19 pandemic, and will continue to increase as most organizations are re-structuring to make telecommuting a permanent part of their mode of operation. Employee mobility, while presenting organizations with some advantages, comes with the associated risk of exposing corporate cyber assets to attackers. The remote user and the remote connectivity technology present some vulnerabilities which can be exploited by any threat agent to violate the confidentiality, integrity and availability (CIA) dimensions of these cyber assets. So, how are users and remote devices authenticated? To what extent is the established connection secured? With employee mobility on the rise, it is necessary to analyze the user authentication role since the mobile employee is not under the monitoring radar of the organization, and the environment from which the mobile employee connects may be vulnerable. In this study, an experiment was setup to ascertain the user authentication roles. The experiment showed the process of 2FA in user authentication and it proved to be an effective means of improving user authentication during remote access. This was depicted via the use of what the user has (mobile phone/soft-token) as a second factor in addition to what the user knows, i.e. password. This authentication method overcomes the security weaknesses inherent in single-factor user authentication via the use of password only. However, the results also showed that though 2FA user authentication ensures security, the remote devices could exhibit further vulnerabilities and pose serious risks to the organization. Thus, a varied implementation was recommended to further enhance the security of remote access communication with regards to the remote user authentication.
文摘The underwater wireless communication with the complexity of attenuation and low propagation speed makes resource constraints in networking sensor nodes and sink.Underwater Sensor Transmission with Attenuation Calculation using Non Orthogonal Multiple Access(UWSTAC-NOMA)protocol has been proposed.This protocol calculates channel gain along with attenuation in underwater channels and provides internetworking sensor for rate allocation minimizing interference.Successive Interference Cancellation has been used at the receiving sensor to decode the information sent.The network level performance of sensors and increasing the data rate improves the overall throughput.Simultaneously,connecting several sensors to sink based on its depth region of deployment has been achieved using Underwater Sensor Transmission with Attenuation Calculation using Non Orthogonal Multiple Access(UWSTAC-NOMA).The analytical background of attenuation never confuted the simulation results of the proposed protocol in NS2 simulator.Simulation results shows that the throughput,average bit error rate and residual energy of sink performance.
文摘We discuss the concept of coarse wavelength-division multiplexing (CWDM) for metro networks. After reviewing the requirements on components such as lasers and fiber, we propose different architectures for a flexible upgrade of existing CWDM systems.
文摘This paper develops a prototype to demonstrate a full-duplex wireless visible light communication (VLC) system based on Universal Serial Bus (USB) port. Combing with a USB 2.0 port on one board, it can achieve up to 2 Mbps bit rates error free, which is mainly limited to the USB bridge circuit, between two computers for data transmission, such as text, audio and video. Hyper Terminal and self-written software are used to allow setting the transmission data rate, control bits, check bits and achieve real-time transmission between any two mobile devices with a USB port. The work is based on the research of VLC local access network. This paper also shows the experimental results and the relationship between system transmission eye diagram and bit rate.