<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="9788793237148.xsl"?>
<book id="home" xmlns:xlink="http://www.w3.org/1999/xlink">
<bookinfo>
<title>5G: 2020 and Beyond</title>
<authorgroup>
<author><firstname>Ramjee</firstname>
<surname>Prasad</surname>
</author>
</authorgroup>
<affiliation><emphasis role="strong">Founder Director, Center for TeleInFrastruktur (CTIF), Aalborg University, Denmark</emphasis></affiliation>
<affiliation><emphasis role="strong">Founder Chairman, Global ICT Standardization Forum for India (GISFI), India</emphasis></affiliation>
<publisher>
<publishername>River Publishers</publishername>
</publisher>
<isbn>9788793237148</isbn>
</bookinfo>
<preface class="preface" id="preface01">
<title>RIVER PUBLISHERS SERIES IN COMMUNICATIONS</title>
<para><emphasis>Consulting Series Editors</emphasis></para>
<para><emphasis role="strong">MARINA RUGGIERI</emphasis><?lb?><emphasis>University of Roma &#x0201C;Tor Vergata&#x0201D;</emphasis><?lb?><emphasis>Italy</emphasis></para>
<para><emphasis role="strong">HOMAYOUN NIKOOKAR</emphasis><?lb?><emphasis>Delft University of Technology</emphasis><?lb?><emphasis>The Netherlands</emphasis></para>
<para>This series focuses on communications science and technology. This includes the theory and use of systems involving all terminals, computers, and information processors; wired and wireless networks; and network layouts, procontentsols, architectures, and implementations.</para>
<para>Furthermore, developments toward newmarket demands in systems, products, and technologies such as personal communications services, multimedia systems, enterprise networks, and optical communications systems.</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Wireless Communications</para></listitem>
<listitem>
<para>Networks</para></listitem>
<listitem>
<para>Security</para></listitem>
<listitem>
<para>Antennas &#x00026; Propagation</para></listitem>
<listitem>
<para>Microwaves</para></listitem>
<listitem>
<para>Software Defined Radio</para></listitem></itemizedlist>
<para>For a list of other books in this series, visit <ulink url="http://www.riverpublishers.com">www.riverpublishers.com</ulink><?lb?><ulink url="http://riverpublishers.com/river publisher/series.php?msg=Communications">http://riverpublishers.com/river publisher/series.php?msg=Communications</ulink></para>
</preface>
<preface class="preface" id="preface02">
<blockquote>
<para>Dedicated to</para>
<para>My grand children Sneha, Ruchika, Akash, Arya and Ayush.</para>
</blockquote>
</preface>
<preface class="preface" id="preface03">
<title>Preface</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fm_fig01.jpg"/></para>
<blockquote>
<para>One cannot remain without engaging in activity at any time, even for a moment; certainly all living entities are helplessly compelled to action by the qualities endowed by material nature.</para>
<para>The Bhagavad Gita (3.5)</para>
</blockquote>
<para>The foremost focus of this book is on next major phase in mobile telecommunication technology &#x02013; fifth generation mobile technology (5G). The fifth generations of mobile systems will be a major stride in the mobile technology. Its standards would be beyond that of 4G. 5G is also referred as beyond 2020 mobile communications technology. Many scientific papers discuss the key concepts and techniques for the implementation of 5G systems. Some of them are, new data coding and modulation techniques, cognitive radio technology, multi-hop networks, Pervasive networks providing ubiquitous computing and so on. 5G can provide speed that would be at-least an order of magnitude higher than the mobile technology used these days.</para>
<para>Mobile giants such as Samsung, Ericsson, Huawei, Nokia Networks and Alcatel-Lucent have started their research on the development of 5G. Though some of the companies claim that they were successful in transmitting the data of 1.056 Gbps over a distance of 2 kilometres at extremely high frequencies, they do not expect these technologies to be commercialized till 2020.</para>
<para>The book discusses on providing the goals and implementation of a novel concept called Wireless Innovative System for Dynamically Operating Mega Communications (WISDOM) which becomes the main 5G definition point. Also, this book gives an idea of the sophisticated techniques to be implemented for making 5G a successful mobile generation than its predecessors. Certain contents for <link linkend="ch02">Chapter <xref linkend="ch2" remap="2"/></link> are based on WISDOM project proposal, <link linkend="ch03">Chapter <xref linkend="ch3" remap="3"/></link> is based on PhD thesis of Rajarshi Sanyal and <link linkend="ch04">Chapter <xref linkend="ch4" remap="4"/></link> is based on Purnendu S.M. Tripathi&#x02019;s thesis.</para>
<para>The book is organized into the following chapters portrayed in the form a tree.</para>
<fig id="FM-1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="FM-1">Figure <xref linkend="FM-1" remap="1"/></link></label>
<caption><para>Structure of the book.</para></caption>
<graphic xlink:href="graphics/fm_fig02.jpg"/>
</fig>
<para>This book is an outcome of the recent effort in my academic garden, and I derive a sense of satisfaction from it similar to that drawn by a gardener on seeing blooming flowers. Further suggestions and comments to enhance the book and the concepts discussed therein are highly welcome.</para>
</preface>
<preface class="preface" id="preface04">
<title>List of Acronomys</title>
<table-wrap position="float">
<table cellspacing="5" cellpadding="5" frame="none" rules="none">
<tbody>
<tr>
<td valign="top" align="left">1G</td>
<td valign="top" align="left">First Generation Mobile Technology</td>
</tr>
<tr>
<td valign="top" align="left">2G</td>
<td valign="top" align="left">Second Generation Mobile Technology</td>
</tr>
<tr>
<td valign="top" align="left">3G</td>
<td valign="top" align="left">Third Generation Mobile Technology</td>
</tr>
<tr>
<td valign="top" align="left">4G</td>
<td valign="top" align="left">Fourth Generation Mobile Technology</td>
</tr>
<tr>
<td valign="top" align="left">5G</td>
<td valign="top" align="left">Fifth Generation Mobile Technology</td>
</tr>
<tr>
<td valign="top" align="left">AMPS</td>
<td valign="top" align="left">Advanced Mobile Phone System</td>
</tr>
<tr>
<td valign="top" align="left">AP</td>
<td valign="top" align="left">Application Points</td>
</tr>
<tr>
<td valign="top" align="left">BMWA</td>
<td valign="top" align="left">Beam Width Multiple Access</td>
</tr>
<tr>
<td valign="top" align="left">CDMA</td>
<td valign="top" align="left">Code Division Multiple Access</td>
</tr>
<tr>
<td valign="top" align="left">CN</td>
<td valign="top" align="left">Cognitive Networks</td>
</tr>
<tr>
<td valign="top" align="left">CUS</td>
<td valign="top" align="left">Collective Use of Spectrum</td>
</tr>
<tr>
<td valign="top" align="left">CMOS</td>
<td valign="top" align="left">Complementary Metal Oxide Semiconductor Components</td>
</tr>
<tr>
<td valign="top" align="left">CONASENSE</td>
<td valign="top" align="left">COmmunication-NAvigation-SENsing-SErvices</td>
</tr>
<tr>
<td valign="top" align="left">CPS</td>
<td valign="top" align="left">Cyber Physical Structure</td>
</tr>
<tr>
<td valign="top" align="left">CR</td>
<td valign="top" align="left">Cognitive Radio</td>
</tr>
<tr>
<td valign="top" align="left">DoS</td>
<td valign="top" align="left">Denial of Service</td>
</tr>
<tr>
<td valign="top" align="left">DSSS</td>
<td valign="top" align="left">Direct-Sequence Spread Spectrum</td>
</tr>
<tr>
<td valign="top" align="left">EDGE</td>
<td valign="top" align="left">Enhanced Data Rate for GSM Evolution</td>
</tr>
<tr>
<td valign="top" align="left">FPGA</td>
<td valign="top" align="left">Field Programmable Gate Array</td>
</tr>
<tr>
<td valign="top" align="left">FDD</td>
<td valign="top" align="left">Frequency Division Duplex</td>
</tr>
<tr>
<td valign="top" align="left">FDMA</td>
<td valign="top" align="left">Frequency Division Multiple Access</td>
</tr>
<tr>
<td valign="top" align="left">GPRS</td>
<td valign="top" align="left">General Packet Radio Service</td>
</tr>
<tr>
<td valign="top" align="left">GSM</td>
<td valign="top" align="left">Global System for Mobile Communications</td>
</tr>
<tr>
<td valign="top" align="left">GIMCV</td>
<td valign="top" align="left">Global Information Multimedia Communication Village</td>
</tr>
<tr>
<td valign="top" align="left">GICT</td>
<td valign="top" align="left">Green Information Communication Technology</td>
</tr>
<tr>
<td valign="top" align="left">HAP</td>
<td valign="top" align="left">High Altitude Platform</td>
</tr>
<tr>
<td valign="top" align="left">HBC</td>
<td valign="top" align="left">Human Bond Communication</td>
</tr>
<tr>
<td valign="top" align="left">ITS</td>
<td valign="top" align="left">Intelligent Transport System</td>
</tr>
<tr>
<td valign="top" align="left">IDP</td>
<td valign="top" align="left">Intrusion Detection and Prevention</td></tr>
<tr>
<td valign="top" align="left">IoT</td>
<td valign="top" align="left">Internet of Things</td>
</tr>
<tr>
<td valign="top" align="left">LOS</td>
<td valign="top" align="left">Line of Sight</td>
</tr>
<tr>
<td valign="top" align="left">LTE</td>
<td valign="top" align="left">Long Term Evolution</td>
</tr>
<tr>
<td valign="top" align="left">M2M</td>
<td valign="top" align="left">Machine-to-Machine</td></tr>
<tr>
<td valign="top" align="left">MAC</td>
<td valign="top" align="left">Medium Access Control</td>
</tr>
<tr>
<td valign="top" align="left">MEA</td>
<td valign="top" align="left">Microwave Endometrial Ablation</td></tr>
<tr>
<td valign="top" align="left">MANET</td>
<td valign="top" align="left">Mobile Ad Hoc Networks</td>
</tr>
<tr>
<td valign="top" align="left">MIMO</td>
<td valign="top" align="left">Multiple-Input and Multiple-Output</td>
</tr>
<tr>
<td valign="top" align="left">NTT</td>
<td valign="top" align="left">Nippon Telephone and Telegraph</td>
</tr>
<tr>
<td valign="top" align="left">NMT</td>
<td valign="top" align="left">Nordic Mobile Telephones</td>
</tr>
<tr>
<td valign="top" align="left">OPEX</td>
<td valign="top" align="left">Operational Expenditure</td>
</tr>
<tr>
<td valign="top" align="left">OFDM</td>
<td valign="top" align="left">Ortho Frequency Division Multiplexing</td>
</tr>
<tr>
<td valign="top" align="left">P2M</td>
<td valign="top" align="left">Person-to-Machine</td></tr>
<tr>
<td valign="top" align="left">PHY</td>
<td valign="top" align="left">Layer Physical layer</td>
</tr>
<tr>
<td valign="top" align="left">QOS</td>
<td valign="top" align="left">Quality of Service</td>
</tr>
<tr>
<td valign="top" align="left">QoL</td>
<td valign="top" align="left">Quality of Life</td>
</tr>
<tr>
<td valign="top" align="left">RFID</td>
<td valign="top" align="left">Radio Frequency Identification</td>
</tr>
<tr>
<td valign="top" align="left">SDR</td>
<td valign="top" align="left">Software Defined Radio</td>
</tr>
<tr>
<td valign="top" align="left">TDMA</td>
<td valign="top" align="left">Time Division Multiple Access</td>
</tr>
<tr>
<td valign="top" align="left">TACS</td>
<td valign="top" align="left">Total Access Communication Systems</td>
</tr>
<tr>
<td valign="top" align="left">UMTS</td>
<td valign="top" align="left">Universal Mobile Telecommunication System</td>
</tr>
<tr>
<td valign="top" align="left">UE</td>
<td valign="top" align="left">User Equipment</td>
</tr>
<tr>
<td valign="top" align="left">VPN</td>
<td valign="top" align="left">Virtual Private Networks</td>
</tr>
<tr>
<td valign="top" align="left">V2I</td>
<td valign="top" align="left">Vehicular-to-Infrastructure</td>
</tr>
<tr>
<td valign="top" align="left">WISDOM</td>
<td valign="top" align="left">Wireless Innovative System for Dynamically Operating Mega Communications</td>
</tr>
<tr>
<td valign="top" align="left">WiMax</td>
<td valign="top" align="left">Wireless Interoperability for Microwave Access</td>
</tr>
<tr>
<td valign="top" align="left">WMAN</td>
<td valign="top" align="left">Wireless Metropolitan Area Network</td>
</tr>
<tr>
<td valign="top" align="left">WLAN</td>
<td valign="top" align="left">Wireless Local Area Network</td>
</tr>
<tr>
<td valign="top" align="left">WPAN</td>
<td valign="top" align="left">Wireless Personal Area Network</td>
</tr>
<tr>
<td valign="top" align="left">WSN</td>
<td valign="top" align="left">Wireless Sensor Networks</td>
</tr>
<tr>
<td valign="top" align="left">WWAN</td>
<td valign="top" align="left">Wireless Wide Area Network</td></tr>
</tbody>
</table>
</table-wrap>
</preface>
<preface class="preface" id="preface05">
<title>List of Figures</title>
<table-wrap position="float">
<table cellspacing="5" cellpadding="5" frame="none" rules="none">
<tbody>
<tr><td valign="top" width="15%"><emphasis role="strong"><link linkend="F1-1">Figure <xref linkend="F1-1" remap="1.1"/></link></emphasis></td><td valign="top" align="left">Tree of Standards [1]</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F1-2">Figure <xref linkend="F1-2" remap="1.2"/></link></emphasis></td><td valign="top" align="left">Global Connectivity through WISDOM [1]</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F1-3">Figure <xref linkend="F1-3" remap="1.3"/></link></emphasis></td><td valign="top" align="left">Global Information Multimedia Communication Village [3]</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F1-4">Figure <xref linkend="F1-4" remap="1.4"/></link></emphasis></td><td valign="top" align="left">Standardization of WISDOM [3]</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F1-5">Figure <xref linkend="F1-5" remap="1.5"/></link></emphasis></td><td valign="top" align="left">Plethora of technologies to deliver 5G services and applications [6]</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F2-1">Figure <xref linkend="F2-1" remap="2.1"/></link></emphasis></td><td valign="top" align="left">WISDOM a new paradigm [1]</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F2-2">Figure <xref linkend="F2-2" remap="2.2"/></link></emphasis></td><td valign="top" align="left">Pillars of WISDOM [1]</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F2-3">Figure <xref linkend="F2-3" remap="2.3"/></link></emphasis></td><td valign="top" align="left">Converged architecture of WISDOM [2]</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F2-4">Figure <xref linkend="F2-4" remap="2.4"/></link></emphasis></td><td valign="top" align="left">WISDOM Architecture [2]</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F2-5">Figure <xref linkend="F2-5" remap="2.5"/></link></emphasis></td><td valign="top" align="left">Network architecture scenarios for short-range communications [2]</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F2-6">Figure <xref linkend="F2-6" remap="2.6"/></link></emphasis></td><td valign="top" align="left">Network architecture scenarios for outdoor mobile communications [2]</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F2-7">Figure <xref linkend="F2-7" remap="2.7"/></link></emphasis></td><td valign="top" align="left">Scenario for next generation cellular networks [2]</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F2-8">Figure <xref linkend="F2-8" remap="2.8"/></link></emphasis></td><td valign="top" align="left">WISDOM Node and WISDOM Station [2]</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F2-9">Figure <xref linkend="F2-9" remap="2.9"/></link></emphasis></td><td valign="top" align="left">End&#x02013;to-End System Architecture [2]</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F3-1">Figure <xref linkend="F3-1" remap="3.1"/></link></emphasis></td><td valign="top" align="left">Three methods of D2D communication for M2M devices</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F3-2">Figure <xref linkend="F3-2" remap="3.2"/></link></emphasis></td><td valign="top" align="left">Interaction between the initiating device, candidate (pair) device and base station for realizing network assisted D2D communication</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F3-3">Figure <xref linkend="F3-3" remap="3.3"/></link></emphasis></td><td valign="top" align="left">TDMA frame</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F3-4">Figure <xref linkend="F3-4" remap="3.4"/></link></emphasis></td><td valign="top" align="left">Constellation diagram</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F3-5">Figure <xref linkend="F3-5" remap="3.5"/></link></emphasis></td><td valign="top" align="left">The multiplexer unit in the access network</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F3-6">Figure <xref linkend="F3-6" remap="3.6"/></link></emphasis></td><td valign="top" align="left">High level functionality of Coordination Processor</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F3-7">Figure <xref linkend="F3-7" remap="3.7"/></link></emphasis></td><td valign="top" align="left">Aggregate frame formation in the uplink and user (A number) identification by Coordination Processor</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F3-8">Figure <xref linkend="F3-8" remap="3.8"/></link></emphasis></td><td valign="top" align="left">Frame formation in the downlink</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F3-9">Figure <xref linkend="F3-9" remap="3.9"/></link></emphasis></td><td valign="top" align="left">Integration of SMNAT with EPC</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F3-10">Figure <xref linkend="F3-10" remap="3.10"/></link></emphasis></td><td valign="top" align="left">Call flow between UE, SMNAT access and EPC core</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F3-11">Figure <xref linkend="F3-11" remap="3.11"/></link></emphasis></td><td valign="top" align="left">Coexistence of WISDOM 5G and SMNAT</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F3-12">Figure <xref linkend="F3-12" remap="3.12"/></link></emphasis></td><td valign="top" align="left">D2D Channel establishment based on proximity of the paired device</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F3-13">Figure <xref linkend="F3-13" remap="3.13"/></link></emphasis></td><td valign="top" align="left">End&#x02013;to-End communication channel establishment for D2D</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F3-14">Figure <xref linkend="F3-14" remap="3.14"/></link></emphasis></td><td valign="top" align="left">Network initiated D2D channel establishment</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F3-15">Figure <xref linkend="F3-15" remap="3.15"/></link></emphasis></td><td valign="top" align="left">Key generation process</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F4-1">Figure <xref linkend="F4-1" remap="4.1"/></link></emphasis></td><td valign="top" align="left">Command and Control Method [1].</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F4-2">Figure <xref linkend="F4-2" remap="4.2"/></link></emphasis></td><td valign="top" align="left">Concept of CR Device [4].</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F4-3">Figure <xref linkend="F4-3" remap="4.3"/></link></emphasis></td><td valign="top" align="left">Measurement setup.</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F4-4">Figure <xref linkend="F4-4" remap="4.4"/></link></emphasis></td><td valign="top" align="left">Rice factor <emphasis>k</emphasis> versus distance in the corridor. Directional receiver antenna used.</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F4-5">Figure <xref linkend="F4-5" remap="4.5"/></link></emphasis></td><td valign="top" align="left">Broadband average received power in the corridor with omnidirectional receiver antenna used.</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F4-6">Figure <xref linkend="F4-6" remap="4.6"/></link></emphasis></td><td valign="top" align="left">A scatter of the plot of the measured power [dB] versus the distance on a log scale for outdoor location (parking) with omnidirectional antenna.</td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="F6-1">Figure <xref linkend="F6-1" remap="6.1"/></link></emphasis></td><td valign="top" align="left">WISDOM, HBC and CONASENSE Collectively.</td></tr>
</tbody>
</table>
</table-wrap>
</preface>
<preface class="preface" id="preface06">
<title>List of Table</title>
<table-wrap position="float">
<table cellspacing="5" cellpadding="5" frame="none" rules="none">
<tbody>
<tr><td valign="top" width="15%"><emphasis role="strong"><link linkend="T1-1">Table <xref linkend="T1-1" remap="1.1"/></link></emphasis></td><td valign="top" align="left">Significant 5G Initiatives till date</td></tr>
</tbody>
</table>
</table-wrap>
</preface>
<preface class="preface" id="preface07">
<title>Acknowledgements</title>
<para>I would like to express my heartfelt gratitude to my colleagues and students contributing in developing the concept of 5G. Specifically, to Sahiti for the overall design and concept of the book; Rajarshi for providing inputs to <link linkend="ch03">Chapter <xref linkend="ch3" remap="3"/></link>; Purnendu for inputs to <link linkend="ch04">Chapter <xref linkend="ch4" remap="4"/></link>, and Prateek for inputs to <link linkend="ch05">Chapter <xref linkend="ch5" remap="5"/></link> and in formatting the book. I am also thankful to the partners involved in the WISDOM proposal that led to formalization of the WISDOM architecture.</para>
<para>Finally, I would like to thank several of my colleagues and students who played a role in initiating 5G research at CTIF namely, Albena, Hanuma, Neeli, Rasmus, Sofoklis, Ambuj, and so on.</para>
</preface>
<preface class="preface" id="preface08">
<title>Contents</title>
<table-wrap position="float">
<table cellspacing="5" cellpadding="5" frame="none" rules="none">
<tbody>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch01">1 Introduction</link></emphasis></td><td valign="top" align="left" width="20%"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C1.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch02">2 WISDOM Concept and Challenges</link></emphasis></td><td valign="top" align="left" width="20%"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C2.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch03">3 SMNAT as Enabler of Device-to-Device Communication</link></emphasis></td><td valign="top" align="left" width="20%"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C3.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch04">4 Dynamic Spectrum Management and mm-WAVES</link></emphasis></td><td valign="top" align="left" width="20%"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C4.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch05">5 CYBER Security and Threats</link></emphasis></td><td valign="top" align="left" width="20%"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C5.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch06">6 BEYOND 2020</link></emphasis></td><td valign="top" align="left" width="20%"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C6.pdf">Download As PDF</ulink></td></tr>
</tbody>
</table>
</table-wrap>
</preface>
<chapter class="chapter" id="ch01" label="1" xreflabel="1">
<title>Introduction</title>
<para>In the last decade world has witnessed a tremendous growth in the wireless technologies. The result is an enormous growth in the evolution of various wireless communication devices like smart phones, laptops, tablets. Due to the enormous growth in the number of these devices for various applications, there is also the requirement for the development of various wireless solutions that are cost effective and reliable. The focus on the mobile wireless communications is dominant as it is the main means of communication in the world.</para>
<para>Based on the type of services and data transfer speeds, mobile wireless technologies have been classified according to their generations. They are shown in the form a tree in the <link linkend="F1-1">Figure <xref linkend="F1-1" remap="1.1"/></link> for easy understanding and are explained below.</para>
<fig id="F1-1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F1-1">Figure <xref linkend="F1-1" remap="1.1"/></link></label>
<caption><para>Tree of Standards [1].</para></caption>
<graphic xlink:href="graphics/ch01_fig01.jpg"/>
</fig>
<section class="lev1" id="sec1-1">
<title>1.1 Mobile Wireless Technology Generations</title>
<para>The first generation mobile systems (1G) were analogue. The first cellular system was put into operation in 1978 by Nippon Telephone and Telegraph (NTT) in Tokyo, Japan. Some of the most popular analogue cellular systems were Nordic Mobile Telephones (NMT) and Total Access Communication Systems (TACS), Advanced Mobile Phone System (AMPS). AMPS and TACS use frequency modulation technique for the radio transmission. The inevitable disadvantage of this generation of mobile systems is that, even though these systems rendered handover and roaming capabilities the cellular networks were not able to interoperate among countries. Multiplexed traffic is carried over a Frequency Division Multiple Access (FDMA) system [2]. The second generation mobile systems (2G) are based on the standard Global System for Mobile Communications (GSM). GSM appeared first in 1991 and they are digital cellular systems. Digital communications enable advanced source coding techniques to be implemented thus allowing the spectrum to be used much more efficiently. This also reduces the bandwidth required for voice and video [2, 3].</para>
<para>The main disadvantage with GSM is that it could handle a maximum data rate of 9.6 kbps which is too slow for the Internet related services. The 2G was subsequently superseded by 2.5G and 2.7G.</para>
<para>2.5G systems are evolved based on the General Packet Radio Service (GPRS) standard. These systems support Wireless Application Protocol, Multimedia Message Service, Short Message Service, mobile games, and search and directory mobile services.</para>
<para>2.75G systems are evolved based on standard Enhanced Data rate for GSM Evolution (EDGE) and this technology is an extended version of GSM. Data transfer rate is high compared to GPRS.</para>
<para>The third generation mobile systems (3G) systems were designed to provide a very high speed Internet access (about 384 kbps in burst mode). Some of the important services that these systems support are wide area wireless voice telephony, video calls, broadband wireless data and additional services like mobile television, Global Positioning System (GPS), other real time audio, video broadcast services. The three important technologies that paved the way to the development of 3G systems are given in reference [3]:</para>
<para>Universal Mobile Telecommunication System (UMTS) was developed that used Frequency Division Duplex (FDD) for forward and backward channels. With the help of wideband Code Division Multiple Access 5MHz channel spacing, high data rates of up to 2 Mbps can be achieved.</para>
<para>Time Division Synchronous CDMA (TD-SCDMA) used 1.6 MHz channel spacing.</para>
<para>The fourth generation mobile system (4G) offered very high speeds of up to 100 Mbps. The important feature of 4G systems are the high quality video and audio streaming over end to end Internet Protocol. The two important standards in 4G technologies are Worldwide Interoperability for microwave Access (WiMax) and Long Term Evolution (LTE). 4G is the current technology used all over the important places of the world. But there are many countries where the 4G services are not yet accessible because of the spectrum related issues [4, 5].</para>
</section>
<section class="lev1" id="sec1-2">
<title>1.2 5G &#x02013; From History to the Present and Future</title>
<para>The concept of realizing next generation communication systems in the form of 5th Generation communication network based on Wireless System for Dynamic Operating Mega Communications (WISDOM) followed by other leading initiatives at research facilities in industry and academia is as shown in <link linkend="T1-1">Table <xref linkend="T1-1" remap="1.1"/></link>. The operational concept of WISDOM has been discussed in detail in the following subsection and the various specific details related with its operation, and operational challenges that WISDOM &#x02013; 5G would require to overcome have been elaborated in <link linkend="ch02">Chapter <xref linkend="ch2" remap="2"/></link>.</para>
<table-wrap position="float" id="T1-1">
<label><link linkend="T1-1">Table <xref linkend="T1-1" remap="1.1"/></link></label>
<caption><para>Significant 5G Initiatives till date.</para></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<td valign="top" align="left">Year</td>
<td valign="top" align="left">5G Initiative</td>
<td valign="top" align="left">Entity</td>
<td valign="top" align="left">Country</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">2008 February</td>
<td valign="top" align="left">WISDOM: Wireless Innovative System for Dynamic Operating Mega Communications [1]<!--br /--></td>
<td valign="top" align="left">Keynote Speech:<?lb?><emphasis role="strong">First International IEEE Conference on Cognitive Radio and Advanced Spectrum Management</emphasis><?lb?>Center for TeleInFrastruktur, Aalborg University</td>
<td valign="top" align="left">Denmark</td>
</tr>
<tr>
<td valign="top" align="left">2008 November</td>
<td valign="top" align="left">5G through<?lb?>WISDOM [7]</td>
<td valign="top" align="left">Center for TeleInFrastruktur, Aalborg University</td>
<td valign="top" align="left">Denmark</td>
</tr>
<tr>
<td valign="top" align="left">2008 November</td>
<td valign="top" align="left">5G systems based on Beam Division Multiple Access [7]</td>
<td valign="top" align="left">South Korea IT R&#x00026;D department</td>
<td valign="top" align="left">South Korea</td>
</tr>
<tr>
<td valign="top" align="left">2012 May</td>
<td valign="top" align="left">First 5G System [7]</td>
<td valign="top" align="left">Samsung Electronics</td>
<td valign="top" align="left">South Korea</td>
</tr>
<tr>
<td valign="top" align="left">2012 October</td>
<td valign="top" align="left">5G Research Center [7]</td>
<td valign="top" align="left">University of Surrey</td>
<td valign="top" align="left">United Kingdom</td>
</tr>
<tr>
<td valign="top" align="left">2013 November</td>
<td valign="top" align="left">Research on 5G systems [7]</td>
<td valign="top" align="left">Huawei Technologies Co. Ltd</td>
<td valign="top" align="left">China</td></tr>
</tbody>
</table>
</table-wrap>
<para>It has been long since the rollout of 4G based services by the cellular companies. Advent and possible utilization of 5G based services in future is already picking up. 5G based services are expected to commence from 2020. High data rate is expected to usher a new digital age ubiquitous communication for the masses that is unimaginable to be fulfilled by today&#x02019;s communication networks. 5G mobile wireless communications are expected to incorporate a large number of advanced technologies in order to increase the bandwidth further; Quality of Service (QoS), improve usability and security, decrease delays and cost of service. Some of the interesting services that users can experience are wearable or flexible mobile devices, Ultra High Display video streaming, smart navigation, mobile cloud, real time interactive games. Spectrum remains a key challenge for 5G, high frequency bands are to be explored to achieve those higher data rates than any other currently emerging technology. Some sources specify that when 5G arrives, it will have to handle billions of devices and myriad traffic types. It will offer improved reception and less network congestion, allowing for better connectivity and smoother roaming functionality [1].</para>
</section>
<section class="lev1" id="sec1-3">
<title>1.3 WISDOM (Wireless Innovative System for Dynamically Operating Mega Communications)</title>
<para>WISDOM is an important and novel concept that defines 5G. The main reason for its description in this chapter is that it is an evolution towards a new communication connectivity era, which will offer the frequencies up to Tera Hertz and data rate up to Tera bps.</para>
<para>The fastest communication and ubiquitous connectivity is the foremost priority of the present era with the need of quick data transfer, distant business correspondence by sharing data and use of single IP for worldwide connectivity using hand held mobile.</para>
<para>To make it happen, the 5G network is assumed as the perfection level in mobile technology, which provides real life mobility. In this regard WISDOM is expected to advance the state-of-the-art in the architecture of next generation of wireless networks and cognitive technologies for higher data rates up to 1 Tera bps.</para>
<para>The relation between WISDOM and 5G can be expressed like this:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq1-1.jpg"/></para>
<para>The 4G and WISDOM concept will lead the wireless communication towards the realization of true 5G systems.</para>
<para>The main motivation for the development of the WISDOM concept for 5G is the needs of the society 2020 and beyond. These days, there is an exponential increase in wireless access bandwidth that is commercially available to the end user.</para>
<para>This will continue to increase in future wireless networks, taken by the rising needs of the mass market in the fields of bandwidth demanding applications such as entertainment, multimedia, Intelligent Transport Systems (ITS), telemedicine, emergency and safety/security applications [1].</para>
<para>Also the futuristic applications like 3D Internet, virtual and augmented reality that combines data for all senses, audio, visual, haptic, digital scent (e.g., tele-haptic applications, like planet or deep sea exploration), networked virtual reality (e.g., video streaming in social networks &#x02013; users stream their own reality), and tele-presence (e.g., immersive environments with applications in both the commercial and military fields) can push the demand for real-time symmetric wireless connectivity to an individual with a data rate of 300 Mbps [1].</para>
<para>WISDOM aims for up to 1 Tbit/s (1 Tera bps = 10<superscript>12</superscript> bits/s) wireless link rates in short-distance burst-mode or for up to 1 Tbit/s of system aggregated traffic with sustainable symmetric link rates of larger than 300 Mbps to mobile terminals at high speed [1, 3, 6, 7]. The communication at 1 Tbit/s is expected to be achieved utilizing millimetre waves (around 30 GHz and above), this has been discussed further in <link linkend="ch04">Chapter <xref linkend="ch4" remap="4"/></link>.</para>
<para>Existing wireless technologies like 3G+ cellular, WiMax IEEE 802.16e, Wi-Fi, Wi-Media as well as the corresponding emerging next generation networks (LTE/LTE-advanced, IEEE 802.16m, IEEE 802.11n, etc.) in the Wireless Wide Area Network (WWAN), Wireless Local Area Network (WLAN) and Wireless Personal Area Network (WPAN) scales are not expected to meet such demanding needs for data rates.</para>
<para>WISDOM is a way towards 5G with a coverage extending from a city region to a country, continents and the world as shown in the <link linkend="F1-2">Figure <xref linkend="F1-2" remap="1.2"/></link> forming a Global Information Multimedia Communication Village (GIMCV). Considering a user to shift between geographical locations swiftly and rely on different access networks, WISDOM based 5G network would be capable of dynamically aligning the communication network to support drastic changes in the overall network topology and therefore referred as dynamically operating mega communications based system.</para>
<para>In brief the key features of WISDOM are [6, 7]:</para>
<orderedlist numeration="loweralpha" continuation="restarts" spacing="normal">
<listitem>
<para>combines established, competitive cellular standards with a promising frequency spectrum and novel enabling technologies;</para></listitem>
<listitem>
<para>reduced coverage, electricity and operational expenditure (OPEX) costs;</para></listitem>
<listitem>
<para>offers scalable and flexible technology options.</para></listitem></orderedlist>
<fig id="F1-2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F1-2">Figure <xref linkend="F1-2" remap="1.2"/></link></label>
<caption><para>Global Connectivity through WISDOM [1].</para></caption>
<graphic xlink:href="graphics/ch01_fig002.jpg"/>
</fig>
</section>
<section class="lev1" id="sec1-4">
<title>1.4 Global Information Multimedia Communication Village (GIMCV)</title>
<para>The different applications of the WISDOM network includes, home and office network, medical and health care, IT services, entertainment-movies high-speed data transfer, educational systems, rescue vehicular communications, meteorology, security, aviation, global communication, smart town, virtual reality, intelligent transportation systems, and so forth.</para>
<para>All these diverse applications of WISDOM are the operating functionality and basis for the Global Information Multimedia Communication Village (GIMCV) as shown in the <link linkend="F1-3">Figure <xref linkend="F1-3" remap="1.3"/></link>.</para>
<para>The Global Information Multimedia Communication Village consists of national and international zones which are divided into macro cells (Suburban, Regional and National network). Macro cells comprise many micro cells (city &#x02013; centres/highway networks), it further contains small pico-cells (in-house &#x02013; network) where there are many small personal area networks. It gives scope for WISDOM application which varies from a person in home to globe from where they belong. It is the way of groupings of the devices in close vicinity of user [3].</para>
<fig id="F1-3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F1-3">Figure <xref linkend="F1-3" remap="1.3"/></link></label>
<caption><para>Global Information Multimedia Communication Village [1].</para></caption>
<graphic xlink:href="graphics/ch01_fig003.jpg"/>
</fig>
<para>The new 5G network is expected to improve the services and applications offered by GIMCV. WISDOM is a dynamic entity for human centric systems offering GIMCV.</para>
</section>
<section class="lev1" id="sec1-5">
<title>1.5 Requirements of 5G</title>
<para>Based on the operational requirements of WISDOM based 5G to support a data rate of 1 Tbit/s there are certain things necessitated in the conventional networks. The requirement of the network is categorized into pico, micro and macro cells. It would be necessary for the mobile terminal to be recognized with a single ID so as to allow seamless network connectivity irrespective of the access network. The envisioned high data rate applications would necessitate that possible authentication and access validation to the mobile device are granted in miniscule time period, i.e., latency as low as 1 ms [8]. This would also necessitate minimization of possible shadowing effect and path loss due to be absolutely minimized. Utilization of distributed antenna systems (DAS) and multi-input and multi-output (MIMO) antennas would be unavoidable. The current MIMO systems would be insufficient and the requirement would be for massive MIMOs [9]. Similarly, the capability of mobile devices to communicate directly, bypassing the conventional network infrastructure, i.e., base station, would be necessary.</para>
<para>As stated earlier the high data rate operations would necessitate measures that can minimize latency to the absolute minimum. The capacity of mobile devices to initiate and establish cellular connections among themselves would be highly beneficial, commonly referred as device-to-device communication (D2D). Utility of D2D in WISDOM 5G communications has been elaborated extensively in <link linkend="ch03">Chapter <xref linkend="ch3" remap="3"/></link>. The current cellular operation spectrum bands are excessively crowded. The high data rate and existing spectrum situation would necessitate utilization of frequency bands that are conventionally not utilized for cellular radio communications. Frequency bands, higher than referred as mm bands mm-waves are capable of supporting the high data rated along with use of visible light communication (VLC), are two frequency bands that can suffice the operational requirements. Details about mm bands for WISDOM based 5G communication have been elaborated in <link linkend="ch04">Chapter <xref linkend="ch4" remap="4"/></link>. Apart from the using these frequency bands the core network would require to rely on cognitive radio technology for ensuring reliable high data services especially for supporting it on mobile devices that are mobile and change geographic locations swiftly. The relevant concepts for effective spectrum utilization in economic aspects of spectrum trading and sharing have been also elaborated in <link linkend="ch04">Chapter <xref linkend="ch4" remap="4"/></link>. The capacity of ubiquitous communication as envisioned to be provided in WISDOM 5G based communications would require specific measures in respect of security and privacy. Various aspects relating with security and privacy challenges and appropriate strategy to address them have been discussed in <link linkend="ch05">Chapter <xref linkend="ch5" remap="5"/></link>. Possible technologies such as Human Bond Communication and COmmunications-NAvigation-SENsing-SErvices that would be significant for fulfilling communication needs of society in 2020 in relation to 5G have been elaborated in <link linkend="ch06">Chapter <xref linkend="ch6" remap="6"/></link>.</para>
<fig id="F1-4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F1-4">Figure <xref linkend="F1-4" remap="1.4"/></link></label>
<caption><para>Standardization of WISDOM [1].</para></caption>
<graphic xlink:href="graphics/ch01_fig004.jpg"/>
</fig>
</section>
<section class="lev1" id="sec1-6">
<title>1.6 Standardization of WISDOM</title>
<para>The major areas where the standardization of WISDOM shown in the <link linkend="F1-4">Figure <xref linkend="F1-4" remap="1.4"/></link> is required are [3]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para><emphasis>Multimedia Communications</emphasis> where it needs to focus on the areas of Machine-to-Machine (M2M) and Peer-to-Peer (P2P) with global identifications for home networking and smart cities and Techno-social Systems.</para></listitem>
<listitem>
<para><emphasis>Cognitive Communications</emphasis> where WISDOM based personalized cognitive communication includes all the educational, office, community, emergency, commercial and intelligent transportation systems.</para></listitem>
<listitem>
<para><emphasis>Personalized Medicine</emphasis> includes bioinformatics, multi-sensor networks, body sensors, and data protection and ethical guidelines.</para></listitem>
<listitem>
<para><emphasis>Network without borders</emphasis> basically comprises the wide range communications for the future Internet or the next generation networks. The main focus is on the Physical layer security, management and resource optimization, identity management, cooperative communications and Internet of things.</para></listitem>
<listitem>
<para><emphasis>Embedded Optimal Resource and Computing</emphasis> It has Energy harvesting techniques and models, time and power conscious hardware (HW)/software (SW) code sign methodologies, terminal energy trade-offs and energy aware reconfigurable and heterogeneous Architectures.</para></listitem>
<listitem>
<para><emphasis>Positioning and Localization</emphasis> includes the navigation systems, ubiquitous and cooperative localization, geo tagging, navigation ID systems and Robotics.</para></listitem></itemizedlist>
<section class="lev2" id="sec1-6-1">
<title>1.6.1 Global ICT Standardisation Forum for India</title>
<para>Global ICT Stadardisation Forum for India (GISFI, <ulink url="http://www.gisfi.org/">http://www.gisfi.org/</ulink>) is playing a pivotal role in formalizing standards for 5G based on WISDOM that ensure the overall operational objective of uninterrupted Tera bps data rate to the end user and support human centric computing [13]. GISFI is addressing the aforesaid objective through its working groups that are looking into sub-aspects pertaining to it. There are seven working groups at GISI, which are as follows:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Security and Privacy</para></listitem>
<listitem>
<para>Future Radio Networks and 5G</para></listitem>
<listitem>
<para>Internet of Things (IoT)</para></listitem>
<listitem>
<para>Cloud and Service Oriented Network</para></listitem>
<listitem>
<para>Green ICT</para></listitem></itemizedlist>
<para>In addition to the working groups there are two additional groups:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Special Interest Group</para></listitem>
<listitem>
<para>Spectrum Group</para></listitem></itemizedlist>
<para>GISFI has produced several documents covering the various aspects of standardization related to 5G through the working groups and they have been submitted to the government bodies such as International Telecommunication Union-T (ITU-T, Standardisation), Department of Telecom India (DoT) and Telecom Regulatory Authority of India (TRAI). Provided inputs to Telecommunication Engineering Center (TEC), DoT on &#x0201C;Implementations of directions issued by DOT on TRAI recommendations on &#x02018;Approach toward Green Telecommunications&#x0201D;&#x02019; and emergency telecom services to TRAI amongst many others.</para>
</section>
</section>
<section class="lev1" id="sec1-7">
<title>1.7 Vision of 5G</title>
<para>The overall vision of 5G can be summarized into the following broad also shown in <link linkend="F1-5">Figure <xref linkend="F1-5" remap="1.5"/></link> [6].</para>
<section class="lev2" id="sec1-7-1">
<title>1.7.1 Enabling the 5G Intelligent Core</title>
<para>M2M and IoT are the two major criteria for realizing the intelligent core, which in turn is the key for enabling seamless ubiquitous networking and connectivity in a 5G context.</para>
<para>M2M and IoT are the key enabling technologies for a pervasive and always-connected 5G mobile services. Research challenges to fully deployable intelligent core are related but not limited to handling the big data collected through M2M and IoT communications (e.g., heterogeneous gateways, energy efficiency, decentralization of routing, naming and addressing), and to security, privacy and trust.</para>
</section>
<section class="lev2" id="sec1-7-2">
<title>1.7.2 Enabling Ubiquitous Connectivity</title>
<para>This feature has two aspects. On one hand, technical challenges relate to sufficient coverage range even in a scenario of very high mobility and data rates, and on the other, to moving application from device-to-device without any content interruption.</para>
<para>Use of millimetre wave links novel multiple antenna concepts, virtualization, small cell deployments, and novel spectrum usage methods are some of the key research enabling areas for ubiquitous connectivity [1].</para>
<fig id="F1-5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F1-5">Figure <xref linkend="F1-5" remap="1.5"/></link></label>
<caption><para>Plethora of technologies to deliver 5G services and applications [6], [13].</para></caption>
<graphic xlink:href="graphics/ch01_fig005.jpg"/>
</fig>
</section>
<section class="lev2" id="sec1-7-3">
<title>1.7.3 Enabling Ubiquitous Networking</title>
<para>This means that regardless of how many access networks are integrated for connectivity purposes, the quality of the delivered service must be retained end-to-end. In the aspect of increased importance of the cloud computing concept for supporting the big data originating from the intelligent 5G core, end-to-end ubiquitous networking will require interoperable decentralized service-oriented mechanisms with support of real-time interactions.</para>
</section>
</section>
<section class="lev1" id="sec1-8">
<title>1.8 Summary</title>
<para>The evolution of mobile wireless communications from 1G to 4G has brought revolution in the communication among the people of the world. It is expected that 5G brings another revolution by offering very high data speeds. It incorporates many sophisticated technologies and uses important concepts like WISDOM for the better performance than their predecessors. This generation is expected to be rolled out by 2020.</para>
</section>
<section class="lev1" id="sec1-9">
<title>References</title>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem>
<para>Ramjee. Prasad, (2008, February). Keynote Speech &#x02013; Wireless Innovative System Dynamic Mega communications (WISDOM), in IEEE CogART&#x02019;08: First IEEE International Workshop on Cognitive Radio and Advanced Spectrum,: <ulink url="http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=2104&#x00026;copyownerid=538">http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=2104&#x00026;copyownerid=538</ulink> <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Ramjee%2E+Prasad%2C+%282008%2C+February%29%2E+Keynote+Speech+-+Wireless+Innovative+System+Dynamic+Mega+communications+%28WISDOM%29%2C+in+IEEE+CogART%2708%3A+First+IEEE+International+Workshop+on+Cognitive+Radio+and+Advanced+Spectrum%2C%3A+http%3A%2F%2Fwww%2Ewikicfp%2Ecom%2Fcfp%2Fservlet%2Fevent%2Eshowcfp%B4eventid%3D2104%26copyownerid%3D538" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Ramjee Prasad, Universal Wireless Personal Communication, Artech House, 1998. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Ramjee+Prasad%2C+Universal+Wireless+Personal+Communication%2C+Artech+House%2C+1998%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Ramjee Prasad, Werner Mohr and Walter Konh[x00E4;]user, Third Generation Mobile Communication Systems, Artech House, 2000. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Ramjee+Prasad%2C+Werner+Mohr+and+Walter+Konh%5Bx00E4%3B%5Duser%2C+Third+Generation+Mobile+Communication+Systems%2C+Artech+House%2C+2000%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Shinsuke Hara and Ramjee Prasad, Multicarrier Techniques for 4G Mobile Communications, Artech House, 2003. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Shinsuke+Hara+and+Ramjee+Prasad%2C+Multicarrier+Techniques+for+4G+Mobile+Communications%2C+Artech+House%2C+2003%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>R. Prasad and L. Munoz, WLANs and WPANs towards 4G Wireless, Artech House, 2003.</para></listitem>
<listitem>
<para>Ramjee Prasad, (2008, November). Convergence towards Future, CTIF Workshop.</para></listitem>
<listitem>
<para>5th generation mobile networks, Wikipedia [online], <ulink url="http://en.wikipedia.org/wiki/5G">http://en.wikipedia.org/wiki/5G</ulink></para></listitem>
<listitem>
<para>Ramjee Prasad, Parag Pruthi, K. Ramareddy, The Top 10 List for Terabit Speed Wireless Personal Services, Wireless Personal Communication, vol. 49, no. 3, pp 299&#x02013;309, 2009. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Ramjee+Prasad%2C+Parag+Pruthi%2C+K%2E+Ramareddy%2C+The+Top+10+List+for+Terabit+Speed+Wireless+Personal+Services%2C+Wireless+Personal+Communication%2C+vol%2E+49%2C+no%2E+3%2C+pp+299-309%2C+2009%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Ramjee Prasad, Global ICT Standardisation Forum for India (GISFI) and 5G Standardization, Journal of ICT Standardization, volume 1-No.2, pp. 123&#x02013;136, November 2013. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Ramjee+Prasad%2C+Global+ICT+Standardisation+Forum+for+India+%28GISFI%29+and+5G+Standardization%2C+Journal+of+ICT+Standardization%2C+volume+1-No%2E2%2C+pp%2E+123-136%2C+November+2013%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Cornelia-Ionela, Neeli Prasad, Victor Croitory, Ramjee Prasad, 5G based on Cognitive Radio, Wireless Personal Communications, Volume 57, Issue 3, pp. 441&#x02013;464, April 2011. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Cornelia-Ionela%2C+Neeli+Prasad%2C+Victor+Croitory%2C+Ramjee+Prasad%2C+5G+based+on+Cognitive+Radio%2C+Wireless+Personal+Communications%2C+Volume+57%2C+Issue+3%2C+pp%2E+441-464%2C+April+2011%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>5G: A Technology Vision &#x02013; Huawei [online], <ulink url="http://www.huawei.com/5gwhitepaper/">http://www.huawei.com/5gwhitepaper/</ulink></para></listitem>
<listitem>
<para>Cheng-Xiang et al., &#x0201C;Cellular architecture and key technologies for 5G wireless communication networks,&#x0201D; Communications Magazine, IEEE , vol.52, no. 2, pp. 122,130, February 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Cheng-Xiang+et+al%2E%2C+%22Cellular+architecture+and+key+technologies+for+5G+wireless+communication+networks%2C%22+Communications+Magazine%2C+IEEE+%2C+vol%2E52%2C+no%2E+2%2C+pp%2E+122%2C130%2C+February+2014%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Ramjee Prasad, Introducing 5G Standardisation, 11th GISFI Standardisation Series Meeting, Bangalore, India, December 2013 [online], <ulink url="http://www.gisfi.org/news_events_details.php?id=73">http://www.gisfi.org/news_events_details.php?id=73</ulink></para></listitem></orderedlist>
</section>
</chapter>
<chapter class="chapter" id="ch02" label="2" xreflabel="2">
<title>WISDOM Concept and Challenges</title>
<para>The concept of WISDOM is evolved in order to meet the needs of interconnected society by offering ubiquitous terabit wireless connectivity. Based on the novel technologies, systems and network architecture WISDOM is a way towards 5th generation networks which will afford frequencies and data rates up to Tera Hertz and Tera bps, respectively.</para>
<para>WISDOM embodies the basic elements that are the building blocks of the future Internet innovations. The development and evolution of WISDOM offers a basic formula: <emphasis role="strong">E &#x0223C; MC <superscript>5</superscript></emphasis></para>
<para>It is based on the combination of five independent vectors, Communication, Connectivity, Convergence, Content and Co-operation [1] as shown in <link linkend="F2-1">Figure <xref linkend="F2-1" remap="2.1"/></link>.</para>
<fig id="F2-1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F2-1">Figure <xref linkend="F2-1" remap="2.1"/></link></label>
<caption><para>WISDOM a new paradigm [1].</para></caption>
<graphic xlink:href="graphics/ch02_fig001.jpg"/>
</fig>
<para>WISDOM is developed to enable the growth of an interconnected society, bridge the physical and virtual worlds by offering a seamless personalized rich digital experience for the end users, and also creating the optimal conditions for capitalizing on Future Internet innovations.</para>
<para>The top down design of WISDOM can be approached with the help of three founding pillars shown in <link linkend="F2-2">Figure <xref linkend="F2-2" remap="2.2"/></link> which are [1]:</para>
<orderedlist numeration="loweralpha" continuation="restarts" spacing="normal">
<listitem>
<para><emphasis>Information theoretic performance/capacity estimation</emphasis>:</para>
<para>Different types of networking paradigms will lead the directions for engineering development.</para></listitem>
<listitem>
<para><emphasis>End-to-End performance optimization:</emphasis></para>
<para>Protocol design for the end&#x02013;to-end optimization is very efficient than the ones based on classical layered design.</para></listitem>
<listitem>
<para><emphasis>Cognitive networking principles.</emphasis></para>
<para>Self-healing/self-organizing networks based on the above principle are essential to manage both, the complexity induced by a variety of possible usage scenarios and minimization of the spectrum and energy requirements, in order to exploit the spectrum usage. WISDOM uses the concept of &#x0201C;cognitive network (CN)&#x0201D;, which is a step ahead of Cognitive Radio.</para></listitem></orderedlist>
<fig id="F2-2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F2-2">Figure <xref linkend="F2-2" remap="2.2"/></link></label>
<caption><para>Pillars of WISDOM [1].</para></caption>
<graphic xlink:href="graphics/ch02_fig002.jpg"/>
</fig>
<section class="lev1" id="sec2-1">
<title>2.1 WISDOM Objectives</title>
<para>WISDOM aims at enabling wireless infrastructure for the human-centric mega communications in 2020 and beyond. It aims at providing higher capacity and performance than any other current emerging technologies by [1]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Designing air interfaces and new systems that achieve a 3 to 5 times improvement over current wireless communications in terms of channel efficiency;</para></listitem>
<listitem>
<para>exploiting larger channel bandwidths in uncontested areas of the spectrum in higher frequency bands and/or considering spectrum co-existence and sharing;</para></listitem>
<listitem>
<para>employing smaller size cells and virtual cells with optimized dynamic spectrum management across different technologies;</para></listitem>
<listitem>
<para>developing novel cross-layer and cross-network domain optimization technologies based on the principles of power efficient cognitive and cooperative communications;</para></listitem>
<listitem>
<para>taking a comprehensive approach in developing a converged WISDOM system by jointly designing radio access systems and network protocols across a number of heterogeneous network architectures including ad-hoc, vehicular, mesh and next generation of cellular networks employing femto-cells and virtual cells efficiently connected to the wired core part of the Future Internet.</para></listitem></itemizedlist>
<fig id="F2-3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F2-3">Figure <xref linkend="F2-3" remap="2.3"/></link></label>
<caption><para>Converged architecture of WISDOM [2].</para></caption>
<graphic xlink:href="graphics/ch02_fig003.jpg"/>
</fig>
<para>WISDOM will also help to design a <emphasis>converged architecture</emphasis> as shown in <link linkend="F2-3">Figure <xref linkend="F2-3" remap="2.3"/></link> and network solution and evaluate its performance with the goal of enabling ubiquitous terabit wireless connectivity for human-centric communications over the network of the future. WISDOM will design and develop wireless/wired interfaces and network protocols in order to integrate the wireless access networks to the fixed infrastructure as well as the core optical part of the Network of the Future. It means the focus of WISDOM will be on the design of wireless/wire line interfacing network nodes. These are the nodes that will facilitate the integration of wireless and wired (optical) network segments [2].</para>
</section>
<section class="lev1" id="sec2-2">
<title>2.2 WISDOM System Requirements</title>
<para>In order to implement a WISDOM system the two main requirements are [2]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Mechanisms for enabling the transmission of Tera bps.</para></listitem>
<listitem>
<para>Mechanisms for enabling mega communications.</para></listitem></itemizedlist>
<para>The former can be achieved by the use of new physical layer techniques, such as new radio carrier-less transmission, to identify new spectrum bands, ultra high spectral efficiency mechanisms, MIMO and advanced physical layer (PHY) interfaces and advanced channel coding techniques. Also the new medium access control (MAC) and link layer are required for the strict QoS requirements that would allow the linking source and resource access for trillion device networks.</para>
<para>The latter can be achieved by the novel network protocols and architectures for heterogeneous networks such as femto cells, cooperative transmission, wireless-wired network integration, integration of high capacity satellite links and cognitive radio networks [1].</para>
<para>The 4G technologies together with WISDOM concept will show a way to the wireless communication to realize the true 5G systems.</para>
<para>To summarize [2]:</para>
<para>WISDOM communication interfaces are up to Tera bps link rate in a burst mode for short range communications.</para>
<para>WISDOM has a target of delivering a sustainable rate of 300 Mbps to mobile terminals at high speed for the needs of immersive applications and tele-presence on the move.</para>
<fig id="F2-4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F2-4">Figure <xref linkend="F2-4" remap="2.4"/></link></label>
<caption><para>WISDOM Architecture [2].</para></caption>
<graphic xlink:href="graphics/ch02_fig004.jpg"/>
</fig>
</section>
<section class="lev1" id="sec2-3">
<title>2.3 WISDOM Architecture</title>
<para>WISDOM architecture is shown in the <link linkend="F2-4">Figure <xref linkend="F2-4" remap="2.4"/></link>. It has three main components [2]:</para>
<section class="lev2" id="sec2-3-3-1">
<title>A. Person to Machine (P2M)</title>
<para>The trend of person to machine communication (P2M) is inflaming the bandwidth demand and changes in communication because of its complexity, heterogeneity and integration of new systems and devices using the different network paradigms. These network paradigms consist of network devices ranging from computers, phones both landline and mobile, cameras, PDAs, collection of embedded machines like cars, washing machines, refrigerators, coffee vending machines, all are equipped with wired and wireless applications capabilities.</para>
<para>Applications of this P2M component are IoT, Wireless Sensor Networks (WSN), Mobile Ad Hoc Networks (MANET) etc. which transmits data from low bit rate up to Tera bps.</para>
</section>
<section class="lev2" id="sec2-3-3-2">
<title>B. Shortrange</title>
<para>There are different short-range communication application such as smart homes, smart cars, Green Information Communication Technology (GICT) and smart offices, personalized medicines, Radio Frequency Identification (RFID), WLAN, security systems, keyless gates, future Internet, immersive communication, smart robotics, wireless accessories etc. Characteristics of the short range communication applications are high data rate, very short range, reliability, battery operated transmitters as well as receivers and low cost.</para>
</section>
<section class="lev2" id="sec2-3-3-3">
<title>C. Cellular and wide range</title>
<para>The cellular communication system where in perfect cellular coverage occurs if each cell is a hexagon and cells can be arranged in a honeycomb. Most cell towers use Omni directional antennas to data transmit in a circular pattern. In some cases, cells overlap and in others, gaps exist with no coverage.</para>
</section>
</section>
<section class="lev1" id="sec2-4">
<title>2.4 Users Requirements and WISDOM</title>
<para>Some of the key enablers of satisfying the user requirements are capacity, connectivity and pervasiveness. These drive the emergence of new environments that evolve from the gradual development and combination of present day cellular communications, IoT and Internet of Services, towards a more advanced vision of fully reprogrammable mobile devices which would make possible to communicate with each other autonomously based on a given event context and part of a scale-free self-organized communication system. Significant breakthroughs in the state-of-the-art are required to reach this level of performance paving us to what can be characterized as a new paradigm for future systems, namely WISDOM [1].</para>
</section>
<section class="lev1" id="sec2-5">
<title>2.5 WISDOM Offerings</title>
<para>WISDOM intends to provide at least an order of magnitude of more capacity than any currently planned wireless radio technology. Creating wireless infrastructure that enables human-centric mega communications is the main aim of WISDOM.</para>
<para>WISDOM gives a novel cross-layer and cross-network-domain optimization technologies based on the principles of power efficient cognitive and cooperative communications. It also offers a design of new air interfaces and systems that achieve a 3&#x02013;5 times improvement over current wireless communications in terms of channel efficiency. It helps in the exploitation of a large channel bandwidth in uncontested areas of the spectrum in higher frequency bands encouraging the techniques like spectrum co-existence and sharing. WISDOM development offers large evolution [2]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Making extensive use of small size cells and the concept of virtual cells, i.e., grouping a number of small cells in a synchronized manner in a way that they all operate in the same channel and are seen by the terminal as a single base station.</para></listitem>
<listitem>
<para>Sharing of knowledge which is used to improve user safety, through intelligent rich presence and collaboration.</para></listitem>
<listitem>
<para>Services for accessibility of users and knowledge based services into workflow and applications, regardless of device.</para></listitem>
<listitem>
<para>Freedom for users to work from home, office or other location using high speed Internet connections.</para></listitem>
<listitem>
<para>A logic based on dependability of services for modularization and locality which operates on &#x0201C;best effort&#x0201D; of technology usage.</para></listitem></itemizedlist>
</section>
<section class="lev1" id="sec2-6">
<title>2.6 WISDOM Impact</title>
<para>It is already mentioned that WISDOM affords terabit communications with a coverage extending from a city region, to a country, the continents, and the world. This is possible by combining personal- and cognitive radio-networks which is the basic operational concept of WISDOM.</para>
<para>WISDOM enables to capitalize on major innovations towards the future smart infrastructure by integrating under one interoperable umbrella leading technologies, such as advanced M2M communication technologies, autonomic networking technologies, data mining and decision-making technologies, security and privacy protection technologies, cloud computing technologies, with advanced sensing and actuating technologies.</para>
</section>
<section class="lev1" id="sec2-7">
<title>2.7 WISDOM Challenges</title>
<para>The four main operational domains of WISDOM are:</para>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem>
<para>Short range low mobility communications</para></listitem>
<listitem>
<para>Outdoor/Indoor cellular communications with full mobility</para></listitem>
<listitem>
<para>Converged Architecture</para></listitem>
<listitem>
<para>Security</para></listitem></orderedlist>
<para>The challenges faced by the WISDOM in the above domains are as follows:</para>
<section class="lev2" id="sec2-7-1">
<title>Short range low mobility communications</title>
<para>The main target of WISDOM is to provide high data rates of about 1 Tera bps in short range communications. Some of the applications like smart phones, smart cars, personalized medicines, WLAN security systems, Radio Frequency Identification (RFID), keyless gates, future Internet, robotics, immersive applications, Green Information Communication Technology (GICT) and smart offices other wireless accessories etc. fall under this category.</para>
<para>The key challenges to achieve high data rates in short range distances are [1]:</para>
<orderedlist numeration="loweralpha" continuation="restarts" spacing="normal">
<listitem>
<para>Exploiting the particular bands in the spectrum range from the Extra High Frequency band, that allow for the design of systems that yield high data rate and significant bandwidth efficiency, as required for Tbit/s communications. Band frequency ranging from 70 GHz up to 300 GHz should be considered in particular. Novel and unconventional solutions, both for RF and baseband design should be considered as the traditional design approaches put some limitations on the achievement of 1-Tera bps connectivity. But, the high absorption rate at those high carrier frequencies poses great challenges for their utilization in Non Line of Sight (NLoS) and mobile connections.</para>
<para>Exploitation of such high frequency bands opens many challenges, among them are:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>available technology support;</para></listitem>
<listitem>
<para>channel characterization at those frequencies is lacking;</para></listitem>
<listitem>
<para>design of robust modulation and transmission techniques has to be done considering Complementary Metal Oxide Semiconductor (CMOS) components limitations;</para></listitem>
<listitem>
<para>pass band of digital device does not allow to use one channel with a bandwidth higher than 2 GHz today.</para></listitem></itemizedlist>
</listitem>
<listitem>
<para>WISDOM short-range communications are based on multiple directional antennas transmitting to the same terminal in order to create spatial diversity and mitigate Line of Sight (LoS) blocking. Therefore, WISDOM requires novel PHY techniques and also the advancements towards the <emphasis>cognitive network</emphasis> architecture. Progress towards this CN concept can be done by carrying out research in a series of interrelated fields such as, directional links, adaptive modulation and coding, medium independent handover, cognitive radio and cooperative techniques at different layers of the protocol stack.</para></listitem>
<listitem>
<para> <emphasis>The human-centric paradigm</emphasis>: This requires a huge interaction of the user with her/his environment in order to interchange information related to the context, profile, role and other relevant information which in general may help to optimize the whole network behaviour as well as the user perception.</para></listitem></orderedlist>
<para>These are the challenges the WISDOM should consider for achieving high data rates in short-range communications.</para>
<para>The scenario of network architecture for short-range communications is shown in the <link linkend="F2-5">Figure <xref linkend="F2-5" remap="2.5"/></link>. It consists of wireless communication systems components such as like CN, WSN, millimetre-wave (mm-wave) cooperative communications, MIMO and virtual MIMO, multi-radio and multi-band devices, multiple frequency bands and air interfaces [2].</para>
<fig id="F2-5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F2-5">Figure <xref linkend="F2-5" remap="2.5"/></link></label>
<caption><para>Network architecture scenarios for short-range communications [2].</para></caption>
<graphic xlink:href="graphics/ch02_fig005.jpg"/>
</fig>
<para>There are:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>In mm-wave Communications: MIMO and Virtual MIMO links in the mm-wave bands Different network architectures (Scatter-nets, Multi-hop Mesh, ad-hoc, indoor wireless-wireline connectivity).</para></listitem>
<listitem>
<para>Application points (AP) and User equipment (UE): it consists of mainly three types of wireless devices such as Multi-band, Multi-Radio, and Microwave Endometrial Ablation (MEA).</para></listitem>
<listitem>
<para>Different network architectures (Scatter-nets, Multi-hop Mesh, ad-hoc, indoor wireless-wireline connectivity).</para></listitem>
<listitem>
<para>The concept of a CN: it is the combination of computer networks, machine learning, knowledge representation and network management. Cognitive network is a cognitive process which has end-to-end goal which is achieved by following the different network condition, planning, decisions for the different network condition with consequences of the decisions.</para></listitem>
<listitem>
<para>The human-centric paradigm: these devices are configured in such a way that it will give paradigm which will be human centric, e.g., smart homes, offices, cars etc.</para></listitem></itemizedlist>
</section>
<section class="lev2" id="sec2-7-2">
<title>Outdoor mobile communications with full mobility</title>
<para>WISDOM aims at delivering a sustainable rate of 300 Mbps to an individual user at full mobility with a peak rate in excess of 1 Gbps, while the vision of the 1 Tera bps rate corresponds to aggregate capacity of a large number of users served in a metropolitan area. This target calls for a revolutionary step for the techniques to be adopted [2]:</para>
<orderedlist numeration="loweralpha" continuation="restarts" spacing="normal">
<listitem>
<para>WISDOM shall consider new communication systems, based on the suitable transmission, signalling and modulation techniques, to be implemented also in new bands.</para></listitem>
<listitem>
<para>MIMO and Virtual MIMO links in the mm-wave bands: MIMO and Virtual-MIMO (on both sides of the link) and various types of beam-forming for establishing highly directional links at high frequencies and in fast-fading environments.</para></listitem>
<listitem>
<para>Use of small cells and virtual cells</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>A virtual cell is a group of small cells synchronized in a way that they all operate in the same channel and are seen by the terminal as a single base station. The key advantage of such a solution, is that mobility signalling is not increased compared to larger cell systems and therefore management overhead and terminal complexity are in the same order of magnitude. At the same time the solution retains the advantages of a small cell system since the short distance between the terminal and the nearest cell allows high bandwidth communication.</para></listitem></itemizedlist>
</listitem></orderedlist>
<fig id="F2-6" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F2-6">Figure <xref linkend="F2-6" remap="2.6"/></link></label>
<caption><para>Network architecture scenarios for outdoor mobile communications [2].</para></caption>
<graphic xlink:href="graphics/ch02_fig06.jpg"/>
</fig>
<para><link linkend="F2-6">Figure <xref linkend="F2-6" remap="2.6"/></link> illustrates the network scenario/architecture for outdoor cellular system with the following listed components [1]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>WISDOM Base Station and User Equipment: Multi-band, Multi-Radio, MEA Systems</para></listitem>
<listitem>
<para>In mm-wave Communications</para></listitem>
<listitem>
<para>MIMO and Virtual MIMO links in the mm-wave bands. Different network architectures (Multi-hop Mesh, ad-hoc, Wireless/Wireline backhauling, Intelligent Transport System (ITS)/Vehicular-to-Infrastructure (V2I))</para></listitem>
<listitem>
<para>The concept of CN</para></listitem>
<listitem>
<para>The human-centric paradigm</para></listitem></itemizedlist>
<fig id="F2-7" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F2-7">Figure <xref linkend="F2-7" remap="2.7"/></link></label>
<caption><para>Scenario for next generation cellular networks [2].</para></caption>
<graphic xlink:href="graphics/ch02_fig008.jpg"/>
</fig>
<para><link linkend="F2-7">Figure <xref linkend="F2-7" remap="2.7"/></link> explains the network scenario for next generation cellular networks and it consists of network of radio cells. It is aimed to achieve Wireless Metropolitan Area Network (WMAN). At the WMAN scale, the vision of Tera bps wireless corresponds to aggregate capacity of all wireless users served in a metropolitan area. For example, 400 radio cells in a metropolitan city, each cell serving 10 users, using 250 Mbps each for virtual reality applications: 400 x 10 x 250 Mbps=1 Tera bps [1].</para>
</section>
<section class="lev2" id="sec2-7-3">
<title>Converged Architecture</title>
<para>WISDOM will help to design a converged architecture and network solution with the goal of enabling ubiquitous terabit wireless connectivity for human-centric mega communications over the network of the future. WISDOM will design and develop wireless/wired interfaces and network protocols in order to integrate the wireless access networks to the fixed infrastructure as well as the core optical part of the Network of the Future. For an optimized wireless/wire line network WISDOM will propose some novel solutions addressing the overall network architecture and the interconnection of the different technology parts of the network with the special focus on interfacing network nodes. This is because these nodes will play the role of edge devices as far as the optical network is concerned and will provide aggregation, traffic shaping and traffic engineering capabilities. For end&#x02013;to-end user optimization WISDOM will design, developand evaluate novel transport protocols compatible to the wired part (optical fibre) of the network that are able to support the characteristics of both the metro and the core part of the network offering abundant bandwidth in an efficient and cost effective manner. The converged WISDOM architecture will comprise a number of self-organizing/self-healing wireless access networks whose design is based on cognitive and cooperation networking principles. The design of these access networks is based on cognitive networking principles.</para>
<para>The key building blocks of the WISDOM access networks are the WISDOM-node and the WISDOM-station, as shown in <link linkend="F2-8">Figure <xref linkend="F2-8" remap="2.8"/></link>. The <emphasis>WISDOM-node</emphasis> is envisioned as an intelligent cognitive multi-radio, multi-band, MIMO mobile device capable of operating in a variety of spectrum allocation and interference conditions by selecting cross-layer, cross-network optimized physical and network layer parameters often in collaboration with other radios even if they belong to different co-located networks. The <emphasis>WISDOM-station</emphasis> is envisioned as fixed or mobile WISDOM-node that is chartered with the task of providing seamless interconnection between the wire line and wireless parts of the converged architecture [2].</para>
<fig id="F2-8" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F2-8">Figure <xref linkend="F2-8" remap="2.8"/></link></label>
<caption><para>WISDOM Node and WISDOM Station [2].</para></caption>
<graphic xlink:href="graphics/ch02_fig08.jpg"/>
</fig>
<para>WISDOM node has a vital role in the design of the network algorithms and protocols at the local network and global internetworking levels. Specifically, at the local level, support for cross-layer and cross-network optimization algorithms in autonomous cognitive networks requires an advanced distributed control and management framework. At the global internetworking level, clusters of cognitive networks represent a new category of access networks that need to be interfaced efficiently with the wired network infrastructure both interms of control and data.</para>
</section>
<section class="lev2" id="sec2-7-4">
<title>End-to-End system</title>
<para>The end-to-end system architecture shown in <link linkend="F2-9">Figure <xref linkend="F2-9" remap="2.9"/></link> consists of the following components [1]:</para>
<orderedlist numeration="loweralpha" continuation="restarts" spacing="normal">
<listitem>
<para>WISDOM Mesh Network</para></listitem>
<listitem>
<para>WISDOM Edge Node</para></listitem></orderedlist>
<fig id="F2-9" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F2-9">Figure <xref linkend="F2-9" remap="2.9"/></link></label>
<caption><para>End&#x02013;to-End System Architecture [2]</para></caption>
<graphic xlink:href="graphics/ch02_fig010.jpg"/>
</fig>
<para>Metro core network is permutation of WISDOM Mesh Network and WISDOM Edge Node. In this mishmash authentication, authorization and accounting (AAA) streaming security scalable services are included. Security includes robustness, confidentiality and integrity. Robustness provides degree to which a system operates perfectly in all conditions. Confidentiality ensures information is accessible only to those authorized to have access.</para>
</section>
</section>
<section class="lev1" id="sec2-8">
<title>2.8 Summary</title>
<para>The aim of the Wireless Innovative System for Dynamically Operating Mega-communications (WISDOM) is to provide terabit communications to the future world. Future networks will feature applications and devices that are highly personalized and humancentric. WISDOM aims to support interest-based service provisioning, where an interest may be based on user-behaviour or user profile. It will design and develop technologies, systems and network architectures that will enable ubiquitous 1 Tb/s wireless connectivity and communication with coverage extending from C<superscript>3</superscript>W through C<superscript>5</superscript> (C<superscript>3</superscript>stands for City, country, continent and W stands for World; C<superscript>5</superscript> represents <emphasis role="strong">C</emphasis>ommunication, <emphasis role="strong">C</emphasis>onnectivity, <emphasis role="strong">C</emphasis>onvergence, <emphasis role="strong">C</emphasis>ontent, and <emphasis role="strong">C</emphasis>o-operation) [1]. The important point is that WISDOM combines personal- and cognitive radio- networks towards robust and efficient future networks that will enable a smooth shift from static to dynamic communications, successful businesses that are financially viable and provide secure transfer of information.</para>
</section>
<section class="lev1" id="sec2-9">
<title>References</title>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem>
<para>Ramjee Prasad, (2008, February). Keynote Speech &#x02013; Wireless Innovative System Dynamic Megacommunications (WISDOM), in IEEE CogART&#x02019;08: First IEEE International Workshop on Cognitive Radio and Advanced Spectrum,: <ulink url="http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=2104&#x00026;copyownerid=538">http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=2104&#x00026;copyownerid=538</ulink> <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Ramjee+Prasad%2C+%282008%2C+February%29%2E+Keynote+Speech+-+Wireless+Innovative+System+Dynamic+Megacommunications+%28WISDOM%29%2C+in+IEEE+CogART%2708%3A+First+IEEE+International+Workshop+on+Cognitive+Radio+and+Advanced+Spectrum%2C%3A+http%3A%2F%2Fwww%2Ewikicfp%2Ecom%2Fcfp%2Fservlet%2Fevent%2Eshowcfp%B4eventid%3D2104%26copyownerid%3D538" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Ramjee Prasad. (2008, November). Convergence towards Future, CTIF Workshop.</para></listitem></orderedlist>
</section>
</chapter>
<chapter class="chapter" id="ch03" label="3" xreflabel="3">
<title>SMNAT as Enabler of Device-to-Device Communication</title>
<para>D2D communication for WISDOM based 5G would be a significant aspect, especially as a mechanism to minimize the latency incurred for accessing a network that would be unacceptable for the WISDOM based 5G. Smart Mobile Network Access Topology (SMNAT), an enabler for D2D in WISDOM, has been discussed in this chapter.</para>
<para>The 5th and 6th generation of mobile networks are envisioned to realize the bandwidth required for WWWW (Wireless Worldwide Wide Web). They should be highly dynamic in nature and actuate self-optimization of resources to support the bandwidth for ever increasing customer base. Spectrum crunch is one of the major issues. Hence these networks should thrive to achieve very high spectral efficiency and less Carrier to Interference ratio (C/I), relative to the existing technologies like LTE and WIMAX. Data speed per user should also not be compromised. Ubiquitous, instantaneous and always connected are some of the key prerequisites of a modern mobile device. It has been partly complied by LTE and some Network based applications based on the IMS (IP Multimedia Subsystem) [1] framework like Rich Communication Suite (RCS) [2]. The data requirement per user is facing an exponential growth with the high proliferation of the applications on the UEs available today. M2M and IoTs today play an important role in shaping up the data traffic patterns which can be sporadic or distributed over time. As the new device technologies usher in, the data throughput requirement per user soars. The smart phone and tablets with three dimension (3D) screens and cameras will be bandwidth hungry. Screen resolution will further increase leading to higher data rates. Online multiplayer gaming applications running on 5G gaming consoles with 3D displays will require higher throughput both for the uplink and downlink. Ultra High Definition (UHD) voice and UHD video realized through Rich Communication Services (RCS) [2] will contribute to the growth of data traffic. More dedicated data bearers will be required at the access and core to guarantee the QoS promised to the user. Due to the swarm of M2M and IoT devices in the network, the mobility management related processes will be more intense and will consume more network resources. The nano nature of the devices with limited RF power will imply additional small-cells/microcells which will increase the intricacy of the access and core network.</para>
<para>The key question is how can one realize a network that can achieve the following:</para>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem>
<para>Cater the bandwidth requirement of next generation mobile devices meant for human users as well for machines.</para></listitem>
<listitem>
<para>High Data rate over large coverage areas and dense demographies.</para></listitem>
<listitem>
<para>Reduce cost of network infrastructure and operation</para></listitem>
<listitem>
<para>Meet the bandwidth, latency, QoS requirement for supporting the next generation network and device applications.</para></listitem>
<listitem>
<para>Reduce power consumption in the network and the device</para></listitem>
<listitem>
<para>Lessen the complexity in the Access (radio) and core network layers</para></listitem></orderedlist>
<para>Living through the advancements in mobile network technology from 2G/3G&#x02013;UMTS towards LTE (4G), one may notice that the primary emphasis is to enable higher bandwidth per user required to drive the next generation network and device applications. With the evolution of the mobile networks from 2G to 4G [3], there is an attempt to inject more symbols (data) per unit time. This has been made possible by the evolution of the modulation schemes from Binary Phase Shift Keying in case of 2G, to 64 Quadrature Amplitude Modulation for LTE-Advanced. In the current Mobile Radio Access Network there is a host of network processes, tightly synchronized and orchestrated by intelligent network elements, such as:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Handover management</para></listitem>
<listitem>
<para>Location management</para></listitem>
<listitem>
<para>Call drop off management</para></listitem>
<listitem>
<para>Interoperability and downward compatibility management</para></listitem>
<listitem>
<para>Service control (like roaming control)</para></listitem>
<listitem>
<para>Feature management</para></listitem></itemizedlist>
<para>These processes involve complex signalling operations across the radio and the core network. The attempt to simplify the network in IMS [1] and LTE [4] is focused to make the core and access networks all IP. Following the evolution trail from 2G to 4G, a significant philosophical drift towards simplification in terms of the service logic related to mobility and location management is not discerned. A similar process for handover, frequency reuse, location updates and cancellations in 4G as compared with 2G [3] is witnessed. Hence the network elements of the state of the art still need to be equipped with the intelligence and processing power to handle all these complex signalling operations. This has a knock-on effect on the handsets too. It involves considerable amount of processing power, thus leading to more battery drainage. So it is imperative to look beyond the state of the art and conceive a technology which is devoid of these constrains and is ideal for the next generation mobile devices. The same goes for core network design. Mobility and Location management in the core network necessitates a substantial volume of signalling interaction between the HLR/HSS (Home Location Register/Home Subscription Service) and the MME (Mobility Management Entity) in LTE core [4] and MSC/VLR (Mobile Switching Center/Visited Location Register) in UMTS Core. Inefficient and un-optimized engineering and design of these network elements impact the service assurance, and finally degrade to the overall QoS offered by the network. Also, a substantial amount of resources is used up for addressing the wireless node in the cellular network, both from the perspective of available bandwidth and also the associated processing activities carried out in the different network elements at the Radio Access Network (RAN) and Core Network (CN).</para>
<para>Managing a mobile network is hugely resource and knowledge intensive, primarily because of the inherent complexity of the network architectures. For example, during cell planning one needs to consider the traffic demand to cover a specific region, availability of base station sites, available channel capacity at each base station, and the service quality at various potential traffic demand areas. The allocation of the right frequency at the cells to get an optimum frequency reuse factor is crucial to achieve smooth handovers, avoidance of call drops during handover, and overall elevation of the performance of the network. These are part of the overall cell planning activity and it requires a lot of resources, in terms of FTE (Full Time Equivalent) and hence it increases the operational cost. The Switching (Time/Space) matrix of a Mobile Switching Center of a 2G/3G network has a finite limit to make and break the number of calls. The Busy Hour Call Attempt handling capacity of a Switch depends much on engineering and dimensioning of this matrix. With the CSCF (Call Session Control Function) for IMS (IP Multimedia Subsystem) [1] and the MMEs (Mobility Management Entity) for the LTE [4], one does not need the Time and Space switching Matrix. The CSCF/MME acts more as SIP (Session Initiation protocol) router for IMS and SIP/GTP/DIAMETER router in case of LTE. However, for routing a call, these network elements still need to involve directly the Layer 7, which utilizes lot of resources and processing power of these network elements. This in turn makes the network elements expensive and increases the capital and operational cost of the mobile network. As a consequence of the convergence of heterogeneous mobile applications catered by the expanse of the mobile devices preordained for diverse deployment scenarios, the signalling inter-processes between the network and the user equipment become more intricate.</para>
<section class="lev1" id="sec3-1">
<title>3.1 5G Communication Landscape</title>
<para>With the present day device capabilities, the mobile devices are in constant interaction with each other. The human-centric mobile device interacts with various wearable devices, like smart watches, wearable computers (e.g., Sixth Sense), SOS devices and health equipments. As the user moves around, these devices become more dynamic in nature. The devices, categorized as M2M or IoTs, may be as below (though this is an example and not an exhaustive list):</para>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem>
<para>Environment sensors</para></listitem>
<listitem>
<para>Connected cars</para></listitem>
<listitem>
<para>Smart objects and robots</para></listitem>
<listitem>
<para>Health equipments</para></listitem>
<listitem>
<para>Small cells not owned by the mobile operators</para></listitem></orderedlist>
<para>According to the newly formed group called METIS (Mobile and wireless communications Enablers for the Twenty-twenty Information Society), which is a consortium of mobile Original Equipment Manufacturer, operators, academic institutions and automotive companies a 5G Network should have 1000 times higher mobile data rate volume per area, 10 to 100 times more connected devices, 10 to 100 times higher typical user data rate, 10 times longer battery life for low power devices and 5 times smaller end-to-end latency. The main objective of the project is to lay the foundation of 5G, the next generation mobile and wireless communications system. The aim is to let people seamlessly bridge the virtual and physical worlds offering the same level of all-senses, context-based, rich communication experience over fixed and wireless networks. Apart from these basic needs, one need systems which can work with the same performance level in the crowds. It should offer the same QoS and throughput as in office, or home as on the move. It should render low end-to-end latency and reliability to enable machine type applications.</para>
</section>
<section class="lev1" id="sec3-2">
<title>3.2 Related Work on 5G</title>
<para>To meet these demands and to conceive a network which incorporates all these enhancements over the 4G, one may need to analyse the potential of new access technologies and architectural concepts and then identify the ones which can be the eligible contenders to serve as 5G technology</para>
<para>Some of them are as follows:</para>
<orderedlist numeration="loweralpha" continuation="restarts" spacing="normal">
<listitem>
<para>Multi-tier 5G Networks</para></listitem>
<listitem>
<para>PHY layer based Network Coding</para></listitem>
<listitem>
<para>Generalized frequency division multiplexing (GFDM)</para></listitem>
<listitem>
<para>Non Orthogonal Multiple Access (NOMA)</para></listitem>
<listitem>
<para>Cognitive Radio</para></listitem>
<listitem>
<para>D2D communication</para></listitem>
<listitem>
<para>Beam forming technology</para></listitem>
<listitem>
<para>In mm-wave technology</para></listitem>
<listitem>
<para>Massive MIMO</para></listitem></orderedlist>
<para>However, the scope of this chapter is not to investigate on all these options and not to provide a comparative analysis. Rather, some new paradigms which have the potential to play pivotal roles in shaping up the 5G network architecture and the D2D Communication Framework are staged. In D2D communication, user equipments (UEs) exchange information among themselves peer-to-peer over a direct link using the cellular resources instead of that through the base station or eNodeB. This is markedly different from small cell (femto cell) communication where UEs communicate with the help of small low-power cellular base stations. D2D users communicate directly while remaining controlled under the Cellular Access network. This optimizes resource utilization in a cellular network and boosts spectral efficiency.</para>
<para>This chapter will primarily delve in the following domains.</para>
<orderedlist numeration="loweralpha" continuation="restarts" spacing="normal">
<listitem>
<para>D2D communication: a study on the existing approaches with the new approach, the Smart Mobile Network Access Topology (SMNAT).</para></listitem>
<listitem>
<para>Integration of SMNAT with LTE-Advanced and 5G Core.</para></listitem>
<listitem>
<para>Security aspects in light of cooperative communication between two devices.</para></listitem></orderedlist>
</section>
<section class="lev1" id="sec3-3">
<title>3.3 Cellular Device-to-Device Communication</title>
<para>Cellular D2D communication is meant to reduce the cellular traffic load by actuating a breakout from the UE itself and directly establish traffic towards the other paired UE using the cellular channel. As a collateral impact, this can significantly contribute to slacken the processor intensive signalling process as explained above. It leverages the benefit from the proximity between two devices and increases the overall resource utilization of the cellular network. But it is imperative that one needs to come up with new methodologies for device discovery and pairing. Direct D2D technologies have already been developed in several wireless standards, aiming to meet the needs for efficient local data transmission required by variant services in personal, public and industrial areas. Some of the existing contenders are Bluetooth, Zigbee and direct Wi-Fi. With D2D communication, the aim is to find a method which is tightly integrated with the cellular network and uses the same spectrum as cellular operations.</para>
<para>Imparting D2D capability in a mobile device impacts the whole of the network framework and is not an inconsequential addition. Issues like authentication, real time billing, fraud control will crop up and the devices will directly interact with each other bypassing the network.</para>
<para>But on a positive note, the benefits are bountiful.</para>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem>
<para>As the paired devices are in the same cell sector, or in the same cell (different sector) or in adjacent cells in physical proximity, high data rates with low latency can be achieved.</para></listitem>
<listitem>
<para>Depending on the proximity of the devices, the radio power level will be reduced. This will result in better battery life.</para></listitem>
<listitem>
<para>As the same radio resources are used for cellular and D2D communication, hence the average frequency reuse factor will be better.</para></listitem>
<listitem>
<para>For a traditional cellular network, one needs two distinct channels for uplink and downlink between the UE and the base station (BS). But in case of D2D communication, a single channel can be used for both directions. Hence the overall spectral efficiency is better.</para></listitem>
<listitem>
<para>The spectral efficiency can be further enhanced if the cognitive radio communication is used wherein the unused spectrum holes may be utilized for establishing direct communication between the two nodes.</para></listitem>
<listitem>
<para>As the D2D communications has limited dependence on the network infrastructure the devices could be used for instant communications between a number of devices within a range.</para></listitem>
<listitem>
<para>D2D on 5G would use licensed spectrum and this would enable the frequencies to be used to be less impacted by interference.</para></listitem>
<listitem>
<para>In times of natural calamities where some essential components of core and access network have failed, D2D communication can ensue.</para></listitem></orderedlist>
<para>A practical implementation scenario of an Over the Top (OTT) application meant from smartphones (for D2D communication) is from Google. A new mobile messaging application called FireChat is empowering nearby smartphone users to stay in touch even when there&#x02019;s no cellular service or Internet connection. The messaging application harnesses a technology called wireless mesh networking, which might someday allow a myriad of devices to connect like links in a chain. The technique might someday be used to tie together thousands of devices with built-in radios and make it possible to be online without having to pay for the access. It could also enable online communications in remote areas or disaster zones without Wi-Fi or cellular signals.</para>
<para>D2D has been proposed as a Rel.12 3GPP feature. D2D Study Item had an approval in 3GPP SA1 (Services working group) in 2011, called ProSe (Proximity based Services) [5] which identifies the use cases and envisage the requirements including network operator control, security, Authentication, Authorization and Accounting (AAA), regulatory aspects, public safety requirements, integration with current infrastructure, network o&#x0FB04;oading. The ongoing discussion by ProSe includes evaluation requirements, D2D channel model, resource use, ProSe discovery and ProSe communication, etc.</para>
<para>ProSe Communication between two UEs in proximity is established by means of a communication path established between the UEs.</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>The ProSe Communication path is established</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>by Direct communication between the UEs</para></listitem>
<listitem>
<para>or routed via the local eNB</para></listitem>
<listitem>
<para>by ProSe Discovery.</para></listitem></itemizedlist>
</listitem>
<listitem>
<para>Communication Process identifies that a UE is in proximity of another UE.</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>by Open [ProSe] Discovery</para></listitem></itemizedlist>
</listitem>
<listitem>
<para>ProSe Discovery without permission from the UE being discovered.</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>by Restricted [ProSe] discovery</para></listitem>
<listitem>
<para>ProSe Discovery that only takes place with permission from the UE being discovered.</para></listitem></itemizedlist>
</listitem></itemizedlist>
<para>D2D communication for M2M type devices is a topic of interest for many telecom researchers. This is because of the huge volume of the devices which may eventually clog up the Mobile network and jeopardize the human-to-human services. The study on D2D requirements for MTC Device to MTC Device scenarios covers</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>The identification and functionality needed to set up a connection towards a MTC Device.</para></listitem>
<listitem>
<para>The IMS domain may provide a solution for this required functionality.</para></listitem>
<listitem>
<para>MTC Devices often act as a gateway for a MTC capillary network of other MTC Devices or non-3GPP devices</para></listitem></itemizedlist>
<para>D2D group for Machine type communications (M2M) Study on Enhancements for MTC is a 3GPP specification &#x02013; TR 22.888 [6] has been crafted in purview of these requirements.</para>
<para>As depicted in <link linkend="F3-1">Figure <xref linkend="F3-1" remap="3.1"/></link>, the scenarios that are covered are</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Devices Communicating directly</para></listitem>
<listitem>
<para>Devices Communicating via MTC Server</para></listitem>
<listitem>
<para>Devices Communicating with assistance from a Name resolution server</para></listitem></itemizedlist>
<fig id="F3-1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F3-1">Figure <xref linkend="F3-1" remap="3.1"/></link></label>
<caption><para>Three methods of D2D communication for M2M devices.</para></caption>
<graphic xlink:href="graphics/ch03_fig001.jpg"/>
</fig>
<para>D2D Communication can be broadly categorized as:</para>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem>
<para>Out of band</para></listitem>
<listitem>
<para>In-band</para></listitem></orderedlist>
<para>Out of band D2D essentially implies that the devices use a radio technology in the standalone mode to actuate communication with a paired device. The pairing method is in the purview of that specific radio technology.</para>
<para>Some existing out of band D2D communication methods are:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Bluetooth</para></listitem>
<listitem>
<para>ZigBee</para></listitem>
<listitem>
<para>Near Field Communication</para></listitem>
<listitem>
<para>Direct Wi-Fi</para></listitem></itemizedlist>
<para>In-band D2D communication implies that the devices use the cellular spectrum and the cellular technology.</para>
<para>In this chapter a new concept for the realization of in-band D2D not by using new resource allocation methodologies but by using a new mobility management and addressing concept called SMNAT (Smart Mobile Network Access Topology) [7&#x02013;13] has been presented.</para>
<para>The subsequent Sections 3.4&#x02013;3.6 will bring out the various radio resource management technologies that can be employed in the in band D2D communication, as seen in the state of the art. These technologies are based on the underlay cellular network, hence they fall in the category of in-band D2D communication methods.</para>
<fig id="F3-2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F3-2">Figure <xref linkend="F3-2" remap="3.2"/></link></label>
<caption><para>Interaction between the initiating device, candidate (pair) device and base station for realizing network assisted D2D communication.</para></caption>
<graphic xlink:href="graphics/ch03_fig002.jpg"/>
</fig>
</section>
<section class="lev1" id="sec3-4">
<title>3.4 D2D Using Physical Layer Network Coding</title>
<para>In this technique [20], there are two cooperating mobile nodes which can relay network codes over the channel codes in two different paths, as shown in <link linkend="F3-2">Figure <xref linkend="F3-2" remap="3.2"/></link>. First it is being sent to the candidate mobile, and subsequently it is being sent to the BS. The candidate mobile node responds back with a new code. The code received from the candidate mobile is combined with the code that was originally sent to that mobile. The combined code is sent to the BS which modifies it with a mathematical expression and relays to the candidate mobile. The candidate mobile who is aware of this mathematical expression deciphers the code that it had sent/received to/from the mobile that has initiated the pairing. When it is successful, the channel is identified and the traffic path between the two nodes is established.</para>
<para>The random selection of two pairs may not alleviate the performance of the network and optimize the system capacity. This is because of the fact that channel conditions between the mobile node and the BS can vary to quite some extent. This may lead to disproportionate SINRs between the nodes and the BS, entirely depending on the channel quality. Hence User Grouping based on proportionate parameters is done by the network based on some Cost Function so as to optimize the performance.</para>
</section>
<section class="lev1" id="sec3-5">
<title>3.5 D2D Using Fractional Frequency Reuse (FFR)</title>
<para>Interference is a significant issue in D2D communications. The interference is caused by devices in D2D mode with that in the normal cellular mode and the eNodeBs. It also depends a lot on the position of the D2D device in the cell, whether it is towards the exterior or towards the interior.</para>
<para>In [21], the radio resource allocation scheme using FFR is proposed. Different resources are allocated to the D2D UEs according to their location in the cell. If the D2D UE resides in the inner region of a cell, then they can use the frequency band that is not used by the eNodeB for relaying to the D2D UEs [24]. The ratio of different frequency reuse factor and the corresponding power level are optimized or adjusted adaptively according to the traffic load and user distribution. D2D and eNodeB relaying UEs located in the same cell do not interfere because radio resources from another frequency band are orthogonally allocated to the D2D and the eNodeBs relaying to the UEs.</para>
</section>
<section class="lev1" id="sec3-6">
<title>3.6 D2D Using Cognitive Radio</title>
<para>In reference [22], there is an overview on how D2D communication can be realized over secondary users. With this concept, the primary users can only transceive via the BS. The secondary user can avail both D2D plus the BS transmission mode.</para>
<para>In reference [23] a joint subcarrier and power allocation method CR-D2D-MC for cognitive multicast with D2D communication coexisting with cellular networks have been proposed. The impact of imperfect spectrum sensing is considered in the proposed problem, which results in the capacity decrease of the cognitive multicast. The simulation results show that the proposed algorithm improves the spectrum efficiency and maintains a better trade-off between capacity and fairness for cognitive networks in a low algorithm complexity. Therefore, employing cognitive multicast based on D2D is able to explore more potential spectrum resources adequately to improve the system performance, and make it possible to satisfy the requirements of multiple kinds of high rate transmission.</para>
</section>
<section class="lev1" id="sec3-7">
<title>3.7 Introducing SMNAT</title>
<para>SMNAT as a concept has been introduced in references [8, 12], which offers a global solution for various categories of cellular network. In SMNAT, the PHY layer is redesigned to take part directly in addressing and mobility management [13]. Similarly, in reference [10], it has been discussed how to implement SMNAT for a mobile network which serves M2M and H2H (Human-to-Human) users. In reference [11], SMNAT has been proposed for Vehicular communication network where D2D communication can be achieved at a group level. In reference [9], implementation scenario for a nano mobile network was brought in. In references [16&#x02013;18] it has been demonstrated how an intelligent PHY layer can be conceived by using colour synthesis and conveyed electronically for use in mobile or fixed networks. In reference [19] a system model was developed showing how to use the smart PHY layer realized by colour coding for the purpose of joint source channel coding.</para>
<para>Of late, the focus of the telecom researchers is to make the PHY layer more generic, intelligent and adaptable for higher bandwidth. As an example, GFDM [25] implements a generalized Ortho Frequency Division Multiplexing (OFDM), which introduces additional degrees of freedom when choosing the system parameters. A technique called tail biting is employed to eliminate the need for additional guard periods that would be necessary in a conventional system, in order to compensate for filtering tails and prevent overlapping of subsequent symbols.</para>
<para>The purpose of SMNAT is to realize a smart and flexible PHY layer which can directly take part in some activities which are performed by layer 7 in the state-of-the-art networks. Take the example of mobility management itself which entails activities like device location tracking across cells, handover and channel management. All these activities demand some processing power required to actuate associated service logic at layer 7.</para>
<para>SMNAT aims to simulate layer 5 and 7 processes related to addressing and identification of a mobile node (UE) in the RAN, at the PHY layer [8, 13]. A mobile node is identified by a symbol located at a fixed phase and amplitude in the complex plane, a time slot in the time frame and a physical channel which are determined during provisioning of the UE. <link linkend="F3-3">Figure <xref linkend="F3-3" remap="3.3"/></link> shows one Time Division Multiple Access (TDMA) frame, which includes <emphasis>T</emphasis><subscript><emphasis>n</emphasis>+1</subscript> time slots (numbered from <emphasis>T</emphasis><subscript>0</subscript> to <emphasis>T<subscript>n</subscript></emphasis>). The data rate required for the traffic burst is denoted by <emphasis>f<subscript>d</subscript> f<subscript>p</subscript></emphasis> denotes the sampling rates of the time slots before it is used to convey the traffic data. <emphasis>f<subscript>r</subscript></emphasis> denotes the refresh frequency for the given frame.</para>
<fig id="F3-3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F3-3">Figure <xref linkend="F3-3" remap="3.3"/></link></label>
<caption><para>TDMA frame.</para></caption>
<graphic xlink:href="graphics/ch03_fig003.jpg"/>
</fig>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/pg42-1.jpg"/></para>
<para>The modulation scheme implemented is a blend of M1 PSK (for outer ring) and M2 PSK (for inner ring), where M1&#x0003C;M2. <link linkend="F3-3">Figure <xref linkend="F3-3" remap="3.3"/></link> shows the proposed constellation in the case of M1=8 and M2=4. The constellation diagram in <link linkend="F3-4">Figure <xref linkend="F3-4" remap="3.4"/></link> pertains to a specific time slot, T1, of the frame. The frame corresponds to a specific subcarrier. Symbols of the outer ring are conveyed at a rate of <emphasis>f<subscript>r</subscript></emphasis> and the symbols of the inner ring are exchanged at a much higher rate, <emphasis>f<subscript>d</subscript></emphasis>.</para>
<para>In particular, one could set: <emphasis>f<subscript>d</subscript></emphasis> = 8 &#x000D7; <emphasis>f<subscript>r</subscript></emphasis>. The outer ring comprises M1 symbols for user traffic, and the inner ring comprises M2 that will be used for the purpose of addressing the users. In the proposed multiple access scheme, a user is identified in the network with respect to the symbol coordinate in the complex plane. The 8PSK symbols are continuously rotated with 3/8 radians per symbol. The rotated symbols are defined in Equation 3.1.</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq3-1.jpg"/></para>
<para>The modulated RF carrier is therefore given in Equation 3.2:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq3-2.jpg"/></para>
<para>Where, <emphasis>E<subscript>s</subscript></emphasis> is the energy per modulating symbol, <emphasis>f<subscript>0</subscript></emphasis> is the centre frequency and &#x003D5;<subscript>0</subscript> is a random phase and is constant during one burst.</para>
<para>A single time slot can carry M1 symbols, used for addressing M1 users and later, the same time slot will be used to convey the symbols for data traffic employing M2 symbols of the inner ring of the complex plane after the mobile node is identified in the network.</para>
<para>Therefore, M1 users, which have been allocated M1 different symbols of the outer ring could use the same time slot and frequency sub-bands.</para>
<fig id="F3-4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F3-4">Figure <xref linkend="F3-4" remap="3.4"/></link></label>
<caption><para>Constellation diagram.</para></caption>
<graphic xlink:href="graphics/ch03_fig004.jpg"/>
</fig>
<fig id="F3-5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F3-5">Figure <xref linkend="F3-5" remap="3.5"/></link></label>
<caption><para>The multiplexer unit in the access network.</para></caption>
<graphic xlink:href="graphics/ch03_fig005.jpg"/>
</fig>
</section>
<section class="lev1" id="sec3-8">
<title>3.8 Network Architecture and the Processes</title>
<para>The network consists of access points which are Wireless transceivers/ repeaters supporting the Smart modulation scheme. As shown in <link linkend="F3-5">Figure <xref linkend="F3-5" remap="3.5"/></link>, multiple access points are interfaced to the local multiplexers. For the uplink, the local multiplexers aggregate the symbols in the time slots of the time frame pertaining to the different Absolute Radio Frequency Channel Number (AFCRNs). For the downlink, it acts as a transit node between the Coordination Processor and the Mobile Station (MS) to convey the broadcast signal related to all the AFCRNs/time frames to the MSs served by the network. Multiple Local Multiplexers converge to an Aggregate Multiplexer which transceives the time frames on both directions of the Coordination Processor [8] in the uplink and downlink. The high level architecture and the internal functional blocks of the Coordination Processor as in <link linkend="F3-6">Figure <xref linkend="F3-6" remap="3.6"/></link> are summarized as below.</para>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem>
<para>It receives the timeframe in the uplink from the Aggregate Multiplexer and analyses the PHY layer parameters for processing the response message and commence the termination leg of the call or SMS.</para></listitem>
<listitem>
<para>It formulates the aggregate frame for the downlink communication and relays it to the Aggregate Multiplexer.</para></listitem>
<listitem>
<para>It interfaces with the HLR/HSS and the VAS network elements to actuate user related tasks.</para></listitem>
<listitem>
<para>It takes part in the layer 7 signalling to enable authentication, support supplementary services and roaming.</para></listitem>
<listitem>
<para>It is responsible for CDR (Call Data Record) generation and interacts with the Mediation and Billing Systems.</para></listitem>
<listitem>
<para>It does dialled number analysis and actuates a TDM/VOIP breakout when needed.</para></listitem>
<listitem>
<para>It can actuate the functionality of a gateway router to receive calls from a state-of-the-art network. This is alike the functionality of Gateway MSC of 2G/3G networks.</para></listitem></orderedlist>
<fig id="F3-6" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F3-6">Figure <xref linkend="F3-6" remap="3.6"/></link></label>
<caption><para>High level functionality of Coordination Processor.</para></caption>
<graphic xlink:href="graphics/ch03_fig006.jpg"/>
</fig>
<fig id="F3-7" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F3-7">Figure <xref linkend="F3-7" remap="3.7"/></link></label>
<caption><para>Aggregate frame formation in the uplink and user (A number) identification by Coordination Processor.</para></caption>
<graphic xlink:href="graphics/ch03_fig007.jpg"/>
</fig>
<section class="lev2" id="sec3-8-1">
<title>3.8.1 Frame Formation in the Uplink</title>
<para>The control signalling messages are invoked by the mobile device only when it initiates a network operation, like Mobile origination Calls, SMS, etc. But no messages are generated for location update unlike the state of the art. The device never gets attached to the network. The network does not keep a track of the location and presence of the device continuously; hence one may eliminate the need of the continuous exchange of mobility management messages between the network and the device.</para>
<para><link linkend="F3-7">Figure <xref linkend="F3-7" remap="3.7"/></link> Illustrates how the frame is formed in the uplink for the addressing part. Multiple UEs (mobile devices) as in this diagram invoke call requests. The UE first hunts for an available AFCRN where the time slot in the allocated position (as assigned to the user during the provisioning process) is identified. The symbol is then populated in the time slot and the UE generates a time frame by injecting only the specific symbol in that time slot in the time frame. Other time slots in the time frame are empty (as in <link linkend="F3-7">Figure <xref linkend="F3-7" remap="3.7"/></link>). The time frame pertaining to the available AFCRN is marked in black in <link linkend="F3-7">Figure <xref linkend="F3-7" remap="3.7"/></link> which implies that the user equipment has successfully populated the assigned symbol (assigned to itself) in the time slot predefined for the user. The access point transfers the information to the local Multiplexer which aggregates the symbols ingressing from the user equipments and formulates a single time frame for each AFCRN. The Local Multiplexer formulates a time frame by injecting the symbols from the different users in the appropriate slots as per the time frames arriving from the user equipment. This time frame is transported to the Aggregate Multiplexer. The Aggregate Multiplexer synthesizes an aggregate time frame with respect to each AFCRN and forwards it to the Coordination Processor for analysis and call processing.</para>
<para>At this stage, it is impossible to identify the address of A party address (calling number of a particular user) from the symbol coordinate and timeslot, because the AFCRN is variable. Hence the Coordination Processor cannot commence authentication. It first needs to secure the time slot in both uplink/downlink directions between the MS and itself. Hence it generates a response message in downlink towards the MS using the same AFCRN number that was used by the A party in the during the uplink layer 1 message for call initiation. However, the particular AFCRN may not be available because it may already be in use as traffic channel by other users. In this case, the Coordination Processor does not generate the response message towards the MS. The MS waits for the timer expiry (in milliseconds) and restarts the scan process and re-initiates a new message with another available AFCRN. In this process, it skips the AFCRN that was previously determined as unavailable. Following a successful layer 1 handshake between UE and the Coordination Processor, the time slot pertaining to the AFCRN is used further as traffic channel. The UE generates a layer 7 message towards the Coordination Processor encapsulated in the time slot that was allocated following the layer 1 handshake process as described earlier. The data conveyance materializes following M2 PSK modulation on the inner ring of the constellation diagram (<link linkend="F3-3">Figure <xref linkend="F3-3" remap="3.3"/></link>). UE populates A party addresses (calling address in E.212 format), authentication parameters, dialled numbers, supplementary service information in this message, so that the Coordination Processor can liaise with the HSS/HLR to actuate authentication, authorization for A party. Subsequently, it analyses the B Party (dialled) number and figures out the outgoing channel by carrying out dialled digit analysis. The above process deviates from mobile originating call procedure followed by the state-of-the-art Mobile Networks. Generally in conventional networks, the serving MSC/MME/CSCF generates an ISUP/SIP message directly for call termination towards the B party address. There is no interrogation towards the HLR//HSS. Only in case of Home routing scenarios, the call is routed towards the Home network where the SCP (Service Control point) is queried to generate a &#x0201C;Connect To&#x0201D; number.</para>
<fig id="F3-8" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F3-8">Figure <xref linkend="F3-8" remap="3.8"/></link></label>
<caption><para>Frame formation in the downlink</para></caption>
<graphic xlink:href="graphics/ch03_fig008.jpg"/>
</fig>
</section>
<section class="lev2" id="sec3-8-2">
<title>3.8.2 Frame Formation in the Downlink</title>
<para>The downlink process of how the call matures at the downlink towards B Party (called address) UE is shown in <link linkend="F3-8">Figure <xref linkend="F3-8" remap="3.8"/></link>. When the call arrives at the Coordination Processor, it first analyses if the B party address is served by the same mobile network, i.e., the smart network. If yes, then it interrogates the HSS/HLR for obtaining the symbol coordinate, time slot and the primary AFCRN allocated for the B Party. The supplementary and the tele-services assigned for the B party are also downloaded by the HSS/HLR towards the Coordination Processor. Subsequently, the Coordination Processor injects the symbol of B party in time slot (preconfigured for B number) in the time frame for the particular AFCRN in the downlink. In case the primary AFCRN is busy, then alternative AFCRNs are tried according to the predefined frequency scanning schemes. Note that this time frame also carries the symbols from other users in the respective time slots. Aggregate frame is formed and is routed to the Aggregate Multiplexer. The Aggregate Multiplexer broadcasts the time frames pertaining to all the AFCRNs in the Downlink via the Local Multiplexer and access points. B party scans the AFCRNs and looks out for the specific symbol contained in the specific time slot assigned for B number. If it finds one, then it formulates a response message by injecting the same symbol in the same time slot position in the UL. If the time slot (pertaining to the AFCRN) is busy, there is no response back from B party. The Coordination Processor has a time out and tries to page B party again with an alternate AFCRN according to the frequency scanning logic. As AFCRN is not fixed, one cannot ascertain at this stage seeing the radio layer PHY layer message whether the page message is intended for the particular B party address or some other users. The page message can indeed be meant for another user provisioned with the same symbol coordinate and time slot position. Hence, multiple users can simultaneously try to generate the response message. But once the Coordination Processor receives the layer 1 page response, the time slot related to the AFCRN will be reserved for use by the Coordination Processor. The time slot/AFCRN is also reserved at the UE end. The subsequent layer 7 message generated by the Coordination Processor will bear the B party address (E.212) as well as the A party address (E.164 for the CLI) and the supplementary service information. The specific UE (the original B party) will respond to this layer 7 message. The other UEs which reserved the time slot will release it when it ascertains from the layer 7 message carried by the time slot that the page was intended for another user (i.e., the B party). This completes the addressing process in the downlink.</para>
</section>
<section class="lev2" id="sec3-8-3">
<title>3.8.3 Integration of SMNAT with 5G Cores</title>
<para>It is imperative that the success behind any new technology lies in its interoperability and integration possibility with the existing or evolving networks. As a reference, in [14], the primary challenges for interworking between LTE core network and legacy core network are discussed. SMNAT is oriented on the PHY layer to implement the processes of addressing, mobility management and data exchange. On the contrary, 3GPPs vision on mobility management on 5G is founded on the application layer, more specifically the NAS (Non Access Stratum). The NAS defines the basic processes for mobility management for EPC (Enhanced Packet Core) between the UE and the MME. The two topologies are ideologically converse. Due to this reason it is recommended to follow a two stepped approach for integration of the two technologies.</para>
<section class="lev3" id="sec3-8-3-1">
<title>Short-term approach</title>
<para>WLAN can be integrated by the EPC core as it permits integration of non 3GPP untrusted network via the ePDG (evolved Packet Data Gateway). In <link linkend="F3-9">Figure <xref linkend="F3-9" remap="3.9"/></link>, the end-to-end integration between SMNAT and EPC is shown.</para>
<para>The UE establishes a communication with HSS through ePDG for actuating EPC authentication. At SMNAT end, RADIUS based authentication is followed alike the EAP-AKA mechanism. The conversion rules from RADIUS to DIAMETER (EPC) follow the GSM IR 61 recommendations.</para>
<para>The data transfer between the UE and the IMS core is established via the S2b interface between the ePDG and the PGW.</para>
<para>The call flow is shown in <link linkend="F3-10">Figure <xref linkend="F3-10" remap="3.10"/></link>. It can be seen that two processes are covered.</para>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem>
<para>Authentication</para></listitem>
<listitem>
<para>Data transfer</para></listitem></orderedlist>
<para>It may be interesting to note that mobility management messages are not exchanged with EPC. In a state-of-the-art (LTE) network, the UE actuate NAS signalling with the EPC. NAS, which is a layer 7 process, is not implemented in SMNAT. Rather SMNAT is dependent on a process where location management is realized via layer 1. This is the reason, the mobility management messages like Location Update/Location Cancellation are not seen (<link linkend="F3-10">Figure <xref linkend="F3-10" remap="3.10"/></link>). SMNAT can directly fit in the architecture which has been realized for integrating Wi-Fi with EPC.</para>
<fig id="F3-9" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F3-9">Figure <xref linkend="F3-9" remap="3.9"/></link></label>
<caption><para>Integration of SMNAT with EPC.</para></caption>
<graphic xlink:href="graphics/ch03_fig009.jpg"/>
</fig>
<fig id="F3-10" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F3-10">Figure <xref linkend="F3-10" remap="3.10"/></link></label>
<caption><para>Call flow between UE, SMNAT access and EPC core.</para></caption>
<graphic xlink:href="graphics/ch03_fig0010.jpg"/>
</fig>
</section>
<section class="lev3" id="sec3-8-3-2">
<title>Long-term approach</title>
<para>The long-term approach is to evolve the eNodeBs and MMEs as to be compatible with SMNAT architecture. As the mobility management part is simplified, these smart eNodeBs will thrive on PHY layer addressing, rather than the communication on NAS. The MMEs will be closer to the definition done for Coordination Processor, which can directly engage itself in PHY layer addressing and mobility management. Hence eNodeBs/Home eNodeB and MMEs will be lighter in terms of power consumption and processor capacity than the state-of-the-art networks.</para>
</section>
</section></section>
<section class="lev1" id="sec3-9">
<title>3.9 Implementation of SMNAT for In-Band&#x02013;D2D and Interoperability with WISDOM</title>
<para>This section brings out how SMNAT can be used to realize D2D communication, which can solve some issues and achieve some specific objects which the state-of-the-art D2D technologies cannot attain. Contrary to the work done so far on D2D where the peering is only possible between the two devices in physical proximity, SMNAT offers a more versatile solution where the D2D leg also could be established between two UEs which are not in vicinity. The following section discusses how this can be achieved.</para>
<para>SMNAT can be deployed as an access and core network layer (<link linkend="F3-11">Figure <xref linkend="F3-11" remap="3.11"/></link>), located on the same network plane as the WISDOM 5G [26&#x02013;28] based on cognitive communication. In such a scenario, SMNAT will be dedicated for D2D communication, while WISDOM will be responsible for global cellular roaming within the network area or beyond.</para>
<fig id="F3-11" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F3-11">Figure <xref linkend="F3-11" remap="3.11"/></link></label>
<caption><para>Coexistence of WISDOM 5G and SMNAT.</para></caption>
<graphic xlink:href="graphics/ch03_fig0011.jpg"/>
</fig>
<para>The available spectrum will be allocated between SMNAT and WISDOM. The ratio of the spectrum allocation can be determined through the process of network planning and can vary according to the traffic characteristics and the business requirement of the particular operator.</para>
<para>To decide whether D2D leg will be established or not, there are two possible options.</para>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem>
<para>Decision by the user</para></listitem>
<listitem>
<para>Decision by the network based on cooperative communication</para></listitem></orderedlist>
<fig id="F3-12" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F3-12">Figure <xref linkend="F3-12" remap="3.12"/></link></label>
<caption><para>D2D Channel establishment based on proximity of the paired device.</para></caption>
<graphic xlink:href="graphics/ch03_fig0012.jpg"/>
</fig>
<para>When any device initiates a communication process on data, it will have two options. It will be given a chance to try a D2D communication with the incentive of a faster communication process or lesser data charges (if offered by the network operator).</para>
<para>If the device does not opt for the D2D option, then the session will be established via the normal process of EPC signalling. Subsequently, the EPC can further decide whether to terminate the session to the candidate device via LTE/LTE-A, or the network will send instructions to the device rather to automatically initiate a D2D session.</para>
</section>
<section class="lev1" id="sec3-10">
<title>3.10 Description of network elements of SMNAT and the Call Flow for Session Establishment</title>
<para>SMNAT [12] [8] has a unique design of the cellular network which represents a checkerboard. There are access points in each cell, which via the Frame Aggregator can communicate with the D2D server. The D2D server is interfaced to a D2D database which holds the mapping between the E.164 address of the mobile device and the SMNAT coordinates namely the symbol coordinate, time slot and AFCRN.</para>
<para>As evident from <link linkend="F3-12">Figure <xref linkend="F3-12" remap="3.12"/></link>, D2D transport channel can be established directly between two nodes in case they are in proximity (same or different cell), but facilitated by the SMNAT Access and core network (for signalling). In case the devices are not in the direct signal range of each other, then the traffic channel will be established via the SMNAT Access and core (access point Frame Multiplexer D2D Server). But this process uses the addressing and mobility management methods pertaining to the PHY layer as defined by SMNAT.</para>
<fig id="F3-13" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F3-13">Figure <xref linkend="F3-13" remap="3.13"/></link></label>
<caption><para>End&#x02013;to-End communication channel establishment for D2D.</para></caption>
<graphic xlink:href="graphics/ch03_fig0013.jpg"/>
</fig>
<para>In <link linkend="F3-13">Figure <xref linkend="F3-13" remap="3.13"/></link>, the end-to-end call flow for D2D channel establishment is shown, which is self-explanatory. D2D server is a core network application platform which is responsible in establishing the pair, either directly between the two devices or via the core network using PHY layer addressing and mobility management.</para>
</section>
<section class="lev1" id="sec3-11">
<title>3.11 Decision by the Network to Initiate D2D Based on Cooperative Communications</title>
<para>In case the user attempts (by default) to establish communication through BS via the WISDOM 5G [26&#x02013;28] network, then the 5G Network will first check if the session can be terminated by the D2D channel. This implies that the network will check if it can o&#x0FB04;oad from cellular to D2D for capacity and optimization reasons. This can be done with the help of Diameter interaction between the HSS and the D2D server. A high level process is shown in <link linkend="F3-14">Figure <xref linkend="F3-14" remap="3.14"/></link>.</para>
<fig id="F3-14" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F3-14">Figure <xref linkend="F3-14" remap="3.14"/></link></label>
<caption><para>Network initiated D2D channel establishment.</para></caption>
<graphic xlink:href="graphics/ch03_fig0014.jpg"/>
</fig>
</section>
<section class="lev1" id="sec3-12">
<title>3.12 Security Aspects in Light of Cooperative Communication between 2 Devices in Cellular D2D Mode</title>
<para>As explained before, D2D communication can be established in the direct mode or via the network depending upon the proximity of the devices, channel conditions and location (both devices in the same cell or different cells). Security has become a primary concern especially for the D2D communication.</para>
<para>In case of the network assisted D2D communication, the network can enforce the security methods that are in place for cellular communication. The integration of SMNAT with the EPC has been shown in <link linkend="F3-9">Figure <xref linkend="F3-9" remap="3.9"/></link>, where the conventional EAP AKA method meant for traditional WLAN network can be used. The ePDG (Evolved Packet Data Gateway)/AAA platform modifies the RADIUS based authentication messages to AKA based EPC authentication parameters over DIAMETER directly with the HSS. The EPC authentication vectors including ciphering keys that are downloaded from the HSS will be retranslated and compared for the purpose of authenticating the UE.</para>
<para>However, for the direct mode of D2D communication, where two devices need to pair with each other using the cellular channel, the procedures become intricate. Generation of symmetric keys for the communicating peers without key exchange is challenging. One of the methods to generate the keys is based on random variations of wireless channel like Channel State Information (CSI). Most of these methods usually use the measurement results of individual subcarriers. But this is not robust, given the fact that the subcarriers in proximity can have similar channel conditions and have strong correlation dependence. Due to this fact there can be repeated segments in the key, which may be easy to crack.</para>
<para>Another approach is to use RSS key generation mechanism based on channel measurements. But the main issue is that it is not designed to meet the requirements of a system demanding key generation at massive scale. Bit generation rate is low as a single sample can provide a single RSS value. This also becomes vulnerable if the UE is static and the channel conditions are predictable and the channel variations are predictable. Hence the endeavour of the researchers is to realize a method of key generation based on CSI, but not based on a single subcarrier. In reference [29], a new algorithm termed as KEEP has been proposed. KEEP aims to actuate the key generation process by incorporating the following sub-processes.</para>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem>
<para>Dropping the inconsistent bits by exploiting the correlation of CSI measurements from multiple carriers. This is executed by a federated filtration method.</para></listitem>
<listitem>
<para>Implementation of Universal has key for validating consistency of bit streams between two communicating channels. A pair of devices exchanges only a part of the hashed keys, which makes it difficult for the attacker to guess and formulate the whole key.</para></listitem>
<listitem>
<para>Using methods of key recombination and adaptive quantization to generate secret bit from a large number of subcarriers. The bit mismatch rate with the process is low. Moreover, it eliminates the correlation of bit streams from multiple subcarriers and reduces predictivity.</para></listitem></orderedlist>
<para>The key generation process based adaptive quantization procedure, CSI sub-blocking and hashing is captured in the following algorithm in <link linkend="F3-15">Figure <xref linkend="F3-15" remap="3.15"/></link>.</para>
<fig id="F3-15" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F3-15">Figure <xref linkend="F3-15" remap="3.15"/></link></label>
<caption><para>Key generation process.</para></caption>
<graphic xlink:href="graphics/ch03_fig0015.jpg"/>
</fig>
</section>
<section class="lev1" id="sec3-13">
<title>3.13 Summary</title>
<para>At present, mobility management is explicitly in the domain of the application layer. This chapter introduces SMNAT where it is proposed to shift from this paradigm and knit this functionality with the PHY layer. This entails simplification of network architecture and associated processes and helps in attaining a network which has a degree of location and presence agnosticism. The interaction between the device and the network occurs only when one of them initiates a network operation for a call, SMS or other services. The handover operation is also simplified. Further, a novel D2D communication concept based on SMNAT has been proposed. Unlike the existing researches in D2D, engrossed in redesigning the radio resource allocation process, a parallel network stratum has been proposed which can actuate D2D communication based on addressing and mobility management processes closer to the PHY layer. The processing cycles in the network will diminish, which creates extra room to cater to new customers. This is aligned with our endeavour to realize a network which is cleaner, greener and leaner.</para>
</section>
<section class="lev1" id="sec3-14">
<title>References</title>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem>
<para>3GPP 23.228 Architecture and main flows for a IMS system. Rel 11, version 11.5.0, 2012-06-22.</para></listitem>
<listitem>
<para>Rich Communication Suite 5.2 Advanced Communications Services and Client Specification, GSMA.</para></listitem>
<listitem>
<para>Amit Kumar; Yunfei Liu; Jyotsna Sengupta; Divya; Evolution of Mobile Wireless Communication Networks:1G to 4G, IJECT Vol. 1, Issue 1, December 2010, pp. 68&#x02013;72. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Amit+Kumar%3B+Yunfei+Liu%3B+Jyotsna+Sengupta%3B+Divya%3B+Evolution+of+Mobile+Wireless+Communication+Networks%3A1G+to+4G%2C+IJECT+Vol%2E+1%2C+Issue+1%2C+December+2010%2C+pp%2E+68-72%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>3GPP TS 24.301: Non-Access-Stratum (NAS) protocol for Evolved Packet System (EPS); Stage 3. Rel 11, version 11.3.0, 2012-06-27.</para></listitem>
<listitem>
<para>3GPP TR 22.803 V12.2.0 (2013-06), Feasibility Study for Proximity Services (ProSe), (Release 12).</para></listitem>
<listitem>
<para>3GPP TR 22.888 V12.0.0 (2013-03), Study on enhancements for Machine-Type Communications (MTC) (Release 12). <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=3GPP+TR+22%2E888+V12%2E0%2E0+%282013-03%29%2C+Study+on+enhancements+for+Machine-Type+Communications+%28MTC%29+%28Release+12%29%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Rajarshi Sanyal and Ramjee Prasad, Enabling Cellular Device-to-Device data exchange on WISDOM 5G by actuating cooperative communication based on SMNAT, paper submitted. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Rajarshi+Sanyal+and+Ramjee+Prasad%2C+Enabling+Cellular+Device-to-Device+data+exchange+on+WISDOM+5G+by+actuating+cooperative+communication+based+on+SMNAT%2C+paper+submitted%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Sanyal, R., Cianca, E. and Prasad, &#x02018;Smart mobile networks with intelligent physical layer actuating mobility management&#x02019;, Int. J. Mobile Network Design and Innovation, Inderscience, 2012 Vol.4, No.2, pp. 91&#x02013;108. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Sanyal%2C+R%2E%2C+Cianca%2C+E%2E+and+Prasad%2C+%27Smart+mobile+networks+with+intelligent+physical+layer+actuating+mobility+management%27%2C+Int%2E+J%2E+Mobile+Network+Design+and+Innovation%2C+Inderscience%2C+2012+Vol%2E4%2C+No%2E2%2C+pp%2E+91-108%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Sanyal, R., Cianca, E. and Prasad, R &#x02018;Nano mobile network based on Smart Location Management and Addressing&#x02019;, Int. J. Mobile Network Design and Innovation, Inderscience, Vol. 4, No. 3, 2012. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Sanyal%2C+R%2E%2C+Cianca%2C+E%2E+and+Prasad%2C+R+%27Nano+mobile+network+based+on+Smart+Location+Management+and+Addressing%27%2C+Int%2E+J%2E+Mobile+Network+Design+and+Innovation%2C+Inderscience%2C+Vol%2E+4%2C+No%2E+3%2C+2012%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Sanyal, R., Cianca, E. and Prasad, R, &#x02018;Challenges for Coexistence of Machine-to-Machine and Human-to-Human Applications in Mobile Network: Concept of Smart mobility management, International Journal of Distributed Sensor Networks, Hindawi publishers, Volume 2012 (2012), Article ID 830371, 12 pagesdoi:10.1155/2012/830371. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Sanyal%2C+R%2E%2C+Cianca%2C+E%2E+and+Prasad%2C+R%2C+%27Challenges+for+Coexistence+of+Machine-to-Machine+and+Human-to-Human+Applications+in+Mobile+Network%3A+Concept+of+Smart+mobility+management%2C+International+Journal+of+Distributed+Sensor+Networks%2C+Hindawi+publishers%2C+Volume+2012+%282012%29%2C+Article+ID+830371%2C+12+pagesdoi%3A10%2E1155%2F2012%2F830371%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Sanyal, R., Cianca, E. and Prasad, &#x02018;Closed User Group Automotive communication network based on addressing at physical layer&#x02019;, International Journal of Interdisciplinary Telecommunications and Networking. IGI Global publishers USA, Volume 4, Issue 4, 2012. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Sanyal%2C+R%2E%2C+Cianca%2C+E%2E+and+Prasad%2C+%27Closed+User+Group+Automotive+communication+network+based+on+addressing+at+physical+layer%27%2C+International+Journal+of+Interdisciplinary+Telecommunications+and+Networking%2E+IGI+Global+publishers+USA%2C+Volume+4%2C+Issue+4%2C+2012%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>R. Sanyal, E. Cianca, and R. Prasad, &#x0201C;Beyond LTE: next generation multiple access technology with intelligent lower layers,&#x0201D; in Proceedings of ICWN 2011, the World Congress Computer Science, Computer Engineering and Applied Computing and International Conference, 2011, p. 474. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=R%2E+Sanyal%2C+E%2E+Cianca%2C+and+R%2E+Prasad%2C+%22Beyond+LTE%3A+next+generation+multiple+access+technology+with+intelligent+lower+layers%2C%22+in+Proceedings+of+ICWN+2011%2C+the+World+Congress+Computer+Science%2C+Computer+Engineering+and+Applied+Computing+and+International+Conference%2C+2011%2C+p%2E+474%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Rajarshi Sanyal, Ernestina Cianca, Ramjee Prasad &#x0201C;Rendering Intelligence at Physical Layer for Smart presented at IARIA conference on wireless networks 2011, France, published at IEEE digital library. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Rajarshi+Sanyal%2C+Ernestina+Cianca%2C+Ramjee+Prasad+%22Rendering+Intelligence+at+Physical+Layer+for+Smart+presented+at+IARIA+conference+on+wireless+networks+2011%2C+France%2C+published+at+IEEE+digital+library%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Rajarshi Sanyal, &#x02018;Challenges in Interoperability and Roaming between LTE - Legacy core for mobility management, Routing, Real Time Charging&#x02019; ITU WORLD 2011, Geneva, 26th October 2011, published in IEEE Explore. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Rajarshi+Sanyal%2C+%27Challenges+in+Interoperability+and+Roaming+between+LTE+-+Legacy+core+for+mobility+management%2C+Routing%2C+Real+Time+Charging%27+ITU+WORLD+2011%2C+Geneva%2C+26th+October+2011%2C+published+in+IEEE+Explore%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Sanyal, R., Cianca, E. and Prasad, &#x02018;Novel WLL architecture based on Colour Pixel Multiple Access implemented on a Terrestrial Video Network as the overlay&#x02019;, International Journal of Interdisciplinary Telecommunications and Networking, IGI Global publishers USA Volume 5, Issue 1, 2013. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Sanyal%2C+R%2E%2C+Cianca%2C+E%2E+and+Prasad%2C+%27Novel+WLL+architecture+based+on+Colour+Pixel+Multiple+Access+implemented+on+a+Terrestrial+Video+Network+as+the+overlay%27%2C+International+Journal+of+Interdisciplinary+Telecommunications+and+Networking%2C+IGI+Global+publishers+USA+Volume+5%2C+Issue+1%2C+2013%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Rajarshi Sanyal, Ernestina Cianca, Ramjee Prasad, Colour Pixel Multiple Access- A multiple Access Technology for Next Generation Mobile Networks&#x02019;, International Conference on Wireless Networks (ICWN 09), 2009 World Congress Computer Science, Computer Engineering and Applied Computing at USA. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Rajarshi+Sanyal%2C+Ernestina+Cianca%2C+Ramjee+Prasad%2C+Colour+Pixel+Multiple+Access-+A+multiple+Access+Technology+for+Next+Generation+Mobile+Networks%27%2C+International+Conference+on+Wireless+Networks+%28ICWN+09%29%2C+2009+World+Congress+Computer+Science%2C+Computer+Engineering+and+Applied+Computing+at+USA%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Rajarshi Sanyal,&#x02018;Framework for Realizing mobile and computer communication through color signals&#x02019;, SAM 2006, World Congress in Computer Science, Computer Engineering and Applied Computing, USA. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Rajarshi+Sanyal%2C%27Framework+for+Realizing+mobile+and+computer+communication+through+color+signals%27%2C+SAM+2006%2C+World+Congress+in+Computer+Science%2C+Computer+Engineering+and+Applied+Computing%2C+USA%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Rajarshi Sanyal, Mobile and Computer Communications Through Colour Signals - An Approach Note. WINSYS 2006: 73&#x02013;78. Portugal.</para></listitem>
<listitem>
<para>Rajarshi Sanyal, Transmission of Audio signals from multiple sources riding on single lossless streaming video channel using Phase Vocoder by applying Joint Source Channel Coding technique, (CIC07): 2007 World Congress in Computer Science, Computer Engineering and Applied Computing in Las Vegas USA.</para></listitem>
<listitem>
<para>Afif OSSEIRAN, Klaus DOPPLER, Cassio RIBEIRO2, Ming XIAO, Mikael SKOGLUND, Jawad MANSSOUR, Advances in Device-to-Device Communications and Network Coding for IMT-Advanced, ICT-MobileSummit 2009 Conference Proceedings. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Afif+OSSEIRAN%2C+Klaus+DOPPLER%2C+Cassio+RIBEIRO2%2C+Ming+XIAO%2C+Mikael+SKOGLUND%2C+Jawad+MANSSOUR%2C+Advances+in+Device-to-Device+Communications+and+Network+Coding+for+IMT-Advanced%2C+ICT-MobileSummit+2009+Conference+Proceedings%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Hyang Sin Chae, Jaheon Gu, Bum-Gon Choi, and Min Young Chung, Radio Resource Allocation Scheme for Device-to-Device Communication in Cellular Networks Using Fractional Frequency Reuse, 2011 17th Asia-Pacific Conference on Communications (APCC), 2nd&#x02013;5th October 2011.</para></listitem>
<listitem>
<para>Peng Cheng; Dept. of Electron. Eng., Shanghai Jiao Tong Univ., Shanghai, China; Lei Deng; Hui Yu; Youyun Xu Resource allocation for cognitive networks with D2D communication: An evolutionary approach, Wireless Communications and Networking Conference (WCNC), 2012 IEEE. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Peng+Cheng%3B+Dept%2E+of+Electron%2E+Eng%2E%2C+Shanghai+Jiao+Tong+Univ%2E%2C+Shanghai%2C+China%3B+Lei+Deng%3B+Hui+Yu%3B+Youyun+Xu+Resource+allocation+for+cognitive+networks+with+D2D+communication%3A+An+evolutionary+approach%2C+Wireless+Communications+and+Networking+Conference+%28WCNC%29%2C+2012+IEEE%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Yueyun Chen1, Xiangyun Xu1, Qun Lei1, Joint Subcarriers and Power Allocation with Imperfect Spectrum Sensing for Cognitive D2D Wireless Multicast, KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS VOL. 7, NO. 7, Jul. 2013. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Yueyun+Chen1%2C+Xiangyun+Xu1%2C+Qun+Lei1%2C+Joint+Subcarriers+and+Power+Allocation+with+Imperfect+Spectrum+Sensing+for+Cognitive+D2D+Wireless+Multicast%2C+KSII+TRANSACTIONS+ON+INTERNET+AND+INFORMATION+SYSTEMS+VOL%2E+7%2C+NO%2E+7%2C+Jul%2E+2013%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Tarun Bansal, Karthikeyan Sundaresan, Sampath Rangarajan, Prasun Sinha, R2D2: Embracing Device-to-Device Communication in Next Generation Cellular Networks, Proc. of IEEE INFOCOM, Toronto, Canada, Apr 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Tarun+Bansal%2C+Karthikeyan+Sundaresan%2C+Sampath+Rangarajan%2C+Prasun+Sinha%2C+R2D2%3A+Embracing+Device-to-Device+Communication+in+Next+Generation+Cellular+Networks%2C+Proc%2E+of+IEEE+INFOCOM%2C+Toronto%2C+Canada%2C+Apr+2014%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>G. Fettweis, M. Krondorf, and S. Bittner, &#x0201C;GFDM &#x02013; Generalized Frequency Division Multiplexing,&#x0201D; in Proc. IEEE 69th Vehicular Technology Conf. VTC Spring 2009. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=G%2E+Fettweis%2C+M%2E+Krondorf%2C+and+S%2E+Bittner%2C+%22GFDM+-+Generalized+Frequency+Division+Multiplexing%2C%22+in+Proc%2E+IEEE+69th+Vehicular+Technology+Conf%2E+VTC+Spring+2009%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Cornelia-Ionela Badoi, Neeli Prasad, Victor Croitoru, Ramjee Prasad, 5G Based on Cognitive Radio, Wireless Pers Commun (2011) 57: 441&#x02013;464. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Cornelia-Ionela+Badoi%2C+Neeli+Prasad%2C+Victor+Croitoru%2C+Ramjee+Prasad%2C+5G+Based+on+Cognitive+Radio%2C+Wireless+Pers+Commun+%282011%29+57%3A+441-464%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Ramjee Prasad, Global ICT Standardisation Forum for India (GISFI) and 5G Standardization, Journal of ICT Standardization, River Publishers, Vol: 1 Issue: 2, June 2013. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Ramjee+Prasad%2C+Global+ICT+Standardisation+Forum+for+India+%28GISFI%29+and+5G+Standardization%2C+Journal+of+ICT+Standardization%2C+River+Publishers%2C+Vol%3A+1+Issue%3A+2%2C+June+2013%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Ramjee Prasad and Albena Mihovska, Challenges to 5G standardization. ITU News, Issue No 10 December 2013. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Ramjee+Prasad+and+Albena+Mihovska%2C+Challenges+to+5G+standardization%2E+ITU+News%2C+Issue+No+10+December+2013%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>W. Xi, X. Li, C. Qian, J. Han KEEP: Fast Secret Key Extraction Protocol for D2D Communication, S. Tang, K. Zhao, Proceedings of IEEE/ACM International Symposium on Quality of Service (IWQoS), 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=W%2E+Xi%2C+X%2E+Li%2C+C%2E+Qian%2C+J%2E+Han+KEEP%3A+Fast+Secret+Key+Extraction+Protocol+for+D2D+Communication%2C+S%2E+Tang%2C+K%2E+Zhao%2C+Proceedings+of+IEEE%2FACM+International+Symposium+on+Quality+of+Service+%28IWQoS%29%2C+2014%2E" target="_blank">Google Scholar</ulink></para></listitem>
</orderedlist>
</section>
</chapter>
<chapter class="chapter" id="ch04" label="4" xreflabel="4">
<title>Dynamic Spectrum Management and mm-WAVES</title>
<para>Radio spectrum is a prime factor in driving the growth of mobile services. The success of 5G network is based on the unconstrained availability of spectrum. About 1200 MHz of spectrum in the frequency bands below 5 GHz has been identified for IMT services during World Administrative Radio Conference (WARC)-92, World Radio communication Conference (WRC)-2000 and WRC-2007. These frequency bands are 450&#x02013;470 MHz, 698&#x02013;960 MHz, 1710&#x02013;2025 MHz, 2110&#x02013;2200 MHz, 2300&#x02013;2400 MHz, 2500&#x02013;2690 MHz, and 3400&#x02013;3600 MHz. The identified spectrum is non-contiguous and scattered in different frequency bands from 450 MHz to 3.4 GHz. However, the actual allocation is ranging between the frequency band 700 MHz and 2.6 GHz. The irony is that these identified frequency bands have already been allocated to legacy services long back. Therefore, no vacant spectrum is available especially below 6 GHz at present for mobile communications. The options available to enhance the spectrum availability for 5G communications are spectrum re-farming, spectrum sharing and use of cognitive radio technology. Moreover, this identified 1200 MHz non-contiguous spectrum could not hold the pressure of high mobile data growth, demand for convergence of different varieties of services and speed as envisaged in 5G network. Assigning a new radio spectrum is crucial to meet the expected demands for future 5G networks. This is possible by exploiting higher microwave frequencies, referred as millimeter (mm-wave) bands. Therefore, mm-frequency band is the obvious and the most preferred band for 5G network.</para>
<para>The 5G network envisages as a combination of several micro, pico and femto cells embedded within a macro cell. According to physical law, coverage decreases with increasing frequency. The mm-waves can be divided into different categories, the first one ranging between 20 and 40 GHz frequency bands for micro sites and the other one is around 60 GHz frequency band for pico and femto cell sites.</para>
<para>With the increase in the number of wireless devices, the number of wireless connections and high data rate networks rises. This leads to the two important factors spectrum demand and spectrum congestion, turning out to be the two critical challenges for the forthcoming wireless communication world. Simultaneously the user&#x02019;s requirements such as high multimedia data rate transmission based on the bandwidth demanding applications will make the future wireless networks to suffer from the spectrum scarcity.</para>
<section class="lev1" id="sec4-1">
<title>4.1 Command and Control Method</title>
<para>The conventional method for allocating spectrum is known as &#x0201C;Command and Control Method&#x0201D; shown in the <link linkend="F4-1">Figure <xref linkend="F4-1" remap="4.1"/></link>. There are some countries following this technique of spectrum allocation. In this method radio spectrum is divided into different spectrum bands that are allowed to specific radio communication services such as satellite services, mobile, broadcast on an exclusive basis.</para>
<para>This method guarantees that the radio frequency spectrum will be exclusively licensed to an authorized user and can use spectrum without any interference [1].</para>
<fig id="F4-1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F4-1">Figure <xref linkend="F4-1" remap="4.1"/></link></label>
<caption><para>Command and Control Method [1].</para></caption>
<graphic xlink:href="graphics/ch04_fig001.jpg"/>
</fig>
<para>This method of spectrum allocation is not efficient because [1]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Spectrum assigned to a particular radio communication service cannot be replaced by other services even though it is witnessed that spectrum is underutilized.</para></listitem>
<listitem>
<para>There is no possibility of questioning the user once the spectrum is allocated to him (during the licensing period) as per the norms, provided he fulfills the terms and conditions.</para></listitem>
<listitem>
<para>This method does not make spectrum to be utilized efficiently in rural areas as the spectrum utilization is heavy in the urban regions and underutilized in the rural areas.</para></listitem></itemizedlist>
<para>It is sad to see the spectrum underutilized and not accessible to all. It is difficult for some nations to provide 4G services itself. There is a need for taking serious steps in handling spectrum issues by implementing sophisticated technologies for the development of nation. In these cases the techniques like spectrum trading would be a successful solution. This will only lead to the development of 5G communications in these types of countries.</para>
</section>
<section class="lev1" id="sec4-2">
<title>4.2 Spectrum Sharing</title>
<para>The demand for multimedia content and information processing, services such as e-education and e-health, mobile broadcasting, enormous increase in the electronic gadgets necessitate efficient use of all available and usable frequency spectrum. The new generation of mobile broadband networks will require supporting higher data throughput rates.</para>
<para>Many sophisticated technologies have been implemented for making the efficient use of available spectrum. For example, line-of-sight (LOS) systems are usable up to 100 GHz now. Running down the size of electronic components and systems introduces the multiple frequency bands in single equipment leading to the efficient use of available spectrum by the enhanced dynamic sharing of frequency bands.</para>
<para>Spectrum management should be in such a way that there should be always optimum spectral sharing. Greater sharing of frequencies and bands allows more data to be sent by different users in the same amount of available spectrum.</para>
<para>Spectrum sharing has basically three dimensions: frequency, time and location. The Collective Use of Spectrum (CUS) allows spectrum to be used by more than one user simultaneously without requiring a license. Some of the examples that come under spectrum sharing are frequency reuse concept in the existing telecom networks, FDMA, TDMA. Another important challenge is the sharing of spectrum among the heterogeneous networks. While it is easier to achieve efficient and successful spectrum sharing among the homogeneous or similar networks or applications, there arises complexity in heterogeneous networks [2].</para>
<para>The spectrum sharing methods are classified into three categories based on based on the priority level of accessing the radio spectrum as follows [2]:</para>
<orderedlist numeration="loweralpha" continuation="restarts" spacing="normal">
<listitem>
<para>Horizontal spectrum sharing: all the devices have equal rights to access the spectrum.</para></listitem>
<listitem>
<para>Vertical spectrum handover only: the primary users are allotted priorities to access the spectrum.</para></listitem>
<listitem>
<para>Hierarchical spectrum sharing: it is an enhanced variant of the vertical spectrum sharing.</para></listitem></orderedlist>
<section class="lev2" id="sec4-2-1">
<title>4.2.1 Spectrum Using SDR and Cognitive Radio &#x02013; Dynamic Sharing</title>
<para>Evolution of software defined radio (SDR) and cognitive radio (CR) are the two major milestones in the mobile communications. Dynamic sharing of spectrum improves the spectrum efficiency and the above mentioned technologies play a vital role in this aspect.</para>
<para>Conventionally, transmitters were tuned to specific frequencies, and facilities for multiple frequencies would cost high. But after the development of these technologies, tuning the transmitters to the multiple frequencies has become easier, i.e., switching to the different frequencies in a dynamic way would be possible at a reasonable cost.</para>
<para>Cognitive radio first detects the occupation of the channel, and if it is occupied, it helps the users to switch to the other vacant channels. Also the carrier signals are sensed regularly for usage in other. There is always a need of large amount of spectrum in case of emergency or public safety conditions compared to that of normal conditions. In these emergency cases, dynamic sharing of spectrum would be a promising solution. In some countries spectrum regulators are used for the encouraging dynamic sharing spectrum with public safety requirements. It is to be noted that CR is a combination of administrative (regulatory), technical, and market based techniques to enhance the efficiency of spectrum utilization [2].</para>
<para>Another area of utility for dynamic sharing is White Spaces (TV Band). Normally, the TV broadcasters repeat the same channel/carrier at relatively longer distances, to avoid any interference especially at the border/edger of the coverage areas that are on the border of two adjacent broadcast transmissions on same channel. However, there are very few receivers in this area, and the spectrum utility is not effective and could be utilized for other purposes.</para>
<para>The broadcasters are generally quite protective for their signal transmissions, even in areas beyond the theoretical coverage areas. Hence, only low power systems that cause minimal interference can be considered for shared usage with the TV spectrum. However, gradually with time building collective confidence amongst the users that includes the broadcasters, higher power based systems could be considered [2].</para>
</section>
</section>
<section class="lev1" id="sec4-3">
<title>4.3 Spectrum Trading</title>
<para>Spectrum trading is a case of spectrum sharing with the involvement of commercial activities. Spectrum trading is found to be a more economical way of efficient use of spectrum. It is an option through which flexibility can be increased and spectrum assigned to a particular service, and can be easily transferred for other usage. To explain it in brief, spectrum trading is a market based mechanism where buyers and the sellers determine the assignments of spectrum and its uses in which seller transfers the right of spectrum usage, in full or part, to buyer while retaining the ownership. In many countries spectrum trading is already running and the trading procedure is confined to specific bands, which are in demand for commercial use with specified conditions. Spectrum trading improves the efficiency and facilitates new services to enter in the market by making slight modification in the regulatory provisions [2].</para>
<para>The difference between spectrum sharing and spectrum trading can be explained as follows:</para>
<para>In spectrum trading the usage rights are transferred completely from the seller for a specified period. However, in spectrum sharing buyer gets a temporary right of spectrum usage with the exclusive rights resting with the seller. Trading becomes effective only when it is clubbed with liberalization. Spectrum trading can be implemented if there is solid base in understanding advanced technologies and operating systems as the spectrum flexibility demands new approaches and practical methods for monitoring compliance, enforcement and conflict resolution [2].</para>
<section class="lev2" id="sec4-3-1">
<title>4.3.1 Spectrum Trading Merits</title>
<para>The merits of spectrum trading are as follows [2]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Improves efficient spectrum usage</para></listitem>
<listitem>
<para>Facilitates the evaluation of spectrum licenses, and gaining knowledge of market value of spectrum</para></listitem>
<listitem>
<para>Quicker process, with better and faster decision-making by those with information</para></listitem>
<listitem>
<para>Removes barriers to entry by allowing small operators and start-ups to acquire spectrum rights of use more readily, thereby facilitating the development of market competition</para></listitem>
<listitem>
<para>There is an opportunity for more rapid redeployment and faster access for spectrum</para></listitem>
<listitem>
<para>Encourages new technologies to gain access to spectrum more quickly</para></listitem>
<listitem>
<para>Existing operators gain an opportunity to sell unused or under-used spectrum and make more flexible use of spectrum</para></listitem>
<listitem>
<para>Reduction in the transactions costs of acquiring rights to use spectrum</para></listitem>
<listitem>
<para>Allows operators increased flexibility to accommodate shifting demand driven by market changes.</para></listitem></itemizedlist>
</section>
</section>
<section class="lev1" id="sec4-4">
<title>4.4 Cognitive Radio</title>
<para>IEEE approved definition of cognitive radio (CR) is a radio in which communication systems are aware of their environment and internal state, and can make decisions about their radio operation based on that information and predefined objectives. The environmental information may not include location information related to communication systems. Cognitive radio is a very good solution for increasing the spectrum utilization.</para>
<para>Cognitive radios should be able to self-organize their communication based on sensing and reconfigurable functions as stated below [3]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para><emphasis>Spectrum resource management:</emphasis> this scheme is necessary to manage and organize efficiently spectrum holes information among cognitive radios.</para></listitem>
<listitem>
<para> <emphasis>Security management:</emphasis> cognitive radio networks (CRNs) are heterogeneous networks in essence and this heterogeneous property introduces a lot of security issues. So this scheme helps in providing security functions in dynamic environment.</para></listitem>
<listitem>
<para><emphasis>Mobility and connection management:</emphasis> this scheme can help neighbourhood discovery, detect available Internet access, and support vertical handoffs, which help cognitive radios to select route and networks.</para></listitem></itemizedlist>
<section class="lev2" id="sec4-4-1">
<title>4.4.1 CR Device Concept</title>
<para>This section explains the features of CR whose implementation in a single device offers a very smart and high performance user terminal &#x02013; CR terminal. The <link linkend="F4-2">Figure <xref linkend="F4-2" remap="4.2"/></link> shows the CR properties.</para>
<fig id="F4-2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F4-2">Figure <xref linkend="F4-2" remap="4.2"/></link></label>
<caption><para>Concept of CR Device [4].</para></caption>
<graphic xlink:href="graphics/ch04_fig002.jpg"/>
</fig>
<section class="lev3" id="sec4-4-1-1">
<title>A. Spectrum sensing</title>
<para>Spectrum sensing operation can be divided into the three step functions [4]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para><emphasis>Signal Detection:</emphasis> In this step of operation existence of the signal is sensed. There is no need to know the type of signal in this step.</para></listitem>
<listitem>
<para><emphasis>Signal Classification:</emphasis> In this step of operation the type of signal is detected, which is done by extracting the features of the signal.</para></listitem>
<listitem>
<para><emphasis>Channel availability decision:</emphasis> In this channel availability is detected. Once the free channels are detected, the step next to it is, sharing the spectrum holes which can be achieved by the spectrum allocation scheme.</para></listitem></itemizedlist>
<para>The CR technology also brings new <emphasis>security and pricing challenges</emphasis> which are shown in the <link linkend="F4-2">Figure <xref linkend="F4-2" remap="4.2"/></link>.</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>New security threats appear with the dynamic spectrum access concept, as well as the CR&#x02019;s authentication needs.</para></listitem>
<listitem>
<para>The pricing is very much influenced by the used channel allocation scheme. Additionally, CRs must be designed with strong capabilities to negotiate the available channels&#x02019; price.</para></listitem></itemizedlist>
</section>
<section class="lev3" id="sec4-4-1-2">
<title>B. Spectrum handover</title>
<para>The phenomenon of frequency changing dynamically is said to be spectrum handover. A secondary user changes its frequency on appearance of a primary user or due to transmission degradation. This necessitates designing a handover scheme [4].</para>
</section>
<section class="lev3" id="sec4-4-1-3">
<title>C. Environment adaptation</title>
<para>Different changes like topological changes, noise or interference power may occur while sensing the information. In order to adapt to these changes and to maintain the constant performance new adaptation techniques have to be implemented which is an important point of concern [4].</para>
</section>
<section class="lev3" id="sec4-4-1-4">
<title>D. CR routing</title>
<para>CR routing is based on the requirement for CR device to interoperate with different systems, and is influenced by the spectrum sharing techniques [4].</para>
<para>CRNs inherit the PSs (Primary Systems) network characteristics: infrastructure - based, mesh, ad-hoc, sensor networks, etc. and these architecture types impose a specific routing algorithm, which must also include the CR devices and the possibility for a CR to be a relay node for another CR.</para>
</section>
</section>
<section class="lev2" id="sec4-4-2">
<title>4.4.2 CR based on 5G</title>
<para>As already stated earlier CR technology would be a major modality to build the integrated 5G network. The various functionalities for 5G that could be met with CR usage are as follows [4]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Advanced PHY and MAC technologies.</para></listitem>
<listitem>
<para>Implementation of novel and flexible protocols.</para></listitem>
<listitem>
<para>Capacity to support homogenous and heterogeneous systems.</para></listitem>
<listitem>
<para>Adaptation to different changes like environment changes, dynamic frequency changes, etc.</para></listitem></itemizedlist>
<para>Correlation between WISDOM and CR in reference to 5G could be given as:</para>
<para>&#x0201C;5G brings the convergence concept through WISDOM and CR represents the technological tool to implement it.&#x0201D; The 5G technology eliminates the radio terminals that are specific to particular wireless technologies and proposes a universal terminal which must include all of the predecessor features in a single device. This terminal convergence is supported by the users&#x02019; needs and demands and is strongly found in CR terminal [4].</para>
<para>There are many issues that still remain to be addressed [4]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>How to connect the CR terminal to the wired networks?</para></listitem>
<listitem>
<para>How to reach the maximum 5G&#x02019;s 1 Tera bps data rate threshold when using the CR technology at the access level?</para></listitem>
<listitem>
<para>How to implement the good techniques in order to combine the flows coming from multiple access networks?</para></listitem></itemizedlist>
</section>
</section>
<section class="lev1" id="sec4-5">
<title>4.5 Millimetre Waves</title>
<para>Most of the radio communications including TV, satellite communications GPS, Bluetooth are utilizing frequency band ranging from 300 MHz to 3 GHz. But this band is getting crowded and the focus is on releasing and utilizing the additional spectrum. In mm-waves are the promising solution for this problem.</para>
<para>The spectrum bands identified under the IMT umbrella do not have the capacity to carry such enormous data required for 5G services. Therefore, mm-waves could be the candidate bands for 5G mobile communications due to high data carrying capacity. The mm-waves have the following advantages [5, 6]:</para>
<orderedlist numeration="loweralpha" continuation="restarts" spacing="normal">
<listitem>
<para>Not much operation at mm-waves so more spectrum is available at mm-waves</para></listitem>
<listitem>
<para>Very large blocks of contiguous spectrum to support future applications.</para></listitem>
<listitem>
<para>Due to high attenuation in free space, frequency reuse is possible at shorter distance</para></listitem>
<listitem>
<para>Spatial resolution is better at mm-waves hardware with CMOS technology</para></listitem>
<listitem>
<para>Advancement in semiconductor technology allows low cost equipment</para></listitem>
<listitem>
<para>Small wavelength makes possible use of large antenna arrays for adaptive beam forming</para></listitem>
<listitem>
<para>Small size of antenna at mm-waves facilitates easy integration on chip and installation at suitable locations.</para></listitem></orderedlist>
<para>In mm-waves allow larger bandwidth and offer high data transfer and low latency rate that are suitable for high speed reliable Internet services. The small wavelength facilitates small size antenna and other part of radio hardware, which reduces costs and also easy to install. The transmitter&#x02019;s antenna would be like a lamppost, which could be installed on building, street lamppost, etc. [6].</para>
<para>High directionality attained in this band can be used to increase spatial multiplexing. The size of antenna required for a mm-waves radio can be one-tenth or less of an equivalent lower frequency radio which is an advantage to the manufactures to build smaller and lighter systems.</para>
<para>Beam width is the measure of how a transmitted beam spreads out as it gets farther from its point of origin. But due to limited availability of radio frequency (RF) bands the fifth generation wireless communication systems will move to ultra-high capacity mm-wave bands. High frequency makes mm-wave band more attractive for wireless communication system and these frequencies are used in terrestrial and satellite communications. Wireless products that use millimeter waves already exist for fixed, LOS transmissions</para>
<para>But the absorption rate of the mm-wave electromagnetic signal poses great challenges for their utilization in the non-LOS and mobile connections. On the other hand, high directionality achieved in this band can be used to increase spatial multiplexing. Wireless backhaul will be another key enabler of 5G-mm-wave small cells [8].</para>
<para>Within the mm frequencies, the frequency band of 60 GHz has attracted the researchers to work with, as the large amounts of bandwidth are unallocated in this band, bandwidths that are required for communication systems at the intended data rates of 100 Mbps and above. Also, another advantage of 60-GHz band is due to a physical property of the propagation channel at this frequency that provides a natural way for reduction of frequency reuse factor, which tends to compact cell size [8].</para>
<para>It is a general property of the mm-wave propagation that the behaviour of the propagation rays is well characterized by the geometric optics. That is, the waves do not penetrate the walls or other obstacles and wave reflection is the main mechanism leading to a multipath [8]. In mm-waves have the potential to support broad-band service access which is especially relevant because of the advent of Broadband Integrated Service Digital Network (B-ISDN).</para>
<para>With the development of personal wireless communication systems, two things are appearing to be significant:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Exploiting high frequency bands, such as mm-waves to provide broadband for high rate data transmission.</para></listitem>
<listitem>
<para>To integrate multi-tasks in one system which greatly extend the application of wireless device.</para></listitem></itemizedlist>
<para>The utility of mm-waves for the micro cells that form the WISDOM based GIMCV are well positioned to be served by these mm-waves. It has been elaborated in these following points:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>It is relatively easy to get licenses for big blocks of mm-wave spectrum, which would allow carriers to deploy large backhaul pipes over 1 Gbps in size. While a single small cell may not need that much capacity, the complexity of heterogeneous networks will require daisy-chaining many small cells together, each cell passing its load down the line.</para></listitem>
<listitem>
<para>Small cell backhaul makes the best use high frequency characteristics of mm-waves. The higher the frequency the shorter distance a wave propagates unless it gets a serious power boost. But the heterogeneous network by definition will be composed of densely packed cells in urban environments, meaning no mm-waves will have to travel far between hops.</para></listitem></itemizedlist>
<para>The traditional uses of the mm-waves include radio navigation, space research, radio astronomy, earth exploration satellite, radar, military weapons and other applications. The backbone/backhaul networks (point to point network) for existing telecom network to connect base station to main switching centre (MSC), Local Multipoint Distribution System (LMDS), indoor WLAN, high capacity dense networks are also present in the mm-waves. The typical microwave backhaul bands are at 6.0 GHz, 11.0 GHz, 18.0 GHz, 23.0 GHz, and 38.0 GHz frequency bands.</para>
<para>The light use of mm-waves could be attributed to high attenuation and low penetration. At such high frequency, waves are more prone to rain and other atmospheric attenuation. The wavelength is in the order of millimeters, and rain drops are also of the same size. Rains absorb high frequency waves and make it difficult for propagation. However, the experimental results show that in heavy rain condition, attenuation is 1.4 dB and 1.6 dB for 200 meters distance at 28 GHz and 38 GHz, respectively [8]. The rain attenuations at 60 GHz for a rainfall rate of 50 mm/h, is approximately 18 dB/km [11]. A proper link design with slightly high transmit power may take care of rain attenuation.</para>
<para>Slight change in the position would affect the signal strength at the receiving end, due to which mm-waves are deeply affected by scattering, reflection and refraction. The root mean square (RMS) delay spread for mm-waves is of the order of few nano seconds, and it is high for are non-LOS (NLOS) links than (LOS) links [9]. Similarly, path loss exponent for NLOS links is higher than LOS links. Due to higher path loss and RMS delay spread, it is assumed that mm-waves are not suitable for (NLOS) links. However, these difficulties could be managed by using carrier aggregation, high order MIMO, steerable antenna, beam-forming techniques.</para>
<para>Recently, extensive measurements to understand the propagation characteristics for defining the radio channel have been carried out at 28 GHz in the dense urban areas of New York City and at 38 GHz cellular propagations measurements were conducted in Austin, Texas, at the University of Texas main campus. The measurements were conducted to know the details about angle of arrival (AoA), angle of departure (AoD), RMS delay spread, path loss, and building penetration and reflelction characteristics for the design of future mm-wave cellular systems. The propagation feasibility studies at 28 GHz and 38 GHz showed that propagation is feasible up to 200 meters of distance [6,10] in both the conditions, i.e., (LOS) and (NLOS) with transmit power of the order of 40&#x02013;50 dBm in a difficult urban environment. This is size of micro cell in the urban areas.</para>
<para>The frequency bands around 60 GHz is best suited for pico and femto cell due to high data carrying capacity and small reuse distance due to strong oxygen absorption at the rate of 15 dB/Km. The usage in frequency bands around 60 GHz is highly sparse, which provides freedom to allocate a large bandwidth to every channel. Moreover, equipment can be made very compact due to the very small antenna size.</para>
<para>Much research work has been done for indoor channel characteriszation at 60 GHz band but a very few work has been done for outdoor characteriszation. In reference [12] measurements were carried out for narrowband CW for received power against separation distance in different environments mainly airport field, urban street and city tunnel. A channel sounder based on correlation has been used for the measurement for centre frequency of 59.0 GHz with a bandwidth of 200 MHz. A 90<superscript>&#x02218;</superscript>-horn antenna was used at transmitting end and a biconical horn with an elevation beamwidth of 20<superscript>&#x02218;</superscript> was used at receiver in all the measurements. The measurement was carried out for path loss exponent and RMS delay spread. The result found that path loss exponent was between 2 and 2.5 for outdoor environment and RMS delay spread was lower than 20 ns. Result also included that multipath phenomenon was bad at parking garage due to large dimensions and smooth surface as compared to city streets and road tunnel, where multipath phenomenon was not much significant.</para>
<fig id="F4-3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F4-3">Figure <xref linkend="F4-3" remap="4.3"/></link></label>
<caption><para>Measurement setup.</para></caption>
<graphic xlink:href="graphics/ch04_fig003.jpg"/>
</fig>
<para>In [13] measurements were carried out at 55 GHz in city streets of London (UK) with moderate traffic density using a fixed transmitter and a mobile receiver, with link distances not greater than 400 m. The transmitter installed at 10 m above the ground level and receiver was mobile mounted over the roof of a car. The test signal was narrowband FM signal generated through Gunn oscillator and fed to a 25-dBi horn antenna. The result found that path loss exponent was 3.6 for a T-R separation of 400 m with LOS path and path loss exponent was 10.4 for same Tx-Rx separation in NLOS condition.</para>
<para>In order to understand the radio channel propagation characteristics, extensive propagation measurements in urban environment hasve been carried out long back at the campus of Delft University of Technology, Netherlands [14]. The measurements for frequency fading over 100 MHz bandwidth centered around 59.9 GHz were done almost exclusively in the time-domain by using network analyzsers and channel sounders. The block diagram of the measurement system used in reference [14] for the frequency-domain characteriszation of the radio-channel is shown in <link linkend="F4-3">Figure <xref linkend="F4-3" remap="4.3"/></link>.</para>
<para>The two main components are signal generator towards transmitter side and spectrum analyser at receiver side. A flat omnidirectional antenna (2 dBi, 120<superscript>&#x02218;</superscript>) was used at transmitter side and omnidirectional (120<superscript>&#x02218;</superscript>) and patch directional antenna (pencil beam, 19.5 dBi, 15<superscript>&#x02218;</superscript>) were used at receiver side. Measurements with both were done in order to see the difference in performance, because omnidirectional antenna allows for more reflected components to enter the receiver. The measurements were conducted for statistics of the &#x02018;k&#x02019; factor of Rice distribution and the path loss coefficient for the pico cell of the order of 50 m radius at three different locations including outdoor and indoor. The measurements were done in possible locations for the mobile multimedia communication.</para>
<para>The measurements were taken in the corridor area (indoor) of the University for the Rice factor <emphasis>k</emphasis> and received power versus distance with T<subscript><emphasis>X</emphasis></subscript>&#x02013;R<subscript><emphasis>X</emphasis></subscript> separation of 12&#x02013;15 m are shown in Figures 4.4 and 4.5 below.</para>
<fig id="F4-4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F4-4">Figure <xref linkend="F4-4" remap="4.4"/></link></label>
<caption><para>Rice factor <emphasis>k</emphasis> versus distance in the corridor. Directional receiver antenna used.</para></caption>
<graphic xlink:href="graphics/ch04_fig004.jpg"/>
</fig>
<fig id="F4-5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F4-5">Figure <xref linkend="F4-5" remap="4.5"/></link></label>
<caption><para>Broadband average received power in the corridor with omnidirectional receiver antenna used.</para></caption>
<graphic xlink:href="graphics/ch04_fig005.jpg"/>
</fig>
<para>The measurements were taken in the parking area (outdoor) of the University for received power versus distance on logarithmic scale with T<subscript><emphasis>X</emphasis></subscript>&#x02013;R<subscript><emphasis>X</emphasis></subscript> separation of 12&#x02013;15 m is shown in <link linkend="F4-6">Figure <xref linkend="F4-6" remap="4.6"/></link>.</para>
<fig id="F4-6" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F4-6">Figure <xref linkend="F4-6" remap="4.6"/></link></label>
<caption><para>A scatter of the plot of the measured power [dB] versus the distance on a log scale for outdoor location (parking) with omnidirectional antenna.</para></caption>
<graphic xlink:href="graphics/ch04_fig006.jpg"/>
</fig>
<para>The measurement results show that propagation is feasible upto 10&#x02013;15 m in the indoor and outdoor urban environment, which is normal size of pico cell.</para>
<para>The Radiocommunication Sector of International Telecom Union (ITU) is responsible for management of radio spectrum at international level. As per ITU-R frequency allocation plan [15], the frequency band 10&#x02013;40 GHz has been earmarked for satellite based services in all the three regions along with Fixed and mobile services. Local Multipoint Distribution System (LMDS), WLAN, Satellite services and High capacity dense network etc. are main services present in mm-waves. Several point to point fixed microwaves links are also working in this band. These links are basically for backbone/backhaul network for GSM and other services. A good amount of vacant spectrum is available at mm-waves which could be utiliszed for 5G communications services. 5G services may transmit high power approximately 40&#x02013;50 dBW. Therefore, coexistence study needs to be carried out with existing LMDS and satellite services, that would be working in neighbouring spectrum bands.</para>
</section>
<section class="lev1" id="sec4-6">
<title>4.6 Summary</title>
<para>Spectrum is a key to mobile wireless communications. The concept of spectrum sharing and spectrum trading are mainly discussed in this chapter. The concept of spectrum trading brings awareness towards its importance as it is not much successful in many countries. Spectrum management is an important challenge for the evolution of 5G communications. Extra high frequency bands have to be explored for the quick data transfers. Working on this, mm-waves have proved successful for the short-range communications. But still further research has to be carried out for the advancements in the existing technologies like cognitive networks, for the efficient use of spectrum.</para>
</section>
<section class="lev1" id="sec4-7">
<title>References</title>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem>
<para>Purnendu. S. M. Tripathi, Ramjee Prasad<emphasis>,</emphasis> &#x0201C;Spectrum Trading in India and 5G&#x0201D;, Journal of ICT standardization&#x0201D;, Journal of ICT standardization, volume 1, No.2, pp. 159&#x02013;174, November 2013. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Purnendu%2E+S%2E+M%2E+Tripathi%2C+Ramjee+Prasad%2C+%22Spectrum+Trading+in+India+and+5G%22%2C+Journal+of+ICT+standardization%22%2C+Journal+of+ICT+standardization%2C+volume+1%2C+No%2E2%2C+pp%2E+159-174%2C+November+2013%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>P. K. Garg, T. R. Dua and Ashok Chandra &#x0201C;Spectrum Challenges for Modern Mobile Services&#x0201D;, Journal of ICT standardization&#x0201D;, volume 1, No. 2, pp. 137&#x02013;158, November 2013. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=P%2E+K%2E+Garg%2C+T%2E+R%2E+Dua+and+Ashok+Chandra+%22Spectrum+Challenges+for+Modern+Mobile+Services%22%2C+Journal+of+ICT+standardization%22%2C+volume+1%2C+No%2E+2%2C+pp%2E+137-158%2C+November+2013%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Kwang-cheng and Ramjee Prasad, &#x0201C;Cognitive Radio Networks&#x0201D;, John Wiley and Sons, Ltd, Publication, 2009.</para></listitem>
<listitem>
<para>Cornelia-Ionela, Neeli Prasad, Victor Croitory, Ramjee Prasad, &#x0201C;5G based on Cognitive Radio&#x0201D;, Wireless Personal Communications, volume 57, Issue 3, pp. 441&#x02013;464, April 2011. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Cornelia-Ionela%2C+Neeli+Prasad%2C+Victor+Croitory%2C+Ramjee+Prasad%2C+%225G+based+on+Cognitive+Radio%22%2C+Wireless+Personal+Communications%2C+volume+57%2C+Issue+3%2C+pp%2E+441-464%2C+April+2011%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Millimeter Waves. [online]. Available: <ulink url="http://www.ieeeghn.org/wiki/index.php/Millimeter_Waves">http://www.ieeeghn.org/wiki/index.php/Millimeter_Waves</ulink> <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Millimeter+Waves%2E+%5Bonline%5D%2E+Available%3A+http%3A%2F%2Fwww%2Eieeeghn%2Eorg%2Fwiki%2Findex%2Ephp%2FMillimeter%5FWaves" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>R. Prasad and L. Vandendorpe, &#x0201C;An overview of millimeter wave indoor wireless communication systems,&#x0201D; Universal Personal Communications, 1993. Personal Communications: Gateway to the 21st Century. Conference Record., 2nd International Conference on, vol. 2, no., pp. 885, 889 vol. 2, 12&#x02013;15 Oct 1993 doi: 10.1109/ICUPC.1993.528506 <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=R%2E+Prasad+and+L%2E+Vandendorpe%2C+%22An+overview+of+millimeter+wave+indoor+wireless+communication+systems%2C%22+Universal+Personal+Communications%2C+1993%2E+Personal+Communications%3A+Gateway+to+the+21st+Century%2E+Conference+Record%2E%2C+2nd+International+Conference+on%2C+vol%2E+2%2C+no%2E%2C+pp%2E+885%2C+889+vol%2E+2%2C+12-15+Oct+1993+doi%3A+10%2E1109%2FICUPC%2E1993%2E528506" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Rangan, S.; Rappaport, T. S.; Erkip, E., &#x0201C;Millimeter-Wave Cellular Wireless Networks: Potentials and Challenges,&#x0201D; Proceedings of the IEEE, vol. 102, no. 3, pp. 366, 385, March 2014 doi: 10.1109/JPROC.2014.2299397 <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Rangan%2C+S%2E%3B+Rappaport%2C+T%2E+S%2E%3B+Erkip%2C+E%2E%2C+%22Millimeter-Wave+Cellular+Wireless+Networks%3A+Potentials+and+Challenges%2C%22+Proceedings+of+the+IEEE%2C+vol%2E+102%2C+no%2E+3%2C+pp%2E+366%2C+385%2C+March+2014+doi%3A+10%2E1109%2FJPROC%2E2014%2E2299397" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Ramjee Prasad, OFDM for Wireless Communications, Artech House, 2004. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Ramjee+Prasad%2C+OFDM+for+Wireless+Communications%2C+Artech+House%2C+2004%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>T. S. Rappaport et. al. Millimeter Wave Mobile Communications for 5G Cellular: It will work. Open Access, IEEE. (2013). DOI: 10.1109/ACCESS.2013.2260813 <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=T%2E+S%2E+Rappaport+et%2E+al%2E+Millimeter+Wave+Mobile+Communications+for+5G+Cellular%3A+It+will+work%2E+Open+Access%2C+IEEE%2E+%282013%29%2E+DOI%3A+10%2E1109%2FACCESS%2E2013%2E2260813" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>R. H. Ott and M. C. Thompson Jr., &#x0201C;Characteristics of a Radio Link in the 55 to 65 GHz Range&#x0201D;, IEEE Transactions on Antennas and Propagation, pp. 873&#x02013;877, 1976. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=R%2E+H%2E+Ott+and+M%2E+C%2E+Thompson+Jr%2E%2C+%22Characteristics+of+a+Radio+Link+in+the+55+to+65+GHz+Range%22%2C+IEEE+Transactions+on+Antennas+and+Propagation%2C+pp%2E+873-877%2C+1976%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>S. Geng et al. &#x0201C;Millimeter-Wave Propagation Channel Characterisation for Short-Range Wireless Communication&#x0201D; IEEE Transaction on Vehicular Technology Vol. 58, No.1, January 2009. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=S%2E+Geng+et+al%2E+%22Millimeter-Wave+Propagation+Channel+Characterisation+for+Short-Range+Wireless+Communication%22+IEEE+Transaction+on+Vehicular+Technology+Vol%2E+58%2C+No%2E1%2C+January+2009%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>P. F. M. Smulders, L. M. Corria, &#x0201C;Characterisation of Propagation in 60 GHz Radio Channels,&#x0201D; Electronics &#x00026; Communication Engineering Journal, Vol. 9, No.2, pp. 73&#x02013;80, Apr 1997. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=P%2E+F%2E+M%2E+Smulders%2C+L%2E+M%2E+Corria%2C+%22Characterisation+of+Propagation+in+60+GHz+Radio+Channels%2C%22+Electronics+%26+Communication+Engineering+Journal%2C+Vol%2E+9%2C+No%2E2%2C+pp%2E+73-80%2C+Apr+1997%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>H. J. Thomas, R. S. Cole and G. L. Siqueira, &#x0201C;An Experimental Study of the Propagation of 55 GHz Millimeter Wave in an Urban Mobile Radio Environment&#x0201D;, IEEE Transactions on Vehicular Technology, pp. 140&#x02013;146, 1994. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=H%2E+J%2E+Thomas%2C+R%2E+S%2E+Cole+and+G%2E+L%2E+Siqueira%2C+%22An+Experimental+Study+of+the+Propagation+of+55+GHz+Millimeter+Wave+in+an+Urban+Mobile+Radio+Environment%22%2C+IEEE+Transactions+on+Vehicular+Technology%2C+pp%2E+140-146%2C+1994%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>D. M Matic, H. Harada, R. Prasad, &#x0201C;Indoor and outdoor frequency measurements for mm-waves in the range of 60 GHz,&#x0201D; Vehicular Technology Conference, 1998. VTC 98. 48th IEEE, vol.1, no., pp. 567, 571 vol.1, 18&#x02013;21 May 1998. doi: 10.1109/VETEC.1998.686638. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=D%2E+M+Matic%2C+H%2E+Harada%2C+R%2E+Prasad%2C+%22Indoor+and+outdoor+frequency+measurements+for+mm-waves+in+the+range+of+60+GHz%2C%22+Vehicular+Technology+Conference%2C+1998%2E+VTC+98%2E+48th+IEEE%2C+vol%2E1%2C+no%2E%2C+pp%2E+567%2C+571+vol%2E1%2C+18-21+May+1998%2E+doi%3A+10%2E1109%2FVETEC%2E1998%2E686638%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>ITU-R Preparatory Studies for WRC-15 [online]. Available:www.itu.int/en/ITU-R <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=ITU-R+Preparatory+Studies+for+WRC-15+%5Bonline%5D%2E+Available%3Awww%2Eitu%2Eint%2Fen%2FITU-R" target="_blank">Google Scholar</ulink></para></listitem></orderedlist>
</section>
</chapter>
<chapter class="chapter" id="ch05" label="5" xreflabel="5">
<title>CYBER Security and Threats</title>
<para>The security challenges in communication networks are a major concern in today&#x02019;s world, with security threats and possible loopholes in communication systems appearing at much higher rate compared with technological advances in the communication systems in itself. Based on the operational structure of WISDOM 5G it is obvious to note the enormous security challenge that surrounds the overall operation of the network. Providing a unified access to the user and seamless migration between underlying access networks would necessitate enormous effort for securing the confidential data related to the user.</para>
<para>The security mechanisms to ensure reliable services utilized by the service providers rely on authentication, authorization, non-repudiation and confidentiality based mechanism among others. These mechanisms collectively ensure that service provider fulfil their liability to deliver reliable and trust worthy services. However, an underlying operational constraint of these mechanisms is the imposed latency. As WISDOM 5G requires almost zero latency for the user to access the services, it would be a major challenge to ensure reliable secure service and meet the objective of high data rate access to the customer in a ubiquitous manner.</para>
<para>Possible mechanisms that could be utilized for addressing the security challenges imposed on WISDOM 5G could be as follows:</para>
<para><emphasis role="strong">Unique ID</emphasis>: Majority security mechanisms are initiated in networks to recognize a particular device in the overall network. If a given mobile device is recognized in a manner that differentiates it from other mobile devices then requirements for authentication and authorization could be avoided. Characteristics that could uniquely define a mobile device could be utilized for forming a unique ID.</para>
<para><emphasis role="strong">Privacy by Design</emphasis>: Maintaining the data and user profile confidentiality is a major requirement imposed on the service providers through governing cyber laws. Security and privacy aspects are usually dealt with separate comparison, with the other network operations. Designing of network components and the overall operational backbone in WISDOM 5G with privacy and security aspects as prime objectives could ensure reliable privacy and security.</para>
<section class="lev1" id="sec5-1">
<title>5.1 Major Challenges Surrounding Future Cyber Security</title>
<para>The plethora of challenges that surround cyber security can be broadly categorized into the following broad areas:</para>
<section class="lev2" id="sec5-1-1">
<title>5.1.1 Network Borders</title>
<para>The emergence of 5G network as stated earlier that merges cells of different sizes and allows unified access technologies for the user device would lead to disappearance of network boundaries. Further the user device is expected to directly communicate with devices that comprise IoT for acquiring information about a certain physical parameter. This would be a different operational setup from today&#x02019;s communication network wherein government entities, private enterprises and private individual users could be the three broad network categories. The government entities currently impose strict operational rules regarding their communication network. Large private enterprises also lay down operational regulations regarding their communication network. These operational regulations would be hard to maintain if the networks are unified and user devices seamlessly switch between them [1].</para>
</section>
<section class="lev2" id="sec5-1-2">
<title>5.1.2 Hindrance to E Commerce</title>
<para>The intention to provide ubiquitous computing and communication capability with data rate is to allow users to access rich and diverse information unhindered. That would be supported with unification of access technologies and underlying networks, along with support for high mobility of the user device. It can be anticipated in future that many companies would roll out novel information providing services that required unhindered data rates. This will, however, be hindered if the user is prohibited due to a certain networks&#x02019; rule and regulation, or the data connection is interrupted due to requirements for authentication and authorization. Cloud and Internet based service provider are looking at opportunities of the form such as [2, 3]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Anything as a service (XaaS)</para></listitem>
<listitem>
<para>Sensing as a service (SaaS)</para></listitem></itemizedlist>
<para>Large enterprises that provide cloud based and Internet based services wish to utilize the aforesaid data service models for increasing the utility of Internet and unification of networks that would comprise machines (IoT, sensing as a service). However, the concept is imposing massive operational complexities even on the enterprises as they are unable to figure out the possible way to deliver such a plethora of utilities and create business opportunity.</para>
<para>Therefore, it can be safely presumed that if the data delivery model is tough to design and operate, security and privacy challenges that such a unified network would throw open would be much more complex to address.</para>
<para>The unified network operation promises to offer the end user the enormous utility of high data rate access with ubiquitous connectivity and extremely rich access to required information. The enterprises also seek to tap into the huge business potential that such a unified network could offer. However, a major privacy and security invasion issue for the common users could easily occur in such a densely connected network could lead to the governments imposing strong prohibitory orders that could ruin the economy and business significantly.</para>
</section>
<section class="lev2" id="sec5-1-3">
<title>5.1.3 International Cyber Disputes</title>
<para>The unified network in WISDOM based 5G would depend significantly on an Internet based core network. Currently, there is a major debate prevalent on controlling the Internet. As it has enormous power in the form of millions of people social networking using it, or the possible spying and cyber crime committed using it. Committing cyber crime with an intention to ally to harm a nation or a major business entity directly, i.e., cyber war is discussed in the following sub-section. Many countries want to have a multilateral control on the Internet, i.e., countries would have direct control on the Internet activities concerning them, including data servers that are related with them but situated in another land; while some countries want a major international entity to take control of the Internet. In both the cases there are possible restrictions that would be forced on Internet operations in future. To protect sovereign interests an individual nation is likely to regulate the Internet autonomy, but this could have detrimental effect on the possible services foreseen to be fulfilled in future through 5G. The more connected the world through a unified network would be, the harder it would be to govern it and bring about an international consensus on Internet Governance.</para>
</section>
<section class="lev2" id="sec5-1-4">
<title>5.1.4 Cyber War</title>
<para>In a unified mega network that allows users to access information directly from cyber physical structures (CPSs) that are in place for automation and control of a CPS, the CPS could be attacked/compromised to harm the possible operations derived from that physical structure. Such attacks on CPS have taken place in current communication network scenarios such as Heart bleed and Suxnet. Their likelihood would increase significantly if the networks are unified and users gain larger uninterrupted access. In the event of a large scale, cyber attack could lead to paralysis of critical infrastructure services such as transportation and banking and public utility such as electricity distribution. The 5G communication network would bring the physical infrastructure and the cyber infrastructure very close, thereby the threats to CPS would be enormous.</para>
<para>The governmental agencies that currently have a tough task in maintaining public utilities security and government infrastructure protection could encounter a situation of securing the infrastructure manifold complex than it is today. Cyber defence similar to other conventional defence mechanisms are cost intensive. Nations could be forced to increase their spending on cyber defence, in turn neglecting other critical priority issues that need to be addressed [1, 6].</para>
</section>
<section class="lev2" id="sec5-1-5">
<title>5.1.5 Differentiation of Legitimate Versus Illegitimate Activities</title>
<para>The unification of various communication networks and devices, and the possibility of accessing information from devices diversely spread across the landscape would make it harder to determine as to what would comprise as legitimate and what would be illegitimate activities. Based on users&#x02019; preferences and choices, the service provider wishes to mould that service and application to meet the users&#x02019; requirement. This is a well-established practice today. In future, especially in the case of service delivery model such as sensing as a service and anything as a service, the service providers would try to data mine about the potential user/customer from their person specific data. The companies are highly interested in inferring the customer as closely as possible, since this influences their business prospects. As person specific data would grow based on the interaction a given person holds with the myriad of devices around, it would be very hard to draw a permissible line of what could be used for analytics and service providing and what comprises personal data that requires to be protected to ensure the privacy of the individual.</para>
</section>
<section class="lev2" id="sec5-1-6">
<title>5.1.6 Legal System to Govern Machine-to-Machine Interactions</title>
<para>The legal systems around the world are designed keeping in mind the needs of the society, ensuring that by abiding by the law the whole society is secured. This is also applicable broadly for the cyber laws that have been enacted by the various governmental bodies. However, not in the 5G communication scenario that would comprise communication between machines (M2M) and IoT. The machines and devices would communicate with each other for certain self-automated tasks based on local decision making/intelligence, this could bypass the involvement of any human being governing the information exchange and automated decision making. In such a case a compromised machine may exploit a connected machine for gaining information or utilizing it to carry out an activity for illicit purpose. If the crime committed shifts from a human being to a machine, it would be tough to enforce any governing law existent today. The legal rules as applicable to common public are drafted such that they are comprehensible to a layman in the broad sense. For example a layman can understand reading Internet privacy and security rules as to what is the ethical way of using the Internet. However, drafting such a regulation base for machines/devices is infeasible considering the fact that interactions between machines would take place in a highly complex technical way, which could vary from machine-to-machine and underlying communication medium between the machines protecting network.</para>
</section>
</section>
<section class="lev1" id="sec5-2">
<title>5.2 Users Awareness</title>
<para>For efficient user expertise of maintaining the expected cyber discipline in navigating across the plethora of data available it would be necessitated to educate the users of the usage etiquettes on the connected network. This is of tantamount importance as in a unified mega network in the form of WISDOM/GIMCV it would be necessary for the users to ensure that they access the data in an appropriate manner, following the basic guidelines. Some broad user guidelines and awareness are as described below:</para>
<para>The end users must be aware of these minimum safety measures [4]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>To install the antivirus and anti-malware solutions in order to protect the devices from various virus or malware attacks. This idea has proved to be an effective solution against malicious attacks.</para></listitem>
<listitem>
<para>The end users must be vigilant of the peculiar activities or behaviours in their own devices.</para></listitem>
<listitem>
<para>They must install the applications from the original developer. The sources must be trustful having legitimate contact information and website.</para></listitem>
<listitem>
<para>They should prefer to choose the applications on the Internet with the maximum number of downloads.</para></listitem>
<listitem>
<para>They should not access their accounts or any other sensitive data when using those devices in public.</para></listitem>
<listitem>
<para>They must ensure the frequent update of their operating systems and other software of their devices.</para></listitem>
<listitem>
<para>They should also install a personal firewall to protect mobile device interfaces from direct attack and illegal access.</para></listitem>
<listitem>
<para>The mobile network operators (MNO) should also be helpful to the end users by providing a secure environment. They can install antivirus and anti-malware software to scan outgoing and incoming SMS and MMS to the mobile network.</para></listitem></itemizedlist>
<para>In addition to these, application developers should ensure that the sensitive or private data is not being sent to the unencrypted channel, which means data must be sent through HTTPS or TLS networks.</para>
<para>In brief we can note important players in securing the mobile wireless ecosystem. They include [3]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Mobile network operators (MNOs)</para></listitem>
<listitem>
<para>Manufacturers of hardware, including mobile devices, chipsets and network equipments</para></listitem>
<listitem>
<para>Application developers and market places</para></listitem>
<listitem>
<para>Operating system vendors</para></listitem>
<listitem>
<para>Network service providers</para></listitem>
<listitem>
<para>Support software vendors</para></listitem>
<listitem>
<para>Wi-Fi hotspot providers, over-the-top (OTP) providers and other platform providers</para></listitem></itemizedlist>
<para>Most of the mobile industries are investing millions of dollars for providing the cyber security solutions for the strong security in the future. From the aspect of mobile operating systems security solutions include [4]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Mandatory encryption</para></listitem>
<listitem>
<para>Application certificates</para></listitem>
<listitem>
<para>Permission list for installations</para></listitem></itemizedlist>
<para>The successful delivery of the mobile security or cyber security solutions require an active participation of the entire mobile landscape of mobile communication stakeholders, industry, Government, enterprises and finally the consumers.</para>
</section>
<section class="lev1" id="sec5-3">
<title>5.3 Spectrum Related Security Issues in CRNs</title>
<para>As discussed earlier cognitive radio principles would be highly applicable to ensure reliable use of spectrum especially where the access would be relying on conventional cellular bands apart from the proposed use of mm bands. Security related issues that surround cognitive radio based networks are elaborated as below</para>
<para>The exceptional growth in the cognitive radio (CR) has attracted several researchers as this innovative concept has proved its potential worldwide. A CR network (CRN) should perform following functions [5]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>To determine the portions of the available spectrum and detect the presence of licensed users when a user operates in a licensed band which is termed as <emphasis>&#x0201C;Spectrum Sensing</emphasis>&#x0201D;.</para></listitem>
<listitem>
<para>To select the best available channel which is termed as &#x0201C;<emphasis>Spectrum Management&#x0201D;.</emphasis></para></listitem>
<listitem>
<para>To coordinate access to the channels with other users (secondary users) which is termed as <emphasis>&#x0201C;Spectrum Sharing&#x0201D;.</emphasis></para></listitem>
<listitem>
<para>To vacate the channel when the licensed user is detected which is known as <emphasis>&#x0201C;Spectrum Mobility</emphasis>&#x0201D;.</para></listitem></itemizedlist>
<para>Some of the spectrum access related security issues concerned with CRNs are [7, 8]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para><emphasis>Masquerading of a cognitive radio node</emphasis>: This threat identifies the masquerading of a CR node while collaborating with other CR nodes for CR functions: spectrum sensing, spectrum sharing, spectrum management and spectrum mobility. For example, a malicious device can send wrong spectrum sensing information to other CR nodes. The affected functionalities are spectrum sharing, spectrum sensing and spectrum mobility.</para></listitem>
<listitem>
<para><emphasis>Selfish Misbehaviours</emphasis>: During the channel negotiation process, a selfish cognitive node tries to gain an unfair advantage and try to improve its own performance. The channel negotiation process is done using the results from spectrum sensing and the fairness depends on the cooperation of the contending nodes. A selfish node may conceal the available data channels from others and reserve it for its own use. The affected functionalities in this case are spectrum sharing and spectrum mobility.</para></listitem>
<listitem>
<para><emphasis>Hidden node problem:</emphasis> This threat identifies the case when a CR node does not detect the user because of the obstacles. The consequence is that, it transmits the same frequency bands of the primary user causing harmful interference. The affected functionalities are spectrum sharing, spectrum mobility and spectrum sensing.</para></listitem>
<listitem>
<para> <emphasis>Jamming of the channel used to distribute cognitive messages</emphasis>: This threat identifies the jamming of a cognitive control channel that is used to distribute cognitive messages in the CR network. This can be executed against an out-of-band or an in-band cognitive control channel if the frequency of the channel is known. The affected functionalities are spectrum sensing and spectrum sharing.</para></listitem>
<listitem>
<para> <emphasis>Unauthorized use of spectrum bands for Denial of Service to primary user:</emphasis> This threat identifies the case where a malicious node or CRN emits power in unauthorized spectrum bands to cause Denial of Service (DoS) to primary users. The affected functionality in this case is spectrum sharing.</para></listitem>
<listitem>
<para><emphasis>Malicious alteration of cognitive messages</emphasis>: This threat identifies the alteration of cognitive messages that are exchanged in the CRN. The affected functionalities in this case are spectrum sharing and spectrum sensing.</para></listitem>
<listitem>
<para>Eavesdropping: This is a common threat or problem in the wireless systems where the privacy of the data is communicated over the other systems. The eavesdropper may get the access to the exchanged content over wireless links like CRNs and then exploit the information against the network.</para></listitem></itemizedlist>
</section>
<section class="lev1" id="sec5-4">
<title>5.4 Summary</title>
<para>Addressing security and privacy challenges in respect to 5G would require excessive examination. In fact it can be concluded that reliable 5G operations would be unfeasible until suitable mechanism that would ensure dynamic operations with excessive high data rate and mobility could prevent cyber crime against user(s).</para>
</section>
<section class="lev1" id="sec5-5">
<title>References</title>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem>
<para>ICSPA, Project 2020 Scenarios for the Future of Cybercrime&#x02013;White Paper for Decision Makers [online], Available: <ulink url="http://2020.trendmicro.com/Project2020.pdf">http://2020.trendmicro.com/Project2020.pdf</ulink> <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=ICSPA%2C+Project+2020+Scenarios+for+the+Future+of+Cybercrime-White+Paper+for+Decision+Makers+%5Bonline%5D%2C+Available%3A+http%3A%2F%2F2020%2Etrendmicro%2Ecom%2FProject2020%2Epdf" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>HP pursues &#x02018;sensing-as-service&#x02019; [online], Available: <ulink url="http://www.eetimes.com/document.asp?doc_id=1257823">http://www.eetimes.com/document.asp?doc_id=1257823</ulink></para></listitem>
<listitem>
<para>Where the Cloud Meets Reality: Scaling to Succeed in New Business Models [online], Available: <ulink url="http://www.accenture.com/us-en/Pages/insight-cloud-meets-reality-scaling-succeed-new-business-models.aspx">http://www.accenture.com/us-en/Pages/insight-cloud-meets-reality-scaling-succeed-new-business-models.aspx</ulink></para></listitem>
<listitem>
<para>Jorja Wright, Maurice. E. Dawson Jr, Marwan Omar, &#x0201C;Cyber security and mobile threats: The need for antivirus applications for smart phones&#x0201D;, Journal of Information systems technology and planning, volume 5, Issue 14, pp. 40&#x02013;60, 2012. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Jorja+Wright%2C+Maurice%2E+E%2E+Dawson+Jr%2C+Marwan+Omar%2C+%22Cyber+security+and+mobile+threats%3A+The+need+for+antivirus+applications+for+smart+phones%22%2C+Journal+of+Information+systems+technology+and+planning%2C+volume+5%2C+Issue+14%2C+pp%2E+40-60%2C+2012%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Abdullahi Arabo, Bernandi Pranggono, &#x0201C;Mobile Malware and Smart Device Security Trends, Challenges and Security&#x0201D;, 19<superscript>th</superscript> International Conference on Control Systems and Computer Science, pp. 526&#x02013;531, May 2013. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Abdullahi+Arabo%2C+Bernandi+Pranggono%2C+%22Mobile+Malware+and+Smart+Device+Security+Trends%2C+Challenges+and+Security%22%2C+19th+International+Conference+on+Control+Systems+and+Computer+Science%2C+pp%2E+526-531%2C+May+2013%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>&#x0201C;Today&#x02019;s mobile cyber security&#x0201D;, Blueprint for the future by CTIA.</para></listitem>
<listitem>
<para>Gianmarco Baldini, Taj Sturman, Abdur Rahim Biswas, Gyozo G[x00B4;]odor, &#x0201C;Security Aspects in Software Defined Radio and Cognitive Radio Networks: A Survey and A Way Ahead&#x0201D;, IEEE Communicatons Surveys &#x00026; Tutorials, volume 14, No. 2, 2012. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Gianmarco+Baldini%2C+Taj+Sturman%2C+Abdur+Rahim+Biswas%2C+Gyozo+G%5Bx00B4%3B%5Dodor%2C+%22Security+Aspects+in+Software+Defined+Radio+and+Cognitive+Radio+Networks%3A+A+Survey+and+A+Way+Ahead%22%2C+IEEE+Communicatons+Surveys+%26+Tutorials%2C+volume+14%2C+No%2E+2%2C+2012%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Neeli Rashmi Prasad, &#x0201C;Secure Cognitive Networks&#x0201D;, Proceedings of the 1st European Wireless Technology Conference, pp. 107&#x02013;110, October 2008. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Neeli+Rashmi+Prasad%2C+%22Secure+Cognitive+Networks%22%2C+Proceedings+of+the+1st+European+Wireless+Technology+Conference%2C+pp%2E+107-110%2C+October+2008%2E" target="_blank">Google Scholar</ulink></para></listitem></orderedlist>
</section>
</chapter>
<chapter class="chapter" id="ch06" label="6" xreflabel="6">
<title>BEYOND 2020</title>
<para>5th<superscript></superscript> Generation wireless systems is referred as beyond 2020 mobile communications which means the 5G standards can be introduced in early 2020s. Today&#x02019;s current advanced technology is LTE advanced, which provides a peak download speed of 1 Gbps and upload speed of 512 Mbps.</para>
<para>5G has been proposed in response to the needs of the connected society 2020 and beyond which means its standards are beyond the currently existing mobile broad band technologies like 4G/LTE and HSPA. It is also that 5G might solve the problem of frequency licensing and spectral management issues [1].</para>
<para>The current 4G LTE system uses advanced technologies such as OFDM, MIMO, Turbo Code, Hybrid ARQ, and sophisticated radio resource management algorithms. It is worth mentioning here that WISDOM together with 4G would lead to realization of 5G systems. The fundamental concepts of 5G are being evolved and developed from the existing technologies, and 5G systems by 2020 would fulfil the requirements of interconnected society by offering very high data rates, provision of transmitting large amounts of data, and security over the data. The 5G terminals have software designed radios; also it has different modulation schemes and error control schemes [1].</para>
<para>5G is a concept where personalization meets connectivity and networking technological innovations by integrating under one interoperable umbrella leading technologies, such as M2M communication technologies, cognitive radio and networking technologies, data mining, decision-making technologies, security and privacy protection technologies, cloud computing technologies, and advanced sensing and actuating technologies.</para>
<para>5G bundles multi-radio, multi-band air interfaces to support portability and nomadicity in ultra-high data rate communications using novel concepts, and cognitive technologies. The aim of 5G is to supersede the current propagation of core mobile networks with single worldwide core network. The objective is to offer seamless multimedia services to users accessing all IP-based infrastructure through heterogeneous access technologies [1].</para>
<section class="lev1" id="sec6-1">
<title>6.1 Challenges for 2020 and Beyond</title>
<para>There are more than 5 billion wireless connected mobile devices in operation in today&#x02019;s world, most of which are handheld terminals and mobile broadband devices in portable laptops, tablets and computers. The result is the tremendous rise in the overall traffic on the wireless communication systems fuelled primarily by the uptake in the mobile-broadband. By 2020 and beyond the wireless devices would be approximately 7 trillion and therefore the traffic will rise manifold as compared with today. 5G system should be an intelligent technology capable of interconnecting the entire world without limits.</para>
<para>The cost of deploying, operation and managing 5G systems for many applications are also the major challenges as the services should be accessible to every common man living in the world [2].</para>
<para>Increasing bit rates led to increased energy consumption in BS. Main challenge for future mobile networks is to reduce power consumption. In cellular networks BS consumes more than 60% of the power so it is preferable to reduce power consumption in BS elements. Recent networks are designed with the consideration of high peak load, not with medium or low load consideration. In real scenario if the load on a network increased, then coverage will decrease and vice versa. To solve this power consumption issue, network topology will be designed in such a way that as load decrease BS starts to cover more regions, and some of the BSs can be shut down [3].</para>
<para>In the recent times, new types of devices, their respective applications and services are being developed and will appear to us in the future. We humans are connected to them through the mobile networks in our daily life. For example, medical devices, traffic lights, vehicles, etc. 5G should provide long term, efficient, high-performing solutions for all these types of services.</para>
<para>Development of 5G is not just replacing the current existing technologies, but it is the matter of evolving and complementing these technologies with new Radio Access technologies with respect to specific scenarios and user cases [2].</para>
</section>
<section class="lev1" id="sec6-2">
<title>6.2 Future Mobile Technologies</title>
<para>Some of the future mobile technologies to be discussed are [3]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>CR</para></listitem>
<listitem>
<para>Beam Division Multiple Access</para></listitem>
<listitem>
<para>Flat IP Support</para></listitem>
<listitem>
<para>Support IPv6</para></listitem>
<listitem>
<para>Pervasive Network</para></listitem>
<listitem>
<para>Multi homing</para></listitem>
<listitem>
<para>Group Cooperative Relay Technique</para></listitem>
<listitem>
<para>Mobile Cloud Computing Support</para></listitem></itemizedlist>
<section class="lev2" id="sec6-2-1">
<title>6.2.1 Cognitive Radio</title>
<para>CR technology will be more efficient radio communications systems to be developed. This new radio technology share the same spectrum efficiently by finding unused spectrum and adapting the transmission scheme to the requirements of the technologies currently sharing the spectrum. CR will have knowledge of free channel and occupied channel, type of data to be transmitted, modulation scheme, position of receiving equipment and also aware of the environment. With the knowledge of above parameters radio should capture the best available spectrum to meet user requirements and quality of services [2].</para>
<para>When the level of occupancy increases then these systems have to move continuously from one channel to another which reduces the efficiency of the system. As use of CR increases a single frequency, signal will appear on a new frequency continuously so that effective algorithm must be developed and CR system will move only when it is necessary [3].</para>
<section class="lev3" id="sec6-2-1-1">
<title>A. Continuous spectrum sensing</title>
<para>In this system spectrum occupancy will monitor continuously, and CR system will use the spectrum on a non-interference basis for the user.</para>
</section>
<section class="lev3" id="sec6-2-1-2">
<title>B. Monitor for empty alternative spectrum</title>
<para>When primary user returns to the spectrum, then CR system must have an alternative spectrum available, so that it can switch to secondary user on it.</para>
</section>
<section class="lev3" id="sec6-2-1-3">
<title>C. Monitor type of transmission</title>
<para>The CR must have knowledge of transmission used by users so that interference can be ignored.</para>
</section>
</section>
<section class="lev2" id="sec6-2-2">
<title>6.2.2 Beam Division Multiple Access</title>
<para>FDMA, TDMA, CDMA and OFDM are the various multiple access techniques used in the wireless communications. In these frequency and time are divided among multiple users. But Korea has proposed a new technique called BDMA which is known as &#x0201C;Beam Division Multiple Access&#x0201D; as radio interference for 5G which does not depend on frequency/time resources.</para>
<para>In BDMA technique BS allocates separate beam to each mobile station and it divides the antenna beam according to the location of mobile stations. Based on the moving speed and position of mobile station, the calculations of direction and width of a downlink beam are done by the BS. When mobile stations are located at different angles with the BS then BS transmits different beams at the different angles to transmit data simultaneously. If mobile stations are at the same angle with the BS, they share same beam. This multiple access technique significantly increases the capacity of the system [4].</para>
<para>The BS can change the width of beams, number of beams and direction according to a communication environment. When the mobile station and BS know each other&#x02019;s position or when are in LOS , they will communicate with each other by a separate beam. Maximization of radiation efficiency of antenna can be done by matching the radiation pattern of mobile station and BS antennas [4].</para>
</section>
<section class="lev2" id="sec6-2-3">
<title>6.2.3 Support IPv6</title>
<para>In the 5G system, each mobile phone will have permanent &#x0201C;Home&#x0201D; IP address and &#x0201C;care of address&#x0201D; which represents its actual location. If computer on the Internet wants to communicate with cell phone, it sends a packet to the home address and subsequently server on home address sends a packet to the actual location through the tunnel. Server also sends a packet to the computer to inform the correct address so that future packets will be sent on that address.</para>
<para>Because of this IPv6 has to be used for mobility. IPv6 addresses are 128 bit, which is four times more than 32 bit IPv4 address. This 128 bit address will be divided into four parts.</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>The part represents the home address of a device.</para></listitem>
<listitem>
<para>The second 32 bits may be used for care of address.</para></listitem>
<listitem>
<para>The set of 32 bits used for tunnelling to establish a connection between wire-line and wireless network.</para></listitem>
<listitem>
<para>The last 32 bits used for IPv6 address may be used for VPN sharing.</para></listitem></itemizedlist>
<para>From this we can conclude that future 5G technology has a goal of establishing single worldwide network standard based on IPv6 for control, packet data, video and voice. The users can experience uniform voice, video and data services based on IPv6 [3].</para>
</section>
<section class="lev2" id="sec6-2-4">
<title>6.2.4 Flat IP control</title>
<para>In 5G world, it is beneficial to transmit all voice, video and data using packet switching instead of circuit switching. It is an important feature to make 5G acceptable for all kinds of technologies. Each mobile device has to be allocated IP based on connected network and its location; devices are identified using the symbolic name instead of conventional IP format in Flat IP. This means the data is no longer routed by traversing a hierarchy from originating user through multiple layers of aggregation to a central core and then re-routed back out in a multilayer disaggregation hierarchy to the targeted user. The flat core routers of the originating user routes data directly to the local flat core router of the targeted user. In this technology, only one access specific node type is available.</para>
<para>This technology uses the reduced number of components lowering the operation cost and investment. This is the reason when there occur low system failure and latency. The only issue is the security as the Internet is open for hackers and criminals along with developers. Trojan horses and phishing are the two important security challenges [3].</para>
</section>
<section class="lev2" id="sec6-2-5">
<title>6.2.5 Multi Homing</title>
<para>It is a technique used to increase the reliability of the Internet connection for an IP network. Future generation networks will support vertical handover, and user can simultaneously be connected to several wireless access technologies and move between them. The Internet through multiple network interface or IP addresses accessible to a single device is called multi homing. The configuration of this network assigns multiple IP addresses to different wireless technologies available on the same device. If one of the links fails, then its IP address will be unreachable but other IP address will still work so we can access the Internet.</para>
<para>Multi homing has become popular because of IPv6 address availability, that support more network protocol for multi homing than traditional IPv4 address. This IPv6 address has availability of provider independent address space. This technique works like IPv4, supports traffic balance across multiple providers and maintains existing TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) sessions through cut-overs [3].</para>
</section>
<section class="lev2" id="sec6-2-6">
<title>6.2.6 Pervasive Networks</title>
<para>The growth in the mobile broadband technology increases air interference technology and provides local area connectivity to the wide area. Future network will be &#x0201C;network of networks&#x0201D; which will provide uninterrupted service when roaming across many radio access schemes. The user can simultaneously be connected to several wireless access technologies and move between them which can be 2.5G, 3G, 4G or 5G mobile networks, Wi-Fi, WPAN, or any other future access technology. In 5G user can provide multiple concurrent data transfer and also user can move globally. Beyond 4G, network gives media independent handover, vertical handover and IEEE 802.21 support.</para>
<para>This IEEE standard 802.21 supports handover between same type of networks as well as distinct type of networks. Mobile IP provides vertical handover mechanisms for different types of networks, but can be slow in the process. To support this mechanism, mobile station must have dual mode cards so that it can work on WLAN and UMTS band and modulation scheme. To support vertical handover mobile station must have dual mode cards so that it can work on WLAN and UMTS band and modulation scheme [3].</para>
</section>
<section class="lev2" id="sec6-2-7">
<title>6.2.7 Group Cooperative Relay Techniques</title>
<para>With the development of the MIMO systems, there is also higher throughput and reliability in a wireless network. This technology seems beneficial for BS side, but not on the user side due to size and power consumption. The alternate solution for this is group cooperative diversity techniques. In cooperative communication, source transmits data to the destination and at that time neighbour user (relay user) can also hear a transmission. The relay user also processes and forwards this message to the destination where received signals are combined. Both signals are transmitted with the different path as this gives diversity in the relaying the information. [3].</para>
</section>
<section class="lev2" id="sec6-2-8">
<title>6.2.8 Mobile Cloud Computing Support</title>
<para>Cloud computing is a new and unique technique to access data like documents, application, video files, music file, etc., from any place without carrying any data-storage devices. A cloud user can access all data from anywhere in the world any time, and the best example of cloud computing is Gmail.</para>
<para>Mobile world is depended upon two factors:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem>
<para>Network availability (3G, 4G, WIFI, etc.,)</para></listitem>
<listitem>
<para>Handset availability (Feature phones, Smart phones).</para></listitem></itemizedlist>
<para>The cloud computing is best option for low processing capability, low data storage. Some of the mobile applications that run on one mobile phone cannot operate on other phone. This problem can be solved by mobile computing. In this, the application runs on the specific device called cloud, and user can access the data and application. Requirement is user must have the Internet, without need for more computing capacity [3].</para>
</section>
</section>
<section class="lev1" id="sec6-3">
<title>6.3 High Altitude Stratospheric Platform Station Systems</title>
<para>The transfer of the large data requires large band width. To use high-bandwidth solution is to use lower wavelength waves, which require LOS propagation, that are challenged to compare with lower frequency propagation. Wireless communication services are facilitated by terrestrial and satellite systems. The terrestrial systems are used to render services in complex propagation areas. Satellite links are used during the lack of availability of terrestrial links. Nowadays research is going on aerial platforms at high altitudes to provide LOS propagation.</para>
<para>A High Altitude Platform (HAP) is powered by battery, engine or solar cell. HAPs work similar to a BS and can be compared with a tall antenna that delivers a wireless communication. HAP is powered by battery, engine or solar cell. HAP can be easily deployed in hours which make it favourable in emergencies and disasters.</para>
<para>HAP does not require expensive launching like satellites which gives cost-effective way. HAPs will vary in position vertically and laterally depending upon the wind. This movement changes the look angle from the ground terminal. If this variation is greater than beam width of an antenna, then it requires the gain to operate the link.</para>
<para>HAPs provide a coverage radius of 30 Km, giving us the benefit of establishing single HAP instead of several terrestrial BSs in suburban and rural areas [4].</para>
</section>
<section class="lev1" id="sec6-4">
<title>6.4 Human Bond Communications</title>
<para>WISDOM based 5G communication would usher the society into a digital age whereby humans can communicate in a real sense. The conventional communication network carries information between users in a &#x02018;digitized&#x02019; form, which is significantly different from the real communication that is anticipated between two users if they are physically present next to each other. Human beings interact with the environment through five senses, i.e., skin, eyes, ears, nose and tongue. Overall understanding of a physical subject by human beings depends on the degree to which the observations are made by the five senses. However, the conventional information communication mechanisms have been centred on either visual (eyes) or audio (ears) based communication. Therefore, for a particular subject the overall judgement that can be drawn by human beings would be based on just these two senses, ignoring the possible utility of other three sensory systems completely. Accordingly, the judgement by the brain based on just the two sensory inputs is indeed only a partial representation of the actual physical subject. Human bond communication (HBC) stresses on utilizing all the five senses for modelling a physical subject with appropriate representation in digital form based on appropriate actuation and transmission across the communication network to support all sensory information [5]. WISDOM based 5G network that can support very high data rate would be capable of supporting the communication bandwidth requirements, if the overall sensor data is to be transmitted. Forming an almost true (complete) understanding of a physical subject through HBC supported on WISDOM 5G would create an information rich society that is unimaginable in today&#x02019;s communication world.</para>
</section>
<section class="lev1" id="sec6-5">
<title>6.5 CONASENSE &#x02013; Communication, Navigation, Sensing and Services</title>
<para>The WISDOM based 5G amply covers the communication aspect of the network, which as discussed earlier would involve one large core network. It has also been stated the significance of sensing the environment is through the capacity of individuals to gain rich information from machines (IoT). However, one of the objectives is to allow seamless connectivity to users even if they are mobile at high speeds. In the case of a user who is mobile at high speeds, it is just not the high speed connectivity that is necessitated, providing the user with effective navigational information is also an expected service requirement.</para>
<fig id="F6-1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label><link linkend="F6-1">Figure <xref linkend="F6-1" remap="6.1"/></link></label>
<caption><para>WISDOM, HBC and CONASENSE Collectively.</para></caption>
<graphic xlink:href="graphics/ch06_fig001.jpg"/>
</fig>
<para>CONASENSE stresses on collective addressing of communication, sensing and navigation aspects dependent on the context, as the three aspects bidirectionally relate with each other to deliver services to the end user [6], [7]. The services that these three aspects provide have been referred as Quality of Life services. This justifies that QoL (Quality of Life) for common people would be ensured in future only if these aspects are collectively handled. This is validated considering the enormous utility of intelligent transportation systems (ITS) and V2V. Both the broad areas rely heavily on navigation information and both in turn influence the information and communication that is available to the end user.</para>
<para>HBC and CONASENSE are complementary aspects in terms of enormous utility of sensing obtained from the myriad types of physical sensors that could be deployed in the biosphere for garnering information. HBC stresses on specific sensing capabilities that human beings utilize to interact with their environment. Therefore HBC and CONASENSE would collectively ensure that information requirements of the future society in 2020 and beyond are appropriately met. The relation between WISDOM, HBC and CONASENSE, and their collective result as assured through the advent of 5G is shown in <link linkend="F6-1">Figure <xref linkend="F6-1" remap="6.1"/></link>.</para>
</section>
<section class="lev1" id="sec6-6">
<title>6.6 Summary</title>
<para>5G technologies will play a vital role in our lives by enabling unlimited access to information and data sharing to anyone, anywhere at any time. To fulfil the requirements of the users to experience Terabit communications, a 5G system must be a combination of different technologies like integrated Radio Access Technology (RAT), including evolved versions of LTE and HSPA and other special advanced technologies.</para>
</section>
<section class="lev1" id="sec6-7">
<title>References</title>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem>
<para>Ramjee Prasad, &#x0201C;Global ICT Standardisation Forum for India (GISFI) and 5G Standardization&#x0201D;, Journal of ICT Standardization, volume 1-No. 2, pp. 123&#x02013;136, November 2013. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Ramjee+Prasad%2C+%22Global+ICT+Standardisation+Forum+for+India+%28GISFI%29+and+5G+Standardization%22%2C+Journal+of+ICT+Standardization%2C+volume+1-No%2E+2%2C+pp%2E+123-136%2C+November+2013%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Cornelia-Ionela, Neeli Prasad, Victor Croitory, Ramjee Prasad, &#x0201C;5G based on Cognitive Radio&#x0201D;, Wireless Personal Communications, volume 57, Issue 3, pp. 441&#x02013;464, April 2011. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Cornelia-Ionela%2C+Neeli+Prasad%2C+Victor+Croitory%2C+Ramjee+Prasad%2C+%225G+based+on+Cognitive+Radio%22%2C+Wireless+Personal+Communications%2C+volume+57%2C+Issue+3%2C+pp%2E+441-464%2C+April+2011%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Ericsson White Paper, &#x0201C;5G Radio Access&#x0201D; <ulink url="http://www.ericsson.com/res/thecompany/docs/publications/ericsson_review/2014/er-5g-radio-access.pdf">http://www.ericsson.com/res/thecompany/docs/ publications/ericsson_review/2014/er-5g-radio-access.pdf</ulink></para></listitem>
<listitem>
<para>Saurabh Patel, Malhar Chauhan, Kinjal Kapadiya, &#x0201C;5G: Future Mobile Technology-Vision 2020&#x0201D;, International Journal of Computer Applications (0975&#x02013;8887) Volume 54&#x02013; No.17, September 2012. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Saurabh+Patel%2C+Malhar+Chauhan%2C+Kinjal+Kapadiya%2C+%225G%3A+Future+Mobile+Technology-Vision+2020%22%2C+International+Journal+of+Computer+Applications+%280975-8887%29+Volume+54-+No%2E17%2C+September+2012%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Ramjee Prasad, Human &#x02013; Bond Wireless Communications, Wireless World Research Forum, May 20, 2014, Marrakech, Morocco.</para></listitem>
<listitem>
<para>Leo P. Ligthart and Ramjee Prasad, &#x0201C;CONASENSE &#x02013; Communications, Navigation, Sensing and Services&#x0201D;, River Publishers, 2013. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Leo+P%2E+Ligthart+and+Ramjee+Prasad%2C+%22Communications%2C+Navigation%2C+Sensing+and+Services%22%2C+River+Publishers%2C+2013%2E" target="_blank">Google Scholar</ulink></para></listitem>
<listitem>
<para>Ernestina Cianca, Mauro De Sanctis, Albena Mihovska, Ramjee Prasad, &#x0201C;CONASENSE: Vision, Motivation and Scope&#x0201D;, Journal of Communication, Navigation, Sensing and Services (CONASENSE), vol 1, issue 1, January 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=Ernestina+Cianca%2C+Mauro+De+Sanctis%2C+Albena+Mihovska%2C+Ramjee+Prasad%2C+%22CONASENSE%3A+Vision%2C+Motivation+and+Scope%22%2C+Journal+of+Communication%2C+Navigation%2C+Sensing+and+Services+%28CONASENSE%29%2C+vol+1%2C+issue+1%2C+January+2014%2E" target="_blank">Google Scholar</ulink></para></listitem></orderedlist>
</section>
</chapter>
<chapter class="nosec" id="ch07">
<title>About the Author</title>
<para>Ramjee Prasad is currently the Director of the Center for TeleInFrastruktur (CTIF) at Aalborg University, Denmark and Professor, Wireless Information Multimedia Communication Chair. Ramjee Prasad is the Founder Chairman of the Global ICT Standardisation Forum for India (GISFI: <ulink url="http://www.gisfi.org">www.gisfi.org</ulink>) established in 2009. GISFI has the purpose of increasing the collaboration between European, Indian, Japanese, North-American and other worldwide standardization activities in the area of Information and Communication Technology (ICT) and related application areas. He was the Founder Chairman of the HERMES Partnership &#x02013; a network of leading independent European research centres established in 1997, of which he is now the Honorary Chair.</para>
<para>He is a Fellow of the Institute of Electrical and Electronic Engineers (IEEE), USA, the Institution of Electronics and Telecommunications Engineers (IETE), India, the Institution of Engineering and Technology (IET), UK, Wireless World Research Forum (WWRF) and a member of the Netherlands Electronics and Radio Society (NERG), and the Danish Engineering Society (IDA).</para>
<para>He is also a Knight (&#x0201C;Ridder&#x0201D;) of the Order of Dannebrog (2010), a distinguished award by the Queen of Denmark.</para>
<para>He has received several international awards, the latest being 2014 IEEE AESS Outstanding Organizational Leadership Award for: <emphasis>&#x0201C;Organizational Leadership in developing and globalizing the CTIF (Center for TeleInFrastruktur) Research Network&#x0201D;.</emphasis></para>
<para>He is the founding editor-in-chief of the Springer International Journal on Wireless Personal Communications. He is a member of the editorial board of other renowned international journals including those of River Publishers. Ramjee Prasad is a member of the Steering committees of many renowned annual international conferences, such as, Wireless Personal Multimedia Communications Symposium (WPMC); Wireless VITAE and Global Wireless Summit (GWS). He has published more than 30 books, 900 plus journals and conferences publications, more than 15 patents, a sizeable amount of graduated PhD students (over 90) and an even larger number of graduated MSc students (over 200). Several of his students are today telecommunication leaders worldwide.</para>
</chapter>
</book>
