<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="9788793379787.xsl"?>
<book id="home" xmlns:xlink="http://www.w3.org/1999/xlink">
<bookinfo>
<title>5G Outlook &#x2013; Innovations and Applications</title>
<affiliation><emphasis role="strong">Editor</emphasis></affiliation>
<authorgroup>
<author><firstname>Ramjee</firstname>
<surname>Prasad</surname>
</author>
</authorgroup>
<affiliation><emphasis role="strong">Founder Director Center for TeleInFrastruktur (CTIF) Aalborg University, Denmark</emphasis></affiliation>
<affiliation><emphasis role="strong">Founder Chairman Global ICT Standardization Forum for India (GISFI) India</emphasis></affiliation>
<publisher>
<publishername>River Publishers</publishername>
</publisher>
<isbn>9788793379787</isbn>
</bookinfo>
<preface class="preface" id="preface01">
<title>RIVER PUBLISHERS SERIES IN COMMUNICATIONS</title>
<para>Volume 48</para>
<para><emphasis>Series Editors</emphasis></para>
<para><emphasis role="strong">ABBAS JAMALIPOUR</emphasis><?lb?><emphasis>The University of Sydney</emphasis><?lb?><emphasis>Australia</emphasis></para>
<para><emphasis role="strong">MARINA RUGGIERI</emphasis><?lb?><emphasis>University of Rome Tor Vergata</emphasis><?lb?><emphasis>Italy</emphasis></para>
<para><emphasis role="strong">HOMAYOUN NIKOOKAR</emphasis><?lb?><emphasis>Delft University of Technology</emphasis><?lb?><emphasis>The Netherlands</emphasis></para>
<para>The &#x201C;River Publishers Series in Communications&#x201D; is a series of comprehensive academic and professional books which focus on communication and network systems. The series focuses on topics ranging from the theory and use of systems involving all terminals, computers, and information processors; wired and wireless networks; and network layouts, protocols, architectures, and implementations. Furthermore, developments toward new market demands in systems, products, and technologies such as personal communications services, multimedia systems, enterprise networks, and optical communications systems are also covered.</para>
<para>Books published in the series include research monographs, edited volumes, handbooks and textbooks. The books provide professionals, researchers, educators, and advanced students in the field with an invaluable insight into the latest research and developments.</para>
<para>Topics covered in the series include, but are by no means restricted to the following:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Wireless Communications</para></listitem>
<listitem><para>Networks</para></listitem>
<listitem><para>Security</para></listitem>
<listitem><para>Antennas &#x0026; Propagation</para></listitem>
<listitem><para>Microwaves</para></listitem>
<listitem><para>Software Defined Radio</para></listitem></itemizedlist>
<para>For a list of other books in this series, visit www.riverpublishers.com</para>
</preface>
<preface class="preface" id="preface02">
<blockquote>
<para>Dedicated to</para>
<para><emphasis>My Colleagues from the CTIF Global Network</emphasis></para>
</blockquote>
</preface>
<preface class="preface" id="preface03">
<title>Preface</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fm1.jpg" mime-subtype="jpeg"/></para>
<blockquote>
<para><emphasis role="strong">Translation</emphasis></para>
<para>One who perceives in comparison with the self, all living entities equally, in happiness and distress; such a one perfected in the science of uniting the individual consciousness with the ultimate consciousness in considered the highest.</para>
<para>The Bhagavad Gita (6.27)</para></blockquote>
<para>This book is outcome of contributions by the researchers from several countries coming from universities, research institutes and industries. The topics covered in this book vary from basic concept of millimeter-waves and their characteristics and usages in 5G mobile technology to the real-time and future applications of 5G in humans&#x2019; daily life and work. Details on technical issues of 5G wireless networks such as effects of denial of service on the network layer and positioning of devices with 5G using flexible wavelet packet modulation are addressed in this book. The chapters of this book are part of the 5th IEEE 5G Summit held in Aalborg on the first July 2016.</para>
<para>IEEE 5G summit is a one-day summit, held on 26 May 2015 at Princeton University, New Jersey for the first time, co-sponsored by Center for TeleInfrastruktur-United States of America (CTIF-USA). The event is organized by IEEE Communications Society. The main purpose for this event is engaging the industry and university with high value and innovative technologies in 5G and its features. The platform provided by 5G summit event is supposed to connect industry leaders, innovators and researchers from academic area to exchange ideas in the divers areas related to 5G and future plans for wireless technology. IEEE 5G summit is planned to hold a series in different countries. Princeton 5G summit was followed by Toronto 5G Summit on November 14, 2015 and Silicon Valley 5G summit on November 16, 2015. There was the first 5G summit event in Asia on March 29, 2016 at Indian Institute of Technology (IIT) Patna, India jointly with the 24th <emphasis>GISFI</emphasis> Standardization Series Meeting (GSSM). This book is collection of some presentations at 5G summit event held in Aalborg (first one in Europe) on July 1, 2016. IEEE Communications Society together with the steering Committee of 5G summit event are planning more events in future to exchange the latest findings in 5G areas and proposing the proper solutions for the future of wireless technology.</para>
<para>5G stands for fifth generation mobile technology. The 5G is the future of the communication technology after 1G, 2G, 3G and 4G. Both industries and universities found that higher data rate, more reliable communications and better Quality of Service (QoS) should be achieved within 5G technology. The journey of mobile generations has started from 1980s and each generation completed the previous one&#x2019;s lacks. For example Global System for Mobile Communications (GSM) presented after 1G to fix the security weakness of analog communication systems. 3G was introduced to cover GSM&#x2019;s lack of mobile data; however it was not a huge success. Then 4G was needed to make better data rate. Now 5G is presented to continue this journey to reach the peak of wireless technology. There have been lots of research and works on 5G from coding and modulation techniques, advanced signal processing, multi-hop networks until applications and standardizations. But there are still a huge amount of works, research and implementations to do. It is predicted that the 5G concept becomes a reality by 2020.</para>
<para>This book consists of 14 chapters covering different challenges and innovations in 5G technology. The book starts with a comprehensive Introduction about 5G from history to the future and continues with the second chapter including the concept of 5G, following by millimeter-waves and their promises to 5G. Two new ideas are presented in Chapters 4 and 5. The book introduces a history and future of International Mobile Telecommunications (IMT) in <link linkend="chapter6">Chapter 6</link> and follows detailed technical issues in the signal processing and network design for 5G in two upcoming chapters. The rest of the book is dedicated to the diverse applications of 5G in different areas from health science to the business modeling.</para>
<para>Ramjee Prasad<?lb?>Founder Director, CTIF, Aalborg University, Denmark<?lb?>Founder chairman, GISFI, India</para>
</preface>
<preface class="preface" id="preface04">
<title>Acknowledgments</title>
<para>This book is the collection of diverse works and research done by different colleagues worldwide for the 5th IEEE 5G Summit held on July 1, 2016 in Aalborg. Therefore, the editor would like to thank all the contributors involved in this book for their collaboration and dedication that made this book finalized. The editor would also like to thank all organizer and participants in this event for sharing and exchanging their findings and novel ideas for the future of 5G technology.</para>
<para>The editor would like to acknowledge the contributions from Center for TeleInFrastrukture (CTIF) colleagues for their role in initiating 5G research at CTIF namely, Albena, Neeli, Sofoklis, Ambuj, Prateek, Mihail, and so on.</para>
<para>Finally, the editor likes to express his special thanks to Maryam for her effort on formatting this book.</para>
</preface>
<preface class="preface" id="preface05">
<title>About the Editor</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fm2.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Ramjee Prasad</emphasis> is the Founder President of the CTIF Global Capsule (CGC). He has been a Founding Director of the Center for TeleInFrastruktur (CTIF) since 2004. He is also the Founder Chairman of the Global ICT Standardisation Forum for India (GISFI: www.gisfi.org) established in 2009. GISFI has the purpose of increasing of the collaboration between European, Indian, Japanese, North-American and other worldwide standardization activities in the area of Information and Communication Technology (ICT) and related application areas.</para>
<para>He was the Founder Chairman of the HERMES Partnership &#x2013; a network of leading independent European research centres established in 1997, of which he is now the Honorary Chair. He is a Fellow of the Institute of Electrical and Electronic Engineers (IEEE), USA, the Institution of Electronics and Telecommunications Engineers (IETE), India, the Institution of Engineering and Technology (IET), UK, Wireless World Research Forum (WWRF) and a member of the Netherlands Electronics and Radio Society (NERG), and the Danish Engineering Society (IDA).</para>
<para>He has received Ridderkorset af Dannebrogordenen (Knight of the Dannebrog) in 2010 from the Danish Queen for the internationalization of top-class telecommunication research and education. He has been honored by the University of Rome &#x201C;Tor Vergata&#x201D;, Italy as a Distinguished Professor of the Department of Clinical Sciences and Translational Medicine on March 15, 2016.</para>
<para>He has received several international awards such as: IEEE Communications Society Wireless Communications Technical Committee Recognition Award in 2003 for making contribution in the field of &#x201C;Personal, Wireless and Mobile Systems and Networks&#x201D;, Telenor&#x2019;s Research Award in 2005 for impressive merits, both academic and organizational within the field of wireless and personal communication, 2014 IEEE AESS Outstanding Organizational Leadership Award for: &#x201C;Organizational Leadership in developing and globalizing the CTIF (Center for TeleInFrastruktur) Research Network&#x201D;, and so on.</para>
<para>He is the Founder Editor-in-Chief of the Springer International Journal on Wireless Personal Communications. He is a member of the editorial board of other renowned international journals including those of River Publishers. Ramjee Prasad is Founder Co-Chair of the Steering committees of many renowned annual international conferences, e.g., Wireless Personal Multimedia Communications Symposium (WPMC); Wireless VITAE and Global Wireless Summit (GWS).</para>
<para>He has published more than 30 books, 1000 plus journals and conferences publications, more than 15 patents, over 100 Ph.D. Graduates and larger number of Masters (over 250). Several of his students are today worldwide telecommunication leaders themselves.</para>
</preface>
<preface class="preface" id="preface06">
<title>List of Figures</title>
<table-wrap>
<table cellspacing="5" cellpadding="5" frame="none" rules="none">
<tbody>
<tr>
<td valign="top" align="left" width="15%"><emphasis role="strong"><link linkend="fig1_1">Figure 1.1</link></emphasis></td>
<td valign="top" align="left">Cell phone development to the future</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig1_2">Figure 1.2</link></emphasis></td>
<td valign="top" align="left">Human bond communication in real world</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig1_3">Figure 1.3</link></emphasis></td>
<td valign="top" align="left">VLC system architecture</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig2_1">Figure 2.1</link></emphasis></td>
<td valign="top" align="left">Mobile wireless technology</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig2_2">Figure 2.2</link></emphasis></td>
<td valign="top" align="left">Collective CONASENSE, WISDOM &#x0026; HBC for 5G</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig2_3">Figure 2.3</link></emphasis></td>
<td valign="top" align="left">5G Rural Areas</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig3_1">Figure 3.1</link></emphasis></td>
<td valign="top" align="left">United State frequency allocations and mm-waves spectrum</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig3_2">Figure 3.2</link></emphasis></td>
<td valign="top" align="left">The changes of the K-factor in LOS situation in the common room</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig3_3">Figure 3.3</link></emphasis></td>
<td valign="top" align="left">Wideband average received power in indoor scenario at 60 GHz</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig3_4">Figure 3.4</link></emphasis></td>
<td valign="top" align="left">Future of medical services using mm-waves in 5G wireless communication systems</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig3_5">Figure 3.5</link></emphasis></td>
<td valign="top" align="left">Vehicle-to-vehicle communication, and vehicle-to base station communication promised by 5G and mm-waves</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig4_1">Figure 4.1</link></emphasis></td>
<td valign="top" align="left">Collaborative computing at the edge in Uber network</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig4_2">Figure 4.2</link></emphasis></td>
<td valign="top" align="left">High level representation of the Google OnHub</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig4_3">Figure 4.3</link></emphasis></td>
<td valign="top" align="left">Fog network Architecture</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig4_4">Figure 4.4</link></emphasis></td>
<td valign="top" align="left">The latency w.r.t the analytics chain</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig4_5">Figure 4.5</link></emphasis></td>
<td valign="top" align="left">Fog and cloud in 5G network paradigm</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig5_1">Figure 5.1</link></emphasis></td>
<td valign="top" align="left">UX evolution along the wireless technology evolution</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig5_2">Figure 5.2</link></emphasis></td>
<td valign="top" align="left">Associated things</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig5_3">Figure 5.3</link></emphasis></td>
<td valign="top" align="left">CX of today</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig5_4">Figure 5.4</link></emphasis></td>
<td valign="top" align="left">CX for tomorrow</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig5_5">Figure 5.5</link></emphasis></td>
<td valign="top" align="left">GlobENDS, Live HD networking across the continents with a Smart device projecting over three sides of the walls</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig5_6">Figure 5.6</link></emphasis></td>
<td valign="top" align="left">Wireless Wisdom Provisioning (WWP)</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig5_7">Figure 5.7</link></emphasis></td>
<td valign="top" align="left">Applications &#x2013; Internet of Human and Things (IoHT)</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig6_1">Figure 6.1</link></emphasis></td>
<td valign="top" align="left">The IMT-2020 standardization process</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig6_2">Figure 6.2</link></emphasis></td>
<td valign="top" align="left">Overall timeline for the standardization of IMT-2020</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig6_3">Figure 6.3</link></emphasis></td>
<td valign="top" align="left">Usage scenarios of IMT-2020</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig6_4">Figure 6.4</link></emphasis></td>
<td valign="top" align="left">Enhancement of key capabilities from IMT-Advanced to IMT-2020</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig7_1">Figure 7.1</link></emphasis></td>
<td valign="top" align="left">A typical ad-hoc network. Nodes A and D are cut-vertices. If DoS is successfully launched on channel 1, node-pairs (A, D), (B, C) and (E, F) will vacate channel 1, thereby resulting in a disconnected network</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig7_2">Figure 7.2</link></emphasis></td>
<td valign="top" align="left">A connected ad hoc network with users independently and uniformly distributed in an L <emphasis>&#x00D7;</emphasis> L grid. All users have &#x201C;hearing distance&#x201D; R, within which they can communicate with each other. Each user could potentially be affected by DoS. The users succumb to the attack are marked red and have to be removed, along with all associated links. The removal of the DoS victims could lead to either a connected or disconnected network</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig7_3">Figure 7.3</link></emphasis></td>
<td valign="top" align="left">Comparison of probability that PUEA disconnects an initially connected network with different numbers of secondary users, N and different values of the probability that any two secondary users have a link, <emphasis>p</emphasis>. In Figure (a), <emphasis>p</emphasis> = 0<emphasis>.</emphasis>0436. The numbers &#x201C;100&#x201D;, &#x201C;200&#x201D; and &#x201C;500&#x201D; in the legends represent 100, 200 and 500 secondary users in the network, respectively, while the parenthesized letters &#x201C;S&#x201D; and &#x201C;A&#x201D; represent the results from simulations and analysis, respectively. In Figure (b), The numbers &#x201C;0.02&#x201D;, &#x201C;0.03&#x201D;, &#x201C;0.04&#x201D;, &#x201C;0.05&#x201D; and &#x201C;0.06&#x201D; in the legends represent the probabilities that any two secondary users have a direct link set as &#x201C;0.02&#x201D;, &#x201C;0.03&#x201D;, &#x201C;0.04&#x201D;, &#x201C;0.05&#x201D; and &#x201C;0.06&#x201D;, respectively</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig7_4">Figure 7.4</link></emphasis></td>
<td valign="top" align="left">Comparison on probability that DoS disconnects an initially connected network after deploying detection and mitigation mechanisms. The probability that any two secondary users have a direct link is 0.0436. The legends &#x201C;Individual detection&#x201D; represents the individual detection mechanism. &#x201C;Centralized protocol&#x201D; and &#x201C;Distributed protocol&#x201D; represent the centralized and the distributed protocols</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig7_5">Figure 7.5</link></emphasis></td>
<td valign="top" align="left">Probability of successful DoS by using the centralized protocol and the distributed protocol presented</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig8_1">Figure 8.1</link></emphasis></td>
<td valign="top" align="left">The TOA positioning method</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig8_2">Figure 8.2</link></emphasis></td>
<td valign="top" align="left">The TDOA positioning method</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig8_3">Figure 8.3</link></emphasis></td>
<td valign="top" align="left">Wavelet conditions and degrees of freedom for design</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig8_4">Figure 8.4</link></emphasis></td>
<td valign="top" align="left">Impulse response of the optimal LPF with 20 coefficients</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig8_5">Figure 8.5</link></emphasis></td>
<td valign="top" align="left">Optimal Filter; (a: top left) Scaling function, (b: top right) Wavelet function and (c: bottom) Frequency response in dB of the optimal filter</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig8_6">Figure 8.6</link></emphasis></td>
<td valign="top" align="left">MSE of TOA estimation vs. Time Offset for WPM signal in AWGN channel</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig9_1">Figure 9.1</link></emphasis></td>
<td valign="top" align="left">An American family is watching TV in 1958. The family was gathered around the same screen</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig9_2">Figure 9.2</link></emphasis></td>
<td valign="top" align="left">The traditional TV value chain as it have looked until a few years ago</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig9_3">Figure 9.3</link></emphasis></td>
<td valign="top" align="left">The disrupted TV broadcast value chain with many new players entering the market. New player categories are indicated with red text</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig9_4">Figure 9.4</link></emphasis></td>
<td valign="top" align="left">Digital exchange for ship-to-shore radio anno 1999 in Denmark</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig9_5">Figure 9.5</link></emphasis></td>
<td valign="top" align="left">IP-based digital exchange for ship-to-shore radio anno 2016</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig10_1">Figure 10.1</link></emphasis></td>
<td valign="top" align="left">Worldwide subscribers from 1993 to 2002 of different 2nd Generation standards</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig10_2">Figure 10.2</link></emphasis></td>
<td valign="top" align="left">Converging three worlds generates new business opportunities</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig10_3">Figure 10.3</link></emphasis></td>
<td valign="top" align="left">Major multiple access methods used in 2nd and 3rd mobile radio standards</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig10_4">Figure 10.4</link></emphasis></td>
<td valign="top" align="left">IMT 2000 worldwide frequency plans</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig10_5">Figure 10.5</link></emphasis></td>
<td valign="top" align="left">Mobile data traffic growth during the year 2007</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig10_6">Figure 10.6</link></emphasis></td>
<td valign="top" align="left">LTE/SAE system architecture</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig10_7">Figure 10.7</link></emphasis></td>
<td valign="top" align="left">LTE radio principles</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig10_8">Figure 10.8</link></emphasis></td>
<td valign="top" align="left">Core network principles</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig10_9">Figure 10.9</link></emphasis></td>
<td valign="top" align="left">Digital mobile networks evolution towards 5th Generation</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig10_10">Figure 10.10</link></emphasis></td>
<td valign="top" align="left">5G architecture envisioned by NGMN</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig10_11">Figure 10.11</link></emphasis></td>
<td valign="top" align="left">New application areas for vertical industries within 5G</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig10_12">Figure 10.12</link></emphasis></td>
<td valign="top" align="left">Consumption controls production and decoupled demand and production</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig10_13">Figure 10.13</link></emphasis></td>
<td valign="top" align="left">Decentralized energy storage linked on a Smart Grid communication to a control center</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig10_14">Figure 10.14</link></emphasis></td>
<td valign="top" align="left">Clustering of the battery storage systems to organize itself</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig10_15">Figure 10.15</link></emphasis></td>
<td valign="top" align="left">Control- and communication platform</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig11_1">Figure 11.1</link></emphasis></td>
<td valign="top" align="left">Typical configurations of small-cell backhaul in LTE-A standard</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig11_2">Figure 11.2</link></emphasis></td>
<td valign="top" align="left">Pictorial view of the body as a device and as a node concept</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig11_3">Figure 11.3</link></emphasis></td>
<td valign="top" align="left">Possible location of sensors and chips for the OCD or OCN approach</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig11_4">Figure 11.4</link></emphasis></td>
<td valign="top" align="left">Possible multi-user, multi-device and multi-node scenario</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig12_1">Figure 12.1</link></emphasis></td>
<td valign="top" align="left">WLAN data rate growth</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig12_2">Figure 12.2</link></emphasis></td>
<td valign="top" align="left">Preamble structures for 11a, 11n and 11ac</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig12_3">Figure 12.3</link></emphasis></td>
<td valign="top" align="left">Preamble structures for 11ax</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig12_4">Figure 12.4</link></emphasis></td>
<td valign="top" align="left">80 MHz OFDMA resource unit allocations</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig12_5">Figure 12.5</link></emphasis></td>
<td valign="top" align="left">11ax packet structure for 80 MHz OFDMA</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig12_6">Figure 12.6</link></emphasis></td>
<td valign="top" align="left">Multiple clients sending a packet without use of uplink MU</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig12_7">Figure 12.7</link></emphasis></td>
<td valign="top" align="left">Multiple clients sending a packet using 11ax uplink MU</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig12_8">Figure 12.8</link></emphasis></td>
<td valign="top" align="left">Downlink MU TXOP for 11ac</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig12_9">Figure 12.9</link></emphasis></td>
<td valign="top" align="left">Downlink and uplink MU for 11ax</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig13_1">Figure 13.1</link></emphasis></td>
<td valign="top" align="left">Example of a patient platform, supporting web based exercising, video teleconsultation, self management and activity coaching</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig13_2">Figure 13.2</link></emphasis></td>
<td valign="top" align="left">Upper extremity exercise system including robotic support for the hand functioning, gravity compensation and individually tailored ideo games</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig13_3">Figure 13.3</link></emphasis></td>
<td valign="top" align="left">The different components of the Interaction monitoring system</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig13_4">Figure 13.4</link></emphasis></td>
<td valign="top" align="left">Schematic presentation of an artificial Personal coaching system, involving on-body sensing, context aware reasoning and persuasive feedback</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig13_5">Figure 13.5</link></emphasis></td>
<td valign="top" align="left">Three examples of Personal coaching systems that use sensor and context information to reason about a health condition to provide personalized and persuasive feedback</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig13_6">Figure 13.6</link></emphasis></td>
<td valign="top" align="left">Example of an integrated caring home environment, offering health, wellness and safety services to people with chronic conditions</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig14_1">Figure 14.1</link></emphasis></td>
<td valign="top" align="left">2D Mapping of one BM value exchange sequence from an industrial business</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig14_2">Figure 14.2</link></emphasis></td>
<td valign="top" align="left">2D Mapping of a multitude of BM value exchange sequence between BM&#x2019;s inside a business</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="fig14_3">Figure 14.3</link></emphasis></td>
<td valign="top" align="left">A &#x201C;ecosystem&#x201D; of the secure persuasive physical, digital and virtual business model</td>
</tr>
</tbody>
</table>
</table-wrap>
</preface>
<preface class="preface" id="preface07">
<title>List of Tables</title>
<table-wrap>
<table cellspacing="5" cellpadding="5" frame="none" rules="none">
<tbody>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="tbl1_1">Table 1.1</link></emphasis></td>
<td valign="top" align="left">Significant 5G initiatives till date</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="tbl6_1">Table 6.1</link></emphasis></td>
<td valign="top" align="left">Bands under study for IMT identification by WRC-19</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="tbl8_1">Table 8.1</link></emphasis></td>
<td valign="top" align="left">Optimal filter coefficients</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="tbl8_2">Table 8.2</link></emphasis></td>
<td valign="top" align="left">Wavelet specifications and objective function</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="tbl8_3">Table 8.3</link></emphasis></td>
<td valign="top" align="left">Simulation setup time synchronization error</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="tbl9_1">Table 9.1</link></emphasis></td>
<td valign="top" align="left">Technologies and bandwidths for 2G, 3G, 4G and 5G technologies</td>
</tr>
<tr>
<td valign="top" align="left"><emphasis role="strong"><link linkend="tbl14_1">Table 14.1</link></emphasis></td>
<td valign="top" align="left">Generic dimensions and questions to any persuasive business model</td>
</tr>
</tbody>
</table>
</table-wrap>
</preface>
<preface class="preface" id="preface08">
<title>List of Abbreviations</title>
<table-wrap>
<table cellspacing="5" cellpadding="5" frame="none" rules="none">
<tbody>
<tr>
<td valign="top" align="left">AAS</td><td valign="top" align="left">Active Antenna System</td></tr>
<tr>
<td valign="top" align="left">AMPS</td><td valign="top" align="left">Advanced Mobile Phone System</td></tr>
<tr>
<td valign="top" align="left">AOA</td><td valign="top" align="left">Angle of Arrival</td></tr>
<tr>
<td valign="top" align="left">AWGN</td><td valign="top" align="left">Additive White Gaussian Noise</td></tr>
<tr>
<td valign="top" align="left">BCC</td><td valign="top" align="left">Body Channel Communication</td></tr>
<tr>
<td valign="top" align="left">BMES</td><td valign="top" align="left">Business Model Ecosystems</td></tr>
<tr>
<td valign="top" align="left">BMI</td><td valign="top" align="left">Business Model Innovation</td></tr>
<tr>
<td valign="top" align="left">BSS</td><td valign="top" align="left">Basic Service Set</td></tr>
<tr>
<td valign="top" align="left">BTS</td><td valign="top" align="left">Base Transceiver Station</td></tr>
<tr>
<td valign="top" align="left">BYOD</td><td valign="top" align="left">Bring Your Own Device</td></tr>
<tr>
<td valign="top" align="left">CAM</td><td valign="top" align="left">Computer Aided Manufacturing</td></tr>
<tr>
<td valign="top" align="left">COTS</td><td valign="top" align="left">Commercial Off-The-Shelve</td></tr>
<tr>
<td valign="top" align="left">CR</td><td valign="top" align="left">Cognitive Radio</td></tr>
<tr>
<td valign="top" align="left">DCM</td><td valign="top" align="left">Dual Carrier Modulation</td></tr>
<tr>
<td valign="top" align="left">DoS</td><td valign="top" align="left">Denial of Service</td></tr>
<tr>
<td valign="top" align="left">DSA</td><td valign="top" align="left">Dynamic Spectrum Access</td></tr>
<tr>
<td valign="top" align="left">FBMC</td><td valign="top" align="left">Filter Bank Multi-Carrier</td></tr>
<tr>
<td valign="top" align="left">FIR</td><td valign="top" align="left">Finite-Impulse-Response</td></tr>
<tr>
<td valign="top" align="left">FM</td><td valign="top" align="left">Frequency Modulation</td></tr>
<tr>
<td valign="top" align="left">FPLMTS</td><td valign="top" align="left">Future Public Land Mobile Telecommunications Systems</td></tr>
<tr>
<td valign="top" align="left">GISFI</td><td valign="top" align="left">Global ICT Standardization Forum for India</td></tr>
<tr>
<td valign="top" align="left">GPRS</td><td valign="top" align="left">General Packet Radio Services</td></tr>
<tr>
<td valign="top" align="left">GPS</td><td valign="top" align="left">Global Positioning System</td></tr>
<tr>
<td valign="top" align="left">HBC</td><td valign="top" align="left">Human Bond Communications</td></tr>
<tr>
<td valign="top" align="left">HMI</td><td valign="top" align="left">Human to Machine Interface</td></tr>
<tr>
<td valign="top" align="left">HPF</td><td valign="top" align="left">High Pass Filter</td></tr>
<tr>
<td valign="top" align="left">HSPA</td><td valign="top" align="left">High Speed Packet Access</td></tr>
<tr>
<td valign="top" align="left">ICC</td><td valign="top" align="left">International Conference on Communications</td></tr>
<tr>
<td valign="top" align="left">ICT</td><td valign="top" align="left">Information and Communication Technology</td></tr>
<tr>
<td valign="top" align="left">IDMA</td><td valign="top" align="left">Interleave Division Multiple Access</td></tr>
<tr>
<td valign="top" align="left">IFTTT</td><td valign="top" align="left">If This Then That</td></tr>
<tr>
<td valign="top" align="left">IMT</td><td valign="top" align="left">International Mobile Telecommunications</td></tr>
<tr>
<td valign="top" align="left">IoT</td><td valign="top" align="left">Internet of Things</td></tr>
<tr>
<td valign="top" align="left">IP</td><td valign="top" align="left">Internet Protocol</td></tr>
<tr>
<td valign="top" align="left">ISI</td><td valign="top" align="left">Inter Symbol Interference</td></tr>
<tr>
<td valign="top" align="left">ISSE</td><td valign="top" align="left">International Symposium on Systems Engineering</td></tr>
<tr>
<td valign="top" align="left">ITU</td><td valign="top" align="left">International Telecommunications Union</td></tr>
<tr>
<td valign="top" align="left">LBT</td><td valign="top" align="left">Listen before Talk</td></tr>
<tr>
<td valign="top" align="left">LDS</td><td valign="top" align="left">Low Density Spreading</td></tr>
<tr>
<td valign="top" align="left">LOS</td><td valign="top" align="left">Line of Sight</td></tr>
<tr>
<td valign="top" align="left">LPF</td><td valign="top" align="left">Low Pass Filter</td></tr>
<tr>
<td valign="top" align="left">LTE</td><td valign="top" align="left">Long Term Evolution</td></tr>
<tr>
<td valign="top" align="left">MAC</td><td valign="top" align="left">Medium Access Control</td></tr>
<tr>
<td valign="top" align="left">MIMO</td><td valign="top" align="left">Multiple Input Multiple Output</td></tr>
<tr>
<td valign="top" align="left">MM</td><td valign="top" align="left">Mixed Mode</td></tr>
<tr>
<td valign="top" align="left">MSE</td><td valign="top" align="left">Mean Square Error</td></tr>
<tr>
<td valign="top" align="left">MU</td><td valign="top" align="left">Multi User</td></tr>
<tr>
<td valign="top" align="left">NFV</td><td valign="top" align="left">Network Function Virtualization</td></tr>
<tr>
<td valign="top" align="left">NLOS</td><td valign="top" align="left">Non Line of Sight</td></tr>
<tr>
<td valign="top" align="left">NMT</td><td valign="top" align="left">Nordic Mobile Telephone</td></tr>
<tr>
<td valign="top" align="left">NOC</td><td valign="top" align="left">Network Operation Center</td></tr>
<tr>
<td valign="top" align="left">OFDM</td><td valign="top" align="left">Orthogonal Frequency Division Multiplexing</td></tr>
<tr>
<td valign="top" align="left">OTT</td><td valign="top" align="left">Over The Top</td></tr>
<tr>
<td valign="top" align="left">PBM</td><td valign="top" align="left">Persuasive Business Models</td></tr>
<tr>
<td valign="top" align="left">PCS</td><td valign="top" align="left">Personal Coaching System</td></tr>
<tr>
<td valign="top" align="left">PDMA</td><td valign="top" align="left">Pattern Division Multiple Access</td></tr>
<tr>
<td valign="top" align="left">PPM</td><td valign="top" align="left">Pulse Position Modulation</td></tr>
<tr>
<td valign="top" align="left">PU</td><td valign="top" align="left">Primary User</td></tr>
<tr>
<td valign="top" align="left">PUEA</td><td valign="top" align="left">Primary User Emulation Attack</td></tr>
<tr>
<td valign="top" align="left">QMF</td><td valign="top" align="left">Quadrature Mirror Filter</td></tr>
<tr>
<td valign="top" align="left">QoS</td><td valign="top" align="left">Quality of Service</td></tr>
<tr>
<td valign="top" align="left">RAN</td><td valign="top" align="left">Radio Access Network</td></tr>
<tr>
<td valign="top" align="left">RAT</td><td valign="top" align="left">Radio Access Technologies</td></tr>
<tr>
<td valign="top" align="left">RSMT</td><td valign="top" align="left">Remotely Supervised Myofeedback Treatment</td></tr>
<tr>
<td valign="top" align="left">RSS</td><td valign="top" align="left">Received Signal Strength</td></tr>
<tr>
<td valign="top" align="left">RU</td><td valign="top" align="left">Resource Unit</td></tr>
<tr>
<td valign="top" align="left">SCMA</td><td valign="top" align="left">Sparse Code Multiple Access</td></tr>
<tr>
<td valign="top" align="left">SDN</td><td valign="top" align="left">Software Defined Networking</td></tr>
<tr>
<td valign="top" align="left">SDP</td><td valign="top" align="left">Semi Definite Programming</td></tr>
<tr>
<td valign="top" align="left">SINR</td><td valign="top" align="left">Signal to Interference Noise Ratio</td></tr>
<tr>
<td valign="top" align="left">SMNAT</td><td valign="top" align="left">Smart Mobile Network Access Topology</td></tr>
<tr>
<td valign="top" align="left">SMS</td><td valign="top" align="left">Short Message Service</td></tr>
<tr>
<td valign="top" align="left">SNR</td><td valign="top" align="left">Signal to Noise Ratio</td></tr>
<tr>
<td valign="top" align="left">SON</td><td valign="top" align="left">Self Organizing Network</td></tr>
<tr>
<td valign="top" align="left">SU</td><td valign="top" align="left">Secondary Users</td></tr>
<tr>
<td valign="top" align="left">TACS</td><td valign="top" align="left">Total Access Communication Systems</td></tr>
<tr>
<td valign="top" align="left">TDOA</td><td valign="top" align="left">Time Difference of Arrival</td></tr>
<tr>
<td valign="top" align="left">TH</td><td valign="top" align="left">Time Hopping</td></tr>
<tr>
<td valign="top" align="left">TOA</td><td valign="top" align="left">Time of Arrival</td></tr>
<tr>
<td valign="top" align="left">UWB</td><td valign="top" align="left">Ultra Wide Band</td></tr>
<tr>
<td valign="top" align="left">VLC</td><td valign="top" align="left">Visible Light Communications</td></tr>
<tr>
<td valign="top" align="left">VTC</td><td valign="top" align="left">Vehicular Technology Conference</td></tr>
<tr>
<td valign="top" align="left">WPM</td><td valign="top" align="left">Wavelet Packet Modulated</td></tr>
<tr>
<td valign="top" align="left">WRC</td><td valign="top" align="left">World Radio Communication Conferences</td></tr>
</tbody>
</table>
</table-wrap>
</preface>
<preface class="preface" id="preface09">
<title>Contents</title>
<table-wrap position="float">
<table cellspacing="5" cellpadding="5" frame="none" rules="none">
<tbody>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch01">1 Introduction</link></emphasis><?lb?>Maryam Rahimi and Ramjee Prasad</td><td valign="top" align="left" width="20%"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C1.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch02">2 5G: Need for the Hour</link></emphasis><?lb?>Nidhi and Ramjee Prasad</td><td valign="top" align="left"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C2.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch03">3 Mm-waves Promises and Challenges in Future Wireless Communication: 5G</link></emphasis><?lb?>Maryam Rahimi, Hitesh Singh and Ramjee Prasad</td><td valign="top" align="left"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C3.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch04">4 The Fog over the Meadow and the Cloud in the Blue Sky</link></emphasis><?lb?>Rajarshi Sanyal</td><td valign="top" align="left"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C4.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch05">5 Adding a New Dimension to Customer Experience, the Reality of 6th Sense &#x2013; 5G and Beyond</link></emphasis><?lb?>Jeevarathinam Ravikumar and Ramjee Prasad</td><td valign="top" align="left"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C5.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch06">6 Imt for 2020 and Beyond</link></emphasis><?lb?>Fran&#x00E7;ois Rancy</td><td valign="top" align="left"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C6.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch07">7 Connectivity of Ad hoc 5G Wireless Networks under Denial of Service Attacks</link></emphasis><?lb?>Zituo Jin, Santhanakrishnan Anand, Koduvayur P. Subbalakshmi and Rajarathnam Chandramouli</td><td valign="top" align="left"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C7.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch08">8 Optimal Signal Design for Wavelet Radio TOA Locationing with Synchronization Error for 5G Networks</link></emphasis><?lb?>Homayoun Nikookar</td><td valign="top" align="left"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C8.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch09">9 Tv Broadcast and 5g</link></emphasis><?lb?>Lars Kierkegaard</td><td valign="top" align="left"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C9.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch10">10 The Next Mobile Communication Steps into New Application Areas</link></emphasis><?lb?>Walter Konh&#x00E4;user</td><td valign="top" align="left"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C10.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch11">11 5G: The Last Frontier?</link></emphasis><?lb?>Marina Ruggieri, Gianpaolo Sannino and Cosimo Stallo</td><td valign="top" align="left"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C11.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch12">12 802.11ax for 5G</link></emphasis><?lb?>Richard van Nee</td><td valign="top" align="left"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C12.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch13">13 5G for Personalized Health and Ambient Assisted Living</link></emphasis><?lb?>Hermie J. Hermens</td><td valign="top" align="left"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C13.pdf">Download As PDF</ulink></td></tr>
<tr><td valign="top"><emphasis role="strong"><link linkend="ch14">14 Multi Business Model Innovations in a World of 5G &#x2013; Towards a World of Advanced Persuasive Business Models Embedded with Sensor- and Persuasive Technologies</link></emphasis><?lb?>Peter Lindgren</td><td valign="top" align="left"><ulink url="https://www.riverpublishers.com/pdf/ebook/chapter/RP_9788793237131C14.pdf">Download As PDF</ulink></td></tr>
</tbody>
</table>
</table-wrap>
</preface>
<chapter class="chapter" id="ch01" label="1" xreflabel="1">
<title>Introduction</title>
<para><emphasis role="strong">Maryam Rahimi and Ramjee Prasad</emphasis></para>
<para>Center for TeleInfrastruktur (CTIF), Aalborg University, Denmark</para>
<para>Radio technologies started their first step to connect the whole world together by introducing the analogue cellular systems in 1980s. Afterwards radio technologies have experienced a rapid evolution in their paths with the launch of the digital wireless communication systems in different steps from Global System for Mobile Communications (GSM) to the Fifth Generation Mobile Technology (5G). 5G technology promises to evolve the mobile communication system with its features especially within very high bandwidth. It is predicted, users experience a huge difference between 5G technology and previous mobile generations, which makes 5G technology more powerful in near future.</para>
<para>5G promises its users enjoying high speed up to 1Tera bps (1Tbits/s = 10<sup>12</sup> bits/s) wireless link rates, wider range of applications, connectivity everywhere, watching high quality videos on their cell phones, lower battery consumption and much more around the year 2020, where it is promised to implement 5G in the reality. For now still huge amount of works and researches are needed to configure 5G standards, network design, signal processing and many other issues to be addressed.</para>
<section class="lev1" id="sec1-1">
<title>1.1 The Journey to 5G Wireless Communication</title>
<para>The Journey began in 1819, when the Danish physicist Chritian Oersted founded the fundamental relationship between electricity and magnetism. Nowadays we know it as electromagnetic field. In 1832, Michael Faraday used the concept of electromagnetic and discovered a way to provide electricity. Later on James Clerck Maxwell introduced his magic equations in 1865 and 1873. The fundamental of critical inventions in next decades are defined by Maxwells&#x2019; equations.</para>
<para>The road towards radio communication started in fact in 1895, when Guglielmo Marconi sent radio telegraph transmission across the English Channel. Similar works by other contemporary scientist, Jagdish Chandra Bose from India pioneered several dimensions towards the field of radio communications. The journey continued with first voice over radio transmission in 1914 and first long-distance TV transmission in the United States, conducted by AT&#x0026;T Bell Labs in 1927. Frequency modulation (FM) was introduced by Armstrong in 1935, which was a huge step forward at that time.</para>
<para>In the 1980s, the First Generation Mobile Networks (1G) were introduced. The 1G signaling systems were designed based on analog system transmissions. Some of the most popular standards set up for 1G system were Advanced Mobile Phone System (AMPS), Total Access Communication Systems (TACS) and Nordic Mobile Telephone (NMT).</para>
<para>In the early 1990s, the Second Generation Mobile Networks (2G) based on Global System for Mobile Communications (GSM) was launched. 2G is the starting point towards wireless digital communication. The main concern of new system was covering the problems with security weakness of analog communication systems. Another novelty in designing GSM was using digital modulation to improve voice quality but the network offers limited data service. The 2G carriers also began to offer additional services, such as paging, faxes, text messages and voicemail.</para>
<para>An intermediary phase, 2.5G was introduced in the late 1990s. It uses the General Packet Radio Services (GPRS) standard, which delivers packet-switched data capabilities to existing GSM networks. It allows users to send graphics-rich data as packets. The importance for packet-switching increased with the rise of the Internet and the Internet Protocol (IP).</para>
<para>The Third Generation Mobile Systems (3G) is proposed in 2000s to provide high speed Internet access to allow mobile phone customers using video and audio applications. One of the main objectives of designing 3G system was to standardize on a single global network protocol instead of the different standards adopted previously in Europe, the U.S. and other regions. 3G phone speeds deliver up to 2 Mpbs, but only under the best conditions and in stationary mode. Moving at a high speed can drop 3G bandwidth to a mere 145 Kbps [1].</para>
<para>The Fourth Generation Mobile System (4G) offered in 2010s promised for providing transmission rates up to 20 Mbps. The concept of Quality of Service (QoS) got more attention in 4G system. It is promised accommodating QoS features in 4G system. QoS will allow telephone carrier to prioritize traffic according to the type of application using bandwidth and adjust between different telephones needs at a moment&#x2019;s notice. High quality video and audio streaming over end to end Internet Protocol is the most attraction of 4G. There are two important standards in 4G technologies; Worldwide Interoperability for Microwave Access (WiMax) and Long Term Evolution (LTE). 4G is currently using in many countries all over the world [2]. <link linkend="fig1_1">Figure 1.1</link> shows a trend in cell phones and their development to the future.</para>
<para>The journey is continuing to the Fifth Generation Mobile System (5G) to achieve the huge promises made by 5G in terms of high data rate, low latency, low power consumption and much more. It is a big step forwards during this road and no one knows if this step makes the human to achieve the peak of the wireless communications or still there is a long way ahead.</para>
<fig id="fig1_1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 1.1</label>
<caption><title>Cell phone development to the future.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig1_1.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev1" id="sec1-2">
<title>1.2 Background and Future of 5G Technology</title>
<para>The concept of realizing 5G communication network based on Wireless Innovative System for Dynamic Operation Mega Communication (WISDOM) followed by other leading initiatives at research facilities in industry and academia is as shown in <link linkend="tbl1_1">Table 1.1</link> [3].</para>
<para>The future of 5G technology is under discussion and research. It is expected that 5G technology increases the bandwidth, QoS, improves usability and security, decreases delays and cost of services, reduces battery consumption, improves reliability of the communications and much more. It is mentioned that, the architecture of 5G is highly advanced and service providers can implement the new technology easily [6].</para>
<para>The challenges of 5G such as, Inter-cell interference, traffic management, multiple services, security and privacy, standardization and so on should be addressed before implementation of 5G technology, which is expected for 2020. It needs lots of efforts from universities and industries to exchange their findings and ideas to reach the final and promised point in 5G system.</para>
<table-wrap id="tbl1_1">
<label>Table 1.1</label>
<caption><title>Significant 5G initiatives till date</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="rows">
<thead>
<tr>
<td valign="bottom" align="left">Year</td>
<td valign="bottom" align="left">5G Initiative</td>
<td valign="bottom" align="left">Entity</td>
<td valign="bottom" align="left">Country</td></tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">2008 February</td>
<td valign="top" align="left">WISDOM [3]</td>
<td valign="top" align="left">Center of TeleInFrastruktur, Aalborg University</td>
<td valign="top" align="left">Denmark</td></tr>
<tr>
<td valign="top" align="left">2008 November</td>
<td valign="top" align="left">5G through WISDOM [4]</td>
<td valign="top" align="left">Center of TeleInFrastruktur, Aalborg University</td>
<td valign="top" align="left">Denmark</td></tr>
<tr>
<td valign="top" align="left">2008 November</td>
<td valign="top" align="left">5G systems based on Beam Division Multiple Access [4]</td>
<td valign="top" align="left">South Korea IT R&#x0026;D department</td>
<td valign="top" align="left">South Korea</td></tr>
<tr>
<td valign="top" align="left">2012 May</td>
<td valign="top" align="left">First 5G System [4]</td>
<td valign="top" align="left">Samsung Electronics</td>
<td valign="top" align="left">South Korea</td></tr>
<tr>
<td valign="top" align="left">2012 October</td>
<td valign="top" align="left">5G Research Center [4]</td>
<td valign="top" align="left">University of Surrey</td>
<td valign="top" align="left">United Kingdom</td></tr>
<tr>
<td valign="top" align="left">2013 November</td>
<td valign="top" align="left">Research on 5G systems [4]</td>
<td valign="top" align="left">Huawei Technologies Co. Ltd</td>
<td valign="top" align="left">China</td></tr>
<tr>
<td valign="top" align="left">2014</td>
<td valign="top" align="left">5G: 2020 and Beyond [5]</td>
<td valign="top" align="left">Center of TeleInFrastruktur, Aalborg University</td>
<td valign="top" align="left">Denmark</td></tr>
</tbody>
</table>
</table-wrap>
</section>
<section class="lev1" id="sec1-3">
<title>1.3 Applications of 5G</title>
<para>Researchers expected 5G technology supports the speed up to 1 Tbit/s, less than 1ms latency, almost 10% network coverage, 1000 times reduction in power consumption, deep indoor coverage, 10 to 100 connected devices, 100x average data rate and so on. The question is what users can do if all promises will be met by 5G technology? Actually the applications of 5G is very much equivalent to achievement of dream. Users could expect unified global standard, network availability anywhere any time, Wireless Fidelity (Wi Fi) global zone and much more. With this great offer from 5G wireless technology people are able to play online games against friends across the world with lots of new experiences, cars can drive automatically, which is a big help to transportation system, health care could be done remotely, a great help to elderly people and video conferencing becomes much more real like you are at the same room with a person who you talk to.</para>
<para>One of the most inspiring application of 5G is Human Bond Communication, proposed in 2015 [7]. Human bond communication is a novel concept that incorporates olfactory, gustatory, and tactile that will allow more expressive and holistic sensory information exchange through communication techniques for more human sentiment centric communication. 5G is the tool to achieve this idea as long as it supports very high data rates. <link linkend="fig1_2">Figure 1.2</link> shows how the concept of Human bond communication could work in the reality.</para>
<para>Visible Light Communications (VLC) is another useful application of 5G for ambient assisted living discussed in 2014 [8]. VLC is an alternative to communication technology using RF wireless spectrum and proposes a concept for integrating VLC to enable intelligent communication infrastructure. The VLC systems can be deployed along with a repeater system for targeted discrete deployment as shown in <link linkend="fig1_3">Figure 1.3</link>.</para>
<para>5G technology can evolve wireless health monitoring system due to its speed, reliability, security and so on. Elderly monitoring system could develop to remote surgery. It is a huge help to people from not very developed countries to receive the same care and medical services as other people. 5G technology will promises us better future in the world more equality and more welfare.</para>
<fig id="fig1_2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 1.2</label>
<caption><title>Human bond communication in real world.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig1_2.jpg" mime-subtype="jpeg"/>
</fig>
<fig id="fig1_3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 1.3</label>
<caption><title>Vlc System Architecture.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig1_3.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev1" id="sec1-4">
<title>1.4 Summary</title>
<para>Mobile wireless communications do not stop growing; the evolution from 1G to 4G has developed the quality of human life dramatically. Lots of dreams came to reality by wireless communication technologies and applications. 5G as the next generation of mobile communication promises to evolve the wireless technology with its speed, reliability and other features. It is expected that, implementation of 5G happens in 2020. Till that time researchers and industry leaders need to carry on different works and exchange data and ideas to achieve the 5G promises. This book presents the latest research results and innovative ideas from both university and industry.</para>
</section>
<section class="lev1" id="sec1-5">
<title>References</title>
<para>[1] Ramjee Prasad, Werner Mohr and Walter Konh&#x00E4;user, &#x201C;Third Generation Mobile Communication Systems&#x201D;, Artech House, 2000. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B1%5D+Ramjee+Prasad%2C+Werner+Mohr+and+Walter+Konh%E4user%2C+%22Third+Generation+Mobile+Communication+Systems%22%2C+Artech+House%2C+2000%2E" target="_blank">Google Scholar</ulink></para>
<para>[2] Shinsuke Hara and Ramjee Prasad, &#x201C;Multicarrier Techniques for 4G Mobile Communications&#x201D;, Artech House, 2003. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B2%5D+Shinsuke+Hara+and+Ramjee+Prasad%2C+%22Multicarrier+Techniques+for+4G+Mobile+Communications%22%2C+Artech+House%2C+2003%2E" target="_blank">Google Scholar</ulink></para>
<para>[3] Ramjee Prasad, Keynote Speech &#x2013; Wireless Innovative System Dynamic Mega Communications (WISDOM), in IEEE CogART 2008, Feb., First IEEE International Workshop on Cognitive Radio and Advanced Spectrum. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B3%5D+Ramjee+Prasad%2C+Keynote+Speech+-+Wireless+Innovative+System+Dynamic+Mega+Communications+%28WISDOM%29%2C+in+IEEE+CogART+2008%2C+Feb%2E%2C+First+IEEE+International+Workshop+on+Cognitive+Radio+and+Advanced+Spectrum%2E" target="_blank">Google Scholar</ulink></para>
<para>[4] 5th Generation Mobile Networks, Wikipedia [online], http://en.wikipedia.org/wiki/5G</para>
<para>[5] Ramjee Prasad, &#x201C;5G: 2020 and Beyond&#x201D;, River Publisher, 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B5%5D+Ramjee+Prasad%2C+%225G%3A+2020+and+Beyond%22%2C+River+Publisher%2C+2014%2E" target="_blank">Google Scholar</ulink></para>
<para>[6] Ramjee Prasad, &#x201C;Global ICT Standadization Forum for India (GISFI) and 5G Standardization&#x201D;, Journal of ICT Standardization, Vol. 1, No. 2, pp. 123&#x2013;136, Nov. 2013.</para>
<para>[7] Ramjee Prasad, &#x201C;Human Bond Communication&#x201D;, Wireless Personal Communication, Vol. 87, No. 3, pp. 619&#x2013;627, 2015. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B7%5D+Ramjee+Prasad%2C+%22Human+Bond+Communication%22%2C+Wireless+Personal+Communication%2C+Vol%2E+87%2C+No%2E+3%2C+pp%2E+619-627%2C+2015%2E" target="_blank">Google Scholar</ulink></para>
<para>[8] Ambuj Kumar, Albena Mihovska, Sofoklis Kyriazakos and Ramjee Prasad,	&#x201C;Visible Light Communications (VLC) for Ambient Assisted Living&#x201D;, Wireless Personal Communication, Vol. 78, No. 3, pp. 1699&#x2013;1717, 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B8%5D+Ambuj+Kumar%2C+Albena+Mihovska%2C+Sofoklis+Kyriazakos+and+Ramjee+Prasad%2C	%22Visible+Light+Communications+%28VLC%29+for+Ambient+Assisted+Living%22%2C+Wireless+Personal+Communication%2C+Vol%2E+78%2C+No%2E+3%2C+pp%2E+1699-1717%2C+2014%2E" target="_blank">Google Scholar</ulink></para>
</section>
<section class="lev1" id="sec1-6">
<title>About the Author</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig1_4.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Maryam Rahimi</emphasis> is currently a Research Assistant at CTIF, Aalborg University. She has studied her Ph.D. at Aalborg University in Wireless Communications and her Master at University Putra Malaysia in Microelectronics. Her focus during Her Ph.D. was at MIMO, signal processing and channel propagation. Maryam has some industrial work experience as an Electronics Engineer. She was involved in different projects and research namely, Design and Development of Radio Frequency (RF) Front-end for a Wireless Receiver or Transceiver, project of ministry science, 2008&#x2013;2009 and Analysis of Measured Channels, Channel Propagation, Cooperative MIMO Capacity, 2010&#x2013;2014. She is author and co-author of more than 15 Journal and Conference papers.</para>
</section>
</chapter>
<chapter class="chapter" id="ch02" label="2" xreflabel="2">
<title>5G: Need for the Hour</title>
<para><emphasis role="strong">Nidhi<sup>1</sup> and Ramjee Prasad<sup>2</sup></emphasis></para>
<para><sup>1</sup>Vishwaniketan, Navi Mumbai, India</para>
<para><sup>2</sup>Center for TeleInfrastruktur (CTIF), Aalborg University, Denmark</para>
<section class="lev1" id="sec2-1">
<title>2.1 Introduction</title>
<para>Current legacy mobile networks in lace, offer plethora of services. Mobile technology is the most ubiquitous technology and has influenced the society more than any other technology. The society has witnessed technological advancements in past years which have dramatically changed the way mobile and wireless communication systems are being used. The appetite for broadband has clearly fuelled the development of mobile cellular networks.</para>
<para>The revolution in mobile communication had always surprised mankind. Within the time span of almost a decade, mobile and wireless communication technology has something big to give. Each succeeding generation has successfully fixed the loopholes of its predecessor and had rooms for the next generation. The 5G is the future of the communication after the success of 1G, 2G, 3G and the recent 4G. 5G is still under developed and fighting for standards which will exist in 2030s and beyond.</para>
<para>Today, almost every telecom company is pulling their socks up to bring 5G standards. 5G networks are considered to be the next generation&#x2019;s &#x201C;Smart&#x201D; networks. It will incorporate intelligence with speed which will help management of billions of connected devices and numerous emerging technologies. 5G networks will emerge as an enabler for connected world. 5G technology aims to enhance the connectivity and mobile broadband. The swift from 3G to 4G has witnessed vast developments. The driving force behind 4G was Speed and it introduced fast video streaming with fast mobile broad bandwidth.</para>
<para>5G will not only enhance the speed but upgrade the technology expansively [1]. Automation services, service-aware networks, context awareness, real-time monitoring services, critical services and many more application areas will dominate the society. 5G networks will introduce new levels intelligence both at device and at network level followed by various emerging disruptive technologies. It will enable devices and network elements to automatically sense the requirements, situation, availability and so on, based on which it accordingly adjust connection speed, degree of latency, alert messages, device power configurations and so on.</para>
<para>The eminent 5G features are broadly higher bandwidths, lower latencies, several times faster data rates, highest degree of scalability, high throughputs, enhanced capacity and so on. It provides opportunities to different technologies which can be exploited to achieve desired level of configurations to meet 5G standards. 5G will be used to meet the requirements which were untethered with the communication generations familiar to us. The application areas and potential 5G target includes zero-outage probability, connecting rural and remote areas, universal internet connectivity, virtual reality, real-time applications and so on.</para>
<para>5G will dominate other mobile networks if it&#x2019;s said standards and features are met. The initiatives and research on 5G is burgeoning at an alarming rate. The race is just not only between the telecom companies now, social media companies like Google and Facebook are also competing for 5G. The race is ramping up to reach gigabit speeds per second, increased capacity and mainly rural connectivity at an economic and affordable rate.</para>
<para>The figures are shocking but there is still a huge percentage of population that is deprived of even basic connectivity. The technologies have grown and developed better in urban scenarios but the rural population is left uncovered from the radar of connectivity. Thus, 5G aims to reduce this gap and the rural and sparsely populated regions to provide basic connectivity along with seamless internet connectivity.</para>
</section>
<section class="lev1" id="sec2-2">
<title>2.2 Mobile Communication Aeon</title>
<para>The wireless mobile communication technologies have gradually evolved to serve the society and meet its basic needs. The technology was analogue when it first came into picture, then came the era of digitization which left its remarkable impact on communication systems and today we have advanced digitized technologies with additional features. There always have been a driving force for the development and deployment of any technology, whether it is analog or the recent evolving &#x201C;Long Term Evolution (LTE)&#x201D; and &#x201C;LTE-Advanced (LTE-A)&#x201D;.</para>
<para>The need for untethered telephony with wireless real-time voice communication has dominated the success of cordless phones, followed by the &#x201C;First Generation of Mobile Communication (1G)&#x201D;. The transition from 1G to &#x201C;Second Generation of Mobile Communication (2G)&#x201D; characterised &#x201C;Short Message Service (SMS)&#x201D; text messaging as its killer application. Gradually with the widespread usage of computers, Internet ruled the technological advancements and filed its candidature as the killer application for the next successor which was &#x201C;Third Generation of Mobile Communication (3G)&#x201D; [2]. The emergence of smartphones that integrated the features of computers with the cellular technology to provide services at fingertips and eventually gave birth to the &#x201C;Fourth Generation of Mobile Communication (4G)&#x201D;, famously known as LTE. The access to faster data speeds and video streaming were the killer applications in 4G. The 4G evolved with all IP services as its key differentiator but raised the unanswered question for power efficiency and low frequency networks in densely deployed environment [3].</para>
<para>With &#x201C;Fifth Generation of Mobile Communication (5G)&#x201D;, mobile operators would create a society offering massive connectivity which will act as an enabler for Machine-to-Machine (M2M) services and the Internet of Things (IoT).</para>
</section>
<section class="lev1" id="sec2-3">
<title>2.3 Wisdom and Its Task Groups Abstract</title>
<para>&#x201C;Wireless Innovative System for Dynamically Operating Mega Communications (WISDOM)&#x201D; is the standard for the 5G mobile communication to be developed in India by 2020. It is a novel technology based on the Cognitive Radio which employs the feature of the opportunistic sensing of the spectrum holes or white spaces. The state of Art technology generations which have already been implemented or are being implemented are 1G, 2G, 3G and 4G. The 4G technology being the latest in the mobile communications serves to provide 100 Mbps of data services. But still the demand for services has not seen saturation. Therefore there is a need to forge a new generation of Mobile Communication which can take care of arising services like wearable or flexible mobile devices, UHD video streaming, navigation and cloud services and many more. WISDOM is proposed to be providing 1Tbits/s of speed at Mm-wave frequencies at short range communication and 300 Mbps of data rate for individual mobile subscribers.</para>
<fig id="fig2_1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 2.1</label>
<caption><title>Mobile wireless technology.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig2_1.jpg" mime-subtype="jpeg"/>
</fig>
<para>&#x201C;Global ICT Standardization Forum for India (GISFI)&#x201D; is an organization is involved with the standardization of the 5G standard [4]. For the standardization it has five existing task groups namely Security and Privacy, Future Radio Networks and 5G, Internet of Things, Cloud and Service Oriented Network and Green ICT. Recently two new task groups are added namely Spectrum Group and Special Interest Group. Each of the above groups has their own tasks and WISDOM presents challenges in each of the task groups. The challenges are to be sequentially met with one task group completing the challenge the other task group takes the next challenge. The <link linkend="fig2_2">Figure 2.2</link> suggests the pathway to 5G technology. The concept of Collaborative Communication, Navigation, Sensing and Services (CONASENSE) and Human Bond Communication (HBC) elaborates the idea for 5G together with WISDOM. CONASENSE suggests that all the operations will be carried out collectively and the information will be shared between the elements as they will inter relate among themselves to give high end services to the users [5] while HBC emphasises that with the increase in bandwidth in the successive generations there exists a window where we can look after the other three senses which are touch, smell and taste [6]. Thus, there are challenges needs to be taken care in the 5G.</para>
<fig id="fig2_2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 2.2</label>
<caption><title>Collective CONASENSE, WISDOM &#x0026; HBC for 5G.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig2_2.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev1" id="sec2-4">
<title>2.4 Towards 5G System</title>
<para>This Section discusses about need for 5G technology as well as different applications such as use cases, self-driven cars and so on.</para>
<section class="lev2" id="sec2-4-1">
<title>2.4.1 Requirements and Drivers</title>
<para>One side where the technology is flourishing at the same time we have sectional population who are still deprived of basic connectivity. With 5G networks expectations are high not only to provide efficient low power network devices, faster data rates, seamless connectivity and integration of existing technologies through 2G, 3G, 4G, and Wi-Fi but also to provide rural connectivity with zero outage probability so that basic connectivity is assured [7].</para>
<para>The fundamental drivers for 5G networks are:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Real-time interactions.</para></listitem>
<listitem><para>Ultra-high definition videos.</para></listitem>
<listitem><para>Critical applications that include medical assistances, traffic management and so on.</para></listitem>
<listitem><para>High quality of service, reliability and security.</para></listitem>
<listitem><para>Billions of heterogeneous devices.</para></listitem>
<listitem><para>Seamless connectivity.</para></listitem>
<listitem><para>Diverse services and new evolved use-cases.</para></listitem>
<listitem><para>Efficient interoperability between available spectrums.</para></listitem>
<listitem><para>Redesigned Air-interface and RAN systems.</para></listitem>
<listitem><para>Enormous network deployments with demanding features like Device-to-Device (D2D), dynamic spectrum sharing, self-backhauling and so on.</para></listitem></itemizedlist>
<para>To fulfill the targets for the 5G wireless networks, the formulated requirements and key components are:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>High Data Transfer Rate both in the Uplink and the downlink</para></listitem>
<listitem><para>Improved Spectral Efficiency</para></listitem>
<listitem><para>Power Management</para></listitem>
<listitem><para>Communication Reliability</para></listitem>
<listitem><para>Network Coverage</para></listitem>
<listitem><para>Network Deployment</para></listitem>
<listitem><para>Network Security</para></listitem>
<listitem><para>Tactile internet</para></listitem>
<listitem><para>Support for high mobility</para></listitem>
<listitem><para>Low Latency (<emphasis>&#60;</emphasis>1 ms)</para></listitem>
<listitem><para>Energy Efficient Network</para></listitem>
<listitem><para>Scalable frequencies to accommodate both low and high data-rate requirements.</para></listitem></itemizedlist>
</section>
<section class="lev2" id="sec2-4-2">
<title>2.4.2 Use-cases</title>
<para>With the transition of LTE and LTE-A systems into the future communication system offering plethora of services has defined several new use-cases. These new use-cases being unique in nature will prove to be the corner stones in the 5G networks as they will decide the success and faster adoption of the emerging 5G and how these potential markets can be exploited to have monetary value. Some of the eminent use-cases are defined as [7, 8].</para>
<section class="lev3" id="sec2-4-2-1">
<title>2.4.2.1 Augmented reality</title>
<para>In augmented reality the digital information is blended with user environment in real-time. It exploits wide variety of user experiences and instances. High bandwidth and low latency will be prime necessity for augmented reality.</para>
</section>
<section class="lev3" id="sec2-4-2-2">
<title>2.4.2.2 Self-driven cars</title>
<para>As a step toward automated traffic control measures, the vehicles will be enabled with communication capabilities and can sense roads and other co-vehicles to resist accidents. Coordinated vehicles with the traffic control system will enhance the speeds and reduce the risks. High bandwidth, fast data handling and responses in fractions of nanoseconds will be its prime requirement.</para>
</section>
<section class="lev3" id="sec2-4-2-3">
<title>2.4.2.3 Video-conferencing and real-time video applications</title>
<para>Real-time video application will emerge as a crucial component in emergency services. It can be used in monitoring applications, security issues, remote medications, identity recognitions and so on. Although 4G systems offer these applications like video conferencing and video monitoring to some extent, 5G networks adds up even more reduced latency and enhanced cloud services.</para>
</section>
<section class="lev3" id="sec2-4-2-4">
<title>2.4.2.4 Machine type communication</title>
<para>5G scenario will witness billions of connected devices by the time it is deployed so it becomes critical to have the devices connected and coordinated so as to have seamless services. Evolving 4G offers connected machine type communication subject to enhancements in 5G for more accessibility, simplified usage, flexibility, faster speeds. D2D communication will become eminent specifically in home application systems which include connected devices like smart meters, automated home appliances, smoke detectors and so on.</para>
</section>
</section>
</section>
<section class="lev1" id="sec2-5">
<title>2.5 How 5G will Change the Society</title>
<para>5G will bring 100 times faster ultra-high speed mobile internet offering speeds more than 10 gigabits per second. This will enables users to download complete movies in 5&#x2013;6 seconds as per Global Tech and telecom companies report. Apart from speed, 5G will connect billions of new heterogeneous wireless devices ranging from smart gadgets to wearable to embedded industrial products apart from phones, tablets, laptops and many more. The digital offset/Response time popularly known as latency is also guaranteed to be minimised up to 1 millisecond, which is roughly 50&#x2013;80 milliseconds in current networks. Reduced latency can enable many critical and sensitive applications. Extremely fast response times will make 5G networks to play vital role in traffic automation and control.</para>
<para>Some of the most transformative changes that will be eminent in 5G scenario are namely Rural Connectivity, Universal Internet Access, Unified Air Interfaces and Affordable Broadband.</para>
<section class="lev2" id="sec2-5-1">
<title>2.5.1 Rural Connectivity</title>
<para>With the deployment of 5G networks, the world will witness complete transformations. Development will be inevitable as cities will grow into smarter mega cities and so do the villages. Thus having a well-connected communication system will serve as the backbone of the network. Rural connectivity is essentially important.</para>
<para>With the current networks data depicts only 70% of the world&#x2019;s population is under the radar of connected society concept. Rest of the population is still deprived of the basic connectivity. Suggested by a survey report, it is said that by 2020, 85 percent of world&#x2019;s population will be under 3G coverage while 60 percent will be under 4G coverage. 5G networks assure to provide low-cost solutions to provide seamless coverage in rural ends. 5G systems play significant role in making ONE connected world [9, 10].</para>
<para>Rural Connectivity can be achieved via Network slicing efficiently. The network slices can be exploited to provide optimized connectivity depending upon use-cases, applications and users. This technology can efficiently be used for resource management. Another efficient technology to achieve Rural Connectivity will be SDN, NFVs and different virtualization technologies. These technologies provide abstracted services and make network flexible and scalable. Virtualized functions gelled with network slicing is used for network orchestration and enhance network coverage. Carrier aggregation can also be used to provide access to user devices.</para>
<para>The prime hindrance in the path of rural connectivity is the lack of potential economic support per square unit. In rural areas another important hindrance is the uneven population distribution. New hardware will be required to provide rural access.</para>
<section class="lev3" id="sec2-5-1-1">
<title>2.5.1.1 Challenges faced by LTE and other technologies</title>
<para>The indispensable challenge to provide rural connectivity via the LTE services was cost. In absence of required economic standard from the smaller and rural carriers, the larger carriers were dominant in the market. Innovative and combination of access technologies are used to provide broadband and voice services. 4G subsystems incorporated smaller cell concept to meet growing demand for data. This serves as a base layer for developments and deployments of 5G rural concepts.</para>
</section>
<section class="lev3" id="sec2-5-1-2">
<title>2.5.1.2 Carrier aggregation for rural connectivity</title>
<para>Carrier aggregation is the technology used to achieve high data rates that increases the transmission bandwidths over single carrier or channel. It is also known as Channel aggregation. It is used in LTE-Advanced networks where it enhanced the transmission bandwidths and bitrates using more than one carrier. LTE-A offers considerably higher data rates than LTE systems. Both Frequency Division Duplexing and Time Division Duplexing support Carrier aggregation for high data throughput. It aggregates, two or more Component Carriers resulting into wider bandwidths. The user end device receives/transmits one or multiple component carriers which may be contiguous and non-contiguous in nature [10].</para>
<para>The access to the user devices can be provided through carrier aggregation of narrow bands. In rural connectivity, mm-waves cannot be used as eNodeB has to provide large coverage thus narrow bands are preferred. <link linkend="fig2_3">Figure 2.3</link> depicts the rural connectivity using carrier aggregation technique.</para>
<para>In remote areas with least population, the carrier aggregation can be done by a single eNodeB but in areas where more than one eNodeB have coverage the carrier aggregation can be provided by using spatial diversity and combining carriers of all the eNodeB. This approach restricts multiple deployments thus significantly reduces infrastructure costs and maintenance.</para>
<para>In Urban areas, particularly in the indoor environments, user maintained access points provide access in Plug and Play manner. Carrier Aggregation is used to provide sound backhaul to such access points resulting into an energy-efficient network.</para>
<fig id="fig2_3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 2.3</label>
<caption><title>5G Rural Areas.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig2_3.jpg" mime-subtype="jpeg"/>
</fig>
</section>
</section>
<section class="lev2" id="sec2-5-2">
<title>2.5.2 Universal Internet Connectivity and Affordable Broadband</title>
<para>Internet has always been there as an active participant in any technical or non-technical, economic, social etc. growth and development. With the technological uplift of mobile communication serving nearly 70&#x2013;80 percent of humanity, Internet can be used as &#x201C;An Enabler to Zero Outage Probability&#x201D;. Universal Internet access can solve coverage problems to nearly 95 percent.</para>
<para>The global standard for 5G networks needs to be formulated at the earliest. The standards include services, co-existing capabilities and most importantly an affordable broadband connectivity of rural communities. The broadband internet connectivity will improve and enhance society both in economic as well as uplift the social and technical standards. Another breakthrough approach to have last-mile connectivity is the Spectrum Sharing, which utilizes white spaces available. The network technologies need to be affordable both in economic as well as availability sense. The spectrum sharing enabled broadband localization and made it available at low costs to support many services like VoIP (voice over IP), video streaming, fast internet access and many more [9, 10].</para>
<para>These emerging technologies are accepted if co-exist with the existing one as an enhancements. The new technologies need to satisfy the mobile ecosystem along with local service providers, existing infrastructures and policies.</para>
</section>
</section>
<section class="lev1" id="sec2-6">
<title>2.6 Emerging Technologies in 5G</title>
<para>The 5G networks will form a service defined platform that regulate its availability, connectivity, system robustness, speed and latency. Major requirements for 5G networks are high bandwidth, improved spectral efficiency, minimal latency and seamless integration of existing technologies. 5G amalgamates the evolving technologies independently with the recent technologies being deployed in LTE and LTE-A systems [3, 7, 8]. The brief description of emerging technologies to achieve the defined requirements are:</para>
<section class="lev2" id="sec2-6-1">
<title>2.6.1 Massive MIMO</title>
<para>MIMO systems are used to enhance the data transfer rates both at device and network levels. It incorporate multiple antennas at both the transmitter and receiver ends to accommodate more data and ultimately leads to improved performance in terms of reliability, spectral efficiency, and improved radiated energy efficiency. The use of large number of antenna results into high throughput, increased spectral efficiency per unit area, enhanced diversity and compensation for the path loss. Massive MIMO allow high resolution beamforming which are useful at higher frequencies. The antenna elements are designed in a manner to use extremely low power [11].</para>
<para>It also mitigates the intracellular interference using linear precoding and detection methods along with diminishing the effects of noise and fading. Massive MIMO systems can be exploited for MAC layer designing without complicated scheduling algorithms.</para>
<para>The major challenge with Massive MIMO system is the amount of Baseband Processing required for the huge amount of antenna usage and the huge number of antennas demand phase synchronization among them. The Massive MIMO systems suffer from pilot contamination from other cells. Effective Channel Estimation/Feedback required incorporated with fast processing algorithms.</para>
</section>
<section class="lev2" id="sec2-6-2">
<title>2.6.2 Network Function Virtualization</title>
<para>&#x201C;Network Function Virtualization (NFV)&#x201D; is an emerging technology that will set standards for technological revolution in 5G networks. It separates service logic from the hardware platform. The network-based services are enabled by software which formerly requires a specialized hardware [3, 12].</para>
<para>It has brought beneficial transformation both in terms of performance as well as in terms of cost. Its functions are irrespective of location and thus results into a flexible and scalable network with enhanced capacity. It is capable of placing the functions either centralized or near the nodes depending upon the use-cases. It incorporates virtualized services which drastically reduces the investments for the devices. However designing network to efficiently enable services and manage orchestration through software is still a challenge.</para>
</section>
<section class="lev2" id="sec2-6-3">
<title>2.6.3 Software Defined Network</title>
<para>Software Defined Radio (SDN) is a continuation to the NFV services. It basically separates the DATA and the CONTROL planes. It abstracts functions into virtual services. It configures load and demand through software to maintain the quality of services (QoS) and consumption time [3].</para>
<para>It offers an alternative to the physical infrastructure to manage network in a simple cost-effective approach. It allows different service deployments using the same physical and logical network infrastructure. It facilitates an Open Standard Network where the direct programmability feature separates the data and control planes controlled by SDN controllers. It also let the operators to configure, manage and optimize network resources and regulate traffic load dynamically [8].</para>
<para>However, IT revolution from existing physical structures to software functions has brought various complexities to manage operator side services. With SDNs, its standardization, unified interface and security are major issues. NFV and SDN are already being developed in LTE networks as the fundamental component.</para>
</section>
<section class="lev2" id="sec2-6-4">
<title>2.6.4 Millimeter-wave</title>
<para>Millimetre-wave (mm-wave) contest as one of the promising solutions to 5G networks. It exploits high frequency band ranging from 20&#x2013;80 GHz. This technology offers more bandwidths to be allocated to render faster deliveries, high-quality video and to increase the communication capacity [5].</para>
<para>The mm-wave differs from other technologies in terms of high propagation loss, directivity, and sensitivity to blockage. It eliminates the severe path loss by exploiting the high beamforming gain from large number of antenna elements [5, 13].</para>
<para>The challenges associated with the mm-wave technology are mainly interference management, IC and system design, spatial reuse and so on. Despite of challenges it has its remarkable applications in deploying small cells and femto cells and in forming wireless backhaul. It offers both co-located and distributed architectures.</para>
</section>
<section class="lev2" id="sec2-6-5">
<title>2.6.5 Cognitive Radio</title>
<para>The Cognitive Radio (CR) is a salvation for the scarce spectrum bands. In CR a transceiver intelligently sense the used/unused channels and selects vacant channel on sharing basis for transmission. It acts as the key enabler for self-organizing networks by increasing frequency reuse, spectral efficiency and energy efficiency. The basic challenges associated with the CR are [11, 14]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis role="underline">Choice of sensing algorithm:</emphasis> There are a number of sensing algorithms. The Energy detection algorithm, the Matched filter algorithm and so on have their own merits and demerits.</para></listitem>
<listitem><para><emphasis role="underline">Concern about latency:</emphasis> 5G aims to provide latency less than 1milliseconds but in CR sensing time and the time to set-up connection is challenging.</para></listitem>
<listitem><para><emphasis role="underline">Handover:</emphasis> The number of handovers in case of CR are predicted to be higher than the licensed spectrum handover and that will increase turnaround time of the network.</para></listitem>
<listitem><para><emphasis role="underline">Routing:</emphasis> the routing mechanism still have rooms for development to ensure security.</para></listitem></itemizedlist>
</section>
<section class="lev2" id="sec2-6-6">
<title>2.6.6 Heterogeneous Networks</title>
<para>Heterogeneous Networks (HetNet) offers macro, pico or femto cell deployments in an ultra-dense manner to provide maximum network coverage and has its applicability at network level. This reduction in the cell size resulted into increased spectral efficiency and reduced transmission power apart from increased network coverage. The femtocells can be deployed as low power cells in residential and enterprise scenarios whereas the picocells considered as high power cells can be used to provide outdoor coverage and in macrocells to fill coverage gaps. It also facilitate integration of various access technologies from legacy systems such 2G, 3G, 4G, Wi-Fi and so on based on coverage area and proposed topology [3, 4].</para>
<para>Small cells are the corner stones in the HetNet deployment resulting into a flexible and scalable network. The major challenges with the HetNets are Intercell Interference, Distributed Interference coordination due to uncoordinated access points, efficient MAC measures, device discovery, connection establishment and most important is the power management. It can be a potential candidate for 5G networks to ensure zero outage probability in terms of network coverage.</para>
</section>
<section class="lev2" id="sec2-6-7">
<title>2.6.7 Internet of Things</title>
<para>The Internet of &#x2018;everything&#x2019; (IoT), demand faster connectivity and huge capacity so that it can connect the world with entities. It has changed the concept of connectivity and access. IoT connects people, appliances, vehicles, service based applications and many more with the digital world. IoT forms a major and very important part in the 5G networks as it will seamlessly connects web of users, devices and services [3, 4, 11].</para>
<para>The existing technologies would not be efficient enough to deploy IoT communication and connectivity which dictates higher reliability, vast capacity, faster broadband, connectivity and many more. The applications namely under IoT are Videos services, Rural and urban applications, diverse device connectivity, control and monitoring applications, active response systems and many more.</para>
</section>
</section>
<section class="lev1" id="sec2-7">
<title>2.7 Conclusions</title>
<para>5G will the revolutionarily transform the way we are communicating today. It will take things a step ahead of our imaginations. Massive connected devices, high bandwidth, energy efficiency; cost effectiveness and so on will be its characteristic feature. 5G systems will play vital role in forming human centric society where everything and anything will be connected to provide service.</para>
<para>To meet up the various new use cases, evolved requirements and service oriented delivery in 5G things need to be transitioned. The transition from legacy systems including the evolving LTE and LTE-A will co-exist in the new scenario to set an interoperable society.</para>
<para>There are many potential candidates to be exploited to fulfil 5G as a scalable, manageable, and flexible network. The key technologies including multicarrier techniques, modulation, coding techniques and so on have to be blended to give desired outcome. The virtualization will play main role in providing seamless access to billions and trillions of connected devices forming a flexible network.</para>
<para>5G claims to be faster than 4G with greater bandwidths, faster downloads critical applications and so on. Its implementation has to overcome barriers like deployment cost, crowed frequency range, integrated devices and so on. The integrated devices at user ends will be one of the major pull back as it involves evolving existing billions 2G, 3G, 4G handsets to 5G compatible devices. An optimized and adaptive network framework accommodating everything from past to future technologies together with trending needs will mark 5G&#x2019;s success.</para>
<para>5G has to face many challenges before it can be adopted into society. Giants of telecom industries are contending to get 5G standards at the earliest. Existing mobile-broadband technologies will provide sound backbone to overall access technologies. Provisioning Rural Connectivity and Universal Internet Access with affordable broadband will be major challenge before 5G becomes mainstream.</para>
</section>
<section class="lev1" id="sec2-8">
<title>Acknowledgement</title>
<para>Authors would like to thank former researchers from Vishwaniketan namely, Sounak Moulik, Nitish Mital and Sandeep Mukherjee for their contributions that are valuable in preparing this chapter.</para>
</section>
<section class="lev1" id="sec2-9">
<title>References</title>
<para>[1] Prasad, Ramjee. 5G: 2020 and Beyond. River Publishers, 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B1%5D+Prasad%2C+Ramjee%2E+5G%3A+2020+and+Beyond%2E+River+Publishers%2C+2014%2E" target="_blank">Google Scholar</ulink></para>
<para>[2] Wunder, Gerhard, et al. &#x201C;5G NOW: non-orthogonal, asynchronous waveforms for future mobile applications.&#x201D; IEEE Communications Magazine (Volume: 52, Issue: 2), 2014: 97&#x2013;105. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B2%5D+Wunder%2C+Gerhard%2C+et+al%2E+%225G+NOW%3A+non-orthogonal%2C+asynchronous+waveforms+for+future+mobile+applications%2E%22+IEEE+Communications+Magazine+%28Volume%3A+52%2C+Issue%3A+2%29%2C+2014%3A+97-105%2E" target="_blank">Google Scholar</ulink></para>
<para>[3] Intelligence, G. S. M. A. &#x201C;Understanding 5G: Perspectives on future technological.&#x201D; London, 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B3%5D+Intelligence%2C+G%2E+S%2E+M%2E+A%2E+%22Understanding+5G%3A+Perspectives+on+future+technological%2E%22+London%2C+2014%2E" target="_blank">Google Scholar</ulink></para>
<para>[4] Ramjee Prasad, Global ICT Standardization &#x0026; 5G Standardization, Volume 1, No. 2, November 2013. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B4%5D+Ramjee+Prasad%2C+Global+ICT+Standardization+%26+5G+Standardization%2C+Volume+1%2C+No%2E+2%2C+November+2013%2E" target="_blank">Google Scholar</ulink></para>
<para>[5] Ernestina Cianca, Mauro De Sanctis, Albena Mihovska, Ramjee Prasad, &#x201C;CONASENSE: Vision, Motivation and Scope,&#x201D; Journal of Communication and Navigation, Sensiing and Services (CONASENSE), vol. 1, no. 1, January 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B5%5D+Ernestina+Cianca%2C+Mauro+De+Sanctis%2C+Albena+Mihovska%2C+Ramjee+Prasad%2C+%22CONASENSE%3A+Vision%2C+Motivation+and+Scope%2C%22+Journal+of+Communication+and+Navigation%2C+Sensiing+and+Services+%28CONASENSE%29%2C+vol%2E+1%2C+no%2E+1%2C+January+2014%2E" target="_blank">Google Scholar</ulink></para>
<para>[6] Ramjee Prasad, &#x201C;Human Bond wireless Communications,&#x201D; in Wireless World research forum, Marrakech, Morocco, May 20 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B6%5D+Ramjee+Prasad%2C+%22Human+Bond+wireless+Communications%2C%22+in+Wireless+World+research+forum%2C+Marrakech%2C+Morocco%2C+May+20+2014%2E" target="_blank">Google Scholar</ulink></para>
<para>[7] Wen, T., and P. Y. Zhu. &#x201C;5G: A technology vision.&#x201D; (2013).</para>
<para>[8] ERICSSON WHITE PAPER, 5G SYSTEMS. http://www.ericsson.com/res/docs/whitepapers/what-is-a-5g-system.pdf, Jan. 2015. Accessed: 2015-05-29. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B8%5D+ERICSSON+WHITE+PAPER%2C+5G+SYSTEMS%2E+http%3A%2F%2Fwww%2Eericsson%2Ecom%2Fres%2Fdocs%2Fwhitepapers%2Fwhat-is-a-5g-system%2Epdf%2C+Jan%2E+2015%2E+Accessed%3A+2015-05-29%2E" target="_blank">Google Scholar</ulink></para>
<para>[9] Boccardi, Federico, et al. &#x201C;Five disruptive technology directions for 5G.&#x201D; Communications Magazine, IEEE 52.2 (2014): 74&#x2013;80. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B9%5D+Boccardi%2C+Federico%2C+et+al%2E+%22Five+disruptive+technology+directions+for+5G%2E%22+Communications+Magazine%2C+IEEE+52%2E2+%282014%29%3A+74-80%2E" target="_blank">Google Scholar</ulink></para>
<para>[10] Shen, Zukang, et al. &#x201C;Overview of 3GPP LTE-advanced carrier aggregation for 4G wireless communications.&#x201D; Communications Magazine, IEEE 50.2 (2012): 122&#x2013;130. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B10%5D+Shen%2C+Zukang%2C+et+al%2E+%22Overview+of+3GPP+LTE-advanced+carrier+aggregation+for+4G+wireless+communications%2E%22+Communications+Magazine%2C+IEEE+50%2E2+%282012%29%3A+122-130%2E" target="_blank">Google Scholar</ulink></para>
<para>[11] Wang, Cheng-Xiang, et al. &#x201C;Cellular architecture and key technologies for 5G wireless communication networks.&#x201D; Communications Magazine, IEEE 52.2 (2014): 122&#x2013;130. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B11%5D+Wang%2C+Cheng-Xiang%2C+et+al%2E+%22Cellular+architecture+and+key+technologies+for+5G+wireless+communication+networks%2E%22+Communications+Magazine%2C+IEEE+52%2E2+%282014%29%3A+122-130%2E" target="_blank">Google Scholar</ulink></para>
<para>[12] Lu, Kejie, et al. &#x201C;Network function virtualization: opportunities and challenges [Guest editorial].&#x201D; Network, IEEE 29.3 (2015): 4&#x2013;5. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B12%5D+Lu%2C+Kejie%2C+et+al%2E+%22Network+function+virtualization%3A+opportunities+and+challenges+%5BGuest+editorial%5D%2E%22+Network%2C+IEEE+29%2E3+%282015%29%3A+4-5%2E" target="_blank">Google Scholar</ulink></para>
<para>[13] Niu, Yong, et al. &#x201C;A survey of millimeter wave communications (mmWave) for 5G: opportunities and challenges.&#x201D; Wireless Networks 21.8 (2015): 2657&#x2013;2676. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B13%5D+Niu%2C+Yong%2C+et+al%2E+%22A+survey+of+millimeter+wave+communications+%28mmWave%29+for+5G%3A+opportunities+and+challenges%2E%22+Wireless+Networks+21%2E8+%282015%29%3A+2657-2676%2E" target="_blank">Google Scholar</ulink></para>
<para>[14] Badoi, Cornelia-Ionela, et al. &#x201C;5G based on cognitive radio.&#x201D; Wireless Personal Communications 57.3 (2011): 441&#x2013;464. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B14%5D+Badoi%2C+Cornelia-Ionela%2C+et+al%2E+%225G+based+on+cognitive+radio%2E%22+Wireless+Personal+Communications+57%2E3+%282011%29%3A+441-464%2E" target="_blank">Google Scholar</ulink></para>
</section>
<section class="lev1" id="sec2-10">
<title>About the Author</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig2_4.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Nidhi</emphasis> is working as research assistant/assistant professor at Vishwaniketan, Navi Mumbai, India since September 2015. She received her Master of Engineering in Electronics &#x0026; Communication in May 2015 and her Bachelor of Technology in Electronics &#x0026; Telecommunication in December 2013. She has done different projects and training, namely: Modelling NAN Implementing IEEE 802.15.4g for Smart Grids, Rourkela Steel Plant vocational training for 30 days in Telecom division, Twitter Feed Display using Arduino Due Microcontroller and Hardware Implementation of Fast Multiplier Architectures Using Verilog HDL. She has presented her research outcome in diverse conferences and seminars such as: keynote speech on &#x201C;5G Security&#x201D; in 4th International IEEE 5G Summit held at IIT Patna &#x2013; March 2016, Special presentation on &#x201C;Security and Privacy&#x201D; in 4th International IEEE 5G Summit held at IIT Patna &#x2013; March 2016, Paper presentation entitled &#x201C;Security Challenges in a 5G Network&#x201D; in IEEE Global Wireless Summit-2015 and tutorial on TV White space for Affordable Broadband Access and Transmission technologies for 5G in IEEE Global Wireless Summit-2015.</para>
</section>
</chapter>
<chapter class="chapter" id="ch03" label="3" xreflabel="3">
<title>Mm-waves Promises and Challenges in Future Wireless Communication: 5G</title>
<para><emphasis role="strong">Maryam Rahimi<sup>1</sup>, Hitesh Singh<sup>2</sup> and Ramjee Prasad<sup>1</sup></emphasis></para>
<para><sup>1</sup>Center for TeleInfrastruktur (CTIF), Aalborg University, Denmark</para>
<para><sup>2</sup>HMR Institute of Technology and Management, Delhi, India</para>
<section class="lev1" id="sec3-1">
<title>3.1 Introduction to Millimeter-waves</title>
<para>Frequency bands ranging from 300 MHz to 3 GHz are used for radio communication devices, such as TV, satellites, Global Positioning System (GPS), and Bluetooth. To solve the issue of the band getting crowded, researchers have proposed millimetre-waves for next-generation wireless systems. These waves include a large amount of unused spectrum from 30 GHz to 100 GHz and thus satisfy high-quality and high-speed broadband networks required by users and companies. Moreover, mm-waves provide high transmission rate, wide spread spectrum, and immunity to interference because of their large bandwidth. However, the use of mm-waves for wireless communications presents several advantages and challenges. This chapter starts with a brief introduction regarding mm-waves and discusses methods for channel propagation and characterization. The advantages of mm-waves in terms of their bandwidth and capacity are also discussed. The chapter ends with presentation of the application of mm-waves.</para>
<para>Millimeter-waves (mm-waves) assigned to the electromagnetic spectrum correspond to radio band frequencies ranging from 30 GHz to 300 GHz, with wavelengths of 10 mm to 1 mm. These waves are longer than infrared waves or X-rays but shorter than radio waves or microwaves. The high frequency of mm-waves and their propagation characteristics motivate researchers to apply mm-waves for various applications, including transmission of large amounts of data, cellular communication, radar, and so on. An overview on different frequency bands based on united state frequency allocations is shown in <link linkend="fig3_1">Figure 3.1</link>.</para>
<fig id="fig3_1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.1</label>
<caption><title>United State frequency allocations and mm-waves spectrum.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig3_1.jpg" mime-subtype="jpeg"/>
</fig>
<para>With its huge amount of available bandwidth, mm-waves are used to transmit large amount of data. Another important advantage of mm-wave propagation is called &#x201C;beamwidth.&#x201D; This parameter is a measure of the process through which transmitted beam spreads out as it gets farther from its point of origin. Radars take advantage of this specific property of mm-waves. The use of millimeter-length microwaves can help engineers to overcome one of the most important challenges in antenna design. For a given antenna size, beamwidth can be decreased by increasing the frequency and thus, the antenna could also be made smaller.</para>
<para>There are certain advantages in using mm-waves; some of them are listed as below:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Numerous spectra are available because of less operations occurring at mm-waves.</para></listitem>
<listitem><para>Frequency reuse could be done in shorter distance because mm-waves exhibit high attenuation in free space.</para></listitem>
<listitem><para>Large antenna arrays for adaptive beamforming can be used for mmwaves.</para></listitem>
<listitem><para>Small wavelengths allow reduction in component size, achieve narrow beamwidths, have high resolution, and so on.</para></listitem>
<listitem><para>Wide bandwidths, which are around main carrier frequencies (35, 94, 140, and 220 GHz), could provide a high information rate capability; wide-band spread spectrum capability, high immunity to jamming and interference, and so on.</para></listitem>
<listitem><para>Extreme high frequencies allow multiple short-distance usages at the same frequency without interfering with one another.</para></listitem></itemizedlist>
<para>Besides, there are several challenges and open issues about mm-waves, which should be addressed in future studies. For example mm-waves suffer from limited communication range because of atmospheric attenuation (10&#x2013;20 km), reduced range capability in adverse weather, poor foliage penetration, particularly in dense green foliage, smaller antennas, which collect less energy in a receiving side, thereby reducing the sensitivity and so on. Signals with shorter-wavelength suffer from absorption by fog, dust, and smoke. For example at 60 GHz (5 mm wavelength) oxygen molecules will interact with electromagnetic radiation and absorb the energy. This reaction indicates that 60 GHz is not a suitable frequency for use in long-range radar or communications, because the oxygen absorbs the electromagnetic radiation and signal. Moreover, given that the 60 GHz signal does not travel far before it loses all its energy, this frequency comes in handy for securing short-range communications, such as local wireless area networks used for portable computers, where hackers should not tap into the data stream.</para>
</section>
<section class="lev1" id="sec3-2">
<title>3.2 Channel Propagation of Millimeter-waves</title>
<para>The channel models at mm-wave are different from other frequency bands because the propagation environment has a different effect on smaller wavelength signals. For example, diffraction tends to be lower due to the reduced Fresnel zone. Scattering is higher due to the increased effective roughness of materials, and penetration losses can be much larger. Mm-wave channel models use common properties as low frequency systems (multi-path delay spread, angle spread, and Doppler shift), with different parameters though (few and clustered paths for example leading to more sparsity in the channel). In addition, several new features are introduced to account for high sensitivity to blockages (buildings, human body, or fingers) and strong differences between line-of-sight and non-line-of-sight propagation conditions. Many opportunities use the mathematical properties of sparsity in channel estimation and equalization and recoder/combiner design.</para>
<para>Mm-waves have a special propagation features because of very small wavelength compared to the size of most of the objects and devices in the environment. Understanding these channel characteristics and extracting proper channel model for mm-waves is fundamental to developing wireless network and also signal processing algorithms for mm-wave transmitter and receivers.</para>
<para>In 1998 a measurement on wideband channel at 60 GHz for indoor scenario was carried out to investigate the behaviour of the mm-waves at that certain frequency [1]. The path loss exponent, Ricean K factor and rms delay spread of the mm-waves were extracted from the measurement results. The results show if the transmitter and receiver antenna are aligned and a strong LOS component is present, the K-factor decreases with distance, down to a certain level. <link linkend="fig3_2">Figure 3.2</link>, shows this effect for the measured data presented in [1]. The results also confirm that the rms delay spread (trms) increases with the distance, also to a certain level.</para>
<para><link linkend="fig3_3">Figure 3.3</link> demonstrates the changes of the level of the wideband average of the received power with distance at 60 GHz frequency measurement, with omni-directional antenna used. The step was 4 cm. As it is seen, the decay with distance is small. This can be explained with the fact that there are many reflections and that they sum up together [2].</para>
<fig id="fig3_2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.2</label>
<caption><title>The changes of the K-factor in LOS situation in the common room (CW: continuous waves, WB: wide band) [1].</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig3_2.jpg" mime-subtype="jpeg"/>
</fig>
<fig id="fig3_3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.3</label>
<caption><title>Wideband average received power in indoor scenario at 60 GHz [2].</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig3_3.jpg" mime-subtype="jpeg"/>
</fig>
<para>More recent work has focused on path loss models for longer range outdoor links to assess the feasibility of mm-wave pico-cellular networks, including measurements in New York City [3, 4]. An interesting outcome of these studies is that, for distances of up to 200 m from a potential low-power base station or access point (similar to cell radii in current micro- and pico-cellular deployments), the distance-based path loss in mm-wave links is no worse than conventional cellular frequencies after compensating for the additional beamforming gain. These findings suggested the mm-wave bands may be viable for pico-cellular deployments and generated considerable interest in mm-wave cellular systems. At the same time, the results also show that, employing mm-waves frequencies in cellular networks is important for directional transmissions, adaptive beamforming, and other MIMO techniques.</para>
<para>Wideband measurements with 200 MHz of bandwidth discovered that city streets do not cause much multipath, as the rms delay spread was observed to be lower than 20 ns [4]. Measurements and models illustrated that path loss in LOS environments behaves almost the same as free space.</para>
<para>Other outdoor measurements in a city street environment at 55 GHz showed that power decreased much more rapidly with distance through narrower streets compared to a direct path or through wide city streets [5].</para>
<para>Samsung has been active in measuring mm-wave channels for future mobile communications. Initial tests were performed at 28 GHz and 40 GHz to study penetration losses for common obstructions such as wood, water, hands, and leaves [6, 7]. In May of 2013, Samsung Electronics announced the company was able to transmit data up to 1.056 Gbps at 28 GHz over distances up to 2 km by using an adaptive array transceiver with multiple antenna elements [8].</para>
<para>The measurement results are also shown that the range of mm-wave communications is limited because of the rain attenuation and atmospheric and molecular absorption characteristics of mm-wave propagation [9, 10]. Moreover, Oxygen absorption at 60 GHz band has a peak that ranges from 15 to 30 dB/km [11]. The channel characterization in [12] presents that the non-line-of-sight (NLOS) channel suffers from higher attenuation than the line-of-sight (LOS) channel.</para>
<para>Moreover, Electromagnetic waves have weak ability to diffract around obstacles, if the size of the obstacles is significantly larger than the wave-length. With a small wavelength, links in the 60 GHz band are sensitive to blockage by obstacles such as human bodies or furniture. It is shown in the literature; blockage by a human decreases the link budget by 20&#x2013;30 dB [13]. Collonge et al. [14] carried out propagation measurements in an indoor environment, while human bodies are moving around, and the results show that the channel is blocked for about 1% or 2% of the time for one to five persons. Considering mobility in human bodies plus constant object shows a huge challenge in mm-waves links. Therefore, maintaining a reliable connection for different applications is a big challenge for mm-wave communications.</para>
</section>
<section class="lev1" id="sec3-3">
<title>3.3 Data Rate and Millimeter-waves</title>
<para>The first generation cellular network was introduced and operated in 1978, which was designed for using basic analog systems for voice communications [15]. During the year 1991, 2G was introduced for providing voice and data services with improved spectrum utilization. It was using digital modulation and time division or code division multiple access. During the period of 2001, 3G was introduced with high speed internal access and improved audio and video streaming capabilities. It uses technologies like wideband code division multiple access (W-CDMA) and high speed packet access (HSPA). The 4G of mobile communication was introduced by ITU in 2011 [15]. The technology used in it was the International Mobile Telecommunication &#x2013; Advanced (IMT-Advanced). Although LTE radio access technology was also used in 4G networks. LTE is an orthogonal frequency division multiplexing (ODFDM) based radio technology which supports up to 20 MHz bandwidth. For enabling high spectrum efficiencies, linked quality improvements and radio pattern adaptation new technology was introduced called Multiple Input Multiple Output (MIMO) [15].</para>
<para>With the tremendous increase of demand for capacity in mobile broadband communications every year, wireless carriers must be prepared for the thousand fold mobile traffic increase in 2020. It forces researchers to find new wireless spectrum which has capabilities to support high data rate demand. The future of mobile communication is 5G technology using mm-waves spectrum [15].</para>
<para>Utilizing mm-waves for 5G wireless technology is a huge step forwards since in the past, mm-wave spectrum was primarily used for satellite communications, long-range point-to-point communications, military applications, and Local Multipoint Distribution Service (LMDS) [16].</para>
<para>The demand for faster and more reliable communication will continue growing at extreme rates, such that annual mobile traffic will exceed 291.8 Exabytes (EB) by 2019 [17]. CISCO has forecasted that mobile data traffic will increase from 2.5 EBs per month in 2014 to 24.3 EBs per month increase in traffic on wireless networks with virtually no latency for content access [8, 19].</para>
<para>The main profit using mm-wave carrier frequencies is the larger spectral channels. For example, at 60 GHz unlicensed mm-wave bands, channels with 2 GHz of bandwidth could be expected. Larger bandwidth channels mean higher data rates, which is the greatest benefit of using mm-waves spectrum in wireless communication.</para>
<para>Besides, massive MIMO is a promising technique for 5G cellular networks. Prior work showed that high throughput can be achieved with a large number of base station antennas through simple signal processing in massive MIMO networks. Massive MIMO promised capability of greatly improving spectral and energy efficiency as well as robustness of the system. In a massive MIMO system, the transmitter and receiver are equipped with a large number of antenna elements (typically tens or even hundreds). Massive MIMO is recommended with mm-waves to overcome challenges of gaining higher data rate. Smaller wavelength captures less energy at antenna due to path loss and so on. Moreover, larger bandwidth means higher noise power and lower Signal to Noise Ratio (SNR). Massive MIMO helps mm-waves to cover those problems and gain higher data rate. Hence, exploiting extra gain from large antenna arrays in the system is promised in massive MIMO.</para>
<para>As a result of the use of large antenna arrays of the transmitter and receiver and combined with radio frequency and mixed signal power constraints, new MIMO communication signal processing techniques are needed. The low complexity transceiver algorithms for wide bandwidths become important. Hence, opportunities abound for exploiting techniques, such as compressed sensing for channel estimation and beamforming.</para>
<para>Precoding and combining is different at mm-wave for three main reasons.</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Parameters have to be configured because of different array. This stage requires different algorithms for finding both analog and digital parameters, and makes the resulting algorithms architecture-dependent.</para></listitem>
<listitem><para>The channel is experienced by the receiver through analog precoding and combining. This feature means that the channel and the analog beamforming are intertwined, which makes estimation of the channel directly a challenge.</para></listitem>
<listitem><para>More sparsity and structure in the channel result from the use of largely close spaced arrays and large bandwidths. This condition provides structures that could be exploited by signal processing algorithms.</para></listitem></itemizedlist>
</section>
<section class="lev1" id="sec3-4">
<title>3.4 Application of Millimeter-waves</title>
<para>The applications of mm-waves are enormous in areas such as Wireless Local and Personal Area Networks (WLAN, WPAN) in the unlicensed band, 5G cellular systems, vehicular area and ad hoc networks, as well as wearable devices.</para>
<para>Exploiting frequency bands from 76&#x2013;81 GHz in different radar ranges for automotive radars has been investigated as one of the major mm-wave applications. WLAN, WPAN, and 5G cellular are being developed with mm-waves. Mm-waves are used in next wireless technology generation to provide high throughput in small cells. There is a huge advantage to utilize mm-waves in MIMO and massive MIMO communication in different applications and scenarios, such as single and multi-user and relay. Vehicle-to-vehicle technology is developing dramatically by using mm-waves, because high data rate for sharing high rate sensors, radar, video, and so on is needed in this technology.</para>
<para>Mm-waves are been used in health science applications for different usages. Wearable devices, such as fitness trackers and smart watches, improve data rate due to usage of mm-waves. The high speed wearable networks provided by mm-waves can connect cell phones, smart watches, augmented reality glasses, and virtual reality headsets [20]. Clearly the future is bright for new applications of mm-waves.</para>
<para><link linkend="fig3_4">Figure 3.4</link> shows how the next generation of wireless technology like 5G could evolve human life in terms of healthcare services and devices. Different sensors gather different information from human&#x2019;s body and data loads to the cloud and been monitored by care givers. The solution and help from medical center could be achieved with no delay. Thanks to mm-waves for their wide band to make this dream to the reality.</para>
<para>Mm-waves have plenty of potential applications as well. For example, with the recent interest and research towards communication between cars and data centers also autonomous vehicles, mm-waves may play a role in providing high data rate connections between cars. This feature is natural because mm-waves already form the backbone of automotive radar, which has been widely deployed and developed over the past 10 years [21]. The combination of mm-wave communication and radar is another interesting application [22]. Mm-waves could enable high rate and low latency connections to clouds that allow remote driving of vehicles through new mm-wave vehicle-to-infrastructure applications.</para>
<fig id="fig3_4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.4</label>
<caption><title>Future of medical services using mm-waves in 5G wireless communication systems.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig3_4.jpg" mime-subtype="jpeg"/>
</fig>
<para><link linkend="fig3_5">Figure 3.5</link> shows an overview on how cars are going to communicate to each other and to the base stations in future. It is clear the network infrastructure should be developed for fast and reliable communication, which is needed in the roads. That is one of the 5G promises with help of mm-waves.</para>
<fig id="fig3_5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 3.5</label>
<caption><title>Vehicle-to-vehicle communication, and vehicle-to base station communication promised by 5G and mm-waves.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig3_5.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev1" id="sec3-5">
<title>3.5 Conclusions</title>
<para>Mm-waves are as old as wireless technology. The first experiment was conducted by Bose in 1895. Since then, use of mm-waves has been limited for many years. However, the rapid development in wireless communication technology has resulted in giving mm-waves more potential to be part of the future of wireless communication specially 5G technology. The greater capacity besides unique characteristics of mm-waves increases the applications of mm-waves. However, many challenges and open issues should be addressed by researchers concerning the new physical technology, software-defined architecture, measurement of network, and so on to promote the development of mm-waves in wireless communication.</para>
</section>
<section class="lev1" id="sec3-6">
<title>References</title>
<para>[1] J. Purwaha, A. Mank, D. Matic, K. Witrusal, and R. Prasad, &#x201C;Wide-Band Channel Measurements at 60 GHz in Indoor Environments,&#x201D; in proc. IEEE benelux 6th Symp. Veh. Technol. Commun, Brussels Belgium, vol. Oct. 1998. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B1%5D+J%2E+Purwaha%2C+A%2E+Mank%2C+D%2E+Matic%2C+K%2E+Witrusal%2C+and+R%2E+Prasad%2C+%22Wide-Band+Channel+Measurements+at+60+GHz+in+Indoor+Environments%2C%22+in+proc%2E+IEEE+benelux+6th+Symp%2E+Veh%2E+Technol%2E+Commun%2C+Brussels+Belgium%2C+vol%2E+Oct%2E+1998%2E" target="_blank">Google Scholar</ulink></para>
<para>[2] D. M. Matic, H. Harada, and R. Prasad, &#x201C;Indoor and outdoor frequency measurements for Mm-waves in the range of 60 GHz,&#x201D; in 48th IEEE Vehicular Technology Conference, 1998. VTC 98, 1998, vol. 1, pp. 567&#x2013;571. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B2%5D+D%2E+M%2E+Matic%2C+H%2E+Harada%2C+and+R%2E+Prasad%2C+%22Indoor+and+outdoor+frequency+measurements+for+Mm-waves+in+the+range+of+60+GHz%2C%22+in+48th+IEEE+Vehicular+Technology+Conference%2C+1998%2E+VTC+98%2C+1998%2C+vol%2E+1%2C+pp%2E+567-571%2E" target="_blank">Google Scholar</ulink></para>
<para>[3] Y. Azar, G. N. Wong, K. Wang, R. Mayzus, J. K. Schulz, H. Zhao, F. Gutierrez, D. Hwang, and T. S. Rappaport, &#x201C;28 GHz propagation measurements for outdoor cellular communications using steerable beam antennas in New York city,&#x201D; in 2013 IEEE International Conference on Communications (ICC), 2013, pp. 5143&#x2013;5147. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B3%5D+Y%2E+Azar%2C+G%2E+N%2E+Wong%2C+K%2E+Wang%2C+R%2E+Mayzus%2C+J%2E+K%2E+Schulz%2C+H%2E+Zhao%2C+F%2E+Gutierrez%2C+D%2E+Hwang%2C+and+T%2E+S%2E+Rappaport%2C+%2228+GHz+propagation+measurements+for+outdoor+cellular+communications+using+steerable+beam+antennas+in+New+York+city%2C%22+in+2013+IEEE+International+Conference+on+Communications+%28ICC%29%2C+2013%2C+pp%2E+5143-5147%2E" target="_blank">Google Scholar</ulink></para>
<para>[4] P. F. M. Smulders and L. M. Correia, &#x201C;Characterisation of propagation in 60 GHz radio channels,&#x201D; Electron. Commun. Eng. J., vol. 9, no. 2, pp. 73&#x2013;80, Apr. 1997. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B4%5D+P%2E+F%2E+M%2E+Smulders+and+L%2E+M%2E+Correia%2C+%22Characterisation+of+propagation+in+60+GHz+radio+channels%2C%22+Electron%2E+Commun%2E+Eng%2E+J%2E%2C+vol%2E+9%2C+no%2E+2%2C+pp%2E+73-80%2C+Apr%2E+1997%2E" target="_blank">Google Scholar</ulink></para>
<para>[5] H. J. Thomas, R. S. Cole, and G. L. Siqueira, &#x201C;An experimental study of the propagation of 55 GHz millimeter waves in an urban mobile radio environment,&#x201D; IEEE Trans. Veh. Technol., vol. 43, no. 1, pp. 140&#x2013;146, Feb. 1994. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B5%5D+H%2E+J%2E+Thomas%2C+R%2E+S%2E+Cole%2C+and+G%2E+L%2E+Siqueira%2C+%22An+experimental+study+of+the+propagation+of+55+GHz+millimeter+waves+in+an+urban+mobile+radio+environment%2C%22+IEEE+Trans%2E+Veh%2E+Technol%2E%2C+vol%2E+43%2C+no%2E+1%2C+pp%2E+140-146%2C+Feb%2E+1994%2E" target="_blank">Google Scholar</ulink></para>
<para>[6] S. Rajagopal, S. Abu-Surra, and M. Malmirchegini, &#x201C;Channel Feasibility for Outdoor Non-Line-of-Sight mm-wave Mobile Communication,&#x201D; in 2012 IEEE Vehicular Technology Conference (VTC Fall), 2012, pp. 1&#x2013;6. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B6%5D+S%2E+Rajagopal%2C+S%2E+Abu-Surra%2C+and+M%2E+Malmirchegini%2C+%22Channel+Feasibility+for+Outdoor+Non-Line-of-Sight+mm-wave+Mobile+Communication%2C%22+in+2012+IEEE+Vehicular+Technology+Conference+%28VTC+Fall%29%2C+2012%2C+pp%2E+1-6%2E" target="_blank">Google Scholar</ulink></para>
<para>[7] H. Zhao, R. Mayzus, S. Sun, M. Samimi, J. K. Schulz, Y. Azar, K. Wang, G. N. Wong, F. Gutierrez, and T. S. Rappaport, &#x201C;28 GHz millimeter-wave cellular communication measurements for reflection and penetration loss in and around buildings in New York city,&#x201D; in 2013 IEEE International Conference on Communications (ICC), 2013, pp. 5163&#x2013;5167. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B7%5D+H%2E+Zhao%2C+R%2E+Mayzus%2C+S%2E+Sun%2C+M%2E+Samimi%2C+J%2E+K%2E+Schulz%2C+Y%2E+Azar%2C+K%2E+Wang%2C+G%2E+N%2E+Wong%2C+F%2E+Gutierrez%2C+and+T%2E+S%2E+Rappaport%2C+%2228+GHz+millimeter-wave+cellular+communication+measurements+for+reflection+and+penetration+loss+in+and+around+buildings+in+New+York+city%2C%22+in+2013+IEEE+International+Conference+on+Communications+%28ICC%29%2C+2013%2C+pp%2E+5163-5167%2E" target="_blank">Google Scholar</ulink></para>
<para>[8] T. S. Rappaport, W. Roh, and K. Cheun, &#x201C;Mobile&#x2019;s millimeter-wave makeover,&#x201D; IEEE Spectr., vol. 51, no. 9, pp. 34&#x2013;58, Sep. 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B8%5D+T%2E+S%2E+Rappaport%2C+W%2E+Roh%2C+and+K%2E+Cheun%2C+%22Mobile%27s+millimeter-wave+makeover%2C%22+IEEE+Spectr%2E%2C+vol%2E+51%2C+no%2E+9%2C+pp%2E+34-58%2C+Sep%2E+2014%2E" target="_blank">Google Scholar</ulink></para>
<para>[9] Z. Qingling and J. Li, &#x201C;Rain Attenuation in Millimeter-wave Ranges,&#x201D; in 2006 7th International Symposium on Antennas, Propagation EM Theory, 2006, pp. 1&#x2013;4. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B9%5D+Z%2E+Qingling+and+J%2E+Li%2C+%22Rain+Attenuation+in+Millimeter-wave+Ranges%2C%22+in+2006+7th+International+Symposium+on+Antennas%2C+Propagation+EM+Theory%2C+2006%2C+pp%2E+1-4%2E" target="_blank">Google Scholar</ulink></para>
<para>[10] R. J. Humpleman and P. A. Watson, &#x201C;Investigation of attenuation by rainfall at 60 GHz,&#x201D; Proc. Inst. Electr. Eng., vol. 125, no. 2, pp. 85&#x2013;91, Feb. 1978. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B10%5D+R%2E+J%2E+Humpleman+and+P%2E+A%2E+Watson%2C+%22Investigation+of+attenuation+by+rainfall+at+60+GHz%2C%22+Proc%2E+Inst%2E+Electr%2E+Eng%2E%2C+vol%2E+125%2C+no%2E+2%2C+pp%2E+85-91%2C+Feb%2E+1978%2E" target="_blank">Google Scholar</ulink></para>
<para>[11] R. C. Daniels and R. W. H. Jr, &#x201C;60 GHz wireless communications: emerging requirements and design recommendations,&#x201D; IEEE Veh. Technol. Mag., vol. 2, no. 3, pp. 41&#x2013;50, Sep. 2007. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B11%5D+R%2E+C%2E+Daniels+and+R%2E+W%2E+H%2E+Jr%2C+%2260+GHz+wireless+communications%3A+emerging+requirements+and+design+recommendations%2C%22+IEEE+Veh%2E+Technol%2E+Mag%2E%2C+vol%2E+2%2C+no%2E+3%2C+pp%2E+41-50%2C+Sep%2E+2007%2E" target="_blank">Google Scholar</ulink></para>
<para>[12] S. Geng, J. Kivinen, X. Zhao, and P. Vainikainen, &#x201C;Millimeter-wave Propagation Channel Characterization for Short-Range Wireless Communications,&#x201D; IEEE Trans. Veh. Technol., vol. 58, no. 1, pp. 3&#x2013;13, Jan. 2009. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B12%5D+S%2E+Geng%2C+J%2E+Kivinen%2C+X%2E+Zhao%2C+and+P%2E+Vainikainen%2C+%22Millimeter-wave+Propagation+Channel+Characterization+for+Short-Range+Wireless+Communications%2C%22+IEEE+Trans%2E+Veh%2E+Technol%2E%2C+vol%2E+58%2C+no%2E+1%2C+pp%2E+3-13%2C+Jan%2E+2009%2E" target="_blank">Google Scholar</ulink></para>
<para>[13] S. Singh, F. Ziliotto, U. Madhow, E. Belding, and M. Rodwell, &#x201C;Blockage and directivity in 60 GHz wireless personal area networks: from cross-layer model to multihop MAC design,&#x201D; IEEE J. Sel. Areas Commun., vol. 27, no. 8, pp. 1400&#x2013;1413, Oct. 2009. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B13%5D+S%2E+Singh%2C+F%2E+Ziliotto%2C+U%2E+Madhow%2C+E%2E+Belding%2C+and+M%2E+Rodwell%2C+%22Blockage+and+directivity+in+60+GHz+wireless+personal+area+networks%3A+from+cross-layer+model+to+multihop+MAC+design%2C%22+IEEE+J%2E+Sel%2E+Areas+Commun%2E%2C+vol%2E+27%2C+no%2E+8%2C+pp%2E+1400-1413%2C+Oct%2E+2009%2E" target="_blank">Google Scholar</ulink></para>
<para>[14] S. Collonge, G. Zaharia, and G. E. Zein, &#x201C;Influence of the human activity on wide-band characteristics of the 60 GHz indoor radio channel,&#x201D; IEEE Trans. Wirel. Commun., vol. 3, no. 6, pp. 2396&#x2013;2406, Nov. 2004. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B14%5D+S%2E+Collonge%2C+G%2E+Zaharia%2C+and+G%2E+E%2E+Zein%2C+%22Influence+of+the+human+activity+on+wide-band+characteristics+of+the+60+GHz+indoor+radio+channel%2C%22+IEEE+Trans%2E+Wirel%2E+Commun%2E%2C+vol%2E+3%2C+no%2E+6%2C+pp%2E+2396-2406%2C+Nov%2E+2004%2E" target="_blank">Google Scholar</ulink></para>
<para>[15] R. Prasad, 5G:2020 and Beyond, vol. 2014. River Publisher. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B15%5D+R%2E+Prasad%2C+5G%3A2020+and+Beyond%2C+vol%2E+2014%2E+River+Publisher%2E" target="_blank">Google Scholar</ulink></para>
<para>[16] S. Y. Seidel and H. W. Arnold, &#x201C;Propagation measurements at 28 GHz to investigate the performance of local multipoint distribution service (LMDS),&#x201D; in IEEE Global Telecommunications Conference, 1995. GLOBECOM&#x2019;95, 1995, vol. 1, pp. 754&#x2013;757. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B16%5D+S%2E+Y%2E+Seidel+and+H%2E+W%2E+Arnold%2C+%22Propagation+measurements+at+28+GHz+to+investigate+the+performance+of+local+multipoint+distribution+service+%28LMDS%29%2C%22+in+IEEE+Global+Telecommunications+Conference%2C+1995%2E+GLOBECOM%2795%2C+1995%2C+vol%2E+1%2C+pp%2E+754-757%2E" target="_blank">Google Scholar</ulink></para>
<para>[17] T. S. Rappaport, &#x201C;Keynote Speech: Millimeter-wave Wireless Communications &#x2013; The Renaissance of Computing and Communications,&#x201D; presented at the IEEE International Conference on Communications (ICC), Sydney, Australia, vol. Jun. 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B17%5D+T%2E+S%2E+Rappaport%2C+%22Keynote+Speech%3A+Millimeter-wave+Wireless+Communications+-+The+Renaissance+of+Computing+and+Communications%2C%22+presented+at+the+IEEE+International+Conference+on+Communications+%28ICC%29%2C+Sydney%2C+Australia%2C+vol%2E+Jun%2E+2014%2E" target="_blank">Google Scholar</ulink></para>
<para>[18] &#x201C;Cisco visual networking index: Mobile data traffic forecast update, 2013&#x2013;2018,&#x201D; presented at the CISCO, San Jose, CA, USA, vol. Feb. 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B18%5D+%22Cisco+visual+networking+index%3A+Mobile+data+traffic+forecast+update%2C+2013-2018%2C%22+presented+at+the+CISCO%2C+San+Jose%2C+CA%2C+USA%2C+vol%2E+Feb%2E+2014%2E" target="_blank">Google Scholar</ulink></para>
<para>[19] &#x201C;FutureWorks NSN White Paper: Looking ahead to 5G,&#x201D; presented at the Nokia Solutions and Networks, The Netherlands, vol. Dec. 2013.</para>
<para>[20] Pyattaev, K. Johnsson, S. Andreev, and Y. Koucheryavy, &#x201C;Communication challenges in high-density deployments of wearable wireless devices,&#x201D; IEEE Wirel. Commun., vol. 22, no. 1, pp. 12&#x2013;18, Feb. 2015. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B20%5D+Pyattaev%2C+K%2E+Johnsson%2C+S%2E+Andreev%2C+and+Y%2E+Koucheryavy%2C+%22Communication+challenges+in+high-density+deployments+of+wearable+wireless+devices%2C%22+IEEE+Wirel%2E+Commun%2E%2C+vol%2E+22%2C+no%2E+1%2C+pp%2E+12-18%2C+Feb%2E+2015%2E" target="_blank">Google Scholar</ulink></para>
<para>[21] H. H. Meinel, &#x201C;Automotive radar: From its origins to future directions,&#x201D; Microw. J., vol. 2013, no. 9, pp. 24&#x2013;28. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B21%5D+H%2E+H%2E+Meinel%2C+%22Automotive+radar%3A+From+its+origins+to+future+directions%2C%22+Microw%2E+J%2E%2C+vol%2E+2013%2C+no%2E+9%2C+pp%2E+24-28%2E" target="_blank">Google Scholar</ulink></para>
<para>[22] C. Sturm and W. Wiesbeck, &#x201C;Waveform Design and Signal Processing Aspects for Fusion of Wireless Communications and Radar Sensing,&#x201D; Proc. IEEE, vol. 99, no. 7, pp. 1236&#x2013;1259, Jul. 2011. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B22%5D+C%2E+Sturm+and+W%2E+Wiesbeck%2C+%22Waveform+Design+and+Signal+Processing+Aspects+for+Fusion+of+Wireless+Communications+and+Radar+Sensing%2C%22+Proc%2E+IEEE%2C+vol%2E+99%2C+no%2E+7%2C+pp%2E+1236-1259%2C+Jul%2E+2011%2E" target="_blank">Google Scholar</ulink></para>
</section>
<section class="lev1" id="sec3-7">
<title>About the Author</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig3_6.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Hitesh Singh</emphasis> is presently working as Assistant Professor in HMR Institute of Technology and Management, Delhi affiliated to Guru Gobind Singh Indraprastha University, Delhi. He has done his Master in computer Science at Indraprastha university, Delhi. Hitesh was involved in several projects and research and he has more than 12 International and National publications. He is currently pursuing his Ph.D. at the Technical University of Sofia, Bulgaria under GISFI program.</para>
</section>
</chapter>
<chapter class="chapter" id="ch04" label="4" xreflabel="4">
<title>The Fog over the Meadow and the Cloud in the Blue Sky</title>
<para><emphasis role="strong">Rajarshi Sanyal</emphasis></para>
<para>Belgacom International Carrier Services, Belgium</para>
<section class="lev1" id="sec4-1">
<title>4.1 Introduction</title>
<para>It is said that &#x2018;Change Is Tough But Constant Evolution Is Invigorating&#x2019;. Last few years, we have witnessed various nuances of telecom network architecture during its continuous evolution trail. The network moved from pure premise based deployments towards the implementation of virtualised instances on the cloud. Technologies like SDN and NFV were introduced which fuelled this network metamorphosis. The evolution to a virtualised network framework had benefited the network operators by reducing the capital expenditure, streamlining the operational processes, reducing the time to deploy new functionalities and rapidly scale up the network capacity. Typically in such scenarios, the network operations are spawned in the cloud environment, the physical location of the clouds are apparently not important anymore. This is indeed one of the selling points of the cloud based technologies. However from a purist&#x2019;s standpoint, this may not be spot-on. The Cloud that we are talking of is not certainly thin mist. The network functions require physical processing resources to operate and the cloud has to fuel its needs. These virtual entities will have to be hosted in real physical machines located in some data centers. The distance between the user devices and the virtual machines have an impact on the data latency and the spatial dimension of the backhaul loop, which determines the overall quality rendered for the given service. The regulatory requirements of certain countries can restrict the user data traffic flow within its boundaries. This makes it overtly important for us to comprehend where the virtual environment is actually hosted, within the country or outside its peripheries. In spite of these constrains, a cloud based mobile network meant for human users appears to be tenable. In fact, it has many &#x2018;pros&#x2019; compared to the COTS (Commercial Off-The-Shelve) installations. However for the machine to machine devices, those simple choices cannot be made. Some machines may need brisker data processing. Some machine may invoke large volumes of queries which can contribute to an avalanche at the backbone network. The centralised network environment in the cloud may be less responsive to such massive computing requests. It is imperative that a part of the processing functions needs to be brought closer to these machines. The telecom researchers thus proposed to lug the cloud from the sky to the ground to mitigate some of these concerns. The cloud morphed into the fog, thus the name &#x2018;fog networks&#x2019;.</para>
<para>The Fog network concept was coined by Cisco [1] and is well within the scope of the 5G network paradigm. Recently a new industry group, The OpenFog Consortium, was formed to define and promote fog computing. The consortium, founded by ARM, Cisco, Dell, Intel, Microsoft and Princeton University in November 2015, seeks to create an architecture and approach to fog, edge, and distributed computing.</para>
<para>FogNets connect a plethora of devices like wearable devices, connected vehicles, sensors, actuators etc. It provides access to internet via aggregate router and also empowers the devices to communicate amongst themselves in a collaborative fashion. These devices form many &#x201C;local clouds&#x201D; at the edge of the network. Contrary to the notion of cloud computing, the fog computing renders capabilities at edge entities with an endeavour to localise computing and relieve the cloud core from the prosaic tasks of repetitive data processing related to control signalling, monitoring, optimisation or even social networking. The edge can also have storage capabilities which is utilised to store chunks of data which can be consolidated to compile the big data. The delta tasks that cannot be accomplished by edge entities are handled by the cloud.</para>
<para>This chapter is organized in 5 sections including introduction (4.1). Section 4.2 provides some background on Fog network with some practical examples. Section 4.3 discusses the overall architecture consolidating fog and the cloud entities Section 4.4 sets out the attributes of the fog. Section 5.5 concludes.</para>
</section>
<section class="lev1" id="sec4-2">
<title>4.2 Background and Examples</title>
<para>Imagine a scenario where a group of college students are travelling together. We see them bantering, sharing pictures and other media files amongst themselves, as well with friends outside their group via social networking platform. The physical environment hosting the social media application may be thousands of kilometres away. The data from the individual smartphones traverses thousands of kilometres every time to reach the central application server which determines the identity and location of the target device. If the originator and the target are in vicinity as in our case, then the trajectory of the data packets becomes a big loop. The traffic trombones via the central server and arrives back at the target device which may be just a meter away. When we have such millions of users exchanging peer to peer information, the backbone traffic and the computing resources expended at the core can be substantial. The pertinent question here is, why cannot the devices communicate with each other at the edges without involving the core? We cannot do it today because most of the device clients are not designed presently to take up a share of the processing tasks done at the cloud core. They are also not fabricated to actuate collaborative communication amongst them. The core applications at present are also not modelled to dispel some processing tasks to the edges, implying the mobile devices.</para>
<para>With the advancement of semiconductor technologies, the edge devices are becoming more intelligent. The network ecosystem is slowly adapting to empower the edge devices to take up some processing load to alleviate the burden of the core, and to make the application more intuitive, real time and responsive. Here are some practical illustrations.</para>
<section class="lev2" id="sec4-2-1">
<title>4.2.1 Uber Fog Network</title>
<para>As per the traditional approach the Uber smartphone application of the Uber driver communicates with the Uber backend to continuously update the trip information. The primary server collates the data and replicates across the hot backup servers in other data centres. In case the primary server breaks, the secondary server takes over. As the primary server continuously communicates with the Uber mobile devices and simultaneously needs to update the secondary servers, we envisage substantial data communication between all these elements. Apart from the backhaul and front haul load, we also need to understand that the computing power required in the core to choreograph these processes is substantial. The system is also subject to latency and we need to keep a watchful eye there to avoid timeouts of data transactions.</para>
<para>To circumvent this situation and optimise the ecosystem, Uber has come up with a unique proposition, i.e., to empower the devices to trigger the computing at the edge and diminish the processing burden of the core network (<link linkend="fig4_1">Figure 4.1</link>). The device application has been redesigned. It consumes additional computing resources and memory of the smartphones of the cab drivers. The trip data is locally stored in the device itself which takes decisions unilaterally without invoking any triggers in real time to the core network. The device is also used as a storage device where moving vector information and network mutation information can be stored temporarily. Uber could eventually demonstrate that even if the whole core network is out of service, or isolated from the cluster of end devices, the network operations can still run as normal and unperturbed, thanks to the collaborative edge computing realised by the mobile device processor and its memory. We must acknowledge that this practical demonstration is a giant step towards establishing the fact that the fog concept can indeed work.</para>
</section>
<section class="lev2" id="sec4-2-2">
<title>4.2.2 IFTTT and Google OnHub</title>
<para>Another novel approach of fog computing is the IFTTT (If This Then That) technology which is presently supported by Google. With this technology, users can orchestrate processes within the mobile device across various applications residing on the handset to trigger a user defined automation task. Before IFTTT was born, this was done at the core network by a mobile service delivery platform which used to house a process choreographer to actuate network driven automation tasks achieving the alike results. With IFTTT, this automation process has been pushed towards the edge. Not only can IFTTT work within a device, but can also help to create a fog network at the edge via an intelligent router with some computing capabilities. Once such example is Google&#x2019;s Onhub which supports IFTTT and help in connecting a plethora of devices at the edge like smartphones, Internet of Things.</para>
<fig id="fig4_1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 4.1</label>
<caption><title>Collaborative computing at the edge in Uber network.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig4_1.jpg" mime-subtype="jpeg"/>
</fig>
<para>IFTTT can be triggered when devices connect and disconnect from OnHub (<link linkend="fig4_2">Figure 4.2</link>). The user can program any custom built logic, termed as recipe, over a smart interface in their device. It lets users manage and prioritize Wi-Fi to connected devices through an app. Some examples are provided by Onhub on what we can do with it:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Build a recipe that turns your WiFi Bulb wirelessly. The lightbulb disconnects automatically when you leave your room, actually when your smartphone disconnects from WiFi network.</para></listitem></itemizedlist>
<fig id="fig4_2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 4.2</label>
<caption><title>High level representation of the Google OnHub.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig4_2.jpg" mime-subtype="jpeg"/>
</fig>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Trigger IFTTT to send you an intimation by email or SMS when your child gets home from school and his/her phone connects to the home&#x2019;s OnHub network.</para></listitem>
<listitem><para>Automatically prioritize Wi-Fi to your Chromecast over other existing wifi device connections, when the Chromecast connects to your OnHub network after you plug it in.</para></listitem></itemizedlist>
</section>
<section class="lev2" id="sec4-2-3">
<title>4.2.3 Smartgrid</title>
<para>The Power Smart Grid is not a new concept. It aims to pilot the control information flow between the power plants more efficiently, optimizes power distributions, diagonizes and isolates circuit failures, scale up, scale down power level dynamically, actuate smart power distribution etc. The &#x2018;As is&#x2019; power grid is modelled to fetch information from the edge actuators and sensors towards the central cloud to pivot the processing tasks. With the surge in the power requirements, the smart grid network architecture is becoming more intricate. Issues like data privacy, scalability, high availability and latency are more potent than ever. The existing smartgrid model needs to adapt to fit in the new environment. The smartgrid designers are looking towards the fog. In South America, SkyWave IDP satellite terminals control and monitor Smart Grid applications. The SkyWave M2M devices have inbuilt capability to actuate analytics at the edges. The thresholds and filters are implemented at these edge devices so that they can preprocess and filter out the relevant information to be sent to the cloud core for group processing. Hence only the critical messages, like changes in current, voltage and power factor information are conveyed to the core network.</para>
</section>
<section class="lev2" id="sec4-2-4">
<title>4.2.4 Edge Analytics</title>
<para>An American petroleum company had to abstract essential information like valve pressure, volume of extracted gas, general health of the machines, etc. Earlier, the actuators were disseminating information towards the central application server in the cloud, where the big data was post-processed subsequently for analytics. Latter on, the analytical capabilities were added at the edge, and only vital data like instantaneous high and low pressure and flow, incremental/decremental gas volume, out of range values were being sent wirelessly to the cloud. The company could increase the production by 30 per cent.</para>
<para>Apart from the above examples there are many other uses cases. Few which comes to my mind are smart cities, rail safety systems connected cars, connected wearables, smart traffic lights, sensors for military applications, aircraft sensor network, Virtual Radio Access Networks etc.</para>
</section>
</section>
<section class="lev1" id="sec4-3">
<title>4.3 Fog Network Architecture and Its Attributes</title>
<para>Fog network comprises of dense computational virtual structures that provide computing, storage, and networking services at the network&#x2019;s edge. Some of the characteristics of such platforms include low latency, location awareness and operability in wireless hetnet access environment. We shall provide more details on the attributes of the Fog network later in this chapter.</para>
<para>Cisco&#x2019;s impression of Fog Network architecture is in <link linkend="fig4_3">Figure 4.3</link>.</para>
<para>As evident from <link linkend="fig4_3">Figure 4.3</link>, the IoTs and M2M devices will be attached to the fog nodes. The application which governs the fog data services can be run on a separate platform at the edge or can as well run within the fog nodes in a distributed fashion. The data is analysed and sieved by the fog application, and only essential data is transferred to the cloud. The temporary data is retained at the fog layer else which can be used for daily operational work without communicating with the cloud.</para>
<para>The latency drop off is the key to Fog Networks. <link linkend="fig4_4">Figure 4.4</link> provides a landscape of the latency requirements of Business Intelligence and analytics pertaining to the fog and the cloud network in purview of a typical operation business, say where data is collected from actuators of a petroleum factory.</para>
<para>The fog network directly gathers data from the sensors and the actuators and executes application specific analytical data in real time. The typical time to process the M2M (only) data is in milliseconds. As explained earlier, fog network has memory and retains the generic data. Only critical data is conveyed towards the cloud network for centralised processing and book keeping.</para>
<para>As we go up in the analytics chain (as in the diagram), we observe that the time to process the analytical data increases exponentially. It is also interesting to see that the more we move towards the cloud zone, the use cases are no more only confined to M2M, but it find its use in HMI (Human to Machine Interface).</para>
<section class="lev2" id="sec4-3-1">
<title>4.3.1 Fog Network in the Context of 5G</title>
<para>The scope for 5G network does not confine itself in just providing superfast connectivity to users. The scope extrapolates to broader domains. Some of them (though not exhaustive) are as follows:</para>
<fig id="fig4_3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 4.3</label>
<caption><title>Fog network Architecture.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig4_3.jpg" mime-subtype="jpeg"/>
</fig>
<fig id="fig4_4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 4.4</label>
<caption><title>The latency w.r.t the analytics chain.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig4_4.jpg" mime-subtype="jpeg"/>
</fig>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Integration of the service logic and containers in the network that processes the big data.</para></listitem>
<listitem><para>Aggregation of the data feed from the actuators that are linked to varied industrial implementations.</para></listitem>
<listitem><para>Cater traffic from human users.</para></listitem>
<listitem><para>Comply with the 5G latency requirements.</para></listitem></itemizedlist>
<para>5G vision for ultra-low latency as envisioned by Ericsson is &#x201C;To support such latency-critical applications, 5G should allow for an application end-to-end latency of 1 ms or less&#x201D;. Nokia 5G research group has spoken about &#x201C;Zero latency gigabit experience&#x201D; for its 5G networks.</para>
<para>Fog network will facilitate this by proposing edge computing in three network domains.</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis role="strong">Fog Computing</emphasis>: Assign computing and storage resources at the edge, filter and parse critical data to cloud to reduce backhaul traffic and processing.</para></listitem>
<listitem><para><emphasis role="strong">Fog Mesh Network</emphasis>: Utilize a swarm of Collaborative device clients at the edges to perform some operations that presently happen in cloud.</para></listitem>
<listitem><para><emphasis role="strong">Fog Radio Access Network (F-RAN)</emphasis>: Realise real-time Collaborative Radio Signal Processing, Collaborative Radio Resource Management at the edge devices, flexibility to scale up and scale down the access network capacity based on traffic conditions, cognitive radio capabilities that renders the ability to adjust the radio parameters based on traffic conditions and radio environment, and diminish fronthaul payload and processing requirements at the LTE Core.</para></listitem></itemizedlist>
<para>The fog network and the cloud network landscape in purview of 5G paradigm is captured in <link linkend="fig4_5">Figure 4.5</link>. The 5G LTE-A mobile network core in conjunction with the virtual RAN (comprising of virtual BS pool and RRUs) shapes up the 5 network [2]. The virtual BS pool conveys are user traffic to the core network via backhaul links. The voice and messaging network service are rendered by the IMS core hosted on the cloud platform. This network is designed to serve human users.</para>
<para>Mobile network was initially not designed to serve the machines. Following the evolution trail from 2G to 5G, we witness that the basic network processes, for example location management, addressing, session setup, almost remain the same. The Fog network is typically designed to cater M2M devices. The network is physically isolated from the mobile core network just because the network characteristics are very different due to the machine type usage. The network design and modelling challenges are different here. The traffic patterns we see in some M2M scenario (non-exhaustive) are as follows.</para>
<fig id="fig4_5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 4.5</label>
<caption><title>Fog and cloud in 5G network paradigm.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig4_5.jpg" mime-subtype="jpeg"/>
</fig>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis role="strong">Electric meters</emphasis>: Small amount of data, few times a year, no mobility, large number of devices.</para></listitem>
<listitem><para><emphasis role="strong">Health</emphasis>: Small amount of data, limited mobility, high quality.</para></listitem>
<listitem><para><emphasis role="strong">Medical imaging</emphasis>: Limited usage but high data volume, needs reliable data channel for quality.</para></listitem>
<listitem><para><emphasis role="strong">SOS</emphasis>: Once in lifetime communication but needs very reliable channel.</para></listitem>
<listitem><para><emphasis role="strong">ATMs/POS</emphasis>: Large numbers, small volumes, bursty traffic secure channel.</para></listitem>
<listitem><para><emphasis role="strong">Vehicular communication</emphasis>: High number of devices, high mobility, low but constant data rate.</para></listitem></itemizedlist>
<para>Some of the challenges that we face today in sharing the existing mobile network for both human users and M2M are as follows.</para>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem><para>Lot of devices need to remain attached to network, but remains mostly in idle mode.</para></listitem>
<listitem><para>Many devices can initiate network attach exactly as same time creating congestion at HLR/HSS.</para></listitem>
<listitem><para>Many devices can initiate GTP context activation at same instance creating congestion at GGSN/PGW/PCRF/OCS.</para></listitem>
<listitem><para>Network congestion due to M2M affects human users.</para></listitem>
<listitem><para>Hung GTP sessions: GTP sessions not gracefully terminated by M2Ms while new GTP sessions are initiated <emphasis>&#x2192;</emphasis> leads to capacity loss at GGSN/PGW.</para></listitem>
<listitem><para>Not properly configured periodic location update timer in M2M device which leads to increase in Location updates.</para></listitem>
<listitem><para>Current device addressing scheme may not be able to fuel growth.</para></listitem>
<listitem><para>Support of BYOD (Bring Your Own Device): Device behaviour can vary widely.</para></listitem>
<listitem><para>Security threats pertaining to M2M can be different from human users.</para></listitem></orderedlist><para>Any surge in M2M traffic can overwhelm the whole mobile network and impact the human users, had we not realised a standalone network for M2M traffic. The access method implemented for M2M can be very different from a 5G cellular networks. Technologies like LoRa (Low power high Range) [2] have been brought in to address the requirements of M2M traffic. Another new technology based on physical layer addressing and mobility management SMNAT (Smart Mobile Network Access Topology) [3] is ideal for the M2M type implementation. The Fog computing platform is connected to the Fog Edge network serving the edge actuators through the fronthaul pipe. LTE-M (LTE for machines) is also a good candidate for M2M access.</para>
<para>The man and machine also need to communicate and interoperate. A central network orchestrator can play the role to choreograph the processes across the two kinds of environments.</para>
</section>
<section class="lev2" id="sec4-3-2">
<title>4.3.2 Fog Network Attributes</title>
<para>The key attributes of Fog network are as follows:</para>
<para><emphasis role="strong">Cognizance of Location</emphasis>: The Fog network brings in location awareness, and holds the logic for processing the meta data at the edges in accordance to the location of the diminutive cloud. For example, in gaming sort of applications, the latency requirements achieved depends on the physical location of the fog network which is in vicinity of the gaming equipment.</para>
<para><emphasis role="strong">Heterogeneous operational environment</emphasis>: The fog devices can come in various shapes, sizes and behaviour. There is not yet a common framework that binds them together. So interoperability, federation and backward compatibility are some of the areas where the fog researchers have focus. The few companies which are in the fog consortium are attempting to bridge these differences.</para>
<para><emphasis role="strong">Hetergeneous Wireless access</emphasis>: The device can acquire any kind of network, be it cellular, LoRa, WiFi, Zigbee etc. The fog network should harmonise the traffic before feeding the data to the fog computing platform by the fronthaul channel.</para>
<para><emphasis role="strong">Device Mobility</emphasis>: The devices can be dynamic in nature, cross countries or continents. The technologies like LoRa support mobility in a limited way. To attempt ubiquitous mobility, more futuristic technology like SMNAT can be adopted.</para>
<para><emphasis role="strong">Real Time Analytics</emphasis>: The Fog Edge network should be able to perform analytics in real time so as to impart only pertinent information to the cloud in an attempt to diminish the backhaul load and processing weight at the core network.</para>
</section>
</section>
<section class="lev1" id="sec4-4">
<title>4.4 Summary and Conclusions</title>
<para>Cloud computing and fog computing play a complementary role in propelling the evolution of the network ecosystem catering the needs of smartphones and M2Ms. The norms widely vary across the two worlds, i.e., man and the machine, and so is their traffic pattern and data distribution. So while we aim to achieve a degree of seclusion between these two network kinds, it is also imperative that interoperability needs to be attained between them. The Fog edge network initiates local data analysis and picks up critical data bearing the changes to the rules of the game. This delta information is transferred towards the central cloud to reduce traffic and processing there. New generation of interfaces are coming up, new architectural choices needs to be addressed. This includes billing framework, security models, operational and analytics processes, session management etc. It is time to think more about our smart watches and the connected coffee machine rather than confining our thought processes only to cloud, NFV, SDN and virtualization. Fog network bears the potential to bring closer the three worlds, the man, the machines and the cloud network.</para>
</section>
<section class="lev1" id="sec4-5">
<title>References</title>
<para>[1] Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are: CISCO Whitepaper, 2015. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B1%5D+Fog+Computing+and+the+Internet+of+Things%3A+Extend+the+Cloud+to+Where+the+Things+Are%3A+CISCO+Whitepaper%2C+2015%2E" target="_blank">Google Scholar</ulink></para>
<para>[2] Shao-Chou Hung; Hsiang Hsu; Shao-Yu Lien; Kwang-Cheng Chen, Architecture Harmonization Between Cloud Radio Access Networks and Fog Networks, Access IEEE, 2015. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B2%5D+Shao-Chou+Hung%3B+Hsiang+Hsu%3B+Shao-Yu+Lien%3B+Kwang-Cheng+Chen%2C+Architecture+Harmonization+Between+Cloud+Radio+Access+Networks+and+Fog+Networks%2C+Access+IEEE%2C+2015%2E" target="_blank">Google Scholar</ulink></para>
<para>[3] A technical overview of LoRa<superscript>&#x00AE;</superscript> and LoRaWAN&#x2122;, Technical Marketing Workgroup 1.0, LoRa Alliance.</para>
<para>[4] Sanyal Rajarshi, Prasad Ramjee, Enabling Cellular Device to Device Data Exchange on WISDOM 5G by Actuating Cooperative Communication Based on SMNAT, Journal of International Journal of Interdisciplinary Telecommunications and Networking, Volume 6 Issue 3, July 2014 Pages 37&#x2013;59, IGI Publishing Hershey. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B4%5D+Sanyal+Rajarshi%2C+Prasad+Ramjee%2C+Enabling+Cellular+Device+to+Device+Data+Exchange+on+WISDOM+5G+by+Actuating+Cooperative+Communication+Based+on+SMNAT%2C+Journal+of+International+Journal+of+Interdisciplinary+Telecommunications+and+Networking%2C+Volume+6+Issue+3%2C+July+2014+Pages+37-59%2C+IGI+Publishing+Hershey%2E" target="_blank">Google Scholar</ulink></para>
</section>
<section class="lev1" id="sec4-6">
<title>About the Author</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig4_6.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Rajarshi Sanyal</emphasis> is telecommunication engineer with 19 years of industry experience in the field of mobile communication. He started his career as a telecom engineer in Hutchison in the mobile switching domain in India and later on worked on R&#x0026;D projects on SS7 and CTI applications. He was involved in R&#x0026;D in a French Telecom startup in the role of a Domain Specialist &#x2013; Telecom focusing on the development of new solutions related to CAMEL, SMSCs, Mobile Service Nodes and Mobile Payment solutions etc. He was associated with Reliance Communications as Engineering Manager on Mobile Core Networks and later on as Managing Consultant at IBM responsible for designing the Service Delivery Platform Solutions for Mobile Networks. He is presently working as a Network Architect (Voice and Mobile Data core network engineering) at BICS (Belgacom International Carrier Services) at Brussels, Belgium. BICS is one of the largest wholesale voice, signaling and data carriers worldwide. For the last 8 years at BICS, he had been spearheading tier one projects based on roaming hubs, GTP solutions, LTE instant roaming, Voice over LTE, WebRTC, M2M and IoT technologies.</para>
<para>He holds several EU, US and Indian patents in the field of Mobile and Computer communications. He has published 24 papers in international telecom journals and conference proceedings in US, Europe and Far East. He holds a Ph.D. from Aalborg University, Denmark. In his thesis he proposed a new generation multiple access technology based on intelligent physical layer to conceive a smart mobile network and realize device to device communication within the framework of 5G mobile network architecture.</para>
</section>
</chapter>
<chapter class="chapter" id="ch05" label="5" xreflabel="5">
<title>Adding a New Dimension to Customer Experience, the Reality of 6th Sense &#x2013; 5G and Beyond</title>
<para><emphasis role="strong">Jeevarathinam Ravikumar<sup>1</sup> and Ramjee Prasad<sup>2</sup></emphasis></para>
<para><sup>1</sup>Stanley Advanced Technology Solutions (SATS), UK</para>
<para><sup>2</sup>Center for TeleInfrastruktur (CTIF), Aalborg University, Denmark</para>
<section class="lev1" id="sec5-1">
<title>5.1 Introduction</title>
<para>The evolution of 2G to 3G and now the current 4G technologies have changed the user&#x2019;s expectations. The demand for providing the best user experience is ever increasing. The following terms; Customer Experience (CX) and User Experience (UX) are used interchangeably throughout this chapter.</para>
<para>5G and beyond are at an increased pressure of enriching the customer experience beyond what the current generation of technologies can offer. CX will continue to remain an important focus in defining and ultimately deploying 5G and beyond networks and associated solutions.</para>
<para>Consumer devices of today can offer the best in class voice, data and video communications connecting anyone from anywhere at any time. However, the devices of tomorrow will offer virtually all the features as much as a wireless network can offer that means users will have more autonomy in defining what they want and how they want it.</para>
<para>Looking into the evolution of UX amongst various technologies, it is clearly evident that the focus of wireless networking has been concentrated on the end user experience.</para>
<para>The UX evolution can be represented in a very simplified fashion,</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/pg55.jpg" mime-subtype="jpeg"/></para>
<para>The function of the wireless network will be fully focused on providing the best user experience. Hence, any evolution in the wireless network era should be built based on the way customer experience requirements will evolve from current to future needs. Evolution is not about quality of service rather it is all about customer experience.</para>
<para><link linkend="fig5_1">Figure 5.1</link> shows how the experience has been changing along the wireless network evolution. It has been a paradigm shift moving from 1G to 5G wireless network evolution.</para>
<para>First generation mobile networks (1G), were a real revolution in providing wireless voice from anywhere but with a limited mobility. 2G with GPRS, and i-mode initiated another revolution in mobile communication providing data over wireless with a true mobility. SMS and roaming are also the major user experience revolution in 2G. Subsequently smartphones, especially iOS made a major revolution in user experience by not only introducing a gesture based UI but also introduced the App Store which vastly expanding the functionality of the device. Android and the Google Play Store have helped to penetrate mass markets and phones with larger screens have enriched multimedia applications. Users can enjoy a HD quality entertainment seamlessly while being mobile with LTE-A offering 300 Mbps speed [3].</para>
<para>As the device screen improves not only in size but also in terms of resolution, such as 4K video quality, creating a compelling need for high resolution projection from the customer device.</para>
<fig id="fig5_1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.1</label>
<caption><title>UX Evolution Along the Wireless Technology Evolution.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig5_1.jpg" mime-subtype="jpeg"/>
</fig>
<para>5G and beyond will offer enormous bandwidth beyond 1 Gbps which can potentially create a demand for devices featuring high resolution video projection equivalent to a 100&#x201D; virtual screen experience to become a commercial reality. <link linkend="fig5_1">Figure 5.1</link> shows how users had different experiences during development steps of the mobile communication systems.</para>
</section>
<section class="lev1" id="sec5-2">
<title>5.2 Does the Bandwidth Matter?</title>
<para>Advances in processing power, computing engines, machine learning, nanotechnologies and beyond, and increasing variety of applications in diverse fields will contribute to a demand for increased bandwidth. Eventually, bandwidth evolution in mobile communications will progress towards terabit mobile communications. Today&#x2019;s 4G &#x2013; LTE user devices offer 300 Mbps speed on a LTE-A compliance handsets.</para>
<para>However, for seamless continuity of HD/UHD video streaming over the air, the network needs to adapt to provide a cinematic standard of streaming that can be beamed over a larger screen or wall or to provide a virtual reality experience. Video bandwidth requirements will be ever increasing as the number of associated devices for each individual increases and as everyone and everything becomes more closely connected. Cinematic quality of video will have a major application in medicine [6].</para>
<para>Referring to <link linkend="fig5_2">Figure 5.2</link>, associated things will demand more bandwidth as most of the associated devices will evolve from low bit rate sensors of today to high bit rate sensors of tomorrow. For example, if the contents of a home fridge are to be seen in real-time for the purpose of updating food stocks, a high resolution video content needs to be transmitted. Increasingly associated things will bring about a major change in human life and way of living, way of working and will also make a major impact on the way business is conducted.</para>
<para>It is now becoming a necessity to be able to deploy a single but fully converged network pipe to match the bandwidth demands and provide seamless wide area coverage. This will eliminate the need for multiple telecom networks and will evolve into a single 5G and beyond network that will ultimately connect everything together from end to end. This will ultimately open up the single wireless conduit from the end users or end nodes and it will eliminate the need for any disparate last mile wired/wireless networks. For example, the video content of the fridge can be directly transmitted over the wide area network of 5G and beyond rather going through a WiFi home network or through a wired Ethernet.</para>
<fig id="fig5_2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.2</label>
<caption><title>Associated things.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig5_2.jpg" mime-subtype="jpeg"/>
</fig>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Person with chain of association</para></listitem>
<listitem><para>Associated things will be touching close to a trillion in the next decade</para></listitem></itemizedlist>
</section>
<section class="lev1" id="sec5-3">
<title>5.3 CX of Today</title>
<para>CX of today is still predominantly focused on the network behavior experience rather than the experience at the end user device or the node. Obviously smartphones have more powerful processing capabilities and features that enhance the customer experience of today. Social networking has changed the traditions of human networking to a great extent.</para>
<para>Referring <link linkend="fig5_3">Figure 5.3</link>, the devices of today still do not have much autonomy in offering network functions as a standalone device.</para>
<para>CX of today is focused more on:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Quality of Experience</para></listitem>
<listitem><para>Quality of Service</para></listitem>
<listitem><para>Bandwidth</para></listitem></itemizedlist>
<fig id="fig5_3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.3</label>
<caption><title>CX of Today.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig5_3.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev1" id="sec5-4">
<title>5.4 CX of Tomorrow</title>
<para>CX of today has been aimed at delivering experiences limited to a human&#x2019;s five senses, but CX of tomorrow shall go beyond the five senses.</para>
<para>What can be expected beyond the five senses?</para>
<para>A digital sense termed the sixth sense (6th Sense) that will not only predict and prescribe but also provide</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>On-demand wisdom provisioning</para></listitem>
<listitem><para>Rapid analysis of a situation</para></listitem>
<listitem><para>Privacy and Personalization</para></listitem></itemizedlist>
<para>6th sense and Digital sense will be used interchangeably throughout this chapter.</para>
<para>Referring to <link linkend="fig5_4">Figure 5.4</link>, the network of tomorrow will pass on some network functionality to the device. Devices will have network functions in a way that a smart device can form an autonomous network around the associated things and multiple devices. Hence a complete chain of networks can be formed to provide seamless communication even during an outage due to natural disasters or similar emergency conditions. Essentially, it will be a type of UserCell which provides most of the base station functionality.</para>
<para>CX of tomorrow shall be focused on</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Distributed network capability</para></listitem>
<listitem><para>Autonomous CX</para></listitem>
<listitem><para>Advanced features with augmented reality (AR) and more</para></listitem></itemizedlist>
<para>There is going to be an enormous potential for CX and it will grow beyond imagination as the CX will be the only continuing killer application over the communication networks. Reliable Gigabits bandwidth will be required for a real time high resolution AR platform.</para>
<fig id="fig5_4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.4</label>
<caption><title>CX for Tomorrow.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig5_4.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev1" id="sec5-5">
<title>5.5 CX Applications</title>
<para>This section discusses a few of the CX applications that will open up a new era in customer experience. Availability of larger bandwidth on demand, speed, display, and multimedia technologies shall make the user devices much more powerful on top of the autonomous network capabilities built in.</para>
<para>Devices of today offer seamless communication over voice, video and data with the mushrooming of many messaging applications such as iMessage, Whatsapp, Viber, Skype etc. Unfortunately, the quality of the video and the experience of being together still feels incomplete over the channels of today.</para>
<para>Networking needs to go beyond the simpler social networking of today to a greater extent of being &#x201C;Globally together&#x201D;, regardless of whether it is networking between friends, family or corporations. Hence there is a need for a seamless, simple and instantaneous Globally together ENhanced with Digital Sense (GlobENDS). GlobENDS will virtually end the borders of this world and shall be a lution in human communication.</para>
<section class="lev2" id="sec5-5-1">
<title>5.5.1 Virtual World &#x2013; Home without a Border</title>
<para>Imagine a cooking lecture conducted at America with virtual class rooms in Africa and India. <link linkend="fig5_5">Figure 5.5</link> depicts the scenario of HD quality live networking directly from a user device. A person sitting in Australia projecting all the video feeds directly from his phone to the three sides of the wall in his room. This is live networking using a 5G and beyond smart device with optical beam projection features. This requires very high resolution video as well as seamless cross-switching.</para>
<para>The same concept can be applied to family networking. Now imagine a scenario involving an extended family with parents, sisters, brothers and families living far apart.</para>
<para>With the advancement in the digital eye wear, a virtual screen of over 100&#x201D;</para>
<para>will make the projection better suited for personal communications.</para>
<para>With GlobENDS, users should be able to have their breakfast together and discuss family matters over the dinner table whilst being in their own place across continents.</para>
<fig id="fig5_5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.5</label>
<caption><title>GlobENDS, Live HD networking across the continents with a Smart device projecting over three sides of the walls.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig5_5.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev2" id="sec5-5-2">
<title>5.5.2 On-demand Digital Sense Provisioning</title>
<para>A Major dream for any human being is to obtain wisdom provisioned over the air. Wisdom provisioning shall be a major breakthrough in human evolution.</para>
<para>Wearable and implantable devices are becoming increasingly commercialized with the advent of Nano technologies, biomedical technologies and advanced medical research. With the evolution of advanced implantable devices and neurological research, it shall be feasible for wireless provisioning of wisdom in the near future.</para>
<para>6th sense of wireless provisioning shall open up all the possibilities of innovations in this century. By nature, humans are &#x2018;analog&#x2019;, with eyes, ears and mouths that are all processing analog signals which are digitally processed in the human brain.</para>
<para>Research over the possibility of reading the human brain is approaching reality with advancement in neuro science [4].</para>
<para><link linkend="fig5_6">Figure 5.6</link> depicts the future possibility for the evolution of the Analog human to a Digital human. WiSense that shall basically enable wireless wisdom provisioning (WWP) through an on demand basis over wireless to the implanted device of the human. This will open up the convergence of Ear &#x0026; Mouth with digital Senses &#x0026; Reflections enabled by 6th sense, the digital sense [1, 5].</para>
<para>Application of WiSense shall open up a major revolution in treating intellectually disabled and other brain related conditions such as Alzheimer, Parkinson&#x2019;s etc.</para>
</section>
<section class="lev2" id="sec5-5-3">
<title>5.5.3 Evolution of How things shall Communicate in the Future</title>
<para>Machine to Machine is not a new concept or technology but it has been around for decades. What makes communication amongst things different with the advancement in digital technologies? The following sections discuss and analyze the past and present.</para>
<section class="lev3" id="sec5-5-3-1">
<title>5.5.3.1 Descriptive</title>
<para>When Alexander Graham Bell invented telephony, it was the first revolution in connecting people through machines but was over the wire &#x2013; Interconnected over Wires (IoW).</para>
<para>When Marconi invented wireless communications, it was again the first revolution in connecting people through the machines but over wireless &#x2013; Interconnected over Wireless (IoW).</para>
<fig id="fig5_6" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.6</label>
<caption><title>WirelessWisdom Provisioning (WWP).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig5_6.jpg" mime-subtype="jpeg"/>
</fig>
<para>When NASA launched the first communications satellite, it was again the first revolution in making the possibility of connecting people globally &#x2013; Interconnected over Satellite (IoS).</para>
<para>When ARPANET was created and subsequently adopted TCP/IP, it was again the first revolution in connecting networks &#x2013; Internet of Networks (IoN).</para>
<para>When Mobile telephony was made and subsequently Cellular communications became popular, it was again a first revolution of communication from anywhere and anytime &#x2013; Interconnected over Cellular (IoC).</para>
<para>Then came 1G, 2G and beyond, all predominantly voice communications transmitted through packet data communications which existed not for connected people but for connected machines. SMS and Global roaming are the highlights of GSM/CDMA networks. 2.5G paved the way for data communications over the cellular networks and Blackberry email became the first real killer application.</para>
<para>But Apple&#x2019;s iOS and App store created the major revolution in connecting people, the easiest way of using data over the cellular. This is a real IoS &#x2013; Internet of Smartphones. Then came Android that made it possible to smartly connect most of the population of the world in a cost effective way. The App store and the Play store have become the killer applications, those who did not make it to the stores went out of business (of phones). Evidently Over The Top (OTT) services have started to dominate as connections are saturated but their attributes such as Speed and Services are continuing to evolve.</para>
<para>Today we have over 6 billion connected phones. Human communication is evolving towards high bandwidth, advancement and enrichment of customer experience. Connecting things and enabling the communication of things with humans shall open up enormous applications in the ever evolving digital space.</para>
</section>
<section class="lev3" id="sec5-5-3-2">
<title>5.5.3.2 Predictive</title>
<para>The global population is not going to double anytime soon which means that there is a finite number of possible connections. Hence connections need to go beyond the people. IoT is connecting anything whether living or nonliving. If we associate 100 things to every individual per day and organize them into subsets of things, the potential connections are going to be beyond 600 Billion and possibly past trillions. Ultimately it will hit the Smart Dust dream. This opens up almost infinite possibility of connections. OTIoT &#x2013; Applications and Services On Top of Internet of Things (OTIoT) shall play a major role and will change business models and the way business is conducted. This is nothing but the OTT of today but in a more powerful and multi-fold method.</para>
</section>
<section class="lev3" id="sec5-5-3-3">
<title>5.5.3.3 Further enhancing CX with cross communication with things</title>
<para>Internet of human and things (IoHT) shall open up many applications. <link linkend="fig5_7">Figure 5.7</link> shows an application in which connected shoes can remind a person, &#x201C;Don&#x2019;t wear me today since you need shoes with spikes as it is going to snow after two hours&#x201D;, or it might even become smart enough to be provisioned to be a spiky shoe for that period of the day!</para>
<para>Referring <link linkend="fig5_7">Figure 5.7</link>, a dog can be digitally enabled to pre alert that there is a jam at exit A and so it may be better to take exit B as they will be communicating live! Practically anything and everything will start communicating and the level of smartness shall be provisioned by the OTIoT services.</para>
<fig id="fig5_7" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 5.7</label>
<caption><title>Applications &#x2013; Internet of Human and Things (IoHT).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig5_7.jpg" mime-subtype="jpeg"/>
</fig>
<para>Aakash Vaani, announcement from the heaven in ancient Indian mythology can be made a reality. A prediction can be made to such an extent that a person can be alerted so precisely, that if he or she takes a particular route at a particular time, he or she shall meet with an accident. This is because of all the things that are communicating and time synchronized with the traffic pattern &#x0026; behaviour, making a scientific prediction of astrology a reality!</para>
</section>
<section class="lev3" id="sec5-5-3-4">
<title>5.5.3.4 Prescriptive</title>
<para>GOD (Generator; Operator; Destroyer) made the living things. Man made the non-living thing, the machines such as aeroplanes etc.</para>
<para>Getting on to making the non-living things communicating among themselves and also with the living things, Man is becoming GOD of devices. Hypothetically, man can make the corpses, the non-living things communicable and also can preserve the bodies with the wearable suit. With the historical data that have been collected over the living period can be made available to the wearable suit and can make the non-living body completely emulating the living body. It shall be nothing but a Human Disaster Recovery (HDR).</para>
<para>Additionally, extra knowledge can be provisioned to make it smarter than it was. In conclusions, a new sense is being created which is the Digital Sense that will eventually become the 6th sense of the human being. Although the 6th sense will be manmade, let us try to put this to good use to help make this world a happy connected, safe and more enjoyable place for all to enjoy. Digital innovation through connecting things should be embraced by everyone so as to stay connected with the growth of business in the new economy.</para>
</section>
</section>
</section>
<section class="lev1" id="sec5-6">
<title>5.6 Conclusions</title>
<para>Digital Sense, the 6th Sense shall be the future of the digital evolution. 5G and beyond shall make the 6th sense a reality, eventually leading to major advancements in the human experience and create major applications in healthcare to home automation.</para>
</section>
<section class="lev1" id="sec5-7">
<title>References</title>
<para>[1] N. Ravikumar, N. H. Metcalfe, J. Ravikumar, R. Prasad, &#x201C;Smartphone Applications for Providing Ubiquitous Healthcare Over Cloud with the Advent of Embeddable Implants&#x201D;, Wireless Personal Communications, Volume 86 Issue 3, February 2016. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B1%5D+N%2E+Ravikumar%2C+N%2E+H%2E+Metcalfe%2C+J%2E+Ravikumar%2C+R%2E+Prasad%2C+%22Smartphone+Applications+for+Providing+Ubiquitous+Healthcare+Over+Cloud+with+the+Advent+of+Embeddable+Implants%22%2C+Wireless+Personal+Communications%2C+Volume+86+Issue+3%2C+February+2016%2E" target="_blank">Google Scholar</ulink></para>
<para>[2] R. Prasad, &#x201C;Human Bond Communications (HBC)&#x201D;. Wireless Personal Communications, 87(3), 619&#x2013;627, 2016. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B2%5D+R%2E+Prasad%2C+%22Human+Bond+Communications+%28HBC%29%22%2E+Wireless+Personal+Communications%2C+87%283%29%2C+619-627%2C+2016%2E" target="_blank">Google Scholar</ulink></para>
<para>[3] J. Ravikumar, R. Prasad, &#x201C;Challenges in guaranteeing Lifestyle Enrichment while evolving towards 5G&#x201D;, 18th GISFI standardisation series meeting, New Delhi, 2014.</para>
<para>[4] Vikash Gilja, Paul Nuyujukian, Cindy A. Chestek, John P. Cunningham, Byron M. Yu, Joline M. Fan, Mark M. Churchland, Matthew T. Kaufman, Jonathan C. Kao, Stephen I. Ryu, Krishna V. Shenoy, &#x201C;A high-performance neural prosthesis enabled by control algorithm design&#x201D;, nature neuroscience 15, 1752&#x2013;1757 (2012).</para>
<para>[5] J. Ravikumar, R. Prasad, &#x201C;Wireless 2020&#x201D;, CTIF, Aalborg University, 2006. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B5%5D+J%2E+Ravikumar%2C+R%2E+Prasad%2C+%22Wireless+2020%22%2C+CTIF%2C+Aalborg+University%2C+2006%2E" target="_blank">Google Scholar</ulink></para>
<para>[6] E. C. Prakash, L. Qiang, A. Anwar, W. K. Chia, N. Ravikumar, and T. K. Chiong, &#x201C;A Practical Surgery Simulator&#x201D;, Proceedings of the International Conference on Information and Automation, December 15&#x2013;18, 2005, Colombo, Sri Lanka. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B6%5D+E%2E+C%2E+Prakash%2C+L%2E+Qiang%2C+A%2E+Anwar%2C+W%2E+K%2E+Chia%2C+N%2E+Ravikumar%2C+and+T%2E+K%2E+Chiong%2C+%22A+Practical+Surgery+Simulator%22%2C+Proceedings+of+the+International+Conference+on+Information+and+Automation%2C+December+15-18%2C+2005%2C+Colombo%2C+Sri+Lanka%2E" target="_blank">Google Scholar</ulink></para>
</section>
<section class="lev1" id="sec5-8">
<title>About the Author</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig5_8.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Jeevarathinam Ravikumar</emphasis> is Technology Director (Europe) &#x2013; Stanley Advanced Technology Solutions (SATS) with Stanley Security Europe of Stanley Black &#x0026; Decker group.</para>
<para>He designed India&#x2019;s first wireless telephony for rural India and was involved in designing Digital Radio/Switches working for Centre for Development of Telematics, Government of India. He was one of the pioneers in starting WCDMA research in Singapore way back in 1998 while working for ASTAR, Singapore. He has been advising wireless telecom operators on 3G/4G deployment and mentoring technology startups. He has over 25 years of experience in wireless communications with the blend of technology and business expertise and worked for many multinational technology companies and also founded his own startups.</para>
<para>He has Masters in Communications and Computer networking from Nanyang Technological University, Singapore and Bachelors of Engineering from Annamalai University, India. He is a senior member of IEEE. He holds international patents in wireless coverage solution and published papers in Beyond 3G &#x0026; 4G networks/services.</para>
</section>
</chapter>
<chapter class="chapter" id="ch06" label="6" xreflabel="6">
<title>Imt for 2020 and Beyond</title>
<para><emphasis role="strong">Fran&#x00E7;ois Rancy</emphasis></para>
<para>Radiocommunication Bureau, International Telecommunication Union, Switzerland</para>
<section class="lev1" id="sec6-1">
<title>6.1 Introduction</title>
<para>Work on International Mobile Telecommunications (IMT) has been ongoing for nearly three decades in ITU. This has been an open process which has included ITU&#x2019;s Member States, national and regional standards development organizations, equipment manufacturers, network operators, as well as academia and industry forums.</para>
<para>With the development of the IMT-2000 3G mobile systems and the current deployments of the IMT-Advanced 4G systems, this activity has revolutionized the way people communicate around the world. ITU is now working together with these partners in the same open process to develop the standards for IMT-2020.</para>
<para>A vital element in the standardization process has been the identification and global harmonization of frequency bands for the operation of IMT, thereby enabling interoperability, roaming and global economies of scale.</para>
<para>This Chapter outlines the process and timeline for standardizing IMT-2020, and the current status of this work. It also provides a perspective of the key technical requirements and spectrum aspects to address to finalize the standard in 2020.</para>
</section>
<section class="lev1" id="sec6-2">
<title>6.2 Background</title>
<para>The second generation of mobile telephone systems were developed in the late 1980&#x2019;s and initially deployed in the early 1990&#x2019;s. Certainly the transition from the first to the second generation of mobile phones was characterized by the change from analog to digital communications, but it was also characterized by the growing requirement for these sytems to operate on a regional, if not global, basis.</para>
<para>Regional/global operation of these systems was hampered by having multiple incompatible standards as well as different frequency bands and channel arrangements being used in different parts of the world. This in turn had a significant impact on the cost, and hence affordability, of these systems. Recognizing this, the ITU membership established a group of experts to study the requirements of future public land mobile telecommunications systems (FPLMTS).</para>
<para>Studies on FPLMTS were conducted in the CCIR (the former ITU-R) Interim Working Party 8/13, with the first substantive output being a decision by the 1992 World Administrative Radiocommunication Conference to identify specific frequency bands for the operation of FPLMTS. The studies then focussed on developing the set of detailed radio interface specifications for FPLMTS.</para>
<para>ITU-R Task Group 8/1 was established to develop these 3G radio interface specifications, which were finally approved in May 2000 in Recommendation ITU-R M.1457 &#x2013; &#x201C;Detailed specifications of the terrestrial radio interfaces of International Mobile Telecommunications-2000 (IMT-2000)&#x201D; [1]. The name change from FPLMTS to IMT and the principles and process for the further development of IMT were established by the ITU Radiocommunication Assembly 2000 in ITU-R Resolutions 56 [2] and 57 [3].</para>
<para>ITU-R Working Party 5D was subsequently established to continue the work on IMT. In close collaboration with the relevant national and regional standards development organizations, a yearly update process for IMT-2000 was applied to cater for the evolution and enhancement of the standard. ITU-R Recommendations were also developed to address the implementation aspects of IMT-2000 such as global circulation of terminal equipment, radio frequency channel arrangements and sharing studies between IMT and other radio services. In parallel, successive World Radiocommunication Conferences have periodically identified additional frequency bands for IMT to cater for the rapidly growing demand for mobile communications, particularly mobile broadband data.</para>
<para>At the same time, Working Party 5D initiated work to address the need for a global platform on which to build the next generations of mobile services &#x2013; fast data access, unified messaging and broadband multimedia: IMT-Advanced. The IMT-Advanced radio interface specifications were finalized in 2012 and are specified in Recommendation ITU-R M.2012 &#x2013; &#x201C;Detailed specifications of the terrestrial radio interfaces of International Mobile Telecommunications Advanced (IMT-Advanced)&#x201D; [4]. These 4G systems are currently being deployed throughout the world, and it is expected that these systems will continue to evolve and be enhanced in the coming years.</para>
<para>With an eye to the longer term requirements, in 2012 Working Party 5D then commenced studies on the next phase of development: IMT-2020. It is planned to finalize the IMT-2020 specifications in the year 2020.</para>
</section>
<section class="lev1" id="sec6-3">
<title>6.3 Imt-2020 Standardization Process</title>
<para>The process for developing the IMT-2020 radio interface specifications is shown in <link linkend="fig6_1">Figure 6.1</link> and is similar to the process that was successfully applied in the development of the IMT-2000 and IMT-Advanced standards. It is important to stress that the development of the IMT standards is not carried out by ITU alone. It is a highly colloborative process with substantial input from and coordination with all involved national, regional and international standards development organizations, partnerships and fora.</para>
<para>The first step of the process was to establish the vision for IMT for 2020 and beyond, by describing potential user and application trends, growth in traffic, technological trends and spectrum implications, and by providing guidelines on the framework and the capabilities for IMT for 2020 and beyond. This work reached a significant milestone with the approval of Recommendation ITU-R M.2083 &#x2013; &#x201C;IMT Vision &#x2013; Framework and overall objectives of the future development of IMT for 2020 and beyond&#x201D; [5] in September 2015.</para>
<fig id="fig6_1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 6.1</label>
<caption><title>The IMT-2020 standardization process.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig6_1.jpg" mime-subtype="jpeg"/>
</fig>
<para>The ITU has now issued the invitation for submission of proposals for candidate radio interface technologies for the terrestrial components of the radio interface(s) for IMT-2020 and invitation to participate in their subsequent evaluation in Circular Letter 5/LCCE/59 [6] on 22 March 2016.</para>
<para>The next step, planned for 2016&#x2013;2017, has now commenced, with studies being undertaken to review how best to make use of the spectrum identified for IMT at world radiocommunication conferences (WRCs), including the recent WRC-15 held in November 2015. It will also be necessary to establish the detailed technical requirements and a set of criteria to support the evaluation of proposals for the radio interfaces for IMT-2020.</para>
<para>The submission of proposals is expected to begin in October 2017 and end by mid-2019. The evaluations against the criteria will then be carried out by independent evaluation groups established for this purpose, and participation in these groups is not limited to ITU members. In the past there has been a very good level of participation in these evaluation activities with the active involvement of Administrations, equipment manufacturers, network operators and academia.</para>
<para>The evaluation reports from the evaluation groups are presented and considered in Working Party 5D and form a basis for developing the consensus on which proposed interfaces should be included in the IMT-2020 standard.</para>
<para>While the 2015 World Radiocommunication Conference made good progress in identifying additional frequency bands and globally harmonized arrangements below 6 GHz for the operation of IMT, it also recognized the potential future requirement for large contiguous blocks of spectrum for this application. Consequently, it called for 11 frequency bands above 24 GHz to be studied by ITU-R as bands that may be identified for future use by IMT at the next World Radiocommunication Conference in 2019 (WRC-19). As a parallel activity, the bands considered as suitable for IMT operation need to be identified and sharing studies associated with the use of these bands need to be conducted in preparation for WRC-19, and these decisions regarding spectrum use will need to be taken into account in developing the final IMT-2020 specifications.</para>
<para>The overall timeline for the standardization of IMT-2020 is presented in <link linkend="fig6_2">Figure 6.2</link>, with final approval of the IMT-2020 specifications expected in around the 3rd quarter of 2020.</para>
<fig id="fig6_2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 6.2</label>
<caption><title>Overall timeline for the standardization of IMT-2020.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig6_2.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev1" id="sec6-4">
<title>6.4 Overview of IMT-2020</title>
<para>It is envisaged that IMT-2020 will expand and support diverse usage scenarios and applications that will extend beyond those currently supported by IMT systems. A broad variety of capabilities will need to be tightly coupled with these intended different usage scenarios and applications for IMT-2020.</para>
<section class="lev2" id="sec6-4-1">
<title>6.4.1 Usage Scenarios of IMT-2020</title>
<para>Three main usage scenarios for IMT-2020 have been identified in Recommendation ITU-R M.2083, &#x201C;IMT Vision &#x2013; Framework and overall objectives of the future development of IMT for 2020 and beyond&#x201D;, which are enhanced mobile broadband, ultra-reliable and low latency communications, and massive machine-type communications. Additional use cases are expected to emerge, which are currently not foreseen. For future IMT, flexibility will be necessary to adapt to new use cases that come with a widely varying range of requirements.</para>
<para>IMT-2020 will encompass a large number of different features. Depending on the circumstances and the different needs in different countries, future IMT systems should be designed in a highly modular manner so that not all features have to be implemented in all networks.</para>
<fig id="fig6_3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 6.3</label>
<caption><title>Usage scenarios of IMT-2020.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig6_3.jpg" mime-subtype="jpeg"/>
</fig>
<para><link linkend="fig6_3">Figure 6.3</link> illustrates some examples of envisioned usage scenarios for IMT-2020.</para>
</section>
<section class="lev2" id="sec6-4-2">
<title>6.4.2 Capabilities of IMT-2020</title>
<para>IMT-2020 systems are mobile systems that include the new capabilities of IMT that go beyond those of IMT-Advanced. IMT-2020 systems will need to support low to high mobility applications and a wide range of data rates in accordance with user and service demands in multiple usage scenarios. IMT-2020 also needs to have capabilities for high quality multimedia applications within a wide range of services and platforms, providing a significant improvement in performance and quality of service. The key design principles of capabilities of IMT-2020 are flexibility and diversity to serve many different use cases and scenarios.</para>
<para>The following eight parameters are considered to be key capabilities of IMT-2020:</para>
<para><emphasis role="strong">Peak data rate</emphasis></para>
<para>Maximum achievable data rate under ideal conditions per user/device (in Gbit/s).</para>
<para><emphasis role="strong">User experienced data rate</emphasis></para>
<para>Achievable data rate that is available ubiquitously across the coverage area to a mobile user/device (in Mbit/s or Gbit/s).</para>
<para><emphasis role="strong">Latency</emphasis></para>
<para>The contribution by the radio network to the time from when the source sends a packet to when the destination receives it (in ms).</para>
<para><emphasis role="strong">Mobility</emphasis></para>
<para>Maximum speed at which a defined QoS and seamless transfer between radio nodes which may belong to different layers and/or radio access technologies (multi-layer/-RAT) can be achieved (in km/h).</para>
<para><emphasis role="strong">Connection density</emphasis></para>
<para>Total number of connected and/or accessible devices per unit area (per km<sup>2</sup>).</para>
<para><emphasis role="strong">Energy efficiency</emphasis></para>
<para>Energy efficiency has two aspects:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>on the network side, energy efficiency refers to the quantity of information bits transmitted to/received from users, per unit of energy consumption of the radio access network (RAN) (in bit/Joule);</para></listitem>
<listitem><para>on the device side, energy efficiency refers to quantity of information bits per unit of energy consumption of the communication module (in bit/Joule).</para></listitem></itemizedlist>
<para><emphasis role="strong">Spectrum efficiency</emphasis></para>
<para>Average data throughput per unit of spectrum resource and per cell (bit/s/Hz).</para>
<para><emphasis role="strong">Area traffic capacity</emphasis></para>
<para>Total traffic throughput served per geographic area (in Mbit/s/m2).</para>
<para>The key capabilities of IMT-2020 are shown in <link linkend="fig6_4">Figure 6.4</link>, compared with those of IMT Advanced.</para>
</section>
</section>
<section class="lev1" id="sec6-5">
<title>6.5 Key Technology Enablers</title>
<para>Report ITU-R M.2320 [7] provides a broad view of future technical aspects of terrestrial IMT systems considering the timeframe 2015&#x2013;2020 and beyond. It includes information on technical and operational characteristics of IMT systems, including the evolution of IMT through advances in technology and spectrally-efficient techniques, and their deployment. Key technologies that are expected to influence the development of IMT-2020 are briefly described below.</para>
<fig id="fig6_4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 6.4</label>
<caption><title>Enhancement of key capabilities from IMT-Advanced to IMT-2020.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig6_4.jpg" mime-subtype="jpeg"/>
</fig>
<section class="lev2" id="sec6-5-1">
<title>6.5.1 Technologies to Enhance the Radio Interface</title>
<para>Advanced waveforms, modulation and coding, and multiple access schemes, e.g., filtered OFDM (FOFDM), filter bank multi-carrier modulation (FBMC), pattern division multiple access (PDMA), sparse code multiple access (SCMA), interleave division multiple access (IDMA) and low density spreading (LDS) may improve the spectral efficiency of the future IMT systems.</para>
<para>Advanced antenna technologies such as 3D-beamforming (3D-BF), active antenna system (AAS), massive MIMO and network MIMO will achieve better spectrum efficiency.</para>
<para>In addition, TDD-FDD joint operation, dual connectivity and dynamic TDD can enhance the spectrum flexibility.</para>
<para>Simultaneous transmission and reception on the same frequency with self-interference cancellation could also increase spectrum efficiency.</para>
<para>Other techniques such as flexible backhaul and dynamic radio access configurations can also enable enhancements to the radio interface.</para>
<para>In small cells, higher-order modulation and modifications to the reference-signal structure with reduced overhead may provide performance enhancements due to lower mobility in small cell deployments and potentially higher signal-to interference ratios compared to the wide-area case.</para>
<para>Flexible spectrum usage, joint management of multiple radio access technologies (RATs) and flexible uplink/downlink resource allocation, can provide technical solutions to address the growing traffic demand in the future and may allow more efficient use of radio resources.</para>
</section>
<section class="lev2" id="sec6-5-2">
<title>6.5.2 Network Technologies</title>
<para>Future IMT will require more flexible network nodes which are configurable based on the Software-Defined Networking (SDN) architecture and network function virtualization (NFV) for optimal processing the node functions and improving the operational efficiency of network.</para>
<para>Featuring centralized and collaborative system operation, the cloud RAN (C-RAN) encompasses the baseband and higher layer processing resources to form a pool so that these resources can be managed and allocated dynamically on demand, while the radio units and antenna are deployed in a distributed manner.</para>
<para>The radio access network (RAN) architecture should support a wide range of options for inter-cell coordination schemes. The advanced self organizing network (SON) technology is one example solution to enable operators to improve the OPEX efficiency of the multi-RAT and multi-layer network, while satisfying the increasing throughput requirement of subscribers.</para>
</section>
<section class="lev2" id="sec6-5-3">
<title>6.5.3 Technologies to Enhance Mobile Broadband Scenarios</title>
<para>A relay based multi-hop network can greatly enhance the Quality of Service (QoS) of cell edge users. Small-cell deployment can improve the QoS of users by decreasing the number of users in a cell and user quality of experience can be enhanced.</para>
<para>Dynamic adaptive streaming over HTTP (DASH) enhancement is expected to improve user experience and accommodate more video streaming content in existing infrastructure.</para>
<para>Bandwidth saving and transmission efficiency improvement is an evolving trend for Evolved Multimedia Broadcast and Multicast Service (eMBMS). Dynamic switching between unicast and multicast transmission can be beneficial.</para>
<para>IMT systems currently provide support for RLAN interworking, at the core network level, including seamless as well as non-seamless mobility, and can offload traffic from cellular networks into license-exempt spectrum bands.</para>
<para>Context aware applications may provide more personalized services that ensure high QoE for the end user and proactive adaptation to the changing context.</para>
<para>Proximity-based techniques can provide applications with information whether two devices are in close proximity of each other, as well as enabling direct device-to-device (D2D) communication. Group communication, including push-to-talk type of communication, is highly desirable for public safety applications.</para>
</section>
<section class="lev2" id="sec6-5-4">
<title>6.5.4 Technologies to Enhance Massive Machine Type Communications</title>
<para>Future IMT systems are expected to connect a large number of M2M devices with a range of performance and operational requirements, with further improvement of low-cost and low complexity device types as well as extension of coverage.</para>
</section>
<section class="lev2" id="sec6-5-5">
<title>6.5.5 Technologies to Enhance Ultra-reliable and Low Latency Communications</title>
<para>To achieve ultra-low latency, the data and control planes may both require significant enhancements and new technical solutions addressing both the radio interface and network architecture aspects.</para>
<para>It is envisioned that future wireless systems will, to a larger extent, also be used in the context of machine-to-machine communications, for instance in the field of traffic safety, traffic efficiency, smart grid, e-health, wireless industry automation, augmented reality, remote tactile control and tele-protection, requiring high reliability techniques.</para>
</section>
<section class="lev2" id="sec6-5-6">
<title>6.5.6 Technologies to Improve Network Energy Efficiency</title>
<para>In order to enhance energy efficiency, energy consumption should be considered in the protocol design.</para>
<para>The energy efficiency of a network can be improved by both reducing RF transmit power and saving circuit power. To enhance energy efficiency, the traffic variation characteristic of different users should be well exploited for adaptive resource management. Examples include discontinuous transmission (DTX), base station and antenna muting, and traffic balancing among multiple RATs.</para>
</section>
<section class="lev2" id="sec6-5-7">
<title>6.5.7 Terminal Technologies</title>
<para>The mobile terminal will become a more human friendly companion as a multipurpose Information and Communication Technology (ICT) device for personal office and entertainment, and will also evolve from being predominantly a hand-held smart phone to also include wearable smart devices.</para>
<para>Technologies for chip, battery, and display should therefore be further improved.</para>
</section>
<section class="lev2" id="sec6-5-8">
<title>6.5.8 Technologies to Enhance Privacy and Security</title>
<para>Future IMT systems need to provide robust and secure solutions to counter the threats to security and privacy brought by new radio technologies, new services and new deployment cases.</para>
</section>
</section>
<section class="lev1" id="sec6-6">
<title>6.6 Spectrum for IMT Operation</title>
<para>This Section discusses about needs for IMT operation spectrum as well as harmonization, identification and technical issues on spectrum for IMT.</para>
<section class="lev2" id="sec6-6-1">
<title>6.6.1 Spectrum Requirements</title>
<para>Report ITU-R M.2290 [8] provides the results of studies on estimated global spectrum requirements for terrestrial IMT in the year 2020. The estimated total requirements include spectrum already identified for IMT plus additional spectrum requirements.</para>
<para>It is noted that no single frequency range satisfies all the criteria required to deploy IMT systems, particularly in countries with diverse geographic and population density; therefore, to meet the capacity and coverage requirements of IMT systems multiple frequency ranges would be needed. It should be noted that there are differences in the markets and deployments and timings of the mobile data growth in different countries.</para>
<para>For future IMT systems in the year 2020 and beyond, contiguous and broader channel bandwidths than available to current IMT systems would be resources that could support broader, contiguous channel bandwidths in this time frame should be explored.</para>
</section>
<section class="lev2" id="sec6-6-2">
<title>6.6.2 Studies on Technical Feasibility of IMT between 6 and 100 GHz</title>
<para>Report ITU-R M.2376 [9] provides information on the technical feasibility of IMT in the frequencies between 6 and 100 GHz. It includes information on potential new IMT radio technologies and system approaches, which could be appropriate for operation in this frequency range. The potential advantages of using the same spectrum for both access and fronthaul/backhaul, as compared with using two different frequencies for access and fronthaul/backhaul, are also described in the Report. The theoretical assessment, simulations, measurements, technology development and prototyping described in the Report indicate that utilizing the bands between 6 and 100 GHz is feasible for studied IMT deployment scenarios, and could be considered for the development of IMT for 2020 and beyond.</para>
</section>
<section class="lev2" id="sec6-6-3">
<title>6.6.3 Spectrum Harmonization</title>
<para>Where radio systems are to be used globally, it is highly desirable for existing and newly allocated spectrum to be harmonized. The benefits of spectrum harmonization include: facilitating economies of scale, enabling global roaming, reducing equipment design complexity, preserving battery life, improving spectrum efficiency and potentially reducing cross border interference.</para>
<para>Mobile devices typically contain multiple antennas and associated radio frequency front-ends to enable operation in multiple bands to facilitate roaming. While mobile devices can benefit from common chipsets, variances in frequency arrangements necessitate different components to accommodate these differences, which leads to higher equipment design complexity.</para>
<para>Consequently, harmonization of spectrum for IMT will lead to simplification and commonality of equipment, which is desirable for achieving economies of scale and affordability of equipment.</para>
</section>
<section class="lev2" id="sec6-6-4">
<title>6.6.4 Spectrum Identification</title>
<para>As mentioned previously, it was by a decision by the 1992 World Administrative Radiocommunication Conference that the first specific frequency bands for the operation of FPLMTS (now IMT) were identified in the ITU Radio Regulations, the international treaty governing the use of the radio frequency spectrum and satellite orbits. Identification of a frequency band in the Radio Regulations does not afford any priority for such use with respect to other radio services allocated to that spectrum, but it does provide a clear signal to the national regulators for their spectrum planning, and also provides a degree of confidence for equipment manufacturers and network operators to make the long term investments necessary to develop IMT in these bands.</para>
<para>Since then, successive World Radiocommunication Conferences have periodically identified additional frequency bands for IMT within the range of 450 MHz to 6 GHz to cater for the rapidly growing demand for mobile communications, particularly mobile broadband data.</para>
<para>While the 2015 World Radiocommunication Conference made good progress in identifying additional frequency bands and globally harmonized arrangements below 6 GHz for the operation of IMT, it also recognized a potential future requirement for large contiguous blocks of spectrum at higher frequencies for these systems.</para>
<para>Consequently, it called for 11 frequency bands above 24 GHz to be studied by ITU-R as bands that may be identified for use by IMT at the World Radiocommunication Conference in 2019 (WRC-19). The frequency bands to be studied are shown in <link linkend="tbl6_1">Table 6.1</link> below.</para>
<para>As can be seen, the different bands span from around 24 GHz up to 86 GHz. While some of those bands are already allocated for the operation of mobile services in the Radio Regulations, others would require a mobile service allocation in addition to an identification for operation of IMT systems.</para>
<para>The focus of these studies should be to identify a limited subset of these bands that are recommended to be identified globally for use by IMT. The studies on these bands will be conducted in a Task Group of ITU-R Study Group 5, and the results of the studies will be included in the Conference Preparatory Meeting report to the World Radiocommunication Conference 2019.</para>
<table-wrap id="tbl6_1">
<label>Table 6.1</label>
<caption><title>Bands under study for IMT identification by WRC-19</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<td valign="bottom" align="left">Existing Mobile Allocation</td>
<td valign="bottom" align="left">No Global Mobile Allocation</td></tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">24.25 GHz&#x2013;27.5 GHz</td>
<td valign="top" align="left">31.8&#x2013;33.4 GHz</td></tr>
<tr>
<td valign="top" align="left">37&#x2013;40.5 GHz</td>
<td valign="top" align="left">40.5 &#x2013;42.5 GHz</td></tr>
<tr>
<td valign="top" align="left">42.5&#x2013;43.5 GHz</td>
<td valign="top" align="left"></td></tr>
<tr>
<td valign="top" align="left">45.5&#x2013;47 GHz</td>
<td valign="top" align="left">47&#x2013;47.2 GHz</td></tr>
<tr>
<td valign="top" align="left">47.2&#x2013;50.2 GHz</td>
<td valign="top" align="left"></td></tr>
<tr>
<td valign="top" align="left">50.4&#x2013;52.6 GHz</td>
<td valign="top" align="left"></td></tr>
<tr>
<td valign="top" align="left">66&#x2013;76 GHz</td>
<td valign="top" align="left"></td></tr>
<tr>
<td valign="top" align="left">81&#x2013;86 GHz</td>
<td valign="top" align="left"></td></tr>
</tbody>
</table>
</table-wrap>
</section>
</section>
<section class="lev1" id="sec6-7">
<title>6.7 Conclusions</title>
<para>The scope of IMT-2020 is much broader than the previous generations of mobile broadband communication systems. We are talking here about not just an enhancement to the traditional mobile broadband scenarios, but extending the application of this technology to use cases involving ultra-reliable and low latency communications, and massive machine-type communications. The ITU&#x2019;s work in developing the specifications for IMT-2020, in close collaboration with the whole gamut of 5G stakeholders, is now well underway, along with the associated spectrum management and spectrum identification aspects.</para>
<para>IMT is the enabler of new trends in communication devices &#x2013; from the connected car and intelligent transport systems to augmented reality, holography, and wearable devices, and a key enabler to meet social needs in the areas of mobile education, connected health and emergency telecommunications. E-applications are transforming the way we do business and govern our countries, and smart cities are pointing the way to cleaner, safer, more comfortable lives in our urban conglomerates. Certainly, IMT-2020 will be a cornerstone for all of the activities related to attaining the goals in the 2030 Agenda for Sustainable Development.</para>
</section>
<section class="lev1" id="sec6-8">
<title>References</title>
<para>[1] Recommendation ITU-R M.1457 &#x2013; &#x201C;Detailed specifications of the terrestrial radio interfaces of International Mobile Telecommunications-2000 (IMT-2000)&#x201D;, May 2000, http://www.itu.int/rec/R-REC-M.1457</para>
<para>[2] ITU-R Resolution 56 &#x2013; &#x201C;Naming for International Mobile Telecommunications&#x201D;, October 2007, http://www.itu.int/pub/R-RES-R.56</para>
<para>[3] ITU-R Resolution 57 &#x2013; &#x201C;Principles for the process of development of IMT-Advanced&#x201D;, October 2007, http://www.itu.int/pub/R-RES-R.57 <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B3%5D+ITU-R+Resolution+57+-+%22Principles+for+the+process+of+development+of+IMT-Advanced%22%2C+October+2007%2C+http%3A%2F%2Fwww%2Eitu%2Eint%2Fpub%2FR-RES-R%2E57" target="_blank">Google Scholar</ulink></para>
<para>[4] Recommendation ITU-R M.2012 &#x2013; &#x201C;Detailed specifications of the terrestrial radio interfaces of International Mobile Telecommunications Advanced (IMT-Advanced)&#x201D;, January 2012, http://www.itu.int/rec/R-REC-M.2012 <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B4%5D+Recommendation+ITU-R+M%2E2012+-+%22Detailed+specifications+of+the+terrestrial+radio+interfaces+of+International+Mobile+Telecommunications+Advanced+%28IMT-Advanced%29%22%2C+January+2012%2C+http%3A%2F%2Fwww%2Eitu%2Eint%2Frec%2FR-REC-M%2E2012" target="_blank">Google Scholar</ulink></para>
<para>[5] Recommendation ITU-R M.2083 &#x2013; &#x201C;IMT Vision &#x2013; Framework and overall objectives of the future development of IMT for 2020 and beyond&#x201D;, September 2015, http://www.itu.int/rec/R-REC-M.2083 <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B5%5D+Recommendation+ITU-R+M%2E2083+-+%22IMT+Vision+-+Framework+and+overall+objectives+of+the+future+development+of+IMT+for+2020+and+beyond%22%2C+September+2015%2C+http%3A%2F%2Fwww%2Eitu%2Eint%2Frec%2FR-REC-M%2E2083" target="_blank">Google Scholar</ulink></para>
<para>[6] Circular Letter 5/LCCE/59 &#x2013; &#x201C;Invitation for submission of proposals for candidate radio interface technologies for the terrestrial components of the radio interface(s) for IMT-2020 and invitation to participate in their subsequent evaluation&#x201D;, 22 March 2016, http://www.itu.int/md/R00-SG05-CIR-0059/ <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B6%5D+Circular+Letter+5%2FLCCE%2F59+-+%22Invitation+for+submission+of+proposals+for+candidate+radio+interface+technologies+for+the+terrestrial+components+of+the+radio+interface%28s%29+for+IMT-2020+and+invitation+to+participate+in+their+subsequent+evaluation%22%2C+22+March+2016%2C+http%3A%2F%2Fwww%2Eitu%2Eint%2Fmd%2FR00-SG05-CIR-0059%2F" target="_blank">Google Scholar</ulink></para>
<para>[7] Report ITU-R M.2320 &#x2013; &#x201C;Future technology trends of terrestrial IMT systems&#x201D;, 2014, http://www.itu.int/pub/R-REP-M.2320</para>
<para>[8] Report ITU-R M.2290 &#x2013; &#x201C;Future spectrum requirements estimate for terrestrial IMT&#x201D;, December 2013, http://www.itu.int/pub/R-REP-M.2290</para>
<para>[9] Report ITU-R M.2376 &#x2013; &#x201C;Technical feasibility of IMT in bands above 6 GHz&#x201D;, July 2015, http://www.itu.int/pub/R-REP-M.2376</para>
</section>
<section class="lev1" id="sec6-9">
<title>About the Author</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig6_5.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Fran&#x00E7;ois Rancy</emphasis> was elected Director of the ITU Radiocommunication Bureau by the ITU Plenipotentiary Conference 2010 (PP-10) in Guadalajara, Mexico. He took office on 1 January 2011. He was confirmed in a second term by the ITU Plenipotentiary Conference 2014 (PP-14) in Busan, Republic of Korea.</para>
<para>Fran&#x00E7;ois Rancy is an engineer, a graduate of the &#x00C9;cole Polytechnique (1977) and the &#x00C9;cole Nationale Sup&#x00E9;rieure des T&#x00E9;l&#x00E9;communications (Paris, 1979).</para>
<para>From 1979 to 1997, he worked as systems engineer and subsequently Head of Department in France T&#x00E9;l&#x00E9;com&#x2019;s research laboratories, where he was in charge of studies on national and international satellite systems and activities relating to the spectrum and the regulation of satellite systems. As from 1992, his responsibilities expanded to cover the entire radiocommunication sphere.</para>
<para>From 1997 to 2004, he was Director of Spectrum Planning and International Affairs at the National Frequency Agency (ANFR).</para>
<para>From 2004 to 2010, he was Director-General of ANFR, responsible for frequency management in France.</para>
<para>In October 2010, he was elected Director, BR by the ITU Plenipotentiary Conference.</para>
<para>At the international level, he led the coordination of European delegations (CEPT) at WRC-03 and chaired the European Union group on spectrum management policy (RSPG) in 2007. He chaired the ITU&#x2013;R Special Committee on Regulatory and Procedural Matters from 1997 to 2003, and the World Radiocommunication Conference in 2007.</para>
<para>Fran&#x00E7;ois Rancy has been awarded the ITU Silver Medal (2007) and the titles of Chevalier de la L&#x00E9;gion d&#x2019;honneur (1998) and Ordre national du m&#x00E9;rite (1992).</para>
</section>
</chapter>
<chapter class="chapter" id="ch07" label="7" xreflabel="7">
<title>Connectivity of Ad hoc 5G Wireless Networks under Denial of Service Attacks</title>
<para><emphasis role="strong">Zituo Jin<superscript>1</superscript>, Santhanakrishnan Anand<superscript>2</superscript>, Koduvayur P. Subbalakshmi<superscript>3</superscript> and Rajarathnam Chandramouli<superscript>3</superscript></emphasis></para>
<para><superscript>1</superscript>Courant Institute of Mathematical Sciences, New York University, USA</para>
<para><superscript>2</superscript>Department of Electrical Engineering and Computer Science, New York Institute of Technology, USA</para>
<para><superscript>3</superscript>Department of Electrical and Computer Engineering, Stevens Institute of Technology, USA</para>
<section class="lev1" id="sec7-1">
<title>7.1 Introduction</title>
<para>This chapter studies the network layer effects of denial of service (DoS) in 5G wireless networks. DoS attacks by malicious nodes have mostly been researched in terms of their effect on the physical layer (i.e., loss of wireless connectivity) for the good nodes or in terms of loss of services for the good nodes. However, one vital consequence of DoS on the network layer is that it can cause unreliable, disconnected networks. This chapter presents an analysis to study the connectivity of ad hoc 5G networks under DoS. The ad hoc network is modeled as a random geometric graph and an approximation for the probability that the network is disconnected due to DoS is determined. This research indicates that in the absence of suitable defense mechanisms, DoS can disconnect a network with significantly high probability. Then, alleviation of this effect by cooperation among good users is discussed. For this, spectrum decision protocols are analyzed, in which good users make individual spectrum decisions to detect DoS and then exchange individual sensing results with their one-hop neighbors (i.e., a distributed protocol) or with a centralized controller (a centralized protocol) to increase resilience to DoS. Our distributed protocol can reduce the probability of the network becoming disconnected under DoS by 31% to two orders of magnitude. The centralized protocol can almost eliminate the effect of DoS on the network layer under certain spatial density of malicious users.</para>
<para>The number of connected Internet devices is expected to reach 50 billion by the year 2020 [1]. The Fifth generation (5G) wireless networks vision is to provide connectivity with low latency, enhanced quality-of-service (QoS), low energy, mobility, large spectral efficiency for all the devices taking into account the growth in the number of devices [2]. This motivated the deployment of unlicensed access to the 4G long term evolution (LTE) networks [3]. In the recent AWS-3 spectrum auction, cellular companies spent $44.9 billion for licenses to 65 MHz of spectrum [4]. Though unlicensed spectrum is less valuable to cellular companies due to stricter transmission rules and the inability to limit other interferers, the potential to use such bands to augment capacity in certain areas is attractive because devices can use these bands at no cost. For example, in 2014, up to 46% of potential cellular data was offloaded to Wi-Fi [5].</para>
<para>Dynamic spectrum access (DSA) [6] based cognitive radio networks [7] are expected to be an integral part of 5G wireless networks. Device-to-device (D2D) communication is also recognized as one of the technology components of the evolving 5G architecture by the European Union project, Mobile and wireless communications Enablers for the Twenty-twenty Information Society (METIS) [8]. Integration of D2D communication into incumbent 3GPP networks was discussed in [9]. Ye et al. [10] compared infrastructure vs ad hoc mode of communication for D2D communications and found ad hoc mode to be better. More detailed analysis for the achievable rates and signal-to-interference-noise-ratio (SINR) distributions were provided in [11]. Since D2D communications take place without infrastructure, it is essential to efficiently design ad hoc 5G wireless networks.</para>
<para>The access of LTE devices to unlicensed spectrum (or D2D communications) is achieved by &#x201C;listen before talk (LBT)&#x201D; spectrum etiquette [3] similar to the secondary user spectrum etiquette in dynamic spectrum access (DSA) networks [12]. Al-Dulaimi et al. proposed a modified LBT etiquette to take into account the interference constraints on Wi-Fi users [13]. However, the access to unrestricted unlicensed spectrum or D2D communications can be susceptible to denial of service (DoS) attacks [14], which have not been discussed in detail for 5G wireless networks. Few types of DoS attacks and their mitigation are discussed in [15, 16]. Li et al. discuss denial of service attacks and malicious attacks [15], where in DoS is measured based on loss of QoS and frequencies that experience DoS are black-listed. Such mechanisms can end up being inadequate because it results in false alarms although the probability of detection is large [17]. In [16], Klassen and Yang perform NS-3 based simulations to show that DoS attack can be mitigated by intrusion detection. However, these studies are not applicable to 5G wireless networks because in unlicensed access, malicious nodes can neither be localized nor identified.</para>
<para>The DoS attack that 5G networks are susceptible to, is similar to primary user emulation attack (PUEA), introduced in [18, 19], unique to cognitive radio enabled dynamic spectrum access (DSA) networks [20]. In this type of attack, a set of malicious secondary users mimic the primary transmitter, leading other secondary users to believe that a primary user is active, when, in fact, it is not. This makes the good (non-malicious) secondary users, following normal spectrum evacuation process, to vacate the spectrum unnecessarily, causing spectrum wastage. PUEA was first discussed by Chen et al. in [18] and [19]. In [18], two mechanisms to detect PUEA were proposed, namely, the distance ratio test and the distance difference test based on the correlation between the length of wireless link and the received signal strength. In [19], a defense mechanism against PUEA was proposed by locating the spurious transmission via an underlying sensor network and comparing it with the known location of the primary transmitter. Anand et al. presented the first analytical model to characterize the probability of successful PUEA based on energy detection in [21]. Jin et al. then proposed two hypothesis test based approaches [22, 23], which enable each individual good secondary user to detect PUEA.</para>
<para>In the literature, PUEA or DoS in general, has mostly been studied from the perspective of its impact on the physical (PHY) layer, but DoS can also affect the performance of DSA networks at higher layers.</para>
<para>As an example, at the link layer, DoS can cause blocking of new calls and dropping of ongoing calls for delay intolerant traffic and cause additional delay for delay tolerant traffic. Jin et al. presented the first analysis of link layer effects of DoS attacks in [24] and [25], where it was shown how PUEA can adversely affect the link layer performance if it is not carefully addressed. DoS also affects connectivity of the network. Xing and Wang discussed connectivity of ad hoc networks subject to DoS attacks [26]. However, they only analyzed nodes that get isolated (i.e., have no links incident on them). As will be shown in the example in Section 7.2, DoS can disconnect a networks without necessarily creating isolated nodes. Therefore, a more detailed analysis of the connectivity of ad hoc networks under DoS is required.</para>
<para>This chapter, addresses two issues regarding the network level impact of DoS, i.e., (i) Can DoS also affect the network connectivity of ad hoc 5G wireless networks? and (ii) Can good users collaborate in a centralized and distributed manner, to mitigate the adverse effect of DoS on the network layer?</para>
<para>First, the ad hoc network is modeled as a random geometric graph and an Erd&#x00F6;s-R&#x00E9;nyi graph based approximate analysis is performed to compute the probability that DoS disconnects the network. Then, centralized [27] and distributed [28] cooperation between the good users is studied to mitigate this effect of DoS. Results indicate that for a small network (a network with 100 secondary users or less), a 5% probability of successful DoS attack results in a significantly large (more than 20%) probability of disconnecting a connected ad hoc network. For small number of malicious users, the centralized protocol proposed in [27] can almost surely guarantee a connected network even in the presence of DoS. For large number of malicious users, the centralized protocol can reduce the probability of the network being disconnected as a consequence of DoS, by about 20%. The distributed protocol presented in [28], can reduce the probability of DoS causing a disconnected network, by about 30% to two orders of magnitude.</para>
</section>
<section class="lev1" id="sec7-2">
<title>7.2 Problem Definition</title>
<para>Consider an example ad-hoc network with three available channels, as shown in <link linkend="fig7_1">Figure 7.1</link>. Nodes communicate with each other using one of three spectrum bands. <link linkend="fig7_1">Figure 7.1</link> shows a snapshot in which node-pairs (A, D), (B, C) and (E, F) communicate on channel 1.</para>
<fig id="fig7_1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 7.1</label>
<caption><title>A typical ad-hoc network. Nodes A and D are cut-vertices. If DoS is successfully launched on channel 1, node-pairs (A, D), (B, C) and (E, F) will vacate channel 1, thereby resulting in a disconnected network.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig7_1.jpg" mime-subtype="jpeg"/>
</fig>
<para>If DoS is successfully launched on channel 1, then these node-pairs need to look for another channel for communication. Since all the three available channels are already in use, these node-pairs cannot find an alternate channel and hence lose the connectivity between them. Since A and D form the cut-vertices of the network, the set of nodes, <emphasis>{</emphasis>A, B, C<emphasis>}</emphasis> will find no means of reaching the set of nodes, <emphasis>{</emphasis>D, E, F<emphasis>}</emphasis>, thus rendering the network disconnected and hence, unreliable. Based on this example, it can be argued that DoS can affect the network layer performance of ad hoc networks adversely, if it is not carefully mitigated.</para>
<para>Since the primary function of the network layer is the routing of data packets to their destinations, a basic requirement for efficient network layer performance is the connectivity of the underlying ad hoc network graph. The good users form the vertices of the underlying network graph and two vertices share an edge if the corresponding secondary users are one hop neighbors, i.e., they are within a specified radio &#x201C;hearing distance&#x201D;, R, from each other. The network itself is connected if it is possible for packets from any node to reach any other node (possibly over several hops). One metric that can be used to measure the network layer performance is the probability of the network being connected.</para>
<para>If malicious users launch a DoS attack, some of the good users may succumb to the attack and evacuate the spectrum band, while some may be able to detect the attack and stay in the band. As shown in <link linkend="fig7_2">Figure 7.2</link>, the set of remaining nodes could possibly remain connected to each other or could also form a disconnected network where at least two nodes cannot reach each other. The probability that the network becomes disconnected under DoS, is used as a metric to gauge the severity of the attack. The analysis for the case when the network is connected before DoS is launched, is presented. The analysis can easily be extended to the case when the network is disconnected before DoS, by studying each connected component separately.</para>
<para>The objectives in this chapter are as follows.</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Develop an analysis to measure the probability that DoS disconnects a connected ad hoc network.</para></listitem>
<listitem><para>Study the probability that DoS renders a connected ad hoc network, disconnected, when deploying the centralized protocol developed in [27] and the distributed protocol developed in [28] are deployed.</para></listitem></itemizedlist>
<fig id="fig7_2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 7.2</label>
<caption><title>A connected ad hoc network with users independently and uniformly distributed in an L <emphasis>&#x00D7;</emphasis> L grid. All users have &#x201C;hearing distance&#x201D; R, within which they can communicate with each other. Each user could potentially be affected by DoS. The users succumb to the attack are marked red and have to be removed, along with all associated links. The removal of the DoS victims could lead to either a connected or disconnected network.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig7_2.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev1" id="sec7-3">
<title>7.3 Connectivity Analysis</title>
<para>The underlying network graph can be modeled as a random geometric graph [29], where each vertex represents a good user and an edge between two vertices indicates that the two corresponding users are within a distance, <emphasis>R</emphasis>, of each other. The DSA network can be viewed as a random geometric graph <emphasis>G</emphasis>(<emphasis>N, p<subscript>ij</subscript></emphasis> )<emphasis>,</emphasis> where <emphasis>N</emphasis> denotes the number of vertices (users), and <emphasis>p<subscript>ij</subscript></emphasis> denotes the probability that there exists an edge between the <emphasis>i</emphasis>th and the <emphasis>j</emphasis>th vertices, i.e., the probability that vertices <emphasis>i</emphasis> and <emphasis>j</emphasis> are less than a distance <emphasis>R</emphasis> apart. Note that <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in1.jpg" mime-subtype="jpeg"/>.</para>
<para>The probability, p<subscript>ij</subscript>, is computed as follows. Let node i be located at (x<subscript>i</subscript>, y<subscript>i</subscript>) and node j be located at (x<subscript>j</subscript>, y<subscript>j</subscript>). The co-ordinates, x<subscript>i</subscript>, y<subscript>i</subscript>, x<subscript>j</subscript> and y<subscript>j</subscript> are all independent and uniformly distributed in (0<emphasis>,</emphasis> L). Conditioned on x<subscript>i</subscript> and y<subscript>i</subscript>, the probability, p<subscript>ij</subscript>(x<subscript>i</subscript>, y<subscript>i</subscript>) can be written as</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq7-1.jpg" mime-subtype="jpeg"/></para>
<para>where</para>
<para><inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in2.jpg" mime-subtype="jpeg"/> y<subscript>min</subscript>= max(0, y<subscript>i</subscript>-R) and y<subscript>max</subscript>= min(L, y<subscript>i</subscript>+R). Averaging over x<subscript>i</subscript> and y<subscript>i</subscript>, p<subscript>ij</subscript> is obtained as</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq7-2.jpg" mime-subtype="jpeg"/></para>
<para>which is independent of i and j since x<subscript>i</subscript>, y<subscript>i</subscript>, x<subscript>j</subscript> and y<subscript>j</subscript> are all mutually independent and identically distributed. Therefore, p<subscript>ij</subscript> in Equation (7.2) can be written as <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/> and the random geometric graph can be represented as G(N, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>). First, the probability that G(N, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>) is connected needs to be computed. Since the analysis of random geometric graphs is complex because some links are dependent on others due to <emphasis>triangle inequality</emphasis> [29], the graph is analyzed as if it were a Erd&#x00F6;s-R&#x00E9;nyi graph [30]<superscript>1</superscript>.</para>
<para>Let p<subscript>c</subscript>(N) denote the probability that G(N, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>) is connected and q(N) <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in6.jpg" mime-subtype="jpeg"/> 1<emphasis>&#x2212;</emphasis>p<subscript>c</subscript>(N) denote the probability that G(N, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>) is disconnected. When G(N, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>) is disconnected, any arbitrary vertex, i, must belong to a component with k vertices, 1 <emphasis>&#x2264;</emphasis> k <emphasis>&#x2264;</emphasis> N<emphasis>&#x2212;</emphasis>1. Let G(<emphasis>k</emphasis>, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>) denote the sub-graph that contains the arbitrary vertex, i. An arbitrary vertex, i, belongs to a component with exactly, k vertices, with probability, p<superscript>(i)</superscript>(k), when G(<emphasis>k</emphasis>, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>) is connected and there is no edge from any vertex in G(<emphasis>k</emphasis>, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>) to any of the remaining N <emphasis>&#x2212;</emphasis> k vertices. Therefore, p<superscript>(i)</superscript>(k) can be written as</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq7-3.jpg" mime-subtype="jpeg"/></para>
<para>The probability that G(N, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp1.jpg" mime-subtype="jpeg"/>) is initially disconnected, q(N), can then be written as</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq7-4.jpg" mime-subtype="jpeg"/></para>
<para>and hence, the probability that G(N, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp1.jpg" mime-subtype="jpeg"/>) is initially connected, p<subscript>c</subscript>(N), can then be written as</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq7-5.jpg" mime-subtype="jpeg"/></para>
<para>where p<subscript>c</subscript>(1)=1 and p<subscript>c</subscript>(2) = <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp1.jpg" mime-subtype="jpeg"/>.</para>
<fn><para><superscript>1</superscript>Such approximations have been done in the past, e.g., [31].</para></fn>
<para>Now, it is essential to calculate the probability that DoS disconnects an initially connected network. All nodes succumb to DoS with probability, <emphasis>p</emphasis><subscript>DoS</subscript> independent of each other. When a node is affected by DoS, the node and all edges incident on the node have to be removed. This is equivalent to independently and randomly removing vertices in G(N<emphasis>,</emphasis> <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp1.jpg" mime-subtype="jpeg"/>)<emphasis>,</emphasis> along with all associated links, with probability <emphasis>p</emphasis><subscript>DoS</subscript>. There moval, thus, can be modeled as a Bernoulli trial with success probability <emphasis>p</emphasis><subscript>DoS</subscript>. Hence, the number of secondary users becoming victims of DoS, <emphasis>n</emphasis><subscript>DoS</subscript>, is binomially distributed, i.e., <emphasis>n</emphasis><subscript>DoS</subscript> <emphasis>&#x223C;</emphasis> <emphasis>Binomial</emphasis> (<emphasis>N, p</emphasis><subscript>DoS</subscript>)<emphasis>.</emphasis> After the removal process is completed, the resultant graph is modeled as a new random Erd&#x00F6;s-R&#x00E9;nyi graph <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in7.jpg" mime-subtype="jpeg"/>, where <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in8.jpg" mime-subtype="jpeg"/> and <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in9.jpg" mime-subtype="jpeg"/> is given by</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq7-6.jpg" mime-subtype="jpeg"/></para>
<para>The probability that <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in10.jpg" mime-subtype="jpeg"/> is connected, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in11.jpg" mime-subtype="jpeg"/>, can be obtained from Equation (7.5). The probability that DoS disconnects a network that is initially connected, i.e., the conditional probability, Pr{<emphasis>G</emphasis>(<emphasis>N</emphasis>&#x00B4;, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>) disconnected<emphasis>|</emphasis> <emphasis>G</emphasis>(<emphasis>N</emphasis>,<inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>)connected}, denoted by <emphasis>p</emphasis><subscript>disconnect</subscript> , can be written as</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq7-7.jpg" mime-subtype="jpeg"/></para>
<para>Since the event that <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in10.jpg" mime-subtype="jpeg"/> is connected is a subset of the event that <emphasis>G</emphasis>(<emphasis>N</emphasis>,<inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>) is connected, <emphasis>p</emphasis><subscript>disconnect</subscript> can be evaluated as</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq7-8.jpg" mime-subtype="jpeg"/></para>
<para>where <emphasis>p<subscript>c</subscript></emphasis>(.) is given by Equation (7.5).</para>
<para>The discussion thus far for the derivation of <emphasis>p</emphasis><subscript>disconnect</subscript> in Equation (7.8) does not consider any defense mechanisms against DoS. It is noted from Equation (7.8) that the factor that can be controlled to reduce the value of <emphasis>p</emphasis><subscript>disconnect</subscript> is the probability that nodes succumb to PUEA, <emphasis>p</emphasis><subscript>DoS</subscript>. One can reduce <emphasis>p</emphasis><subscript>DoS</subscript> by deploying the detection mechanism for each individual secondary user, specified in [27]. The value of <emphasis>p</emphasis><subscript>DoS</subscript> can be further reduced by deploying the centralized protocol presented in [27] or the distributed protocol developed in [28]. The centralized protocol developed in [27] is more efficient in keeping the network connected even in the presence of DoS attacks (as will be seen in Section 7.4), but requires the presence of a centralized controller, which may or may not be possible in all DSA networks. The distributed protocol is not as efficient as the centralized protocol (as will be observed from the results depicted in Section 7.4), but is less complex to implement.</para>
</section>
<section class="lev1" id="sec7-4">
<title>7.4 Results and Discussions</title>
<para>The locations of all the users including both good and malicious users are considered to be uniformly distributed in a 2000 m <emphasis>&#x00D7;</emphasis> 2000 m square grid (i.e., <emphasis>L</emphasis> = 2000). Each user has a transmission range of <emphasis>R</emphasis> = 250 m [7]. Plugging in these values in Equations (7.1) and (7.2), <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/> = 0.0436. The number of users in the network (i.e., the number of vertices in <emphasis>G</emphasis>(<emphasis>N</emphasis>, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>)), <emphasis>N</emphasis>, is set as 100, 200 and 500, respectively. First, the effect of DoS on the connectivity of the network is evaluated. For this, the probability of successful DoS attack, <emphasis>p</emphasis>DoS, is varied from 0 to 1 in increments of 0.05. <link linkend="fig7_3">Figure 7.3</link>(a) depicts the probabilities that DoS disconnects an initially connected ad hoc network (i.e., <emphasis>p</emphasis><subscript>disconnect</subscript> specified in Equation (7.8)) with different numbers of users. The legends in <link linkend="fig7_3">Figure 7.3</link>(a) are explained as follows. The numbers &#x201C;100&#x201D;, &#x201C;200&#x201D; and &#x201C;500&#x201D; represent 100, 200 and 500 secondary users in the network, respectively, while the parenthesized letters &#x201C;S&#x201D; and &#x201C;A&#x201D; represent simulations results (obtained by C based simulations on UBUNTU Linux platform) and analytical results (using the analysis presented in Section 7.3), respectively.</para>
<fig id="fig7_3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 7.3</label>
<caption><title>Comparison of probability that PUEA disconnects an initially connected network with different numbers of secondary users, N and different values of the probability that any two secondary users have a link, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>. In Figure (a), <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/> = 0.0436. The numbers &#x201C;100&#x201D;, &#x201C;200&#x201D; and &#x201C;500&#x201D; in the legends represent 100, 200 and 500 secondary users in the network, respectively, while the parenthesized letters &#x201C;S&#x201D; and &#x201C;A&#x201D; represent the results from simulations and analysis, respectively. In Figure (b), The numbers &#x201C;0.02&#x201D;, &#x201C;0.03&#x201D;, &#x201C;0.04&#x201D;, &#x201C;0.05&#x201D; and &#x201C;0.06&#x201D; in the legends represent the probabilities that any two secondary users have a direct link set as &#x201C;0.02&#x201D;, &#x201C;0.03&#x201D;, &#x201C;0.04&#x201D;, &#x201C;0.05&#x201D; and &#x201C;0.06&#x201D;, respectively.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig7_3.jpg" mime-subtype="jpeg"/>
</fig>
<para>It can be seen from <link linkend="fig7_3">Figure 7.3</link>(a) that as the number of users increases, the network becomes more resilient to disconnectedness under DoS. For example, when <emphasis>p</emphasis><subscript>DoS</subscript> = 0<emphasis>.</emphasis>45, the networks with 100 and 200 secondary users can have a <emphasis>p</emphasis><subscript>disconnect</subscript> up to about 0.99 and 0.57, respectively, while the network with 500 secondary users achieves almost 0 for <emphasis>p</emphasis><subscript>disconnect</subscript> . That is equivalent to saying that the network with 500 secondary users would almost surely remain connected under DoS as long as the probability of successful DoS attack does not exceed 0.45. This is because, as <emphasis>N</emphasis> increases, for the same <emphasis>R</emphasis>, i.e., for the same value of <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>, the average number of neighbors, <emphasis>N</emphasis><inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>, increases for each node. This means that the degree of each node increases and therefore, the probability that the network is connected, increases [29, 30]. It is also observed from <link linkend="fig7_3">Figure 7.3</link>(a) that when the probability of successful DoS attack is high enough, e.g., when <emphasis>p</emphasis><subscript>DoS</subscript> = 0<emphasis>.</emphasis>9, which is the case in networks with no defense mechanisms for DoS, even the network with 500 secondary users becomes disconnected under DoS.</para>
<para>The effect of the probability that any two secondary users have a direct link, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>, on the probability that DoS disconnects a initially connected network, <emphasis>p</emphasis><subscript>disconnect</subscript>, is also studied. The value of <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/> can be varied in practice, either by modifying <emphasis>R</emphasis> or by increasing the area of the square grid, <emphasis>L</emphasis>2. The number of secondary users is fixed at <emphasis>N</emphasis> = 200 and the probability of successful PUEA <emphasis>p</emphasis><subscript>DoS</subscript> is varied from 0 to 1 in increments of 0.05. <link linkend="fig7_3">Figure 7.3</link>(b) depicts the probabilities that DoS disconnects an initially connected network with respect to <emphasis>p</emphasis><subscript>DoS</subscript> for varying values of <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>. The numbers &#x201C;0.02&#x201D;, &#x201C;0.03&#x201D;, &#x201C;0.04&#x201D;, &#x201C;0.05&#x201D; and &#x201C;0.06&#x201D; in the legends represent <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/> = &#x201C;0.02&#x201D;, &#x201C;0.03&#x201D;, &#x201C;0.04&#x201D;, &#x201C;0.05&#x201D; and &#x201C;0.06&#x201D;, respectively. It is observed from <link linkend="fig7_3">Figure 7.3</link>(b) that as <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/> increases from 0.02 to 0.06, <emphasis>p</emphasis><subscript>disconnect</subscript> decreases, indicating that the network is more likely to remain connected under DoS. For example, when <emphasis>p</emphasis><subscript>DoS</subscript> = 0<emphasis>.</emphasis>4 and <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/> = 0<emphasis>.</emphasis>02, the network is almost surely disconnected, while for the same value of <emphasis>p</emphasis><subscript>DoS</subscript>, when <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/> = 0<emphasis>.</emphasis>06, the network is almost surely connected. This is intuitively correct because <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/> increases when the grid size, <emphasis>L</emphasis>, decreases or when the transmission range, <emphasis>R</emphasis>, increases. In both these cases, more nodes tend to be in the transmission range of each other, even after DoS, which, in turn, results in more number of edges in the graph after the removal of nodes that succumb to DoS, thereby increasing the probability that the graph is connected even under DoS attack. However, increase in <emphasis>p</emphasis><subscript>DoS</subscript> results in removal of more nodes and edges, and can still disconnect the network with a high probability. For example, when <emphasis>p</emphasis><subscript>DoS</subscript> &#62; 0<emphasis>.</emphasis>85, the network is almost surely disconnected for <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/> &#x2264; 0<emphasis>.</emphasis>06.</para>
<para>Next, the effect of DoS on the network connectivity performance in the presence of defense mechanisms for DoS are studied, considering three defense mechanisms, (i) the individual detection mechanism proposed in [27], (ii) the centralized protocol developed in [27] and (iii) the distributed protocol developed in [28]. A network with 200 secondary users (i.e., <emphasis>N</emphasis> = 200 vertices in <emphasis>G</emphasis>(<emphasis>N</emphasis>, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/inp.jpg" mime-subtype="jpeg"/>)) is considered and the strength of DoS is increased by increasing the average number of malicious users, <emphasis>E</emphasis>[<emphasis>Nm</emphasis>]. For each value of <emphasis>E</emphasis>[<emphasis>Nm</emphasis>], the probability of successful DoS, <emphasis>p</emphasis><subscript>DoS</subscript>, is computed for the individual detection mechanism, the centralized protocol (according to the analysis described in [27]) and for the distributed protocol in [28].</para>
<para><link linkend="fig7_4">Figure 7.4</link> shows the probabilities that DoS disconnects an initially connected network, <emphasis>p</emphasis><subscript>disconnect</subscript> , after deploying DoS detection and mitigation mechanisms<superscript>2</superscript>. It is observed from <link linkend="fig7_4">Figure 7.4</link> that different DoS detection and mitigation mechanisms exhibit significantly different impact on keeping the network connected. While the network implementing only the individual detection mechanism shows some resilience to DoS compared to the network with no defense mechanisms against DoS<superscript>3</superscript>, its ability to keep the network connected under DoS is still poor. For example, even with 20 malicious users launching DoS, the probability of network becoming disconnected is about 0.7. This shows that when network level impact is considered, it makes more sense for a collaborative approach to spectrum decision than taking an individual decision. The results shown in <link linkend="fig7_4">Figure 7.4</link> indicate that the centralized protocol proposed in [27] and the distributed protocol proposed in [28] are effective in maintaining the network connected (and hence, increase reliability) under DoS. For example, when the network has no more than 60 malicious users, the centralized protocol can almost surely maintain the network connected under DoS. When the number of malicious users increases, the centralized protocol can still reduce the probability of the network becoming disconnected due to PUEA by about 20%. The distributed protocol proposed in [28] can improve the probability of the network becoming disconnected due to DoS by about 31% when the number of malicious users is large. For small number of malicious users, the distributed protocol can improve the probability that DoS disconnects the network, by two orders of magnitude.</para>
<fig id="fig7_4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 7.4</label>
<caption><title>Comparison on probability that DoS disconnects an initially connected network after deploying detection and mitigation mechanisms. The probability that any two secondary users have a direct link is 0.0436. The legends &#x201C;Individual detection&#x201D; represents the individual detection mechanism described in [27]. &#x201C;Centralized protocol&#x201D; and &#x201C;Distributed protocol&#x201D; represent the centralized and the distributed protocols proposed in [27] and [28], respectively.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig7_4.jpg" mime-subtype="jpeg"/>
</fig>
<para>It is observed that the performance of the distributed protocol is better than that of the centralized protocol for lower loads of malicious users. To understand this behavior in more detail, the probability of successful DoS when deploying the distributed protocol proposed in [28] with that when deploying the centralized protocol proposed in [27] are compared and depicted in <link linkend="fig7_5">Figure 7.5</link>. It is observed that the distributed protocol outperforms the centralized protocol in terms of successfully detecting DoS when the expected number of malicious users <emphasis>E</emphasis>[<emphasis>Nm</emphasis>] <emphasis>&#60;</emphasis> 45. For larger number of malicious users, the centralized protocol results in smaller probability of successful DoS and therefore, smaller probability of a disconnected ad hoc network under DoS. The reason for this behavior is explained below.</para>
<para>In a network with N nodes, let the probability that any node succumbs to DoS while implementing the individual detection mechanism alone, be <emphasis>p</emphasis><subscript>DoS</subscript>. While deploying the centralized protocol in [27], a node finally succumbs to DoS if the fraction of nodes individually succumbing to DoS (using the individual detection mechanism alone) is greater than a specified threshold, i.e., the probability of successful DoS while deploying the centralized protocol, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in4.jpg" mime-subtype="jpeg"/>, is approximately written as</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq7-9.jpg" mime-subtype="jpeg"/></para>
<para><superscript>2</superscript>The legends &#x201C;Individual detection&#x201D; represents the individual detection mechanism described in [27], while &#x201C;Centralized protocol&#x201D; and &#x201C;Distributed protocol&#x201D; represent the centralized and the distributed protocols proposed in [27] and in [28], respectively.</para>
<para><superscript>3</superscript>In such a network, every time DoS is launched, it will succeed with probability one.</para>
<fig id="fig7_5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 7.5</label>
<caption><title>Probability of successful DoS by using the centralized protocol in [27] and the distributed protocol presented in [28].</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig7_5.jpg" mime-subtype="jpeg"/>
</fig>
<para>In a network deploying the distributed protocol presented in [28], a node succumbs to DoS if the node itself and ALL its neighbors succumb to DoS while making the individual decision. Therefore, the probability of successful DoS while deploying the distributed protocol with a node with <emphasis>N</emphasis> 0 neighbors, <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in5.jpg" mime-subtype="jpeg"/>, can be written as</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq7-10.jpg" mime-subtype="jpeg"/></para>
<para>When the number of malicious users is small, each node can detect DoS better while implementing the individual detection mechanism alone, i.e., <emphasis>p</emphasis><subscript>DoS</subscript> is small. For smaller values of <emphasis>p</emphasis><subscript>DoS</subscript>, the value of <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in5.jpg" mime-subtype="jpeg"/> in Equation (7.10) is negligible and is likely to be smaller than the value of <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in4.jpg" mime-subtype="jpeg"/> in Equation (7.9). However, when the number of malicious users increase, <emphasis>p</emphasis><subscript>DoS</subscript> increases and the value of <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in5.jpg" mime-subtype="jpeg"/> in Equation (7.10) maybe significantly larger than that of <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in4.jpg" mime-subtype="jpeg"/> in Equation (7.9), resulting in better performance for the centralized protocol.</para>
</section>
<section class="lev1" id="sec7-5">
<title>7.5 Conclusions</title>
<para>This chapter analyzed the network layer performance of ad hoc 5G wireless networks under denial of service attacks, in terms connectivity. The ad hoc network was modeled as a random geometric graph and an approximate Erd&#x00F6;s-R&#x00E9;nyi graph based analysis was performed to determine the probability that DoS disconnects a connected ad hoc network. Numerical results indicated that although connectivity of the network under DoS can be enhanced in a denser network, DoS should always be treated with defense mechanisms for the network to stay connected when nodes are more vulnerable to the attack. The network layer performance when deploying centralized and distributed defense mechanisms against DoS was also discussed. The distributed protocol reduced the probability of the network becoming disconnected by 31% to two orders of magnitude. The centralized protocol was shown to prevent the network from becoming disconnected when the number of malicious users is small. When the number of malicious users increases, the centralized protocol can reduce the probability of DoS disconnecting the network, by about 20%.</para>
</section>
<section class="lev1" id="sec7-6">
<title>References</title>
<para>[1] UMTS, &#x201C;Mobile traffic forecasts 2010&#x2013;2020,&#x201D; Report, UMTS Forum, Jan. 2011. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B1%5D+UMTS%2C+%22Mobile+traffic+forecasts+2010-2020%2C%22+Report%2C+UMTS+Forum%2C+Jan%2E+2011%2E" target="_blank">Google Scholar</ulink></para>
<para>[2] D. R. C. S. E. C. Limited, &#x201C;5G Vision,&#x201D; White Paper, Feb. 2015. [Online]. Available: http://www.samsung.com/global/business-images/insights/2015/Samsung-5G-Vision-0.pdf <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B2%5D+D%2E+R%2E+C%2E+S%2E+E%2E+C%2E+Limited%2C+%225G+Vision%2C%22+White+Paper%2C+Feb%2E+2015%2E+%5BOnline%5D%2E+Available%3A+http%3A%2F%2Fwww%2Esamsung%2Ecom%2Fglobal%2Fbusiness-images%2Finsights%2F2015%2FSamsung-5G-Vision-0%2Epdf" target="_blank">Google Scholar</ulink></para>
<para>[3] H. Technologies, &#x201C;U-LTE: Unlicensed spectrum utilization of LTE.&#x201D; [Online]. Available: http://www.huawei.com/ilink/en/download/HW\327803</para>
<para>[4] B. Munson, &#x201C;Washington glowing over AWS-3 auction results,&#x201D; Wireless Week, Jan. 2015. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B4%5D+B%2E+Munson%2C+%22Washington+glowing+over+AWS-3+auction+results%2C%22+Wireless+Week%2C+Jan%2E+2015%2E" target="_blank">Google Scholar</ulink></para>
<para>[5] &#x201C;Cisco visual networking index: Global mobile data traffic forecast update 2014 2019,&#x201D; Cisco White Paper. [Online]. Available: http://cisco. com/c/en/us/solutions/collateral/service-provider/visual-networking-ind exvni/whitepaperc11-520862.html</para>
<para>[6] C. Cordeiro, K. Challapali, and M. Ghosh, &#x201C;Cognitive phy and mac layers for dynamic spectrum access and sharing of tv bands,&#x201D; Proceeding, First Intl. Workshop on Technol. and Policy for Accessing Spectrum (TAPAS) 2006, Aug. 2006. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B6%5D+C%2E+Cordeiro%2C+K%2E+Challapali%2C+and+M%2E+Ghosh%2C+%22Cognitive+phy+and+mac+layers+for+dynamic+spectrum+access+and+sharing+of+tv+bands%2C%22+Proceeding%2C+First+Intl%2E+Workshop+on+Technol%2E+and+Policy+for+Accessing+Spectrum+%28TAPAS%29+2006%2C+Aug%2E+2006%2E" target="_blank">Google Scholar</ulink></para>
<para>[7] R. Chen, J. M. Park, and K. Bian, &#x201C;Robust distributed spectrum sensing in cognitive radio networks,&#x201D; Proceedings, IEEE Conference on Computer Communications (INFOCOM&#x2019;2008), pp. 1876&#x2013;1884, Apr. 2008. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B7%5D+R%2E+Chen%2C+J%2E+M%2E+Park%2C+and+K%2E+Bian%2C+%22Robust+distributed+spectrum+sensing+in+cognitive+radio+networks%2C%22+Proceedings%2C+IEEE+Conference+on+Computer+Communications+%28INFOCOM%272008%29%2C+pp%2E+1876-1884%2C+Apr%2E+2008%2E" target="_blank">Google Scholar</ulink></para>
<para>[8] G. Fodor, &#x201C;D2D communications: What part will it play in 5G,&#x201D; Jul. 2014. [Online]. Available: http://www.ericsson.com/research-blog/5g/device-device-communications/ <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B8%5D+G%2E+Fodor%2C+%22D2D+communications%3A+What+part+will+it+play+in+5G%2C%22+Jul%2E+2014%2E+%5BOnline%5D%2E+Available%3A+http%3A%2F%2Fwww%2Eericsson%2Ecom%2Fresearch-blog%2F5g%2Fdevice-device-communications%2F" target="_blank">Google Scholar</ulink></para>
<para>[9] X. Lin, J. G. Andrews, A. Ghosh, and R. Ratasuk, &#x201C;An overview of 3GPP device-to-device proximity services,&#x201D; IEEE Commun. Mag., vol. 52, no. 4, pp. 40&#x2013;48, Apr. 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B9%5D+X%2E+Lin%2C+J%2E+G%2E+Andrews%2C+A%2E+Ghosh%2C+and+R%2E+Ratasuk%2C+%22An+overview+of+3GPP+device-to-device+proximity+services%2C%22+IEEE+Commun%2E+Mag%2E%2C+vol%2E+52%2C+no%2E+4%2C+pp%2E+40-48%2C+Apr%2E+2014%2E" target="_blank">Google Scholar</ulink></para>
<para>[10] Q. Ye, M. Al-Shalash, C. Caramanis, and J. G. Andrews, &#x201C;Resource optimization in device-to-device cellular systems using time-frequency hopping.&#x201D; [Online]. Available: http://arxiv.org/abs/1309.4062 <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B10%5D+Q%2E+Ye%2C+M%2E+Al-Shalash%2C+C%2E+Caramanis%2C+and+J%2E+G%2E+Andrews%2C+%22Resource+optimization+in+device-to-device+cellular+systems+using+time-frequency+hopping%2E%22+%5BOnline%5D%2E+Available%3A+http%3A%2F%2Farxiv%2Eorg%2Fabs%2F1309%2E4062" target="_blank">Google Scholar</ulink></para>
<para>[11] X. Lin, J. G. Andrews, and A. Ghosh, &#x201C;Spectrum sharing for device-to-device communications in cellular networks.&#x201D; [Online]. Available: http://arxiv.org/abs/1305.4219 <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B11%5D+X%2E+Lin%2C+J%2E+G%2E+Andrews%2C+and+A%2E+Ghosh%2C+%22Spectrum+sharing+for+device-to-device+communications+in+cellular+networks%2E%22+%5BOnline%5D%2E+Available%3A+http%3A%2F%2Farxiv%2Eorg%2Fabs%2F1305%2E4219" target="_blank">Google Scholar</ulink></para>
<para>[12] &#x201C;IEEE Standards for information technology &#x2013; Telecommunications and information exchange between systems &#x2013; Wireless Regional Area Networks-Specific Requirements &#x2013; Part 22-Cognitive wireless RAN medium access control (MAC) and physical layer (PHY) specifications: Policies and procedures for operation in the TV bands,&#x201D; Jun. 2006.</para>
<para>[13] Al-Dulaimi, S.l-Rubaye, Q. Ni, and E. Sousa, &#x201C;5G communications race: Pursuit of more capacity triggers LTE in unlicensed band,&#x201D; IEEE Vehic. Technol. Mag., vol. 10, no. 1, pp. 43&#x2013;51, Feb. 2015. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B13%5D+Al-Dulaimi%2C+S%2El-Rubaye%2C+Q%2E+Ni%2C+and+E%2E+Sousa%2C+%225G+communications+race%3A+Pursuit+of+more+capacity+triggers+LTE+in+unlicensed+band%2C%22+IEEE+Vehic%2E+Technol%2E+Mag%2E%2C+vol%2E+10%2C+no%2E+1%2C+pp%2E+43-51%2C+Feb%2E+2015%2E" target="_blank">Google Scholar</ulink></para>
<para>[14] M. Hangargi, &#x201C;Business need for security: Denial of service attacks in wireless networks,&#x201D; Masters Dissertation, Department of Information Assurance, North Eastern University, Apr. 2012. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B14%5D+M%2E+Hangargi%2C+%22Business+need+for+security%3A+Denial+of+service+attacks+in+wireless+networks%2C%22+Masters+Dissertation%2C+Department+of+Information+Assurance%2C+North+Eastern+University%2C+Apr%2E+2012%2E" target="_blank">Google Scholar</ulink></para>
<para>[15] Y. Li, B. Kaur, and B. Andersen, &#x201C;Denial of service prevention for 5G,&#x201D; Wireless Personal Commun., vol. 57, no. 3, pp. 365&#x2013;376, Apr. 2011. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B15%5D+Y%2E+Li%2C+B%2E+Kaur%2C+and+B%2E+Andersen%2C+%22Denial+of+service+prevention+for+5G%2C%22+Wireless+Personal+Commun%2E%2C+vol%2E+57%2C+no%2E+3%2C+pp%2E+365-376%2C+Apr%2E+2011%2E" target="_blank">Google Scholar</ulink></para>
<para>[16] M. Klassen and N. Yang, &#x201C;Anomaly based intrusion detection in wireless networks using Bayesian classifier,&#x201D; Proc., Intl. Conf. on Advanced Computational Intelligence (ICACI&#x2019;2012), Sept. 2012.</para>
<para>[17] S. Anand, S. Sengupta, K. Hong, K. P. Subbalakshmi, R. Chandramouli, and H. Cam, &#x201C;Exploiting channel fragmentation and aggregation/bonding to create security vulnerabilities,&#x201D; IEEE Trans. on Vehic. Technol., vol. 63, no. 8, pp. 3867&#x2013;3874, Oct. 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B17%5D+S%2E+Anand%2C+S%2E+Sengupta%2C+K%2E+Hong%2C+K%2E+P%2E+Subbalakshmi%2C+R%2E+Chandramouli%2C+and+H%2E+Cam%2C+%22Exploiting+channel+fragmentation+and+aggregation%2Fbonding+to+create+security+vulnerabilities%2C%22+IEEE+Trans%2E+on+Vehic%2E+Technol%2E%2C+vol%2E+63%2C+no%2E+8%2C+pp%2E+3867-3874%2C+Oct%2E+2014%2E" target="_blank">Google Scholar</ulink></para>
<para>[18] R. Chen and J. M. Park, &#x201C;Ensuring trustworthy spectrum sensing in cognitive radio networks,&#x201D; Proceedings, IEEE Workshop on Networking Technologies for Software Defined Radio Networks, pp. 110&#x2013;119, Sep. 2006. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B18%5D+R%2E+Chen+and+J%2E+M%2E+Park%2C+%22Ensuring+trustworthy+spectrum+sensing+in+cognitive+radio+networks%2C%22+Proceedings%2C+IEEE+Workshop+on+Networking+Technologies+for+Software+Defined+Radio+Networks%2C+pp%2E+110-119%2C+Sep%2E+2006%2E" target="_blank">Google Scholar</ulink></para>
<para>[19] R. Chen, J. M. Park, and J. H. Reed, &#x201C;Defense against primary user emulation attacks in cognitive radio networks,&#x201D; IEEE Journal on Selected Areas in Communications: Special Issue on Cognitive Radio Theory and Applications, vol. 26, no. 1, pp. 25&#x2013;37, Jan. 2008. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B19%5D+R%2E+Chen%2C+J%2E+M%2E+Park%2C+and+J%2E+H%2E+Reed%2C+%22Defense+against+primary+user+emulation+attacks+in+cognitive+radio+networks%2C%22+IEEE+Journal+on+Selected+Areas+in+Communications%3A+Special+Issue+on+Cognitive+Radio+Theory+and+Applications%2C+vol%2E+26%2C+no%2E+1%2C+pp%2E+25-37%2C+Jan%2E+2008%2E" target="_blank">Google Scholar</ulink></para>
<para>[20] M. Wyglinski, M. Nekovee, and Y. T. Hou, Cognitive Radio Communications and Networks: Principles and Practice. Elsevier Inc., 2010. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B20%5D+M%2E+Wyglinski%2C+M%2E+Nekovee%2C+and+Y%2E+T%2E+Hou%2C+Cognitive+Radio+Communications+and+Networks%3A+Principles+and+Practice%2E+Elsevier+Inc%2E%2C+2010%2E" target="_blank">Google Scholar</ulink></para>
<para>[21] S. Anand, Z. Jin, and K. P. Subbalakshmi, &#x201C;An analytical model for primary user emulation attacks in cognitive radio networks,&#x201D; Proceedings, IEEE Symposium of New Frontiers in Dynamic Spectrum Access Networks (DySPAN&#x2019;2008), Oct. 2008. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B21%5D+S%2E+Anand%2C+Z%2E+Jin%2C+and+K%2E+P%2E+Subbalakshmi%2C+%22An+analytical+model+for+primary+user+emulation+attacks+in+cognitive+radio+networks%2C%22+Proceedings%2C+IEEE+Symposium+of+New+Frontiers+in+Dynamic+Spectrum+Access+Networks+%28DySPAN%272008%29%2C+Oct%2E+2008%2E" target="_blank">Google Scholar</ulink></para>
<para>[22] Z. Jin, S. Anand, and K. P. Subbalakshmi, &#x201C;Detecting primary user emulation attacks in dynamic spectrum access networks,&#x201D; Proceedings, IEEE International Conference on Communications (ICC&#x2019;2009), Jun. 2009. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B22%5D+Z%2E+Jin%2C+S%2E+Anand%2C+and+K%2E+P%2E+Subbalakshmi%2C+%22Detecting+primary+user+emulation+attacks+in+dynamic+spectrum+access+networks%2C%22+Proceedings%2C+IEEE+International+Conference+on+Communications+%28ICC%272009%29%2C+Jun%2E+2009%2E" target="_blank">Google Scholar</ulink></para>
<para>[23] Z. Jin, S. Anand, and K. P. Subbalakshmi, &#x201C;Mitigating primary user emulation attacks in dynamic spectrum access networks using hypothesis testing,&#x201D; ACM SIGMOBILE Mobile Computing and Communications Review, Special Issue on Cognitive Radio Technologies and Systems, vol. 13, no. 2, pp. 74&#x2013;85, April 2009. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B23%5D+Z%2E+Jin%2C+S%2E+Anand%2C+and+K%2E+P%2E+Subbalakshmi%2C+%22Mitigating+primary+user+emulation+attacks+in+dynamic+spectrum+access+networks+using+hypothesis+testing%2C%22+ACM+SIGMOBILE+Mobile+Computing+and+Communications+Review%2C+Special+Issue+on+Cognitive+Radio+Technologies+and+Systems%2C+vol%2E+13%2C+no%2E+2%2C+pp%2E+74-85%2C+April+2009%2E" target="_blank">Google Scholar</ulink></para>
<para>[24] Z. Jin, S. Anand, and K. P. Subbalakshmi, &#x201C;Performance analysis of dynamic spectrum access networks under primary user emulation attacks,&#x201D; Proceedings, IEEE Global Communications Conference (GLOBECOM&#x2019;2010), Dec. 2010. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B24%5D+Z%2E+Jin%2C+S%2E+Anand%2C+and+K%2E+P%2E+Subbalakshmi%2C+%22Performance+analysis+of+dynamic+spectrum+access+networks+under+primary+user+emulation+attacks%2C%22+Proceedings%2C+IEEE+Global+Communications+Conference+%28GLOBECOM%272010%29%2C+Dec%2E+2010%2E" target="_blank">Google Scholar</ulink></para>
<para>[25] Z. Jin, S. Anand, and K. P. Subbalakshmi, &#x201C;Impact of primary user emulation attacks on dynamic spectrum access networks,&#x201D; IEEE Trans. on Commun., vol. 60, no. 9, pp. 2635&#x2013;2643, Sep. 2012. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B25%5D+Z%2E+Jin%2C+S%2E+Anand%2C+and+K%2E+P%2E+Subbalakshmi%2C+%22Impact+of+primary+user+emulation+attacks+on+dynamic+spectrum+access+networks%2C%22+IEEE+Trans%2E+on+Commun%2E%2C+vol%2E+60%2C+no%2E+9%2C+pp%2E+2635-2643%2C+Sep%2E+2012%2E" target="_blank">Google Scholar</ulink></para>
<para>[26] F. Xing and W. Wang, &#x201C;Understanding dynamic denial of service attacks in mobile ad hoc networks,&#x201D; Proc., IEEE Military Commun. Conf. (MILCOM&#x2019;2006), Oct. 2006. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B26%5D+F%2E+Xing+and+W%2E+Wang%2C+%22Understanding+dynamic+denial+of+service+attacks+in+mobile+ad+hoc+networks%2C%22+Proc%2E%2C+IEEE+Military+Commun%2E+Conf%2E+%28MILCOM%272006%29%2C+Oct%2E+2006%2E" target="_blank">Google Scholar</ulink></para>
<para>[27] Z. Jin, S. Anand, and K. P. Subbalakshmi, &#x201C;Robust spectrum decision protocol against primary user emulation attacks in dynamic spectrum access networks,&#x201D; Proceedings, IEEE Global Communications Conference (GLOBECOM&#x2019;2010), Dec. 2010. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B27%5D+Z%2E+Jin%2C+S%2E+Anand%2C+and+K%2E+P%2E+Subbalakshmi%2C+%22Robust+spectrum+decision+protocol+against+primary+user+emulation+attacks+in+dynamic+spectrum+access+networks%2C%22+Proceedings%2C+IEEE+Global+Communications+Conference+%28GLOBECOM%272010%29%2C+Dec%2E+2010%2E" target="_blank">Google Scholar</ulink></para>
<para>[28] Z. Jin, S. Anand, and K. P. Subbalakshmi, &#x201C;NEAT: A NEighbor AssisTed spectrum decision protocol for resilience against PUEA,&#x201D; Cognitive Radio Eletromagnetic Spectrum Security (CRESS&#x2019;2014), Oct. 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B28%5D+Z%2E+Jin%2C+S%2E+Anand%2C+and+K%2E+P%2E+Subbalakshmi%2C+%22NEAT%3A+A+NEighbor+AssisTed+spectrum+decision+protocol+for+resilience+against+PUEA%2C%22+Cognitive+Radio+Eletromagnetic+Spectrum+Security+%28CRESS%272014%29%2C+Oct%2E+2014%2E" target="_blank">Google Scholar</ulink></para>
<para>[29] M. Penrose, Random Geometric Graphs. Oxford University Press, 2003. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B29%5D+M%2E+Penrose%2C+Random+Geometric+Graphs%2E+Oxford+University+Press%2C+2003%2E" target="_blank">Google Scholar</ulink></para>
<para>[30] B. Bollob&#x00E1;s, Random Graphs, 2nd ed. Cambridge University Press, 2001.</para>
<para>[31] D. Lu, X. Huang, P. Li, and J. Fan, &#x201C;Connectivity of large-scale cognitive radio ad hoc networks,&#x201D; Proc., IEEE Intl. Conf. on Comp. Commun. (INFOCOM&#x2019;2012), Mar. 2012. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B31%5D+D%2E+Lu%2C+X%2E+Huang%2C+P%2E+Li%2C+and+J%2E+Fan%2C+%22Connectivity+of+large-scale+cognitive+radio+ad+hoc+networks%2C%22+Proc%2E%2C+IEEE+Intl%2E+Conf%2E+on+Comp%2E+Commun%2E+%28INFOCOM%272012%29%2C+Mar%2E+2012%2E" target="_blank">Google Scholar</ulink></para>
</section>
<section class="lev1" id="sec7-7">
<title>About the Authors</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig7_6.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Zituo Jin</emphasis> (SM&#x2019;08) is currently pursuing his Master&#x2019;s program in financial management at the Courant Institute of Mathematical Sciences in New York University (NYU). He graduated with a Ph.D. from the Department of Electrical and Computer Engineering at Stevens Institute of Technology, Hoboken, New Jersey. He received the B.E. degree in the Department of Information Engineering from Xi&#x2019;an Jiaotong University, Xi&#x2019;an, China, in 2006.</para>
<para>His current research interests include cognitive radio network security and denial-of-service attack in dynamic spectrum access networks. He is a student member of IEEE, IEEE communications society and IEEE computer society.</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig7_7.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Santhanakrishnan Anand</emphasis> received his Ph.D. degree from the Indian Institute of Science, Bangalore, India, in 2003. He is currently an Assistant Professor at Department of Electrical and Computer Engineering, New York Institute of Technology.</para>
<para>His current areas of research include spectrum management and security in next generation wireless networks, covert timing channels, social media analytics, dynamics of Wikipedia and information propagation in Internet media.</para>
<para>Dr. Santhanakrishnan Anand received the Seshagiri Kaikini medal for the best Ph.D. dissertation in the electrical sciences division, Indian Institute of Science for the academic year 2003&#x2013;2004. He has represented Samsung Electronics in 3GPP SA2 and IEEE 802.20 standardization meetings.</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig7_8.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Koduvayur P. Subbalakshmi (Suba)</emphasis> is a Professor at Stevens Institute of Technology. She will serve as a Jefferson Science Fellow at the US Department of State during the academic year 2016&#x2013;2017.</para>
<para>Her research interests include: Cognitive radio networks, Cognitive Mobile Cloud Computing, Social Media Analytics and Wireless security. She is a Subject Matter Expert for the National Spectrum Consortium.</para>
<para>She is a Founding Associate Editor of the IEEE Transactions on Cognitive Communications and Networking and the Founding Chair of the Security Special Interest Group of the IEEE Technical Committee on Cognitive Networks. She is also a recipient of the NJIHOF Innovator award.</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig7_9.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Rajarathnam Chandramouli (Mouli)</emphasis> is the Thomas Hattrick Chair Professor of Information Systems in Electrical and Computer Engineering (ECE) and a Professor in the School of Systems and Enterprises at Stevens Institute of Technology. He is the Founding Director of NSF SAVI: Institute for Cognitive Networking and the Co-Director of the Information Networks and Security (iNFINITY) laboratory. Prior to joining Stevens he was on the ECE faculty at Iowa State University, Ames.</para>
<para>His research covers cognitive radio networking, dynamic spectrum management/access, text analytics and forensics, social media analytics and security, and prototyping/experimental research in these areas.</para>
<para>His research and technology commercialization projects are funded by the National Science Foundation, National Institute of Justice, Department of Defense and the industry.</para>
</section>
</chapter>
<chapter class="chapter" id="ch08" label="8" xreflabel="8">
<title>Optimal Signal Design for Wavelet Radio TOA Locationing with Synchronization Error for 5G Networks</title>
<para><emphasis role="strong">Homayoun Nikookar</emphasis></para>
<para>Netherlands Defence Academy, the Netherlands</para>
<section class="lev1" id="sec8-1">
<title>8.1 Introduction</title>
<para>High throughput and low cost and latency as well as high reliability, spectral efficiency and flexibility are, among others, major requirements of 5G. Another remarkable issue for the 5G networks is its context-awareness. Context can be location. Location-based services are becoming more and more important. In this chapter accurate positioning of devices with 5G using flexible wavelet packet modulation is addressed. Wavelet Packet modulated (WPM) signal can be used for joint communications and ranging (two functionalities in one technology). Using wavelet technology the optimal signal will be designed for the time-of-arrival (TOA) or time-difference-of-arrival (TDOA) locationing when there exists a synchronization error. The focus will be on the wavelet packet modulated signal as wavelets have lower sensitivity to distortion and interference as a result of synchronization error. Further advantage of wavelet technology lies in its flexibility to customize and shape the characteristics of the waveforms for 5G radio communication and ranging purposes. In addition to the flexibility, the reconfigurability of the wavelet signals is also an important characteristic for the successful application of this technology in cognitive radio communication and ranging systems.</para>
<para>There are basically three methods to estimate the position with radio signals: Received Signal Strength (RSS), Angle of Arrival (AOA) and Time of Arrival (TOA) [1, 2]. Here we focus on the TOA method. In this location technique the time of arrival of the signal sent by the mobile agent to be positioned is measured at each receiver (access point). The propagation time of each signal is known and is proportional to the distance. As shown in <link linkend="fig8_1">Figure 8.1</link> the measured time provides information in a set of points around the circumference of a circle having the radius of distance between the object (mobile) and the access point. The intersection of the circles is the mobile&#x2019;s position. Similar to the RSS method, for the 2-D location based on the TOA technique, at least three access points are required. Let <emphasis>t</emphasis><subscript>1</subscript>, <emphasis>t</emphasis><subscript>2</subscript> and <emphasis>t</emphasis><subscript>3</subscript> denote the flight time of the transmitted signal of the object (mobile) to be positioned, to the respective receivers (access points). The access points 1, 2 and 3 are respectively positioned at locations (0,0), (0,<emphasis>y</emphasis><subscript>2</subscript>) and (<emphasis>x</emphasis><subscript>3</subscript>,<emphasis>y</emphasis><subscript>3</subscript>). Let (<emphasis>x,y</emphasis>) denote the coordinates of the handset (object) to be positioned. By estimating the time of arrivals, the following set of equations should be solved to obtain the position (<emphasis>x,y</emphasis>) of the mobile devices.</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-1.jpg" mime-subtype="jpeg"/></para>
<para>where c is the speed of light. It should be mentioned that to avoid ambiguity in identifying the intersection of circles in <link linkend="fig8_1">Figure 8.1</link> all three equations in (8.1) must be considered.</para>
<para>The key factor in time based distance estimator is the arrival time of the first path. TOA utilizes the time delay to get the distance and looks for the intersection of at least three circles to estimate the location. It requires synchronization at both transmitter and receiver side, which is always an important issue in the wireless network, as well as the information of transmission time. If the system is not synchronized or if there is an offset in the time of transmission, the TOA methods cannot work properly. For instance, even a 1msec inaccuracy in the TOA estimation can cause an error of up to 300 m in ranging!</para>
<para>A variant of TOA, the time difference of arrival (TDOA) scheme, can improve the situation. It calculates the target mobile&#x2019;s position according to the time differences between each measurements, rather than the time measurement itself as in TOA. Therefore, as shown in <link linkend="fig8_2">Figure 8.2</link>, the TDOA searches the hyperbolic intersection and only needs the receiver clock synchronization without the information of time of transmission. The equations for the TDOA positioning become:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-2.jpg" mime-subtype="jpeg"/></para>
<para>Efficient methods to solve these nonlinear equations have been reported [3].</para>
<fig id="fig8_1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 8.1</label>
<caption><title>The TOA positioning method (APi: <emphasis>i</emphasis>th Access Point).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig8_1.jpg" mime-subtype="jpeg"/>
</fig>
<para>The RSS method is not an accurate method in locationing, especially in multipath fading environments. The AOA method requires a complex hardware. The TOA and TDOA methods are more appropriate for the positioning (especially when the bandwidth of the transmission is wide providing a fine time resolution). A remarkable issue in locationing with the TOA or TDOA techniques is the estimation of the arrival time of the transmitted signals. Major TOA estimation techniques use the correlation function and find its maximum to estimate the TOA or TDOA [4].</para>
<para>In this chapter we shall design the optimal signal for TOA or TDOA locationing when there exists a synchronization error. We particularly concentrate on the wavelet packet modulated signal for communications and ranging<sup>1</sup> as wavelets have lower sensitivity to distortion and interference (due to synchronization error) and also provide flexibility in signal design when there exists a synchronization error in the received signal. The advantage of wavelet transform lies in its flexibility to customize and shape the characteristics of the waveforms for radio communication and ranging purposes. In addition to the flexibility, the reconfigurability of the wavelet signals is also an important characteristic of this technology which paves the way for its successful application in cognitive radio communication and ranging systems of future.</para>
<fn><sup>1</sup> It should be emphasized that the Wavelet Packet Modulated (WPM) signal can be used for joint communications and ranging. This joint functionality in one technology is the outstanding capability of the WPM signal.</fn>
<fig id="fig8_2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 8.2</label>
<caption><title>The TDOA positioning method (APi: <emphasis>i</emphasis>th Access Point).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig8_2.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev1" id="sec8-2">
<title>8.2 Wavelet Signal Design</title>
<para>This Section focuses on the design steps of wavelet signal. The implementation of filter also will be discussed in this section.</para>
<section class="lev2" id="sec8-2-1">
<title>8.2.1 Design Procedure</title>
<para>The attributes of the wavelet packet modulation system greatly depend on the set of transmission bases utilized which in turn is determined by the filters used. This means that by adapting the filters one can adapt the transmit waveform characteristics to satisfy a system specification. Choosing the right filter though is a delicate task. The filters cannot be arbitrarily chosen and instead have to satisfy a number of constraints. Besides the design objectives there are other budgets which have to be considered in order to guarantee that the designed wavelet is valid. The design procedure consists of 3 major steps [5], namely:</para>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem><para>Formulation of design problem, i.e., stating the design objectives and constraints mandated by wavelet theory.</para></listitem>
<listitem><para>Application of suitable optimizations and transformations to make the problem tractable.</para></listitem>
<listitem><para>Utilization of numerical solvers to obtain the required filter coefficients.</para></listitem></orderedlist>
<para>At the end of the design procedure a low pass Finite-Impulse-Response (FIR) filter <emphasis>h</emphasis>[<emphasis>n</emphasis>], satisfying the design and wavelet constraints, is obtained. From this filter the other three filters <emphasis>g</emphasis>[<emphasis>n</emphasis>], i.e., the high-pass filter, <emphasis>h</emphasis>&#x00B4;[<emphasis>n</emphasis>], i.e., the dual of <emphasis>h</emphasis>[<emphasis>n</emphasis>] and <emphasis>g</emphasis>&#x00B4;[<emphasis>n</emphasis>], i.e., the dual of <emphasis>g</emphasis>[<emphasis>n</emphasis>] are derived through the Quadrature Mirror Filter (QMF) relation [5], i.e., <emphasis>g</emphasis>[<emphasis>n</emphasis>] = (<emphasis>&#x2212;</emphasis>1)<emphasis><sup>n</sup>h</emphasis>[<emphasis>L &#x2212;</emphasis> 1 <emphasis>&#x2212; n</emphasis>], for <emphasis>h</emphasis>[<emphasis>n</emphasis>] of length <emphasis>L</emphasis>. Where <emphasis>h</emphasis>&#x00B4;[<emphasis>n</emphasis>] = <emphasis>h</emphasis>*[&#x2212;<emphasis>n</emphasis>], and <emphasis>g</emphasis>&#x00B4;[<emphasis>n</emphasis>] = g*[&#x2212;<emphasis>n</emphasis>].</para>
<para>In the following sections we will elaborate on each of these processes.</para>
</section>
<section class="lev2" id="sec8-2-2">
<title>8.2.2 Filter Bank Implementation of Wavelet Packets</title>
<para>It is well known that compactly supported orthonormal wavelets can be obtained from a tree structure constructed by successively iterating discrete two-channel paraunitary filter banks [5&#x2013;8]. Time and frequency limited orthonormal wavelet packet bases <emphasis>&#x03BE;</emphasis>(<emphasis>t</emphasis>) can be derived by recursively iterating discrete half-band high <emphasis>g</emphasis>[<emphasis>n</emphasis>] and low-pass <emphasis>h</emphasis>[<emphasis>n</emphasis>] filters, as<sup>2</sup>:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-3.jpg" mime-subtype="jpeg"/></para>
<para>In (8.3) the subscript <emphasis>l</emphasis> denotes the level in the wavelet tree structure and superscript <emphasis>p</emphasis> indicates the waveform index. The number of bases <emphasis>p</emphasis> generated is determined by the number of iterations <emphasis>l</emphasis> of the two-channel filter bank. Equation (8.3), known as 2-scale equation, can be interpreted as follows &#x2013; a basis function belonging to a certain subspace of lower resolution can be obtained from shifted versions of the bases belonging to a subspace of higher resolution; and the weights <emphasis>h</emphasis> and <emphasis>g</emphasis> used in the transformation are low and high pass in nature. The filters <emphasis>h</emphasis> and <emphasis>g</emphasis> form a quadrature mirror pair and are also known as analysis filters. These filters have duals/adjoints known as synthesis filters which are also a pair of half-band low <emphasis>h</emphasis> and high pass filters <emphasis>g .</emphasis> All these four filters share a strict and tight relation and hence it is enough if the specifications of one of these filters are available. The wavelet packet sub-carriers (used at the radio transmitter end) are generated from the synthesis filters. And the wavelet packet duals (used at the radio receiver end) are obtained from the analysis filters. The entire wavelet packet modulated (WPM) transceiver structure can thus be realized by this set of two QMF pairs. Hence, the design process can also be confined to the construction of one of the filters, usually the low pass analysis filter <emphasis>h</emphasis>.</para>
<fn><sup>2</sup>The expressions are considered in continuous time domain to convenience derivations in Section 8.4.</fn>
</section>
</section>
<section class="lev1" id="sec8-3">
<title>8.3 Problem Statement</title>
<para>The time synchronization error in the received signal for the data detection of communications and the TOA or TDOA estimation of ranging is modeled by shifting the received data samples R[n] by a time offset &#x0394;<subscript><emphasis>t</emphasis></subscript> to the left or right as:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-4.jpg" mime-subtype="jpeg"/></para>
<para>Here, S[n] denotes the transmitted signal and w[n] the additive white Gaussian noise (AWGN). According to wavelet theory [5] under ideal conditions, when the WPM transmitter and receiver are perfectly synchronized and the channel is benign, the detection of signal in the <emphasis>u</emphasis>th symbol and <emphasis>k</emphasis> th sub-carrier <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in12.jpg" mime-subtype="jpeg"/> is the same as the transmitted data <emphasis>a<subscript>u,k</subscript></emphasis> <sup>3</sup>. However, errors are introduced in the demodulation decision making process under time offset errors &#x0394;<subscript><emphasis>t</emphasis></subscript> as elucidated below:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-5.jpg" mime-subtype="jpeg"/></para>
<para>Where <emphasis>N</emphasis> is the number of wavelet subcarriers. Defining the cross waveform function &#x03A9;(&#x0394;<subscript><emphasis>t</emphasis></subscript>) as:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-6.jpg" mime-subtype="jpeg"/></para>
<fn><para><sup>3</sup>The apostrophes in the symbol <emphasis>u</emphasis>&#x00B4; and carrier <emphasis>k</emphasis>&#x00B4; indices are used to indicate receiver side.</para></fn>
<para>the demodulated data corrupted by the interference due to loss of orthogonality at the receiver for the <emphasis>k</emphasis> th subcarrier and <emphasis>u</emphasis>th symbol can be expressed as:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-7.jpg" mime-subtype="jpeg"/></para>
<para>For the data communication, in (8.7), the first term stands for the attenuated useful signal, the second term denotes Inter Symbol Interference (ISI), third term gives Inter Symbol Inter Carrier Interference (IS-ICI) and the last term stands for Gaussian noise. Generally speaking multi-carrier systems are highly sensitive to loss of time synchronization. A loss of time synchrony results in samples outside a WPM symbol getting selected erroneously, while useful samples at the beginning or at the end of the symbol getting discarded. It also introduces ISI and ICI causing performance degradation.</para>
<para>For the locationing, TOA or TDOA estimation methods use the correlation function and find its maximum to estimate the time of arrival of the signal to be used for positioning. However, because of time synchronization error there will be a cross correlation energy between the wavelets. Therefore, our objective in this paper is to design proper wavelets for TOA ranging when there is a time synchronization error. The design is achieved by minimizing the interference caused by the timing error.</para>
<para>We also note that though WPM and Orthogonal Frequency Division Multiplexing (OFDM) share many similarities as orthogonal multicarrier systems, they are significantly different in their responses to loss of time synchronization. This difference is a result of the fact that the WPM symbols overlap with each other and are longer than the OFDM symbol<sup>4</sup>. Under a loss in time synchronization, the overlap of the symbols in WPM causes each symbol to interfere with several other symbols while in OFDM each symbol interferes only with its neighbors. The second important difference is in the usage of guard intervals. OFDM benefits from the cyclic prefix which significantly improves its performance under timing errors. WPM cannot use guard intervals because of the symbol overlap.</para>
<fn><sup>4</sup>The length of the symbol and the degree of overlap is determined by the length of wavelet filter used.</fn>
<para>Fortunately, WPM offers the possibility in adjusting the properties of the waveforms in a way that the errors due to loss of synchronization can be minimized. In Section 8.5 we present a method to design a new family of wavelet filters which minimize the energy of the timing error interference for ranging applications. But before that, let us discuss the major wavelet properties that are important in the selection of wavelets.</para>
</section>
<section class="lev1" id="sec8-4">
<title>8.4 Important Wavelet Properties</title>
<para>Generally speaking the wavelet tool is a double edged sword &#x2013; on one hand there is scope for customization and adaptation; on the other hand there are no clear guidelines to choose the best wavelet from for a given application. In order to ease the selection process constraints, such as orthogonality, compact support and smoothness are imposed. Here we shall discuss them in more detail.</para>
<section class="lev2" id="sec8-4-1">
<title>8.4.1 Wavelet Existence and Compact Support</title>
<para>This constraint is necessary to ensure that the wavelet has finite non-zero coefficient and thus the impulse response of the wavelet decomposition filter is finite as well. According to [9], this property can be derived by simply integrating both sides of the two-scale Equation in (8.8) and can be derived as follows<sup>5</sup>:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-8.jpg" mime-subtype="jpeg"/></para>
<para>Substituting <emphasis>u=</emphasis> 2<emphasis>t</emphasis> &#x2013; <emphasis>n</emphasis>, (8.8) can be rewritten as:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/pg-112.jpg" mime-subtype="jpeg"/></para>
<fn><para><sup>5</sup>The subscripts denoting the decomposition level <emphasis>l</emphasis> and the waveform index <emphasis>p</emphasis> have been dropped for convenience.</para></fn>
<para>Finally we obtain the compactly supported wavelet constraint as:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-9.jpg" mime-subtype="jpeg"/></para>
<para>It should be noted that the derivation resulting in (8.9) is also recognized as the wavelet existence constraint.</para>
</section>
<section class="lev2" id="sec8-4-2">
<title>8.4.2 Paraunitary Condition</title>
<para>The paraunitary or the orthogonality condition is essential for many reasons. First, it is a prerequisite for generating orthonormal wavelets [6, 7]. Second, it automatically ensures perfect reconstruction of the decomposed signal. The constraint can be derived using the orthonormality property of the scaling function and its shifted version as follows:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-10.jpg" mime-subtype="jpeg"/></para>
<para>Substituting the two-scale Equation (8.3) in (8.10) we get:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-11_a.jpg" mime-subtype="jpeg"/></para>
<para>Or</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-11_b.jpg" mime-subtype="jpeg"/></para>
<para>Equation (8.11b) is called double shift orthogonality relation of the wavelet low pass filters impulse responses. In (8.11b), <emphasis>L</emphasis> illustrates the length of the low pass wavelet filter impulse response. For a filter of length <emphasis>L</emphasis> the orthogonality condition (8.11b) imposes <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in13.jpg" mime-subtype="jpeg"/> non-linear constraints on <emphasis>h</emphasis>[<emphasis>n</emphasis>].</para>
</section>
<section class="lev2" id="sec8-4-3">
<title>8.4.3 Flatness/<emphasis>K</emphasis>-Regularity</title>
<para>This property is a rough measure of smoothness of the wavelet. The regularity condition is needed to ensure that the wavelet is smooth in both time and frequency domains [10]. It is normally quantified by the number of times a wavelet is continuously differentiable. The simplest regularity condition is the <emphasis>flatness</emphasis> constraint which is stated on the low pass filter. A low pass filter (LPF), <emphasis>h</emphasis>[<emphasis>n</emphasis>], is said to satisfy <emphasis>K</emphasis> th order flatness if its transfer function <emphasis>H</emphasis> (<emphasis>&#x03C9;</emphasis>) contains <emphasis>K</emphasis> zeroes located at the Nyquist frequency (<emphasis>&#x03C9;</emphasis> = <emphasis>&#x03C0;</emphasis>). For any function <emphasis>Q</emphasis>(<emphasis>&#x03C9;</emphasis>) with no poles or zeros at (<emphasis>&#x03C9;</emphasis> = <emphasis>&#x03C0;</emphasis>) this can be written as:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-12.jpg" mime-subtype="jpeg"/></para>
<para>In (8.12), <emphasis>Q(&#x03C9;)</emphasis> is a factor of <emphasis>H(&#x03C9;)</emphasis> that does not have any single zero at <emphasis>&#x03C9; = &#x03C0;</emphasis>. Having K number of zeros at <emphasis>&#x03C9;</emphasis> = <emphasis>&#x03C0;</emphasis> also means that <emphasis>H</emphasis> (<emphasis>&#x03C9;</emphasis>)is K-times differentiable and its derivatives are zero when they are evaluated at <emphasis>&#x03C9; = &#x03C0;</emphasis>. Considering that:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-13.jpg" mime-subtype="jpeg"/></para>
<para>the <emphasis>k</emphasis> th order derivative of <emphasis>H</emphasis> (<emphasis>&#x03C9;</emphasis>) would be:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-14.jpg" mime-subtype="jpeg"/></para>
<para>The evaluation of (8.14) at <emphasis>&#x03C9;</emphasis> = <emphasis>&#x03C0;</emphasis> would result in:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/pg-114.jpg" mime-subtype="jpeg"/></para>
<para>Therefore, the <emphasis>K</emphasis> -regularity constraint in terms of the low pass filter coefficients can be given as:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-15.jpg" mime-subtype="jpeg"/></para>
</section>
<section class="lev2" id="sec8-4-4">
<title>8.4.4 Degrees of Freedom to Design</title>
<para>The criterion (8.9), (8.11b) and (8.15) are necessary and sufficient conditions for the set to form an orthonormal basis and these conditions have to be imposed for all design procedures. For a filter of length <emphasis>L</emphasis> this is essentially getting <emphasis>L</emphasis> unknown filter variables from <emphasis>L</emphasis> equations. Of these <emphasis>L</emphasis> equations, one equation is required to satisfy the wavelet existence condition, <emphasis>L</emphasis>/2 come from the paraunitaryness constraint, <emphasis>K &#x2212;</emphasis> 1 from the regularity constraint and the remaining <emphasis>L</emphasis>/2-<emphasis>K</emphasis> conditions offer the possibility for establishing the design objective. The larger the value of <emphasis>L</emphasis>/2-<emphasis>K</emphasis>, the greater the degree of freedom for design and the greater is the loss in regularity. There is therefore a trade-off on offer. The <emphasis>L</emphasis>/2-<emphasis>K</emphasis> degrees of freedom that remain after satisfying wavelet existence, orthogonality and <emphasis>K</emphasis> -regularity condition can be used to design a scaling filter with the desired property (refer to <link linkend="fig8_3">Figure 8.3</link>). In the next section we illustrate this with a special signal design example for the ranging application of wavelet packet modulation signal.</para>
<fig id="fig8_3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 8.3</label>
<caption><title>Wavelet conditions and degrees of freedom for design.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig8_3.jpg" mime-subtype="jpeg"/>
</fig>
</section>
</section>
<section class="lev1" id="sec8-5">
<title>8.5 Formulation of Design Problem</title>
<para>In this Section, different aspects for formulation of design problem are discussed. Details on how the mathematical constraints converted from non-convex problem to the convex-problem are presented in this section as well.</para>
<section class="lev2" id="sec8-5-1">
<title>8.5.1 Design Criterion</title>
<para>In disturbance-free environments the cross-correlations of WPM waveforms equal zero and perfect reconstruction is possible despite the time and frequency overlap. The timing error &#x0394;<subscript><emphasis>t</emphasis></subscript> on the other hand leads to the loss of the orthogonality between the waveforms and consequently they begin to interfere one with another leading to ICI and ISI error for communication and degrading the TOA estimation performance for ranging, stated as:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-16.jpg" mime-subtype="jpeg"/></para>
<para>The design objective would therefore be to generate wavelet bases <emphasis>&#x03BE;</emphasis> and their duals <emphasis>&#x03BE;</emphasis> that minimize interference energy in the presence of timing error:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-17.jpg" mime-subtype="jpeg"/></para>
</section>
<section class="lev2" id="sec8-5-2">
<title>8.5.2 Wavelet Domain to Filter Bank Domain</title>
<para>The waveforms are created by the multilayered tree structure filter bank. Using Parseval&#x2019;s theorem of energy conservation it can be easily proven that the total energy at each level is equal regardless of the tree&#x2019;s depth. Therefore, minimizing the interfering energy at the roots of the tree will automatically lead to the decrease of total interfering energy at the higher tree branches. Furthermore, the two-channel filter banks through the 2-scale equation are related, albeit explicitly, to the wavelet waveforms. Therefore, the design process can be converted into a tractable filter design problem. We should hence be able to minimize deleterious effects of time synchronization errors in wavelet radio ranging by minimizing the following cross-correlation function:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-18.jpg" mime-subtype="jpeg"/></para>
<para>The design problem of minimizing the interference energy due to timing offset can now be formally stated as an optimization problem with objective function (8.18) and constraints (8.9), (8.11b) and (8.15), i.e.,</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-19.jpg" mime-subtype="jpeg"/></para>
<para>As obvious, the second constraint in (8.19) is non-linear and therefore the optimization problem becomes a non-convex one. Thus, the optimization problem as given above can only be solved by general purpose solvers. However, such solvers are susceptible to being trapped in local minima. In order to overcome this difficulty, some authors have suggested multiple starting point techniques or branch-and-bound method [11]. Moreover, general purpose algorithms cannot guarantee that the found result is a global minimum and furthermore when number of constraints increases these algorithms often fail to provide a valid solution. The objective function and constraints can be solved much more efficiently using convex optimization and semi-definite programs [12&#x2013;18]. In the following sections we attempt to express the design constraints in convex form so that convex optimization tools can be employed to obtain the solution [19&#x2013;21]. Similar to the wavelet signal design for the distributed radio sensing networks [22], we shall move to the auto-correlation domain (<emphasis>r<subscript>h</subscript></emphasis>[<emphasis>k</emphasis>]= L<emphasis>m&#x2208;z h</emphasis>[<emphasis>m</emphasis>]<emphasis>h</emphasis>[<emphasis>m</emphasis> + <emphasis>k</emphasis>]) to simplify the minimization problem.</para>
</section>
<section class="lev2" id="sec8-5-3">
<title>8.5.3 Transformation of the Mathematical Constraints from Non-convex Problem to a Convex/linear One</title>
<para>Fortunately, it is possible to transform the non-convex/non-linear equations into a linear/convex problem by reformulating the constraints in terms of the autocorrelation sequence <emphasis>r<subscript>h</subscript></emphasis>[<emphasis>k</emphasis> ], [23&#x2013;25]:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-20.jpg" mime-subtype="jpeg"/></para>
<para>Taking into account the inherent symmetry of the autocorrelation sequence it can be defined more precisely as:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-21.jpg" mime-subtype="jpeg"/></para>
<para>In (8.21), <emphasis>L</emphasis> is the length of the FIR filter and the autocorrelation function is symmetric about <emphasis>l</emphasis> = 0; i.e.:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-22.jpg" mime-subtype="jpeg"/></para>
<para>The three constraints (8.9), (8.11b), and (8.15) are derived in terms of <emphasis>r<subscript>h</subscript></emphasis>[<emphasis>l</emphasis>] in the following sub-sections.</para>
<section class="lev3" id="sec8-5-3-1">
<title>8.5.3.1 Compact support or admissibility constraint</title>
<para>The compact support constraint in (8.3) can be rewritten as:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-23.jpg" mime-subtype="jpeg"/></para>
<para>Reversing the order of the summation and considering the fact that the impulse response of filter <emphasis>h</emphasis>[<emphasis>n</emphasis>] has non-zero values only at 0 <emphasis>&#x2264; n &#x2264; L</emphasis> &#x2013; 1, we obtain:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-24.jpg" mime-subtype="jpeg"/></para>
<para>The compact support constraint in (8.9) can then be rewritten as:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-25.jpg" mime-subtype="jpeg"/></para>
<para>Taking into consideration the double shift orthonormality property (see Equation (8.11b)) and the fact that the autocorrelation sequence is symmetric, we can simplify (8.25) further as:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-26.jpg" mime-subtype="jpeg"/></para>
<para>Equation (8.26) is the compactly supported wavelet constraint stated in terms of the autocorrelation sequence <emphasis>r<subscript>h</subscript></emphasis>[<emphasis>l</emphasis>].</para>
</section>
<section class="lev3" id="sec8-5-3-2">
<title>8.5.3.2 Double shift orthogonality constraint</title>
<para>The double shift orthogonality constraint presented in (8.11b), can be expressed in terms of the autocorrelation sequence <emphasis>r<subscript>h</subscript></emphasis>[<emphasis>l</emphasis>] as follows:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-27.jpg" mime-subtype="jpeg"/></para>
<para>It should be noted that (8.27) is obtained by applying <emphasis>n &#x2013;</emphasis> 2<emphasis>k = m</emphasis> in Equation (8.11b). Hence the final double shift orthogonality constraint in terms of autocorrelation sequence <emphasis>r<subscript>h</subscript></emphasis>[<emphasis>l</emphasis>] is:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-28.jpg" mime-subtype="jpeg"/></para>
<para>where <inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in14.jpg" mime-subtype="jpeg"/> denotes the floor function or the integer part of (<emphasis>&#x00B7;</emphasis>) which is the greatest integer that is less than or equal to (<emphasis>&#x00B7;</emphasis>). Again we make use of the symmetry property to simplify it. In contrast to (8.11b) which was non-convex, (8.28) consists of linear equalities and is also convex.</para>
</section>
<section class="lev3" id="sec8-5-3-3">
<title>8.5.3.3 <emphasis>K</emphasis>-Regularity constraint</title>
<para>The regularity constraint can be reformulated in terms of autocorrelation sequence <emphasis>r<subscript>h</subscript></emphasis>[<emphasis>l</emphasis>] by considering the square of the absolute value of Equation (8.12); i.e.:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-29.jpg" mime-subtype="jpeg"/></para>
<para>Requiring the transfer function <emphasis>H</emphasis> (<emphasis>&#x03C9;</emphasis>) to have <emphasis>K</emphasis> zeros at Nyquist frequency (<emphasis>&#x03C9;</emphasis> = <emphasis>&#x03C0;</emphasis>) is equivalent to requiring <emphasis>|H</emphasis> (<emphasis>&#x03C9;</emphasis>)<emphasis>|</emphasis>2 to have 2<emphasis>K</emphasis> zeros at <emphasis>&#x03C9;</emphasis> = <emphasis>&#x03C0;</emphasis>. Taking into account the fact that <emphasis>|H</emphasis> (<emphasis>&#x03C9;</emphasis>)<emphasis>|</emphasis>2 is the Fourier transform of autocorrelation sequence of <emphasis>r<subscript>h</subscript></emphasis>[<emphasis>l</emphasis>], evaluating the 2<emphasis>k</emphasis> th order derivative of <emphasis>|H</emphasis> (<emphasis>&#x03C9;</emphasis>)<emphasis>|</emphasis>2 and making use of the symmetry property of the autocorrelation sequence <emphasis>r<subscript>h</subscript></emphasis>[<emphasis>l</emphasis>], it can be easily shown that</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-30.jpg" mime-subtype="jpeg"/></para>
<para>Equation (8.30) states the regularity constraint in terms of autocorrelation sequence <emphasis>r<subscript>h</subscript></emphasis>[<emphasis>l</emphasis>].</para>
<para>The admissibility, paraunitary and <emphasis>K</emphasis> -regularity conditions are readily available in the auto-correlation domain (Equations (8.26), (8.28) and (8.30), respectively). Therefore, we only have to derive the objective function. Now, we know that</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-31.jpg" mime-subtype="jpeg"/></para>
<para>and</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-32.jpg" mime-subtype="jpeg"/></para>
<para>Applying the corollary<sup>6</sup>: <emphasis>The sum of squares of a cross-correlation between two functions equals the inner product of the autocorrelation sequences of these two functions,</emphasis> and the double shift orthogonality property:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-33.jpg" mime-subtype="jpeg"/></para>
<para>The cross-correlation function <emphasis>rhg</emphasis>&#x00B4;[<emphasis>n</emphasis>] can be rewritten in terms of <emphasis>r<subscript>h</subscript></emphasis>[<emphasis>n</emphasis>] as follows:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-34.jpg" mime-subtype="jpeg"/></para>
<para>The new optimization problem can thus be stated as:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/pg-120.jpg" mime-subtype="jpeg"/></para>
<fn><para><sup>6</sup>Proved in the Appendix.</para></fn>
<para>Since the optimization problem posed above is linear it is also convex. Therefore, any linear or convex optimization tool can be used to solve this problem. In this case, we choose SeDuMi [26] as generic Semi Definite Programming (SDP) solvers to solve the optimization problem. SeDuMi stands for <emphasis>self-dual minimization</emphasis> as it implements a self-dual embedding technique for optimization over self-dual homogeneous cones [26]. It comes as an additional Matlab<superscript>&#x00AE;</superscript> package and can be used for linear, quadratic and semidefinite programming. Normally it requires a problem to be described in a primal standard form but with modeling languages like YALMIP (short for Yet Another LMI Parser) the optimization problems can be directly expressed in a user-friendly higher level language [27]. Thus YALMIP allows the user to concentrate on the high-level modeling without having to worry about low-level details. We have developed a filter optimization program that incorporates most of the available optimization routines for Matlab<superscript>&#x00AE;</superscript> and which relies on YALMIP to translate the problem into the standard form. From the autocorrelation sequence, the algorithm derives filter coefficients with length <emphasis>L</emphasis> having minimum phase property<sup>7</sup>. At the end of the design process the filter coefficients of the analysis LPF will be generated. From the analysis the low-pass-filter (LPF) <emphasis>h</emphasis>[<emphasis>n</emphasis>], the high-pass-filter (HPF) <emphasis>g</emphasis>[<emphasis>n</emphasis>] and the synthesis filters, LPF <emphasis>h</emphasis>&#x00B4;[<emphasis>n</emphasis>] and HPF <emphasis>g</emphasis>&#x00B4;[<emphasis>n</emphasis>], can be obtained through the quadrature Mirror Filter (QMF) equations. And from these set of filters the wavelets and their duals can be derived using the 2-scale Equation (3) .</para>
</section>
</section>
</section>
<section class="lev1" id="sec8-6">
<title>8.6 Results and Analysis</title>
<para>In this section we present a few results to demonstrate the design procedure. As already mentioned, the main variables of the design process are the length and regularity order of the filter.</para>
<section class="lev2" id="sec8-6-1">
<title>8.6.1 Frequency and Impulse Response of Designed Filter</title>
<para>We set the length of the filter to 20 though it is possible to design longer or shorter filters. The order of regularity chosen is 5, which is a compromise between optimization space and wavelet regularity. The impulse response of the designed optimal filter is illustrated in <link linkend="fig8_4">Figure 8.4</link> and numerical values of filter coefficients are given in <link linkend="tbl8_1">Table 8.1</link>. Although the optimal filter is designed in the autocorrelation domain, the minimum-phase time domain coefficients obtained satisfy all constraints mandated by the design process.</para>
<fn><para><sup>7</sup>We chose filters having minimum phase because they guarantee stability.</para></fn>
<fig id="fig8_4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 8.4</label>
<caption><title>Impulse response of the optimal LPF with 20 coefficients.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig8_4.jpg" mime-subtype="jpeg"/>
</fig>
<table-wrap id="tbl8_1">
<label>Table 8.1</label>
<caption><title>Optimal filter coefficients</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="none">
<tbody>
<tr>
<td valign="top" align="left">&#x00A0;&#x00A0;0.119881851613898</td>
<td valign="top" align="left">&#x00A0;&#x00A0;0.498287367999060</td>
<td valign="top" align="left">&#x00A0;&#x00A0;0.660946808777660</td>
<td valign="top" align="left">&#x00A0;&#x00A0;0.203191803677134</td>
</tr>
<tr>
<td valign="top" align="left">&#x2013;0.02915169068882</td>
<td valign="top" align="left">&#x00A0;&#x00A0;0.159448121842196</td>
<td valign="top" align="left">&#x2013;0.144908809151642</td>
<td valign="top" align="left">&#x2013;0.301681615791117</td>
</tr>
<tr>
<td valign="top" align="left">&#x00A0;&#x00A0;0.206305798368833</td>
<td valign="top" align="left">&#x00A0;&#x00A0;0.205999004857997</td>
<td valign="top" align="left">&#x00A0;&#x00A0;0.165410385138750</td>
<td valign="top" align="left">&#x2013;0.0566148032177797</td>
</tr>
<tr>
<td valign="top" align="left">&#x00A0;&#x00A0;0.071282862607634</td>
<td valign="top" align="left">&#x2013;0.00958254794419582</td>
<td valign="top" align="left">&#x2013;0.0083940508446907</td>
<td valign="top" align="left">&#x00A0;&#x00A0;0.00912479119304040</td>
</tr>
<tr>
<td valign="top" align="left">&#x2013;0.00498653232060</td>
<td valign="top" align="left">&#x2013;0.00069440881953843</td>
<td valign="top" align="left">&#x00A0;&#x00A0;0.00154092796305564</td>
<td valign="top" align="left">&#x2013;0.000370932610232259</td>
</tr>
</tbody>
</table>
</table-wrap>
<para>The wavelet and scaling function of the newly designed optimal filter are illustrated in <a href="fig8_5">Figure 8.5a</a> and 8.5b, respectively. The frequency response is shown in <a href="fig8_5">Figure 8.5c</a>. <link linkend="tbl8_2">Table 8.2</link> shows the specifications of the various filters used in the study along with the values of the corresponding objective functions. Clearly the designed wavelet has the lowest interference energy (due to time synchronization error).</para>
</section>
<section class="lev2" id="sec8-6-2">
<title>8.6.2 Evaluation of Designed Filter under Loss of Time Synchronization</title>
<para>The performance of the designed wavelet is compared and contrasted with several known wavelets by means of computer simulations. We have designed a ranging/communication system with DQPSK modulation and 128 orthogonal subcarriers, corresponding to wavelet packet tree of 7 stages. Guard intervals are not used and no error estimation or correction capabilities are implemented.</para>
<fig id="fig8_5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 8.5</label>
<caption><title>Optimal Filter; (a: top left) Scaling function, (b: top right) Wavelet function and (c: bottom) Frequency response in dB of the optimal filter.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig8_5.jpg" mime-subtype="jpeg"/>
</fig>
<para>To simplify the analysis, perfect frequency and phase synchronization are assumed. The time offset &#x0394;<emphasis><subscript>t</subscript></emphasis> is modeled as discrete uniform distribution between <emphasis>&#x2013;</emphasis>2 and 2 samples, i.e., &#x0394;<emphasis><subscript>t</subscript> &#x2208;</emphasis> [&#x2013;2, &#x2013;1, 0, 1, 2]. In order to accentuate the difference in performances between various wavelets, an oversampling factor of 15 is applied. The details are tabulated in <link linkend="tbl8_3">Table 8.3</link>.</para>
<table-wrap id="tbl8_2">
<label>Table 8.2</label>
<caption><title>Wavelet specifications and objective function</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<td valign="bottom" align="left">Name</td>
<td valign="bottom" align="left">Length</td>
<td valign="bottom" align="left"><emphasis>K</emphasis> -Regularity</td>
<td valign="bottom" align="center"><inline-graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/in15.jpg" mime-subtype="jpeg"/></td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Haar</td>
<td valign="top" align="center">&#x00A0;&#x00A0;&#x00A0;&#x00A0;2</td>
<td valign="top" align="center">&#x00A0;&#x00A0;1</td>
<td valign="top" align="center">&#x2013;</td>
</tr>
<tr>
<td valign="top" align="left">Daubechies</td>
<td valign="top" align="center">&#x00A0;&#x00A0;20</td>
<td valign="top" align="center">10</td>
<td valign="top" align="center">0.41955</td>
</tr>
<tr>
<td valign="top" align="left">Symlets</td>
<td valign="top" align="center">&#x00A0;&#x00A0;20</td>
<td valign="top" align="center">10</td>
<td valign="top" align="center">0.41955</td>
</tr>
<tr>
<td valign="top" align="left">Discrete Meyer</td>
<td valign="top" align="center">102</td>
<td valign="top" align="center">&#x00A0;&#x00A0;1</td>
<td valign="top" align="center">0.45722</td>
</tr>
<tr>
<td valign="top" align="left">Coiflet</td>
<td valign="top" align="center">&#x00A0;&#x00A0;24</td>
<td valign="top" align="center">&#x00A0;&#x00A0;4</td>
<td valign="top" align="center">0.41343</td>
</tr>
<tr>
<td valign="top" align="left">Optimal</td>
<td valign="top" align="center">&#x00A0;&#x00A0;20</td>
<td valign="top" align="center">&#x00A0;&#x00A0;5</td>
<td valign="top" align="center">0.36814</td>
</tr>
</tbody>
</table>
</table-wrap>
<table-wrap id="tbl8_3">
<label>Table 8.3</label>
<caption><title>Simulation setup time synchronization error</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<td valign="bottom" align="left"></td>
<td valign="bottom" align="center">WPM</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Number of Subcarriers</td>
<td valign="top" align="center">128</td>
</tr>
<tr>
<td valign="top" align="left">Number of Multicarrier Symbols per Frame</td>
<td valign="top" align="center">100</td>
</tr>
<tr>
<td valign="top" align="left">Modulation</td>
<td valign="top" align="center">DQPSK</td>
</tr>
<tr>
<td valign="top" align="left">Channel</td>
<td valign="top" align="center">AWGN</td>
</tr>
<tr>
<td valign="top" align="left">Oversampling Factor</td>
<td valign="top" align="center">15</td>
</tr>
<tr>
<td valign="top" align="left">Guard Band</td>
<td valign="top" align="center">&#x2013;</td>
</tr>
<tr>
<td valign="top" align="left">Guard Interval</td>
<td valign="top" align="center">&#x2013;</td>
</tr>
<tr>
<td valign="top" align="left">Frequency Offset</td>
<td valign="top" align="center">&#x2013;</td>
</tr>
<tr>
<td valign="top" align="left">Phase Noise</td>
<td valign="top" align="center">&#x2013;</td>
</tr>
<tr>
<td valign="top" align="left">Time Offset</td>
<td valign="top" align="center">&#x0394;<emphasis><subscript>t</subscript></emphasis> =2</td>
</tr> 
</tbody>
</table>
</table-wrap>
<fig id="fig8_6" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 8.6</label>
<caption><title>Mse of Toa Estimation vs. Time Offset for Wpm Signal in Awgn Channel (Snr = 20 Db).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig8_6.jpg" mime-subtype="jpeg"/>
</fig>
<para>The Mean Square Error (MSE) of TOA estimation is calculated for different values of time offset and is shown in <link linkend="fig8_6">Figure 8.6</link>, respectively. Because the direction of timing error is inconsequential for WPM based system the time offset &#x0394;<subscript><emphasis>t</emphasis></subscript> is considered to follow a uniform distribution between 1 and 5 samples. The results presented corroborate the gains brought in by the newly designed wavelets.</para>
</section>
</section>
<section class="lev1" id="sec8-7">
<title>8.7 Conclusions</title>
<para>Wavelet Packet Modulation is a strong candidate for signal design in 5G networks. It provides communication and ranging functionalities with one technology and offers enormous adaptability and flexibility to system designers. This tutorial chapter presented a methodology for designing new wavelets for communication and ranging of context-aware 5G networks when there is a time synchronization error. The design process was described as an optimization problem that accommodated the design objectives and additional constraints necessary to ensure the wavelet existence and the orthonormality. In order to obtain the global minimum, the original non-convex constraints and the objective function were translated into the autocorrelation domain. Using the new formulation, the design problem was expressed as a convex optimization problem and efficiently solved using the semi definite programming technique. To demonstrate the design mechanism for the ranging applications special filters were developed for the TOA estimation when there exists a time synchronization error. The simulation results revealed that the newly designed wavelet signal satisfied all the design objectives and outperformed the standard wavelets in terms of the MSE of TOA estimation. Importantly, the wavelet design framework presented in this chapter can easily be applied to other design criteria of 5G networks (e.g., security, spectral efficiency, throughput, latency performance, ...) by merely altering the objective function. However, to be able to do so, the desirable properties of the wavelet bases must be translated into realizable objective functions. This can at times be challenging because the relationship between wavelet functions and filters is implicit and not direct.</para>
</section>
<section class="lev1" id="sec8-8">
<title>References</title>
<para>[1] M. Benedetto, Understanding Ultra Wide Band: Radio Fundamentals, Prentice Hall PTR, NJ. 2004. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B1%5D+M%2E+Benedetto%2C+Understanding+Ultra+Wide+Band%3A+Radio+Fundamentals%2C+Prentice+Hall+PTR%2C+NJ%2E+2004%2E" target="_blank">Google Scholar</ulink></para>
<para>[2] M. Ghavami, L. B. Michael and R. Kohno, Ultra Wideband Signals and Systems in Communications Engineering, Wiley, 2004. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B2%5D+M%2E+Ghavami%2C+L%2E+B%2E+Michael+and+R%2E+Kohno%2C+Ultra+Wideband+Signals+and+Systems+in+Communications+Engineering%2C+Wiley%2C+2004%2E" target="_blank">Google Scholar</ulink></para>
<para>[3] Y. T. Chan, K. C. Ho, &#x201C;A Simple and Efficient Estimator for Hyperbolic Location,&#x201D; IEEE Transactions on Signal Processing,&#x201D; Vol. 42, No. 8, pp. 1905&#x2013;1915, Aug. 1994. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B3%5D+Y%2E+T%2E+Chan%2C+K%2E+C%2E+Ho%2C+%22A+Simple+and+Efficient+Estimator+for+Hyperbolic+Location%2C%22+IEEE+Transactions+on+Signal+Processing%2C%22+Vol%2E+42%2C+No%2E+8%2C+pp%2E+1905-1915%2C+Aug%2E+1994%2E" target="_blank">Google Scholar</ulink></para>
<para>[4] H. Nikookar and R. Prasad, Introduction to Ultrawidebband for Wireless Communications, Springer, 2009.</para>
<para>[5] H. Nikookar, Wavelet Radio: Adaptive and Reconfigurable Wireless Systems based on Wavelets, Cambridge University Press, 2013. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B5%5D+H%2E+Nikookar%2C+Wavelet+Radio%3A+Adaptive+and+Reconfigurable+Wireless+Systems+based+on+Wavelets%2C+Cambridge+University+Press%2C+2013%2E" target="_blank">Google Scholar</ulink></para>
<para>[6] Daubechies, &#x201C;Ten Lectures on Wavelets&#x201D;, Society for Industrial and Applied Mathematics, Philadelphia, Pennsylvania, 1992. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B6%5D+Daubechies%2C+%22Ten+Lectures+on+Wavelets%22%2C+Society+for+Industrial+and+Applied+Mathematics%2C+Philadelphia%2C+Pennsylvania%2C+1992%2E" target="_blank">Google Scholar</ulink></para>
<para>[7] P. P. Vaidyanathan, Multirate Systems and Filter Banks, Prentice Hall PTR, Englewood Cliffs, New Jersey, 1993. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B7%5D+P%2E+P%2E+Vaidyanathan%2C+Multirate+Systems+and+Filter+Banks%2C+Prentice+Hall+PTR%2C+Englewood+Cliffs%2C+New+Jersey%2C+1993%2E" target="_blank">Google Scholar</ulink></para>
<para>[8] M. Jansen and P. Oonincx, Second Generation Wavelets and Applications, Springer, 2005. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B8%5D+M%2E+Jansen+and+P%2E+Oonincx%2C+Second+Generation+Wavelets+and+Applications%2C+Springer%2C+2005%2E" target="_blank">Google Scholar</ulink></para>
<para>[9] W. J. Phillips, &#x201C;Wavelet and filter banks course notes&#x201D;, 2003 [Available Online] http://www.engmath.dal.ca/courses/engm6610/notes/notes.html</para>
<para>[10] M. Vetterli and I. Kovacevic, Wavelets and Subband Coding. Englewood Cliffs, New Jersey: Prentice-Hall PTR, 1995.</para>
<para>[11] E. L. Lawler and D. E. Wood, &#x201C;Branch-and-bound methods: A survey&#x201D;, JSTOR Operations Research, Vol. 14, No. 4, pp. 699&#x2013;719, August 1966. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B11%5D+E%2E+L%2E+Lawler+and+D%2E+E%2E+Wood%2C+%22Branch-and-bound+methods%3A+A+survey%22%2C+JSTOR+Operations+Research%2C+Vol%2E+14%2C+No%2E+4%2C+pp%2E+699-719%2C+August+1966%2E" target="_blank">Google Scholar</ulink></para>
<para>[12] E. Alizadeh, &#x201C;Interior point methods in semidefinite programming with applications to combinatorial optimization&#x201D;, SIAM Journal of Optimization, Vol. 5, pp. 13&#x2013;51, 1995. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B12%5D+E%2E+Alizadeh%2C+%22Interior+point+methods+in+semidefinite+programming+with+applications+to+combinatorial+optimization%22%2C+SIAM+Journal+of+Optimization%2C+Vol%2E+5%2C+pp%2E+13-51%2C+1995%2E" target="_blank">Google Scholar</ulink></para>
<para>[13] Y. Ye, Interior Point Algorithms: Theory and Analysis, New York, Wiley, 1997. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B13%5D+Y%2E+Ye%2C+Interior+Point+Algorithms%3A+Theory+and+Analysis%2C+New+York%2C+Wiley%2C+1997%2E" target="_blank">Google Scholar</ulink></para>
<para>[14] S. Boyd, L. El Ghaoui, E. Feron, V. Balkrishnan, &#x201C;Linear matrix inequalities in system and control theory&#x201D;, SIAM Study in Applied Mathematics, Vol. 15, June 1994. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B14%5D+S%2E+Boyd%2C+L%2E+El+Ghaoui%2C+E%2E+Feron%2C+V%2E+Balkrishnan%2C+%22Linear+matrix+inequalities+in+system+and+control+theory%22%2C+SIAM+Study+in+Applied+Mathematics%2C+Vol%2E+15%2C+June+1994%2E" target="_blank">Google Scholar</ulink></para>
<para>[15] S. Boyd, L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B15%5D+S%2E+Boyd%2C+L%2E+Vandenberghe%2C+Convex+Optimization%2C+Cambridge+University+Press%2C+2004%2E" target="_blank">Google Scholar</ulink></para>
<para>[16] L. Vandenberghe, S. Boyd, &#x201C;Semidefinite programming&#x201D;, SIAM review, Vol. 38, No. 1, pp. 49&#x2013;95. March 1998. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B16%5D+L%2E+Vandenberghe%2C+S%2E+Boyd%2C+%22Semidefinite+programming%22%2C+SIAM+review%2C+Vol%2E+38%2C+No%2E+1%2C+pp%2E+49-95%2E+March+1998%2E" target="_blank">Google Scholar</ulink></para>
<para>[17] H. Wolkowicz, R. Saigal, L. Vandenberghe, Handbook of Semidefinite Programming, Kluwer Academic Publisher, 2000. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B17%5D+H%2E+Wolkowicz%2C+R%2E+Saigal%2C+L%2E+Vandenberghe%2C+Handbook+of+Semidefinite+Programming%2C+Kluwer+Academic+Publisher%2C+2000%2E" target="_blank">Google Scholar</ulink></para>
<para>[18] R. Hettich, K. O. Kortanek, &#x201C;Semidefinite programming: Theory, methods and applications&#x201D;, SIAM Review, Vol. 35, No. 3, pp. 380&#x2013;429, September 1993. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B18%5D+R%2E+Hettich%2C+K%2E+O%2E+Kortanek%2C+%22Semidefinite+programming%3A+Theory%2C+methods+and+applications%22%2C+SIAM+Review%2C+Vol%2E+35%2C+No%2E+3%2C+pp%2E+380-429%2C+September+1993%2E" target="_blank">Google Scholar</ulink></para>
<para>[19] A. Karmakar, A. Kumar, R. K. Patney, &#x201C;Design of an optimal two-channel orthogonal filterbank using semidefinite programming&#x201D;, IEEE Signal Processing Letters, Vol. 14, No. 10, pp. 692&#x2013;694, October 2007. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B19%5D+A%2E+Karmakar%2C+A%2E+Kumar%2C+R%2E+K%2E+Patney%2C+%22Design+of+an+optimal+two-channel+orthogonal+filterbank+using+semidefinite+programming%22%2C+IEEE+Signal+Processing+Letters%2C+Vol%2E+14%2C+No%2E+10%2C+pp%2E+692-694%2C+October+2007%2E" target="_blank">Google Scholar</ulink></para>
<para>[20] J. Wu, K. M. Wong, &#x201C;Wavelet packet division multiplexing and wavelet packed design under timing error effects&#x201D;, IEEE Transaction. on Signal Processing, Vol. 45, No. 12, pp. 2877&#x2013;2890, December 1997. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B20%5D+J%2E+Wu%2C+K%2E+M%2E+Wong%2C+%22Wavelet+packet+division+multiplexing+and+wavelet+packed+design+under+timing+error+effects%22%2C+IEEE+Transaction%2E+on+Signal+Processing%2C+Vol%2E+45%2C+No%2E+12%2C+pp%2E+2877-2890%2C+December+1997%2E" target="_blank">Google Scholar</ulink></para>
<para>[21] J. K. Zhang, T. N. Davidson, K. M. Wong, &#x201C;Efficient design of orthonormal wavelet bases for signal representation&#x201D;, IEEE Transactions on Signal Processing, Vol. 52, No. 7, July 2007. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B21%5D+J%2E+K%2E+Zhang%2C+T%2E+N%2E+Davidson%2C+K%2E+M%2E+Wong%2C+%22Efficient+design+of+orthonormal+wavelet+bases+for+signal+representation%22%2C+IEEE+Transactions+on+Signal+Processing%2C+Vol%2E+52%2C+No%2E+7%2C+July+2007%2E" target="_blank">Google Scholar</ulink></para>
<para>[22] H. Nikookar, &#x201C;Signal design for context aware distributed radar sensing networks based on wavelets,&#x201D; IEEE Journal of Selected Topics in Signal Processing, Vol. 9, No. 2, March 2015. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B22%5D+H%2E+Nikookar%2C+%22Signal+design+for+context+aware+distributed+radar+sensing+networks+based+on+wavelets%2C%22+IEEE+Journal+of+Selected+Topics+in+Signal+Processing%2C+Vol%2E+9%2C+No%2E+2%2C+March+2015%2E" target="_blank">Google Scholar</ulink></para>
<para>[23] B. Alkire, L. Vandenberghe, &#x201C;Convex optimization problems involving finite autocorrelation sequences&#x201D;, Mathematical Programming, Series A93, pp. 331&#x2013;359, 2002. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B23%5D+B%2E+Alkire%2C+L%2E+Vandenberghe%2C+%22Convex+optimization+problems+involving+finite+autocorrelation+sequences%22%2C+Mathematical+Programming%2C+Series+A93%2C+pp%2E+331-359%2C+2002%2E" target="_blank">Google Scholar</ulink></para>
<para>[24] T. N. Davidson, L. Zhi-Quan, K. M. Wong, &#x201C;Orthogonal pulse shape design via semidefinite programming&#x201D;, IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP &#x2018;99), Vol. 5, pp. 2651&#x2013;2654, March 1999. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B24%5D+T%2E+N%2E+Davidson%2C+L%2E+Zhi-Quan%2C+K%2E+M%2E+Wong%2C+%22Orthogonal+pulse+shape+design+via+semidefinite+programming%22%2C+IEEE+International+Conference+on+Acoustics%2C+Speech+and+Signal+Processing+%28ICASSP+%2799%29%2C+Vol%2E+5%2C+pp%2E+2651-2654%2C+March+1999%2E" target="_blank">Google Scholar</ulink></para>
<para>[25] T. N. Davidson, L. Zhi-Quan, J. F. Sturm, &#x201C;Linear matrix inequality formulation of spectral mask constraints with applications to FIR filter design&#x201D;, IEEE Transaction. on Communications, Vol. 50, No. 11, pp. 2702&#x2013;2715, November 1999. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B25%5D+T%2E+N%2E+Davidson%2C+L%2E+Zhi-Quan%2C+J%2E+F%2E+Sturm%2C+%22Linear+matrix+inequality+formulation+of+spectral+mask+constraints+with+applications+to+FIR+filter+design%22%2C+IEEE+Transaction%2E+on+Communications%2C+Vol%2E+50%2C+No%2E+11%2C+pp%2E+2702-2715%2C+November+1999%2E" target="_blank">Google Scholar</ulink></para>
<para>[26] J. F. Sturm, &#x201C;Using SeDuMi 1.02, a MATLAB toolbox for optimization over symmetric cones&#x201D;, Optimization Methods and Software, Vol. 11&#x2013;12, pp. 625&#x2013;653, 1999. [Available Online] http://sedumi.mcmaster.ca/ <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B26%5D+J%2E+F%2E+Sturm%2C+%22Using+SeDuMi+1%2E02%2C+a+MATLAB+toolbox+for+optimization+over+symmetric+cones%22%2C+Optimization+Methods+and+Software%2C+Vol%2E+11-12%2C+pp%2E+625-653%2C+1999%2E+%5BAvailable+Online%5D+http%3A%2F%2Fsedumi%2Emcmaster%2Eca%2F" target="_blank">Google Scholar</ulink></para>
<para>[27] J. L&#x00F6;fberg, &#x201C;A Toolbox for modeling and optimization in MATLAB&#x201D;, Proceedings of the CACSD Conference, 2004. [Available Online] http://control.ee.ethz.ch/&#x223C;joloef/wiki/pmwiki.php</para>
</section>
<section class="lev1" id="sec8-9">
<title>Appendix: Sum of squares of cross-correlation</title>
<para>The sum of squares of cross-correlation magnitude is related to the autocorrelation sequences of low pass filter <emphasis>H</emphasis> and high pass filter <emphasis>G</emphasis> according to the following equation:</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-A1.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Proof</emphasis></para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/eq8-A2.jpg" mime-subtype="jpeg"/></para>
</section>
<section class="lev1" id="sec8-10">
<title>About the Author</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig8_7.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Homayoun Nikookar</emphasis> received his Ph.D. in Electrical Engineering from Delft University of Technology in 1995. In the past he has led the Radio Advanced Technologies and Systems (RATS) program, and supervised a team of researchers carrying out cutting-edge research in the field of advanced radio transmission. He has received several paper awards at international conferences and symposiums. Dr. Nikookar has published about 150 papers in the peer reviewed international technical journals and conferences, 12 book chapters and is author of two books: Introduction to Ultra Wideband for Wireless Communications, Springer, 2009 and Wavelet Radio, Cambridge University Press, 2013.</para>
</section>
</chapter>
<chapter class="chapter" id="ch09" label="9" xreflabel="9">
<title>Tv Broadcast and 5g</title>
<para><emphasis role="strong">Lars Kierkegaard</emphasis></para>
<para>Teracom A/S, Copenhagen, Denamrk</para>
<section class="lev1" id="sec9-1">
<title>9.1 Introduction</title>
<para>The traditional TV broadcast value chain is today subject to significant pressure due to new OTT market players such as Netflix and HBO entering the market. Traditional players are being by-passed by new market players in the value chain. Advanced 4G- and 5G mobile networks is expected to accelerate the pressure on the existing value chain even further, with LTE-Broadcast (eMBMS) being the disruptive trigger point. This chapter provides an overview of TV broadcast and 5G with outset in a historical perspective. In particular, the changes to the traditional TV broadcast value chain are described together with key technology drivers, and a view of TV broadcast in a future 5G scenario is presented.</para>
<para>This chapter focuses on TV broadcast and 5G. My reason for choosing this topic is not only the fascinating aspects of the technological development of Information and Communication Technology (ICT) but also the mere fact that television takes up a lot of our time. Just as an example, the average TV viewing in Denmark is three hours every day. Hence, it is clear that television plays a significant part of our lives.</para>
<para>The first part of this chapter looks at TV broadcast in a historical context. In order to reflect on TV Broadcast in a 5G era it is important to understand television in a historical context and the traditional TV broadcast industry, as we have known it for many years. I will walk you through the main milestones of the technological development in Denmark as well as the traditional TV broadcast value chain.</para>
<para>The second part focuses on the disruptive changes which the TV broadcast industry is undergoing these years. In fact, television as we have known it since the 1940&#x2019;s is subject to enormous changes caused by ground breaking developments in ICT technology and subsequent changes in viewing habits especially from the younger part of the population.</para>
<para>The internet, and especially IP and WiFi have resulted in an enormous disruptive change to the traditional broadcast TV value chain. New players have entered the value chain and existing players, especially the distributors of TV signals, are under pressure from Internet Service Providers who distributes the TV signals at lower costs mainly due to economies of scale and standardization.</para>
</section>
<section class="lev1" id="sec9-2">
<title>9.2 Traditional TV Broadcast</title>
<para>The <link linkend="fig9_1">Figure 9.1</link> shows an American family watching TV in the living room in 1958. The picture illustrates the fact that there was only one television in the home and that it was something that the family gathered around to watch together. In a Danish context, public TV broadcast took its beginning in 1951 when Statsradiofonien started to transmit regular TV broadcasts each lasting one hour, three days per week, to only approximately 200 TV receivers.</para>
<para>In the following years, eight TV transmitter towers were established giving nationwide coverage for public service TV broadcast in Denmark in an analogue terrestrial TV broadcast network. In 1987, a competition public broadcaster, namely TV 2, went live on air, following a political decision that Danmark&#x2019;s Radio should no longer have a monopoly on broadcast TV. This expanded the transmitter infrastructure to 34 main towers, which we also have in Denmark today.</para>
<fig id="fig9_1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 9.1</label>
<caption><title>An American family is watching TV in 1958. The family was gathered around the same screen [3].</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig9_1.jpg" mime-subtype="jpeg"/>
</fig>
<para>In the 1980&#x2019;s the Danish government decided to liberalize, a part of the Danish TV broadcast industry and open up for commercial TV broadcasters when cable-TV and satellite-TV access technologies became available. The next major milestone in Danish TV history took place on 2 November 2009 when the analogue terrestrial TV network was shut down and the Digital Terrestrial TV (DTT) network based on DVB-T1 was launched 15 minutes later. A part of the network was later upgraded to DVB-T2. All that was needed was a digital set top box, which connects to the TV. At the same time, Boxer TV went live on air as a new DTT commercial pay TV provider in Denmark. Suddenly, it was possible to view more than 45 TV-channels on the terrestrial TV network.</para>
<para>Having introduced the main historical milestones let us look at what we could call the traditional TV broadcast value chain. The value chain is illustrated in <link linkend="fig9_2">Figure 9.2</link>.</para>
<para>In the first part of the value chain, we have the TV broadcasters, who is responsible for production of their own content and who buys content from other content owners. The TV broadcasters can be either public service TV broadcasters such as DR, or pay-tv providers such as Boxer-TV or WAOO! In Denmark. The content is arranged and divided into TV channels, which is transmitted to the viewers via different distribution platforms.</para>
<para>The distribution network technologies include the DTT platform, satellite, Cable TV, DSL using copper cables and fibre. The third part of the value chain is the receiving end equipment, namely the televisions and set top boxes supporting either DVB-T/T2 for the DTT network or DVB-C for fiber based networks. The last part of the value chain is the consumers who receive the content and pays a TV license fee for the Public Service content and as an option pay-tv subscriptions for the pay-tv content.</para>
<fig id="fig9_2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 9.2</label>
<caption><title>The traditional TV value chain as it have looked until a few years ago.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig9_2.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev1" id="sec9-3">
<title>9.3 Disruptive Changes</title>
<para>The <link linkend="fig9_3">Figure 9.3</link> illustrates the new TV value chain. Notice that new players have entered the different parts of the value chain. The traditional TV broadcasters now also face competition from on-demand content aggregators and Over The Top (OTT) providers such as Netflix and HBO. The traditional television is today only one of many devices from which it is possible to watch TV. This includes smart phones, tablets and game consoles, which now support TV viewing via apps. The traditional TV itself has been &#x201C;internet enabled&#x201D;, which is also called smart TV&#x2019;s, and supports a long range of apps for the user.</para>
<para>Thus, new players have entered the market, and the market has become more fragmented with new roles. Examples of new roles in the value chain are OTT-providers, application developers, new device types and the fact that the consumer can create his or her own &#x201C;video&#x201D; channel (e.g., on YouTube).</para>
<para>The main reason for this disruptive development in the TV market is the convergence or melting together of different industries. Convergence in the TV market is a term used to describe the melting together of internet, broadcast and telecommunications industries. IP and internet is an enabler, which breaks down industry barriers, as it has been the case for other technological innovations during recent years. Refer to Clayton Kristensen&#x2019;s famous book on innovation for other examples on disruptive innovations. New business models and market players emerge and incumbent players in the value chain are challenged. The market also becomes more fragmented.</para>
<fig id="fig9_3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 9.3</label>
<caption><title>The disrupted TV broadcast value chain with many new players entering the market. New player categories are indicated with red text.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig9_3.jpg" mime-subtype="jpeg"/>
</fig>
<para>Historically, internet, broadcast and telecommunications have been separate and isolated industries. However, all of this is changing now with new players entering the market. Netflix who entered the Danish TV market in the autumn of 2012 with their Internet TV offering is an example of this. Netflix have entered the TV market with big strength not only in the Danish TV market but also on a global scale. Netflix provides a stand-alone OTT service, which operates across any Internet Service Providers network, whereas HBO offers their OTT TV offering as a valued added service to Telia Broadband.</para>
<para>Via Play, TDC Play and TV2 Play are examples of other new OTT streaming apps where broadcasters stream TV over IP directly to the consumer and are thus bypassing traditional distribution links in the TV value chain, such as terrestrial distribution, cable and satellite.</para>
<para>However, new hybrid standards such as Hbb-TV have also emerged. The Hybrid solutions combine broadcast and point-to-point IP communication, where broadcast transmits TV signals downlink to the consumers and internet is used uplink to provide new interactive services such as personalized services based on metadata. Examples of metadata are personalized electronic program guides where program highlights are presented based on the consumer&#x2019;s interests and preferences as well as predefined language and audio settings again according to the consumer&#x2019;s preferences.</para>
</section>
<section class="lev1" id="sec9-4">
<title>9.4 Technology Drivers</title>
<para>IP and the internet are together with new wireless access technologies the main technology drivers behind the disruptive change in the TV broadcast value chain. Flow TV is just only one of many services and applications, which will be supported from the same network infrastructure in the future. In order words: ICT is becoming a utility just like electricity, water and energy. The main technology drivers are described in the following.</para>
<section class="lev2" id="sec9-4-1">
<title>9.4.1 IP-Based Communication</title>
<para>Common IP-based ICT infrastructure networks bring significant advantages for the operators and the users compared to digital proprietary distribution platforms. Firstly, all components in an IP-based network can be supervised and remote controlled from central locations. This is possible because all components have a unique IP address in the system, which also is the prerequisite for Internet of Things. In other words, supervision, operations and maintenance of the network is centralized, which drives down operating costs to a lower level compared with analogue or digital proprietary systems. For this reason, the Network Operation Center (NOC) plays a central role with a long range of remote services.</para>
<para><link linkend="fig9_4">Figure 9.4</link> shows an example of a TMA based proprietary digital switch from 1999 used for coastal emergency radio voice communication between a control room and ships in distress. Notice the left picture with the cross-connects, which often require physical measurements to troubleshoot. The entire switch fills up more than a 40 square meter room.</para>
<para>The next picture in <link linkend="fig9_5">Figure 9.5</link> shows an IP-based &#x201C;exchange&#x201D; supporting the same coastal radio service as the proprietary digital exchange shown in <link linkend="fig9_4">Figure 9.4</link>.</para>
<fig id="fig9_4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 9.4</label>
<caption><title>Digital exchange for ship-to-shore radio anno 1999 in Denmark [6].</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig9_4.jpg" mime-subtype="jpeg"/>
</fig>
<fig id="fig9_5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 9.5</label>
<caption><title>IP-Based Digital Exchange for Ship-to-Shore Radio Anno 2016.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig9_5.jpg" mime-subtype="jpeg"/>
</fig>
<para>The difference in size, power consumption and ultimately cost speaks for itself. Troubleshooting is done using software based protocol tracing tools in different layers of the OSI stack. The cost is also substantially lower because Commercial Off-The-Shelf (COTS) hardware is used.</para>
</section>
<section class="lev2" id="sec9-4-2">
<title>9.4.2 Broadcast vs. Point-to-Point Communication</title>
<para>Today, the main difference between broadcast networks and present 3G (UMTS) and 4G (LTE Advanced) cellular mobile network, is the fact that broadcast networks transmits the same information to all users, whereas cellular mobile networks use point-to-point communication. The main advantage with broadcast networks compared with 3G and 4G mobile networks is the fact that the capacity requirements in the networks are the same no matter how many users receive the transmitted signal. In other worlds, it does not matter if two thousands or two million viewers are receiving the signal.</para>
<para>The disadvantage is the lack of interactivity, which is on the other hand, is the key advantage in point-to-point communication. In point-to-point communication networks the issue is that the capacity requirements are dependent on the number of concurrent users connected to the network.</para>
</section>
<section class="lev2" id="sec9-4-3">
<title>9.4.3 LTE-Broadcast</title>
<para>The disadvantage of point-to-point communication compared to broadcast with respect to capacity is the main reason for the introduction of LTE-Broadcast, or also called eMBMS, in the 3GPP specifications. LTE-Broadcast was initially introduced in release 9 of the 3GPP specifications and further refined in releases 10 and 11.</para>
<para>However, to date only KT in Korea has commercially launched an LTE-Broadcast service. There is approx. ten trials in different parts of the world according to Global mobile Suppliers Organization (GSA).</para>
</section>
<section class="lev2" id="sec9-4-4">
<title>9.4.4 Data-rates and Bandwidth</title>
<para>Bandwidth efficiency has increased significantly in 4G compared to 3G since IP communication is also used in the wireless access part of the mobile network. This improves the frequency band more efficiently compared to traditional TDMA, FDMA and CDMA coding schemes used in 2G and 3G networks. Thus, new and enhanced coding and modulation schemes have improved the bandwidth efficiency.</para>
<table-wrap id="tbl9_1">
<label>Table 9.1</label>
<caption><title>Technologies and bandwidths for 2G, 3G, 4G and 5G technologies</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="groups">
<thead>
<tr>
<td valign="bottom" align="left">Generation</td>
<td valign="bottom" align="left">Year</td>
<td valign="bottom" align="left">Standards</td>
<td valign="bottom" align="left">Technology</td>
<td valign="bottom" align="left">Bandwidth</td>
<td valign="bottom" align="left">Data-rates</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">2G</td>
<td valign="top" align="left">1991</td>
<td valign="top" align="left">GSM, GPRS, EDGE</td>
<td valign="top" align="left">Digital</td>
<td valign="top" align="left">Narrowband</td>
<td valign="top" align="left"><emphasis>&#60;</emphasis>80&#x2013;100 Kbit/s</td>
</tr>
<tr>
<td valign="top" align="left">3G</td>
<td valign="top" align="left">2001</td>
<td valign="top" align="left">UMTS, HSPA</td>
<td valign="top" align="left">Digital</td>
<td valign="top" align="left">Broadband</td>
<td valign="top" align="left"><emphasis>&#60;</emphasis>2 Mbit/s</td>
</tr>
<tr>
<td valign="top" align="left">4G</td>
<td valign="top" align="left">2010</td>
<td valign="top" align="left">LTE, LTE Advanced</td>
<td valign="top" align="left">Digital</td>
<td valign="top" align="left">Mobile broadband</td>
<td valign="top" align="left">xDSL like experience 1 hr HD mobile in 6 minutes</td>
</tr>
<tr>
<td valign="top" align="left">5G</td>
<td valign="top" align="left">2025&#x2013;2030</td>
<td valign="top" align="center">&#x2013;</td>
<td valign="top" align="left">Digital</td>
<td valign="top" align="left">Ubiquitous connectivity</td>
<td valign="top" align="left">Fibre like experience 1 hr HD mobile in 6 seconds</td>
</tr>
</tbody>
</table>
</table-wrap>
<para>The <link linkend="tbl9_1">Table 9.1</link> shows the technologies and bandwidths for 2G, 3G, 4G and 5G networks respectively.</para>
<para>Notice the exponential increase in data-rates in the developing generations of mobile networks. The increase in data-rates in 5G networks in mainly due to the use of higher frequencies above 3 GHz with limited geographical coverage of 50&#x2013;500 m in each cell. This concept is also called Small Cells.</para>
<para>Flow-TV and On-demand video requires that high bandwidths are supported in the access network and for backhaul connectivity. A main prerequisite of the increased data-rates in 5G networks is the availability of spectrum allocated to 5G networks.</para>
<para>At the ITU World Radio Conference (WRC) in Geneva in 2012, it was decided to reallocate the 700 MHz band ranging from 694&#x2013;790 MHz from DTT to mobile internet. The main argument for this reallocation was the availability of enhanced codecs video compression in DTT networks such as HEVC. The other argument was that the 700 MHz band is more suitable for rural areas in Denmark, due to the longer geographical reach of this frequency band compared to other frequency bands, which are currently available for mobile internet. At WRC 2015, it was decided to postpone a proposal for the sub-700 MHz band to 2023.</para>
<para>The sub-700 MHz band is currently reserved for downlink TV-broadcast. Hence, it can be expected that the current DTT distribution platform will remain in service at least until 2030 in most countries including Denmark.</para>
</section>
</section>
<section class="lev1" id="sec9-5">
<title>9.5 Tv Broadcast in the 5g Era</title>
<para>One of the main characteristics with 5G networks is the use of higher frequencies over 3 GHz which have limited coverage from approx. 50&#x2013;500 meters from the base station antenna. 5G networks will support bandwidths of up to 10 Gbit/s. TV everywhere is a term used to describe:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Freedom of choice to only pay for TV-channels that the consumer wants to watch.</para></listitem>
<listitem><para>Freedom to watch the TV-channels irrespective of the time.</para></listitem>
<listitem><para>Freedom to watch the TV-channels irrespective of place (at home, commuting, in the summerhouse etc.</para></listitem></itemizedlist>
<para>The in 5G area these capabilities are mandatory for the consumer. A significant part of these capabilities will most likely be supported in future 5G networks.</para>
<para>However, security is a major concern one major when it comes to TV broadcast using LTE-Broadcast in 5G networks is security which needs to be addressed is security. Adequate security measures are critical in terms of securing service continuity, service integrity and service confidentiality. TV viewers demand a stable and robust TV-broadcast service and they have an increasing demand to have the privacy in terms of preferences and choices of content. Cybercrime is becoming an increasing issue on IP- and internet connected systems.</para>
<para>Thus, the future ICT communication landscape for TV broadcast should not only consist of both IP and internet based content but also non-IP digital TV broadcast platforms that cannot be hacked and which continues as a robust and reliable communication means to the population both in everyday life and in case of major crises. As an example, a major fire occurred outside of Stockholm in 2014. The internet in the area was down for three days but the TV and radio broadcast networks continued to broadcast important information and messages to the population during the crises.</para>
<para>To conclude, a combination of both IP- and non-IP TV-distribution platforms for flow-TV are to be expected even in the 5G era, which not only serves to entertain but also to be an important communication means for the society in case of major crises in the society. Well, at least until 2030.</para>
</section>
<section class="lev1" id="sec9-6">
<title>9.6 Conclusions</title>
<para>This chapter has analyzed the disruptive changes to the traditional TV-value chain, which has occurred in recent years. No doubt, IP and the internet have affected many industries, and TV broadcast is no exception. In addition, new market players have entered into the value chain, which increases competition but also new revenue opportunities being the end-result.</para>
<para>However, although the internet has changed the TV broadcast industry for good it is important to note that the IP and the internet and traditional DTT-broadcast should be regarded as complementary platforms in order to secure a reliable and robust TV broadcast service.</para>
<para>Thus, a combination of both IP- and non-IP TV-distribution platforms for flow-TV are to be expected even in the 5G era, which not only serves to entertain but also to be an important communication means for the society in case of major crises in the society. Well, at least until 2030, as the former Director-General of the World Trade Organization, Pascal Lamy, also recommends in a report to the EU commission [11].</para>
<para>What happens after 2030 is difficult to say at the point of writing this chapter. No doubt, it will take time to get the security aspects solved with respect to TV-broadcast over IP-based networks and the internet with the increases in cybercrime. However, there is no doubt that in the longer run even more frequencies, especially in the higher frequency bands above 6 GHz, are likely to be allocated to 5G networks. This will in turn increase the capacity of OTT viewing even further, and especially when combined with the concept of Content Delivery Networks (CDN) meaning that the OTT content is located close to the end user, which in turn reduces load on the mobile network.</para>
<para>So to conclude: Only time will tell how TV-broadcast is distributed after 2030. However, one thing is for sure. Adequate ICT infrastructure is an important prerequisite in order to move viewing of moving images to the next level.</para>
</section>
<section class="lev1" id="sec9-7">
<title>References</title>
<para>[1] DR Report, DR Medieforskningen 2015.</para>
<para>[2] da.wikipedia.org/wiki/Fjernsyn i Danmark</para>
<para>[3] en.wikipedia.org/wiki/Television in the United States</para>
<para>[4] www.teracom.dk</para>
<para>[5] Clayton Kristensen: The Innovators Dilemma, Havard Business School Press, 1997.</para>
<para>[6] Photograph source: Lars Kierkegaard.</para>
<para>[7] Photograph source: Lars Kierkegaard.</para>
<para>[8] www.3gpp.org</para>
<para>[9] GSA: Evolution to LTE Report, October 2015.</para>
<para>[10] EU Commission Report, Mobile Communications: From 1G to 5G.</para>
<para>[11] Pascal Lamy: Report to the European Commission, Results of the work of the High Level Group on the Future use of the UHF band (470&#x2013;790 MHz), 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B11%5D+Pascal+Lamy%3A+Report+to+the+European+Commission%2C+Results+of+the+work+of+the+High+Level+Group+on+the+Future+use+of+the+UHF+band+%28470-790+MHz%29%2C+2014%2E" target="_blank">Google Scholar</ulink></para>
</section>
<section class="lev1" id="sec9-8">
<title>About the Author</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig9_6.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Lars Kierkegaard</emphasis> is currently Head of Strategy &#x0026; Business Development at Teracom A/S. Lars is an expert on ICT and network convergence and have a 17 years background from international hi-tech ICT companies within media, broadcast, telecom and public safety industries.</para>
<para>He joined Teracom in 2010 where he was responsible for standardization of existing technical broadcast solutions into market oriented ICT product and service portfolios.</para>
<para>In 2013, Lars was appointed with the responsibility to head a new business innovation department to drive growth initiatives. At the same year, Lars was awarded with the title &#x201C;Employee of the year&#x201D; in TeracomBoxer Group in the category &#x201C;Profitable Growth in our whole business&#x201D;.</para>
<para>In 2015 Lars, lead Teracom to win a 15-year contract for design, system integration and operations of a new nationwide coastal radio system in Denmark.</para>
<para>Main responsibility areas include business development &#x0026; sales, people management, product management, innovation, and bid management. He is also a frequent speaker on ICT and convergence at international conferences.</para>
<para>Prior to his employment at Teracom, he has held senior product management and business development positions in Terma, Anritsu and Ericsson with Information and Communication Technology (ICT) being the &#x201C;red thread&#x201D;.</para>
<para>Lars is board member of the Danish Consumer Electronics Association. He is also advisory board member at Center for Communication, Media &#x0026; ICT at Aalborg University, board member of the IEEE Joint Chapter for Denmark, and external censor at the technical universities in Denmark. Finally, Lars is board member of the WorldDAB Association.</para>
<para>He holds a M.Sc. degree in Civil Engineering from the Technical University of Denmark, and a Master&#x2019;s degree in Information and Communication Technology from Aalborg University in Denmark, as well as a Graduate Certificate in Business Administration from Copenhagen Business School.</para>
</section>
</chapter>
<chapter class="chapter" id="ch10" label="10" xreflabel="10">
<title>The Next Mobile Communication Steps into New Application Areas</title>
<para><emphasis role="strong">Walter Konh&#x00E4;user</emphasis></para>
<para>Technical University of Berlin, Germany</para>
<section class="lev1" id="sec10-1">
<title>10.1 Introduction and Mobile Pioneer Phase</title>
<para>The digital mobile communication started 1992 with first GSM network deployments in Europe, called 2nd Generation. Meanwhile we are discussing 5th Generation networks planned to start first deployments in 2020. This chapter describes the mobile evolution and its highlights. It will consider 5G technologies focus on new application areas which are not yet covered by mobile communication systems. As an example for new application areas it will describe a decentralized energy storage system and its mobile communication requirements to make renewable energy supply viable. The chapter ends with Conclusions and outlook.</para>
<para>Mobile communication is older than many today&#x2019;s users would expect. During the first period, called the pioneer phase from 1921 to 1945, mobile radio technology was still quite premature and dominated by the mechanical problem designing a radio system that could survive the bumps and bounces of a moving vehicle. These initial radio systems were based on amplitude modulation radio and no commercial services were established. The invention of frequency modulation was an important determinant and the World War II brought tremendous improvements in designs. This first pioneer phase is marked by three topics [1]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>mainly used by military and paramilitary groups,</para></listitem>
<listitem><para>building a radio transmitter capable of operating within the size and power constrains of a moving car and</para></listitem>
<listitem><para>radio transmission based on frequency modulation.</para></listitem></itemizedlist>
<para>The next phase of development of mobile communication systems is the expansion of mobile telephone services into commercial use. The technical improvements were oriented towards two goals:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>reduction of transmission bandwidths and</para></listitem>
<listitem><para>implementation of automatic trunking.</para></listitem></itemizedlist>
<para>The next step of the early mobile communication systems was</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>cellular structuring.</para></listitem></itemizedlist>
<para>This innovation represented a totally new approach of deploying radio networks. It was the idea to extend the capacity to an unlimited system, breaking through the limits that had restricted the growth of the mobile communication.</para>
</section>
<section class="lev1" id="sec10-2">
<title>10.2 Analog Mobile Communication Systems</title>
<para>After World War II a lot of mobile communication systems based on analog technology were deployed in different countries. This was the start of the commercial phase, but still a niche market. These networks had following attributes:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>analog air channel,</para></listitem>
<listitem><para>narrow band communication,</para></listitem>
<listitem><para>voice centric services,</para></listitem>
<listitem><para>only national roaming,</para></listitem>
<listitem><para>FDD based,</para></listitem>
<listitem><para>less subscriptions compared with today,</para></listitem>
<listitem><para>expensive tariffs,</para></listitem>
<listitem><para>used in cars mainly and</para></listitem></itemizedlist>
<para>were called 1st Generation of mobile communication systems. Most common 1st Generation systems are AMPS, TACS, NMT and C-net.</para>
</section>
<section class="lev1" id="sec10-3">
<title>10.3 Digital Mobile Communication Systems</title>
<para>A totally change in the mobile communication began with the development of first digital systems in the eighties of the last century with first deployments 1992. It started from a niche market with less subscriptions and high tariffs to a mass market with very high penetration and flat rates and remarkable changes of our daily human behaviour. It is in the meanwhile unimaginable to live without a mobile terminal. The most successful system of this 2nd Generation of mobile networks was GSM, which was planned as a mobile communication system for Europe only and conquered nearly the whole world in less than 10 years. In 2002, when the 3rd Generation started, 62% of the worldwide subscriptions were based on GSM (<link linkend="fig10_1">Figure 10.1</link>). The reasons for this success were:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>fully digital transmission,</para></listitem>
<listitem><para>enhanced frequency economy,</para></listitem>
<listitem><para>privacy,</para></listitem>
<listitem><para>improved hand-held viability,</para></listitem>
<listitem><para>flexible configuration of networks and services,</para></listitem>
<listitem><para>international compatibility,</para></listitem>
<listitem><para>enhanced services.</para></listitem>
<listitem><para>based on field-proven digital switch technology,</para></listitem>
<listitem><para>open Interfaces,</para></listitem>
<listitem><para>multi-vendor architecture,</para></listitem>
<listitem><para>competitive operator concept and</para></listitem>
<listitem><para>early system availability.</para></listitem></itemizedlist>
<para>But nevertheless the killer application still was mobile voice service. 2nd Generation standards were narrow band systems with voice centric services and the first real data services started with the introduction of GPRS, what led to an extended architecture. Another milestone was the introduction of the IN-architecture with prepaid service. The next step into broadband was the development of EDGE architecture with the success to become member of the IMT 2000 family. EDGE gives GSM/GPRS-Market new significant boost and business potential, EDGE and 3G WCDMA are complementary not competing and EDGE is the smooth migration path to 3G-services in existing spectrum. Although EDGE requires no hardware or software changes to be made in GSM core network, base stations must be modified. EDGE compatible transceiver units must be installed and the base station subsystem needs to be upgraded to support EDGE. New mobile terminal hardware and software is also required to decode/encode the new modulation and coding schemes and carry the higher user data rates to implement new services.</para>
<fig id="fig10_1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 10.1</label>
<caption><title>Worldwide subscribers from 1993 to 2002 of different 2nd Generation standards.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_1.jpg" mime-subtype="jpeg"/>
</fig>
<para>The International Telecommunications Union (ITU) launched a new framework of standards under the generic name of IMT-2000 to present the culmination of ten years study and design work to identify the 3rd Generation standards. The following key factors were established [2, 3]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>high speed access, supporting broadband services such as fast Internet access and multimedia applications,</para></listitem>
<listitem><para>flexibility and support of new kinds of services and</para></listitem>
<listitem><para>offer of an effective evolutionary path for 2nd Generation existing wireless networks.</para></listitem></itemizedlist>
<para>The market expectations were focused on more advanced services than voice and low data services considering merging three worlds which have operated so far independently the computer and data activities, the telecommunication and the audio and video content world. Multimedia applications use several services in parallel such as voice, audio, video data, e-mail, etc. and have to be supported by the radio interface and the core network. The main focus on this merged field of activities is to generate new business opportunities and multimedia mobile communication (<link linkend="fig10_2">Figure 10.2</link>). UMTS was the first radio network with FDD and TDD radio access technologies. For FDD was chosen WCDMA as multiplex method and access technology for TDD was TD-CDMA [2]. TD-CDMA was improved by the Chinese to TDSCDMA and deployed in China. UMTS networks were ATM/IP based with full roaming through different networks and broadband services like internet access and multimedia services. UMTS was standardized by 3GPP.</para>
<para>To improve broadband access to get DSL-like broadband speeds HSPA was standardized in Release 5 (Downlink) and Release 6 (Uplink) of 3GPP. Mobile broadband moved a step faster with HSDPA delivering up to 14 Mbps in the downlink and HSUPA returning 5.8 Mbps in the uplink. HSPA improvements in UMTS spectrum efficiency were achieved through new modulation (16 QAM) formats, reduced radio frame lengths and new functionalities within radio networks (including retransmissions between Node B and the Radio Network Controller). Consequently, throughput is increased and latency is reduced (down to 100 ms and 50 ms for HSDPA and HSUPA respectively). By the end of 2007, there were 166 commercial HSDPA networks in 75 countries in operation and further 38 networks committed to deployment. The first commercial launch of HSUPA was in early 2007 and 24 networks had launched by the end of the year.</para>
<fig id="fig10_3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 10.2</label>
<caption><title>Converging three worlds generates new business opportunities (Picture Siemens).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_2.jpg" mime-subtype="jpeg"/>
</fig>
<para>CDMA 2000, mainly developed in US and successor of the 2G standard IS 95, became member of the IMT-2000 family too. It is a hybrid 2.5G/3G standard of mobile communication that use CDMA, a multiple access scheme for digital radio, to send voice, data, and signaling data between mobile phones and cell sites. CDMA 2000 is considered a 2.5G protocol in 1xRTT and a 3G protocol in EVDO.</para>
<para>CDMA is a mobile digital radio technology that transmits streams of bits and whose channels are divided using pseudo noise sequences. CDMA permits many radios to share the same frequency channel. Unlike TDMA, a different technique used in GSM and DAMPS, all radios can be active all the time, because network capacity does not directly limit the number of active radios. Since larger numbers of phones can be served by smaller numbers of cell sites, CDMA-based standards have a significant economic advantage over TDMA-based standards, or the oldest cellular standards that used frequency division multiple access (<link linkend="fig10_3">Figure 10.3</link>).</para>
<fig id="fig10_3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 10.3</label>
<caption><title>Major multiple access methods used in 2nd and 3rd mobile radio standards (Picture NSN).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_3.jpg" mime-subtype="jpeg"/>
</fig>
<para>CDMA 2000 remains compatible with the 2nd Generation CDMA telephony methods IS 95. The CDMA 2000 standards CDMA2000 1xRTT, CDMA2000 EV-DO, and CDMA 2000 EV-DV are approved radio interfaces for the ITU&#x2019;s IMT-2000 standard. CDMA 2000 is an incompatible competitor of the other major 3G standard UMTS. It is defined to operate at 400 MHz, 800 MHz, 900 MHz, 1700 MHz, 1800 MHz, 1900 MHz, and 2100 MHz. CDMA2000 was standardized by 3GPP2. IMT 2000 allocated worldwide news spectrums for 3G for FDD and TDD applications, except North America (<link linkend="fig10_4">Figure 10.4</link>).</para>
<para>After deployment of HSPA and spreading of smartphones the mobile data traffic in the 3G networks increased extremely. Attractive HSDPA flat-rate mobile-broadband services offered to drive strong increase in traffic volumes. As traffic still grows faster than revenue, networks had to become more efficient. This required low cost per bit technologies and was one of the main arguments to push 4G (<link linkend="fig10_5">Figure 10.5</link>).</para>
<para>LTE/SAE (Long-Term Evolution/System Architecture Evolution) is a standard for wireless cellular communication of high-speed data for mobile terminals. It is evolutionary based on the GSM/EDGE and UMTS/HSPA network technologies, increases the capacity and speed using a different radio interface together with core network improvements and decreasing the network costs /4,5/. The standard is defined by the 3GPP and is specified in its release 8 document series, with minor enhancements described in release 9.</para>
<fig id="fig10_4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 10.4</label>
<caption><title>IMT 2000 Worldwide Frequency Plans (Picture Siemens).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_4.jpg" mime-subtype="jpeg"/>
</fig>
<fig id="fig10_5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 10.5</label>
<caption><title>Mobile data traffic growth during the year 2007 (Picture NSN).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_5.jpg" mime-subtype="jpeg"/>
</fig>
<para>LTE is the natural upgrade path for carriers with both GSM/UMTS and CDMA 2000 networks. Only multi-band phones will be able to use LTE in all countries where it is supported. The key benefits for operators and users are:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>only one network element in radio and core each (<link linkend="fig10_6">Figure 10.6</link>),</para></listitem>
<listitem><para>enhancement of packet switched technology,</para></listitem>
<listitem><para>high data rates, low latency, packet optimised flat IP system,</para></listitem>
<listitem><para>comprehensive security,</para></listitem>
<listitem><para>mobility concept with tight Integration for 3GPP access,</para></listitem>
<listitem><para>streamlined SAE bearer model with network centric QoS handling and</para></listitem>
<listitem><para>on/offline and flow based charging.</para></listitem></itemizedlist>
<fig id="fig10_6" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 10.6</label>
<caption><title>LTE/SAE System Architecture (Picture NSN).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_6.jpg" mime-subtype="jpeg"/>
</fig>
<para>Although marketed as a 4G wireless service, LTE (as specified in the 3GPP release 8 and 9 document series) does not satisfy the technical requirements the 3GPP consortium has adopted for its new LTE Advanced standard. The requirements were originally set forth by the ITU-R organization in its IMT Advanced specification. However, due to marketing pressures and significant advancements that WiMAX, Evolved High Speed Packet Access and LTE bring to the original 3G technologies, ITU later decided that LTE together with the aforementioned technologies can be called 4G technologies [4]. The LTE Advanced standard formally satisfies the ITU-R requirements to be considered IMT-Advanced [5&#x2013;7].</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>MME: Mobility Management Entity</para></listitem>
<listitem><para>PCRF: Policy and Charging Control Function</para></listitem>
<listitem><para>SAE-GW: System Architecture Evolution Gateway</para></listitem>
<listitem><para>IMS: IP Multimedia Subsystem</para></listitem>
<listitem><para>HSS: Home Subscriber Server</para></listitem>
<listitem><para>AAA: Authentication, Authorization and Accounting</para></listitem></itemizedlist>
<para>LTE radio interface use different methods in downlink and uplink. For downlink OFDMA with</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>improved spectral efficiency,</para></listitem>
<listitem><para>reduced interference,</para></listitem>
<listitem><para>very well suited for MIMO and</para></listitem></itemizedlist>
<para>for uplink Single-Carrier-FDMA with</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>power efficient uplink increasing battery lifetime,</para></listitem>
<listitem><para>improved cell edge performance by low peak to average ratio and</para></listitem>
<listitem><para>reduced terminal complexity.</para></listitem></itemizedlist>
<fig id="fig10_7" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 10.7</label>
<caption><title>LTE Radio Principles (Picture NSN).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_7.jpg" mime-subtype="jpeg"/>
</fig>
<para>Further topics:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>enabling peak cell data rates of 173 Mbps downlink and 58 Mbps in uplink at 20 MHz bandwidth, FDD, 2 TX, 2 RX, DL MIMO, PHY layer gross bit rate</para></listitem>
<listitem><para>scalable bandwidth: 1.4/3/5/10/15/20 MHz also allows deployment</para></listitem>
<listitem><para>in lower frequency bands (rural coverage, refarming)</para></listitem>
<listitem><para>short latency: 10&#x2013;20 ms roundtrip ping delay (server near RAN)</para></listitem>
<listitem><para>FDD and TDD timing.</para></listitem></itemizedlist>
<para><link linkend="fig10_7">Figure 10.7</link> illustrates the LTE radio principles. Core technology is based on the Mobility Management Entity with C-Plane part of a GW, session and mobility management, idle mode mobility management, paging and AAA proxy. The serving gateway contains user plane anchor for mobility between the 2G/3G access systems and the LTE access system and lawful interception. The packet data network gateway implies the gateway towards internet/intranets, user plane anchor for mobility between 3GPP and non-3GPP access systems like home agent, charging support, policy and charging enforcement, packet filtering and lawful interception (<link linkend="fig10_8">Figure 10.8</link>).</para>
<para>The roadmap of the digital mobile network evolution towards 5th Generation, starting with first network operation based on GSM 1992 until today shows <link linkend="fig10_9">Figure 10.9</link>.</para>
</section>
<section class="lev1" id="sec10-4">
<title>10.4 5G Requirements and Technologies</title>
<para>Although 4G Technology is still in rollout a lot of research- and industry activities have started already. With 5G a new phase of mobile communication will start and the focus is on the billions of terminals available in the internet of things. We can, therefore, deduce that data traffic will continue to increase dramatically over time. It is estimated 1000 times by 2020. Connected devices will increase over time by 10&#x2013;100 until 2020. New device types like probes, sensors, meters, machines, control computers etc. will significantly contribute to that increase. New sectors will bring new priorities, like future cars with car-to-car communication and real time navigation, Industry 4.0 with plant of the future, Energy with decentralized energy production and energy storage and real estate with metering, consumption control etc. Broadband communications will stimulatethe economy by contributing significantly to GDP and creating employment. From a user&#x2019;s point of view 5G networks should enable the perception of infinite capacity, tactile internet and augmented reality. Compared to existing networks, 5G networks will need to be more available, more dependable and more reliable and offer increased speed, increased throughput, decreased latency, improved deviceautonomy and must be offered at low cost. &#x201C;5G is an end-to-end ecosystem to enable a fully mobile and connected society. It empowers value creation towards customers and partners, through existing and emerging use cases, delivered with consistent experience, and enabled by sustainable business models&#x201D; is the NGMN 5G vision [10].</para>
<fig id="fig10_8" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 10.8</label>
<caption><title>Core network principles (Picture NSN).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_8.jpg" mime-subtype="jpeg"/>
</fig>
<fig id="fig10_9" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 10.9</label>
<caption><title>Digital mobile networks evolution towards 5th Generation.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_9.jpg" mime-subtype="jpeg"/>
</fig>
<para>The evolution process, which will be chosen, is of importance:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>embark on a linear evolution of today&#x2019;s networks as it was done in the past, or</para></listitem>
<listitem><para>adopt a new revolutionary approach, or</para></listitem>
<listitem><para>a combination of both.</para></listitem></itemizedlist>
<para>Traditionally, the 3GPP approach is evolutionary (including backwards compatibility). A pure evolutionary approach may not be sufficient for 5G. To obtain new spectrum for mobile services is essential, but not the whole solution. More efficient use of spectrummust be ensured with licensed, unlicensed and shared access regimes. Opportunities to deliver broadcast content to mobile users and vice versa by exploiting synergies. Network topology and architecture will change:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>cell sizes becoming smaller,</para></listitem>
<listitem><para>cells becoming denser (ultra-dense over time),</para></listitem>
<listitem><para>traditional &#x201C;cell&#x201D; concept will become less relevant in favour of wireless cloud approach,</para></listitem>
<listitem><para>interworking with other networks more prevalent (e.g., Wi-Fi offload),</para></listitem>
<listitem><para>introduction of device to device working,</para></listitem>
<listitem><para>virtualisation of network functions, management and orchestration,</para></listitem>
<listitem><para>evolution from hardware to software.</para></listitem></itemizedlist>
<para>From an economic point of view high demand to reduce CAPEX and OPEX. Decrease radio network energy consumption and CO2 emissions. Reduce energy consumption per BTS site and use more energy efficient BTS, reduce site power consumption, increase site temperature, use outdoor BTS, optimize energy consumption versus traffic, reduce the number of BTS sites, increase cell coverage, share networks and use renewable energy source like solar cells, wind and hybrid solutions on site like green energy (hydro, wind and bio generated grid electricity). The technical issues to be discussed and analyzed:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>new chip technologies,</para></listitem>
<listitem><para>new network architecture with distributed service platforms,</para></listitem>
<listitem><para>new hierarchy of cloud platforms, e.g., mobile edge clouds for base stations,</para></listitem>
<listitem><para>mini clouds on local level and less central clouds,</para></listitem>
<listitem><para>new operating systems and network protocols,</para></listitem>
<listitem><para>tactile internet,</para></listitem>
<listitem><para>high availability,</para></listitem>
<listitem><para>high reliability,</para></listitem>
<listitem><para>high security,</para></listitem>
<listitem><para>new diversity concept for frequency, place and infrastructure,</para></listitem>
<listitem><para>future machine to machine communication with new authentication techniques to support applications with high security and real time requirements and</para></listitem>
<listitem><para>new antenna technique with controlled and intelligent beaming.</para></listitem></itemizedlist>
<fig id="fig10_10" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 10.10</label>
<caption><title>5G architecture envisioned by NGMN.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_10.jpg" mime-subtype="jpeg"/>
</fig>
<para>Next Generation Mobile Network [8] created an architecture that leverages the structural separation of hardware and software, as well as the programmability offered by Software Defined Networking and Network Function Virtualization. 5G architecture is an SDN/NFV native architecture covering all aspects ranging from devices, (mobile/fixed) infrastructure, network functions, value enabling capabilities and all the management aspects to orchestrate the 5G system. The Infrastructure resource layer contains the physical resources of a fixed-mobile converged network, access nodes, cloud nodes, networking nodes and 5G devices with all kinds of terminals from vertical business applications like M2M terminals. The Business enablement layer contains all functions required within a converged network of modular network function, value enabling capabilities and information repository. The business application layer implies applications and services of the operator, enterprise services, verticals of M2M and IoT and utilisation of 5G networks by 3rd parties. E2E management and orchestration has the capability to manage this 5G network end-to-end and provide an operation support system and self-organizing network capabilities (<link linkend="fig10_10">Figure 10.10</link>).</para>
</section>
<section class="lev1" id="sec10-5">
<title>10.5 New Application Areas for Vertical Industries</title>
<para>The next phase of mobile communication is to integrate industry, energy, mobility, real estate, and its processes. This is widely referred to as machine to machine communication and Internet of the Things. Billions of smart devices will use their embedded communication abilities and sensors to act on their local environment and use remote triggers based on intelligent logic. These devices have different requirements with respect to capabilities, power consumption and cost. IoT will also have a wide range of requirements on networking such as reliability, security, performance (latency, throughput), etc. New services for vertical industries like</para>
<fig id="fig10_11" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 10.11</label>
<caption><title>New application areas for vertical industries within 5G (Picture VDE).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_11.jpg" mime-subtype="jpeg"/>
</fig>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>future cars (car-to-car communication, real time navigation, etc.),</para></listitem>
<listitem><para>industry 4.0 (plant of the future),</para></listitem>
<listitem><para>energy (decentralized energy production, energy transport, energy distribution and</para></listitem>
<listitem><para>energy storage) and</para></listitem>
<listitem><para>real estate services (metering, consumption control) [8] (<link linkend="fig10_11">Figure 10.11</link>)</para></listitem></itemizedlist>
<para>will not be limited to connectivity only but can also require enablers from cloud computing, big data management, security, logistics, etc.</para>
</section>
<section class="lev1" id="sec10-6">
<title>10.6 Application Example Decentralized Energy Storage</title>
<para>Energy is a very important resource for the benefit of mankind. In many countries discussions are ongoing how to manage the energy turnaround. An important contribution will build intelligent Smart Grid applications as new services within the communication networks. A decentralized energy storage concept based on Smart Grid applications and a centralized control system shows an example how to contribute to the energy turnaround. Merging power networks and communication networks to intelligent Smart Grids opens a lot of opportunities for future energy resource handling and should motivate researchers to find out the best solutions for the future [9]. For better monitoring and metering, sensors, communication technology as well as distributed real-time computing platforms will be the key technologies for managing various electrical equipment. The herewith handled state parameters are critical for the determination of the current state of the Smart Grids and seen as the success factor for shifting from centralized to decentralized energy system.</para>
<para>This captured information will be used as input for many types of model predictive algorithms whose output supports decisions to achieve the goals of the future Smart Grids. For an appropriate control structure in order to stabilize the grid with a limited mechanical inertia, an architecture based on an appropriate combination of central and decentralized control is needed.</para>
<para>For better predictive models and algorithms improved computer based models and algorithms will be needed. The grid elements such as transmission and distribution lines, voltage and current transformers, flexible AC and DC elements, switches, protection equipment but also all grid users including generators, storage, consumer equipment and behavior have to be extended with digital communication and information features.</para>
<para>A software architecture allowing consumers and market players to compose new services and to satisfy own requirements related to energy services and products thereby using also market interfaces and at the same time supporting the quality and security of supply of the grid based electricity system [10].</para>
<para>The energy turnaround initiated by politics created a high volatility in the energy production based on renewable energy (wind power stations and photovoltaic systems). To integrate renewable energy economically an additional concept of energy storage and energy supply has to be claimed. The proposed concept is a decentralized energy concept and decouples energy production from energy consumption. This is necessary to increase the share of renewable energy in the energy supply in an economical way (<link linkend="fig10_12">Figure 10.12</link>). In the cellars of the real estate industry will be deployed thousands of battery systems. A battery system exists of a battery-farm, a AC/DC inverter and a control- and communication unit. All battery systems are linked to each other and to the control center via the communication unit called Smart Grid. Based on the Smart Grid all decentralized storage system can be linked to a virtual large storage system distributed countrywide. When there is an oversupply of energy the batteries can be loaded and when there is demand the batteries can be unloaded, controlled by the central control center. Intelligent data exchange between the decentralized battery systems enables the battery systems to organize itself a lot of energy supplies tasks (<link linkend="fig10_13">Figures 10.13</link> and <link linkend="fig10_14">10.14</link>).</para>
<fig id="fig10_12" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 10.12</label>
<caption><title>Consumption controls production and decoupled demand and production.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_12.jpg" mime-subtype="jpeg"/>
</fig>
<para>The Control- and Communication Platform (<link linkend="fig10_15">Figure 10.15</link>) is composed of an industry PC, Linux operating system and the OGEMA Platform [11], developed by Fraunhofer IWES Institute. The applications have to organize</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>control of the AC/DC inverter,</para></listitem>
<listitem><para>control Battery Management System,</para></listitem>
<listitem><para>communication with the central unit,</para></listitem>
<listitem><para>communication with the battery systems belonging to the same Micro Grid,</para></listitem>
<listitem><para>smart metering,</para></listitem>
<listitem><para>recording balancing power,</para></listitem>
<listitem><para>remote maintenance,</para></listitem>
<listitem><para>security,</para></listitem>
<listitem><para>IoT interface.</para></listitem></itemizedlist>
<para>The revenue model is based on balancing power and tenant electricity. The focus is on real estate industry with huge leverage effect. The top 10 real estate companies in Germany provide base to c. 100,000 buildings and c. 800,000 end users leading to 2,788 GWh power supply per year to end customers.</para>
<fig id="fig10_13" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 10.13</label>
<caption><title>Decentralized energy storage linked on a Smart Grid communication to a control center.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_13.jpg" mime-subtype="jpeg"/>
</fig>
<fig id="fig10_14" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 10.14</label>
<caption><title>Clustering of the battery storage systems to organize itself.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_14.jpg" mime-subtype="jpeg"/>
</fig>
<fig id="fig10_15" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 10.15</label>
<caption><title>Control- and communication platform (IoT interface).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_15.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev1" id="sec10-7">
<title>10.7 Conclusions and Outlook</title>
<para>The future communication standard 5G will change everyday life and economy dramatically. The success of a new generation of mobile communication system is mainly based on new applications to address new market potentials. 5G is expected to address industry, energy, mobility, real estate industry, health, etc. and generate a high number of new applications. Further important topics are security and reliability. It is important to focus on the areas network capability, consistent customer experience, flexibility, efficiency and innovation/8/. Significant investment has to be made in 5G collaborative research programs and within technology companies too. Timing is key and careful alignment is needed between research and standardisation timelines. Measures need to be put in place to ensure that research results lead to high quality standards. Close link between research projects and the most influential players in standardisation has proven to be the best way to ensure close link.</para>
<para>Within the EU research program Horizon 2020 the 5G Public-Private-Partnership (5G PPP) [12, 13] is established, which is focussed on systems with high data rate like video applications, systems for IoT applications and systems with low latency. Additional 5G will support automobile range, transport, manufacturing, banking, energy, smart cities, etc.</para>
<para>Finally, reference should be made to the fact that an excellent new generation will be successful only by learning from the mistakes of the past. Mistakes of the past were no terminals available or too late, less or wrong applications and too much focus on technology and not on business oriented applications. 3G and mainly 4G networks are already on a high level of performance and will be a high competition after 2020, too.</para>
</section>
<section class="lev1" id="sec10-8">
<title>References</title>
<para>[1] George Calhoun, Digital Cellular Radio, Artech House, ISBN: 0-89006-266-8</para>
<para>[2] Ramjee Prasad, Werner Mohr, Walter Konh&#x00E4;user, Third Generation Mobile Communication, Artech House, ISBN: 1-58053-082-6</para>
<para>[3] Walter Konh&#x00E4;user: Keynote speech on IEEE Vehicular Technology Conference Fall 99, Amsterdam, September 19&#x2013;22, 1999.</para>
<para>[4] An Introduction to LTE. 3GPP LTE Encyclopedia. Retrieved December 3, 2010.</para>
<para>[5] Long Term Evolution, a technical overview. Motorola. Retrieved July 3, 2010.</para>
<para>[6] News room press release. Itu. int. Retrieved 2012-10-28.</para>
<para>[7] ITU-R Confers IMT-Advanced (4G) Status to 3GPP LTE (Press release). 3GPP. 20 October 2010. Retrieved 18 May 2012.</para>
<para>[8] NGNM 5G White Paper &#x2013; Executive Version, Version 1.0, 22nd December 2014.</para>
<para>[9] Walter Konh&#x00E4;user, Smart Grid Applications as new Services within the Communication Networks, Global Wireless Summit 2014 in Aalborg from May 11&#x2013;14, 2014.</para>
<para>[10] Smart Grids SRA 2035 Strategic Research Agenda, March 2012.</para>
<para>[11] OGEMA, http://www.iis.fraunhofer.de/de/ff/ener/proj/ogema-2-0.html</para>
<para>[12] Mohr. W., 5G Public-Private-Partnership in Horizon 2020 der EU-Commission, VDE dialog 02/2014, ITG news.</para>
<para>[13] EU Commission, Horizon 2020, https://ec.europa.eu/programmes/horizo n2020/en/h2020-section/information-and-communication-technologies</para>
</section>
<section class="lev1" id="sec10-9">
<title>About the Author</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig10_16.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Walter Konh&#x00E4;user</emphasis> was born in 1949. He studied electrical engineering at the Technical University in Berlin and finalized with Ph.D. In 2007 he was appointed to Professor for Mobile Communication Systems.</para>
<para>Since joining Siemens in 1982 he has been involved in a variety of assignments. For eighteen years he has worked in the mobile networks business and was CTO within the mobile infrastructure business of Siemens. In 2004 he became President for the WLAN business with worldwide responsibility.</para>
<para>After the merger of Siemens Communication Group with Nokia Net to Nokia Siemens Networks (NSN) in 2007 he became Head of Product Process Deployment and site manager for NSN in Berlin.</para>
<para>Since 2010 he works as independent professional as Executive Consultant and is partner since 2013 at Hoseit-Unternehmensberatung, Berlin and Cologne, where he is working on a decentralized energy storage concept based on Smart Grid applications and a centralized control system to contribute to the energy turnaround.</para>
<para>He is a member of the VDE, the German Association of Electrical Engineers and is Spokesman of the regional VDE organization in Berlin and Brandenburg.</para>
</section>
</chapter>
<chapter class="chapter" id="ch11" label="11" xreflabel="11">
<title>5G: The Last Frontier?</title>
<para><emphasis role="strong">Marina Ruggieri, Gianpaolo Sannino and Cosimo Stallo</emphasis></para>
<para>University of Roma &#x201C;Tor Vergata&#x201D; &#x2013; Center for Teleinfrastructures (CTIF I), Italy</para>
<section class="lev1" id="sec11-1">
<title>11.1 Introduction</title>
<para>The human body of wireless users at present plays an extremely limited role in both the network and the user terminal functions and architectures.</para>
<para>An innovative and challenging vision of the 5G-to-6G transition envisages the human body as a main actor with an active role in node and network functions as well as in user terminal architecture.</para>
<para>New frontiers in a tight connection of standardization and ethics (stethics) is intrinsically involved in the above vision.</para>
<para>In the last three years, the Center for Teleinfrastructures at the University of Roma &#x201C;Tor Vergata&#x201D; (CTIF I) is focusing on a very challenging research effort where the maturity of Information and Communications Technology (ICT) is horizontally offered to deploy vertical applications in interdisciplinary areas, such as health, law, economics, cultural heritage, humanities, etc. In order to develop the above research approach, CTIF I is composed of a strong group of ICT engineers, along with experts in the other disciplines, particularly in the clinical and biomedical areas.</para>
<para>The joint effort of the ICT and medical groups has produced an innovative and extremely challenging way of looking at the future of ICT, in particular at the meaning and the role of 5G in the evolutionary development of wireless systems.</para>
<para>In the above frame, the present Chapter, after highlighting the current achievements and open challenges of 5G, will present the CTIF I vision on the challenges of the future beyond 5G world, providing an application example under investigation and early stage development with the dentistry component of the medical area. In the example, the human body &#x2013; and in particular the oral cavity of the wireless user &#x2013; plays an active role in the node of the networks.</para>
<para>The future work and perspectives of the CTIF I approach and activities in the area of the human body active role to device and network functions of future mobile systems will be presented.</para>
</section>
<section class="lev1" id="sec11-2">
<title>11.2 5G Achievements and Open Challenges</title>
<para>Mobile information systems have been facing the challenges of the continuously increasing demand for the high data rates and mobility required by new wireless applications. 4G (Fourth Generation)/LTE (Long Term Evolution) wireless networks now enable high-speed mobile web videos, IP (Internet Protocol) telephony, video gaming, mobile High-Definition (HD) TV, video conferencing, and even mobile 3D TV.</para>
<para>The current trend of annual doubling of wireless data traffic is expected to continue. Research on 5G wireless communications has started and developed rapidly. It is expected that 5G wireless infrastructure will be deployed beyond 2020. However, enabling technologies for 5G mobile information systems such as massive MIMO (Multiple Input Multiple Output), new modulation, and waveform design are still in their infancy. More efforts from this community are truly needed to make 5G mobile systems reach their full fruition.</para>
<para>Massive MIMO (M-MIMO) technologies have been proposed to scale up data rates reaching gigabits per second in the forthcoming 5G mobile communications systems. However, one of the crucial constraints is dimension in space to implement the M-MIMO.</para>
<para>How to make more small cells in sleeping state for energy saving in ultradense small cell system has become a research hotspot.</para>
<para>The key of wireless power transfer technology rests on finding the most suitable means to improve the efficiency of the system. The wireless power transfer system applied in implantable medical devices can reduce the physical and economic burden of patients since it will achieve charging in vitro.</para>
<para>Optimum beamforming and power allocation can be analyzed using, for instance, a game-theoretic framework [1] to maximize the rate of each user selfishly under the transmit power constraint and the Primary User (PU) interference constraint. The design of the cognitive MIMO system is formulated as a non-cooperative game, where the secondary users (SUs) compete with each other over the resources made available by the PUs.</para>
<para>Compressive sensing theory [2] can be applied to reconstruct the signal with far fewer measurements than what is usually considered necessary. While, in many scenarios, such as spectrum detection and modulation recognition, it is only expected to acquire useful characteristics rather than the original signals, where selecting the feature with sparsity becomes the main challenge.</para>
<para>With the widespread use of Internet, the scale of mobile data traffic grows explosively, which makes 5G networks in cellular networks become a growing concern. Recently, the ideas related future network, for example, Software Defined Networking (SDN) [3], Content-Centric Networking (CCN) [4], Big Data [5], have drawn more and more attention.</para>
<para>The exploitation of mm-waves in mobile cellular environments will represent a breakthrough of 5G, as clearly stated in [6]. In [6], the mobile urban propagation in the 38 GHz band is thoroughly investigated and the viability of broadband transmission by Line Of Sight (LOS) and Not Line of Sight (NLOS) links is demonstrated. In [7], the wireless communication channel operating in the 70 GHz and 80 GHz band is characterized to define specific parameters and constraints that can be used to define the optimal topology of a multi-gigabit access network. P-t-P links with 10 Gb/s capacity are considered. In [8], single-carrier higher-order modulations and FDM (Frequency Division Multiplexing) channel aggregation techniques are used in combination with MIMO spatial multiplexing for P-t-P multi-gigabit short-distance E-band LOS connections, pushing the available data-rate up to 48 Gb/s. The use of E-band for P-t-P backhauling is a possible scenario.</para>
<para>Well-known backhaul technologies such as spectral-efficient LOS microwave, fiber and copper are being tailored to support the exploding user traffic demand in the RAN (Radio Access Network). However, owing to their position below roof height, a substantial number of small cells in urban settings do not have access to a wired backhaul, or clear line of sight to either a macro cell or a remote fiber backhaul point of presence. For distances of the order of 1-1.5 kilometers, which are expected to be enough for Long Term Evolution (LTE)-A small-cell backhauling, mm-wave systems can provide backhauling in the order of several gigabits per second.</para>
<para><link linkend="fig11_1">Figure 11.1</link> shows a potential multi-tier LTE-A cell deployment with mm-wave wireless backhaul. Small-cell Base Transceiver Station (BTS) are installed closer to smaller buildings or over streetlamps. Macro BTS are installed on the top of the bigger buildings. The presence of LOS connection is guaranteed for P-t-P backhaul among macro BTSs and may be ensured for P-t-P among small cell BTSs installed on the streetlamps. Also P-t-mP backhaul among macro BTSs and small-cell BTSs on the streetlamps may be reasonably assured. These LOS links can be effectively supported by E-band multi-gigabit transmission.</para>
<fig id="fig11_1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 11.1</label>
<caption><title>Typical configurations of small-cell backhaul in LTE-A standard.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig11_1.jpg" mime-subtype="jpeg"/>
</fig>
<para>In [9] E-band for P-t-P backhauling in LTE-A small cells is considered in combination with point-to-multipoint NLOS backhauling at 6 GHz. The solutions envisaged in [9] looks rather similar to the commercial products for small-cell backhauling supplied by CERAGON corporation (Palo Alto, CA) [10]: the FibeAir-70TM for LOS P-t-P transmitting at aggregate data-rate of 1 Gb/s at 81 GHz, and the FibeAir-2500TM for NLOS P-t-mP transmitting at 200 Mb/s at 6 GHz. All these components rely on single-carrier transmission techniques.</para>
<para>State-of-the-art PHY-layer solutions considered in [7&#x2013;9] look dated and lack of efficiency in particular in the presence of phase-noise, nonlinear distortions and signal-to-noise ratio drops due to atmospheric attenuation and rain fading. Such kind of impairments is usual in mm-wave transmission. Therefore, alternative solutions should be investigated in order to allow robust small-cell backhaul with reduced power expense.</para>
<para>A completely different typology of transmission based on UWB (Ultra-Wide Band) techniques has been considered in [11, 12]. However, as shown in [13] and [14], IR (Impulse Radio) techniques, thanks to their simplicity and intrinsic robustness, are very efficient also if employed in the E-band context. The IR-based backhaul relies on Pulse-Position-Modulation (PPM) for digital transmission and on Time Hopping (TH) for multi-user P-t-mP transmission. Such transceiver architecture is very efficient, very simple, and cost-effective and can be implemented by using Commercial Off the Shelf (COTS) hardware.</para>
<para>Finally, the 5G paradigm is paving the way for rich healthcare services enhanced with video calls and high definition images, available nearly everywhere. 5G networks are supporting sensors requiring very low energy consumption, with one battery charge every fifteen years. It will be very beneficial for medical connected devices such as blood pressure or insulin body worn sensors.</para>
<para>Furthermore, the high reliability and security of 5G infrastructures should help to alleviate the legitimate end user and health professionals concerns about privacy and hacking around health data and services. When thinking about new 5G capabilities in the domain of lower latency, reaching the target of 1 ms, new applications in the area of prosthesis or augmented human can be conceived.</para>
<para>The above frame about 5G suggests that, in spite of the open challenges and some potential issues, the 5G system paradigm is solid and it could represent a (final?) landing point for the mobile world as we have been used to know it from the introduction of GSM [15].</para>
<para>The 5G approach, where the extreme efficiency and speed of the mobile network as well as the full convergence between wired and wireless are the ultimate goals, indicates that 5G could in principle &#x201C;saturate&#x201D; the achievable maturity at system level from both operators and users viewpoints.</para>
<para>It is therefore very natural to pose the question of what could happen to the networks and users after the full deployment of 5G.</para>
<para>A possible answer is provided in the rest of the Chapter.</para>
</section>
<section class="lev1" id="sec11-3">
<title>11.3 The Challenges on the 5G Frontier</title>
<para>The transition between 5G and a following generation can introduce dramatic changes in the role played by the user inside the network.</para>
<para>A medium-term scenario envisages an increasing synergy between the user device capabilities and their implementation through the user&#x2019;s body. The result will be a highly personalized body-related device that will be able to solve intrinsic limitations in the current interaction with the device (e.g., finger size w.r.t keyboard).</para>
<para>A further step ahead allows predicting a strong interaction between the brain functions of the user and the device. A possible scenario would envisage the device be driven by brain and emotional related commands. In the depicted frame, the device would need not only for pure technology but also for a proper merging between standardization and ethics (stethics).</para>
<para>In parallel, the biomedicine is progressing dramatically, and the early diagnostics of important diseases can take advantage of proper chips to be implanted in the body. A label-free spiral microfluidic device is proposed, for instance, to allow size-based isolation of viable Circulating tumor cells (CTCs), i.e. rare cancer cells that are shed from primary or metastatic tumors into the peripheral blood circulation. Phenotypic and genetic characterization of these rare cells is crucial to provide important information and guide cancer staging and treatment (e.g., [16, 17]).</para>
<para>The increased closeness between the human body and functions that are generally assigned to an external device is the starting point of a research effort played by a joint team of engineers and medical doctors to identify a set of functions that can be supported by one or more chips to be implanted. Those chips can be supporting not only &#x201C;pure medical&#x201D; functions but also &#x2013; and here is the matter that can be of interest for the post 5G community &#x2013; device and network functions.</para>
<para>This is the key-passage to achieve a partially internal user device (Body as a Device &#x2013; ByD) and to assign to each user functions related to the nodes of the network (Body as a Node &#x2013; ByN).</para>
<para>A pictorial view of the above concept is shown in <link linkend="fig11_2">Figure 11.2</link>.</para>
<fig id="fig11_2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 11.2</label>
<caption><title>Pictorial view of the body as a device and as a node concept.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig11_2.jpg" mime-subtype="jpeg"/>
</fig>
<para>In the depicted frame, the next paragraph describes a possible scenario where the ByD and/or ByN approaches could be implemented by implants in the oral cavity.</para>
</section>
<section class="lev1" id="sec11-4">
<title>11.4 The Oral Cavity as Device or Node</title>
<para>The oral cavity is one of the main gateways to the body. It is in fact in the early months of life, a cognitive tool which subsequently develops with all its structures (mucous membranes, muscles, tendons, bones, joints, teeth, nerves, vessels, glands, etc) as a body involved in carrying out different functions (immuno-protection, digestion, chewing, swallowing, phonetic). The complexity as well as the sensitivity of these structures, makes oral health closely related to general health conditions. The first evidences of many systemic diseases are borne by the oral structures and therefore are diagnosed through an examination of those.</para>
<para>Precisely for this reason, the oral cavity may constitute the ideal environment for positioning sensory systems and collecting data that might be useful both in monitoring oral activities, detecting pathologies/problems and planning early intervention and partial remote management.</para>
<para>In addition, as highlighted in Section 11.3, the devices could also host functions of the user device (Oral Cavity as a Device &#x2013; OCD) and/or of the network node (Oral Cavity as a Node &#x2013; OCN).</para>
<para>In <link linkend="fig11_3">Figure 11.3</link> possible positioning of sensors and chips in the oral cavity is depicted.</para>
<para>Due to the ICT contribution performance and costs of cures for both the public health system and the private patients could change, especially in the Dentistry field, where a significant growth of technology-driven approaches is occurring. In recent years technological advancement have radically changed the face of dentistry by increasing the reliability of diagnostic imaging, simplifying treatments planning/realization thanks to computer-guided and minimally invasive approaches, reducing working time and errors human-related thanks to the intraoral optical scans and CAM (Computer Aided Manufacturing) units [18&#x2013;20]. However the potential opportunities offered by this sector have not been truly exploited yet, since these technological advancements have focused on aspects of close dental relevance.</para>
<para>Using intraoral micro-biosensors featuring a wireless transmission, instead of wired connections as proposed in the past two decades by several researchers [21&#x2013;27], could open new scenarios for dentistry applications (related to oral health), general sensing applications (sensing parameters related to human health) as well as Human-Machine-Interface (HMI) applications (using measurements of oral cavity to drive/control machines). The advancements in micromachining techniques have allowed sensor miniaturization for minimum discomfort in the oral cavity and easy implantation with no tissue injury. The sensors can be easily integrated into prosthetic devices and orthodontic appliances, even in the teeth or bones. [28] Chemical markers relevant to health may be detected by electrochemical sensors, as well as variation in ph, temperature, pressure or position of the oral environment.</para>
<fig id="fig11_3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 11.3</label>
<caption><title>Possible location of sensors and chips for the OCD or OCN approach.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig11_3.jpg" mime-subtype="jpeg"/>
</fig>
<para>The use of intraoral sensors from the communication point of view is analogous to other mHealth applications. However wireless communication between intraoral devices and the outside world is challenging, since the oral cavity is a hybrid propagation environment. Intraoral sensors are in the border between intra-body and wearable sensors. It is not strictly speaking a communication &#x201C;inside the body&#x201D; as a sensor inside the body, depending on its anatomical location, is usually surrounded by a distinct and fairly stable tissue environment.</para>
<para>An intraoral device is located in a constantly changing environment depending on the relative positions of the jaws and movements of the tongue, which continuously changes shape when one swallows, breathes, or speaks. As intraoral devices are in contact with the gums, the tongue, or the palate, and their associated receivers may be in contact with the human body, Body Channel Communication (BCC) can be considered to be used for these devices [29]. However, when applied to intraoral devices, neither of the BCC methods maintains their desired operating conditions due to attenuation effect. Therefore, the use of RF-based wireless communications could be considered. As a matter of fact, RF wireless communication has been already successfully adopted in implantable devices such as the pacemaker and neuro-stimulator.</para>
<para>The proper selection of the frequency band is fundamental for establishing a reliable link between intraoral devices and the outside world. The selection of the frequency is strictly related to two fundamental design elements: size of the antenna and attenuation. It is worth noted that an RF-based communication approach foresees the use of a battery inside the mouth, at least for those important applications that foresee a continuous monitoring. This is one of the main challenges limiting the adoption of intraoral devices for continuous monitoring. Interesting solutions for recharging the sensors are based on the use of the jaw movement that normally occurs when chewing, eating and speaking [30]. For instance, one can obtain approximately 580 J only from daily chewing, which is equivalent to an average power of approximately 7 mW. An alternative approach has been proposed in two studies [31, 32] where a passive sensor is inserted in the mouth and read by an external device.</para>
<para>It should be highlighted that the presence of the sensors inside the oral cavity might cause metabolic alterations (causing inflammation or tissue damage). Therefore, the molecular and biochemical approaches undertaken to unravel possible metabolic alterations (with particular reference to quantification of recognized markers of inflammation or tissue damage), occurring during prosthesis implantation and long-term wearing, should be addressed [33].</para>
<para>The presence of sensors and chips has to be, therefore, analyzed also in terms of potential harm to the oral cavity, in particular, and the whole body in general. The sensor/chip design and implementation have to be driven by the guidelines and requirements deriving from the above analysis. The same applies to whatever part of the body is selected for the chip positioning.</para>
</section>
<section class="lev1" id="sec11-5">
<title>11.5 Future Work</title>
<para>The Chapter has provided a possible vision of post 5G systems, particularly related with the active use of the human body of the user to both extend, integrate or substitute the user device functions and/or the node functions.</para>
<fig id="fig11_4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 11.4</label>
<caption><title>Possible multi-user, multi-device and multi-node scenario.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig11_4.jpg" mime-subtype="jpeg"/>
</fig>
<para>In the envisaged vision, the scenarios reported in <link linkend="fig11_4">Figure 11.4</link> are possible. A number of important activities are being and will be undertaken to understand fully the impact and the potential of the ByD and ByN approaches, and to design and implement harmless chips. The experimental activity will start from the OCD and OCN cases and will be later extended to other parts of the body.</para>
</section>
<section class="lev1" id="sec11-6">
<title>References</title>
<para>[1] Feng Zhao, Hongsheng Wu, Hongbin Chen, and Wen Wang, &#x201C;Game-Theoretic Beamforming and Power Allocation in MIMO Cognitive Radio Systems with Transmitter Antenna Correlation&#x201D;, Mobile Information Systems, Hindawi Journal, Volume 2015 (2015). <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B1%5D+Feng+Zhao%2C+Hongsheng+Wu%2C+Hongbin+Chen%2C+and+Wen+Wang%2C+%22Game-Theoretic+Beamforming+and+Power+Allocation+in+MIMO+Cognitive+Radio+Systems+with+Transmitter+Antenna+Correlation%22%2C+Mobile+Information+Systems%2C+Hindawi+Journal%2C+Volume+2015+%282015%29%2E" target="_blank">Google Scholar</ulink></para>
<para>[2] B. Adcock and A. C. Hansen. Generalized sampling and infinite dimensional compressed sensing. Preprint, 2012. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B2%5D+B%2E+Adcock+and+A%2E+C%2E+Hansen%2E+Generalized+sampling+and+infinite+dimensional+compressed+sensing%2E+Preprint%2C+2012%2E" target="_blank">Google Scholar</ulink></para>
<para>[3] Hyojoon Kim and Nick Feamster, &#x201C;Improving Network Management with Software Defined Networking&#x201D;, IEEE Communication Magazine 2013. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B3%5D+Hyojoon+Kim+and+Nick+Feamster%2C+%22Improving+Network+Management+with+Software+Defined+Networking%22%2C+IEEE+Communication+Magazine+2013%2E" target="_blank">Google Scholar</ulink></para>
<para>[4] Diego Perino and Matteo Varvello &#x201C;A Reality Check for Content Centric Networking&#x201D;, ICN&#x2019;11, 2011, Toronto, Ontario, Canada. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B4%5D+Diego+Perino+and+Matteo+Varvello+%22A+Reality+Check+for+Content+Centric+Networking%22%2C+ICN%2711%2C+2011%2C+Toronto%2C+Ontario%2C+Canada%2E" target="_blank">Google Scholar</ulink></para>
<para>[5] Christopher J. Bucholtz. (2012, March) Customers, Big Data, and the Internet of Things. [Online]. http://www.technewsworld.com/story/74692.html</para>
<para>[6] T. Rappaport, S. Sun, R. Mayzus, H. Zhao, Y. Azar, K. Wang, G. N. Wong, J. K. Schulz, M. Samimi and F. Gutierrez, &#x201C;Millimeter-wave Communications for 5G Cellular: It Will Work!,&#x201D; IEEE Access, vol.1, 2013, pp. 335&#x2013;349. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B6%5D+T%2E+Rappaport%2C+S%2E+Sun%2C+R%2E+Mayzus%2C+H%2E+Zhao%2C+Y%2E+Azar%2C+K%2E+Wang%2C+G%2E+N%2E+Wong%2C+J%2E+K%2E+Schulz%2C+M%2E+Samimi+and+F%2E+Gutierrez%2C+%22Millimeter-wave+Communications+for+5G+Cellular%3A+It+Will+Work%21%2C%22+IEEE+Access%2C+vol%2E1%2C+2013%2C+pp%2E+335-349%2E" target="_blank">Google Scholar</ulink></para>
<para>[7] C. Colombo, and M. Cirigliano, &#x201C;Next-Generation Access Network: A Wireless Network Using E-Band Radio Frequency (71&#x2013;86 GHz) to Provide Wideband Connectivity,&#x201D; Bell Labs Tech. Jour, vol.16, no.1, 2011, pp. 187&#x2013;206. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B7%5D+C%2E+Colombo%2C+and+M%2E+Cirigliano%2C+%22Next-Generation+Access+Network%3A+A+Wireless+Network+Using+E-Band+Radio+Frequency+%2871-86+GHz%29+to+Provide+Wideband+Connectivity%2C%22+Bell+Labs+Tech%2E+Jour%2C+vol%2E16%2C+no%2E1%2C+2011%2C+pp%2E+187-206%2E" target="_blank">Google Scholar</ulink></para>
<para>[8] C. Sacchi, C. Stallo, and T. Rossi, &#x201C;Space and Frequency Multiplexing for MM-Wave Multi-Gigabit P-t-P Transmission Links,&#x201D; Proc. of 2013 IEEE Aerospace Conf., Big Sky (MT), March 2013, pp. 1&#x2013;10. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B8%5D+C%2E+Sacchi%2C+C%2E+Stallo%2C+and+T%2E+Rossi%2C+%22Space+and+Frequency+Multiplexing+for+MM-Wave+Multi-Gigabit+P-t-P+Transmission+Links%2C%22+Proc%2E+of+2013+IEEE+Aerospace+Conf%2E%2C+Big+Sky+%28MT%29%2C+March+2013%2C+pp%2E+1-10%2E" target="_blank">Google Scholar</ulink></para>
<para>[9] J. Zhang, W. Ni, J. Matthews. C-K. Sung, X. Wang, H. Suzuki, and I. Collings, &#x201C;Low Latency Integrated Point-to-Multipoint and E-band Point-to-Point Backhaul for Mobile Small Cells,&#x201D; Proc. of IEEE ICC 2014 Workshops, June 2014, pp. 592&#x2013;597. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B9%5D+J%2E+Zhang%2C+W%2E+Ni%2C+J%2E+Matthews%2E+C-K%2E+Sung%2C+X%2E+Wang%2C+H%2E+Suzuki%2C+and+I%2E+Collings%2C+%22Low+Latency+Integrated+Point-to-Multipoint+and+E-band+Point-to-Point+Backhaul+for+Mobile+Small+Cells%2C%22+Proc%2E+of+IEEE+ICC+2014+Workshops%2C+June+2014%2C+pp%2E+592-597%2E" target="_blank">Google Scholar</ulink></para>
<para>[10] CERAGON: Wireless backhaul solutions for small cells. Available: http://www.ceragon.com/files/Ceragon</para>
<para>[11] C. Stallo, S. Mukherjee, E. Cianca, M. Ruggieri, &#x201C;IR-UWB Approach for High Bit Rate Transmission in the E Band,&#x201D; Proc. of IEEE ESTEL Conf., Oct. 2012, pp. 1&#x2013;6. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B11%5D+C%2E+Stallo%2C+S%2E+Mukherjee%2C+E%2E+Cianca%2C+M%2E+Ruggieri%2C+%22IR-UWB+Approach+for+High+Bit+Rate+Transmission+in+the+E+Band%2C%22+Proc%2E+of+IEEE+ESTEL+Conf%2E%2C+Oct%2E+2012%2C+pp%2E+1-6%2E" target="_blank">Google Scholar</ulink></para>
<para>[12] C. Stallo, S. Mukherjee, E. Cianca, M. De Sanctis, T. Rossi, M. Lucente, M. Ruggieri, &#x201C;UWB for high bit rate communications beyond 60 GHz&#x201D;, Proc. of IEEE Int. Conf. on Personal Indoor Mobile Communications (PIRMC) 2010, Istanbul, Turkey, May 2010. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B12%5D+C%2E+Stallo%2C+S%2E+Mukherjee%2C+E%2E+Cianca%2C+M%2E+De+Sanctis%2C+T%2E+Rossi%2C+M%2E+Lucente%2C+M%2E+Ruggieri%2C+%22UWB+for+high+bit+rate+communications+beyond+60+GHz%22%2C+Proc%2E+of+IEEE+Int%2E+Conf%2E+on+Personal+Indoor+Mobile+Communications+%28PIRMC%29+2010%2C+Istanbul%2C+Turkey%2C+May+2010%2E" target="_blank">Google Scholar</ulink></para>
<para>[13] Rahman, T. F.; Sacchi, C.; Stallo, C., MM-wave LTE-A small-cell wireless backhauling based on TH-IR techniques, IEEE Aerospace Conference 2015, Big Sky, Montana, Pages 1&#x2013;9. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B13%5D+Rahman%2C+T%2E+F%2E%3B+Sacchi%2C+C%2E%3B+Stallo%2C+C%2E%2C+MM-wave+LTE-A+small-cell+wireless+backhauling+based+on+TH-IR+techniques%2C+IEEE+Aerospace+Conference+2015%2C+Big+Sky%2C+Montana%2C+Pages+1-9%2E" target="_blank">Google Scholar</ulink></para>
<para>[14] C. Stallo, E. Cianca, S. Mukherjee, T. Rossi, M. De Sanctis, M. Ruggieri, &#x201C;IR-UWB for multi-gigabit communications beyond 60 GHz&#x201D;, Telecommunication Systems Journal, Springer US, 2014. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B14%5D+C%2E+Stallo%2C+E%2E+Cianca%2C+S%2E+Mukherjee%2C+T%2E+Rossi%2C+M%2E+De+Sanctis%2C+M%2E+Ruggieri%2C+%22IR-UWB+for+multi-gigabit+communications+beyond+60+GHz%22%2C+Telecommunication+Systems+Journal%2C+Springer+US%2C+2014%2E" target="_blank">Google Scholar</ulink></para>
<para>[15] Prasad R., Ruggieri M., (2003) &#x201C;Technology Trends in Wireless Communications&#x201D;, Artech House, Boston, 2003, ISBN 1-58053-352-3. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B15%5D+Prasad+R%2E%2C+Ruggieri+M%2E%2C+%282003%29+%22Technology+Trends+in+Wireless+Communications%22%2C+Artech+House%2C+Boston%2C+2003%2C+ISBN+1-58053-352-3%2E" target="_blank">Google Scholar</ulink></para>
<para>[16] Warkiani ME, Khoo BL, Wu L, Tay AK, Bhagat AA, Han J, Lim CT. Ultra-fast, label-free isolation of circulating tumor cells from blood using spiral microfluidics. Nat Protoc. 2016 Jan; 11(1): 134&#x2013;48. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B16%5D+Warkiani+ME%2C+Khoo+BL%2C+Wu+L%2C+Tay+AK%2C+Bhagat+AA%2C+Han+J%2C+Lim+CT%2E+Ultra-fast%2C+label-free+isolation+of+circulating+tumor+cells+from+blood+using+spiral+microfluidics%2E+Nat+Protoc%2E+2016+Jan%3B+11%281%29%3A+134-48%2E" target="_blank">Google Scholar</ulink></para>
<para>[17] Warkiani ME, Guan G, Luan KB, Lee WC, Bhagat AA, Chaudhuri PK, Tan DS, Lim WT, Lee SC, Chen PC, Lim CT, Han J. Slanted spiral microfluidics for the ultra-fast, label-free isolation of circulating tumor cells. Lab Chip. 2014 Jan 7; 14(1): 128&#x2013;37. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B17%5D+Warkiani+ME%2C+Guan+G%2C+Luan+KB%2C+Lee+WC%2C+Bhagat+AA%2C+Chaudhuri+PK%2C+Tan+DS%2C+Lim+WT%2C+Lee+SC%2C+Chen+PC%2C+Lim+CT%2C+Han+J%2E+Slanted+spiral+microfluidics+for+the+ultra-fast%2C+label-free+isolation+of+circulating+tumor+cells%2E+Lab+Chip%2E+2014+Jan+7%3B+14%281%29%3A+128-37%2E" target="_blank">Google Scholar</ulink></para>
<para>[18] Sannino G, Barlattani A. Straight versus angulated abutments on tilted implants in immediate fixed rehabilitation of the edentulous mandible: a 3-year retrospective comparative study. Int J Prosthodont. 2016;29(3) doi: 10.11607/ijp.4448 <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B18%5D+Sannino+G%2C+Barlattani+A%2E+Straight+versus+angulated+abutments+on+tilted+implants+in+immediate+fixed+rehabilitation+of+the+edentulous+mandible%3A+a+3-year+retrospective+comparative+study%2E+Int+J+Prosthodont%2E+2016%3B29%283%29+doi%3A+10%2E11607%2Fijp%2E4448" target="_blank">Google Scholar</ulink></para>
<para>[19] Sannino G. All-on-4 concept: a 3-dimensional finite element analysis. J Oral Implantol. 2015 Apr; 41(2): 163&#x2013;71. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B19%5D+Sannino+G%2E+All-on-4+concept%3A+a+3-dimensional+finite+element+analysis%2E+J+Oral+Implantol%2E+2015+Apr%3B+41%282%29%3A+163-71%2E" target="_blank">Google Scholar</ulink></para>
<para>[20] Sannino G., Germano F., Arcuri L., Bigelli E., Arcuri C., Barlattani A. CEREC CAD/CAM Chairside System. Oral Implantol (Rome). 2015 Apr 13; 7(3): 57&#x2013;70. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B20%5D+Sannino+G%2E%2C+Germano+F%2E%2C+Arcuri+L%2E%2C+Bigelli+E%2E%2C+Arcuri+C%2E%2C+Barlattani+A%2E+CEREC+CAD%2FCAM+Chairside+System%2E+Oral+Implantol+%28Rome%29%2E+2015+Apr+13%3B+7%283%29%3A+57-70%2E" target="_blank">Google Scholar</ulink></para>
<para>[21] K. Hori, T. Ono, K. Tamine, J. Kondo, S. Hamanaka, Y. Maeda, J. Dong, M. Hatsuda, &#x201C;Newly developed sensor sheet for measuring tongue pressure during swallowing&#x201D;, J. Prosthod. Res. 53, pp. 28&#x2013;32, 2009. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B21%5D+K%2E+Hori%2C+T%2E+Ono%2C+K%2E+Tamine%2C+J%2E+Kondo%2C+S%2E+Hamanaka%2C+Y%2E+Maeda%2C+J%2E+Dong%2C+M%2E+Hatsuda%2C+%22Newly+developed+sensor+sheet+for+measuring+tongue+pressure+during+swallowing%22%2C+J%2E+Prosthod%2E+Res%2E+53%2C+pp%2E+28-32%2C+2009%2E" target="_blank">Google Scholar</ulink></para>
<para>[22] K. Nishigawa, E. Bando, M. Nakano, &#x201C;Quantitative study of bite force during sleep associated bruxism&#x201D;, J. Oral Rehab. 28, pp. 485&#x2013;491, 2001. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B22%5D+K%2E+Nishigawa%2C+E%2E+Bando%2C+M%2E+Nakano%2C+%22Quantitative+study+of+bite+force+during+sleep+associated+bruxism%22%2C+J%2E+Oral+Rehab%2E+28%2C+pp%2E+485-491%2C+2001%2E" target="_blank">Google Scholar</ulink></para>
<para>[23] Q. Peng, T. F. Budinger, &#x201C;ZigBee-based wireless intra-oral control system for quadriplegic patients&#x201D;, IEEE Transactions on Engineering in Medicine and Biology Society, pp. 1647&#x2013;1650, 2007. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B23%5D+Q%2E+Peng%2C+T%2E+F%2E+Budinger%2C+%22ZigBee-based+wireless+intra-oral+control+system+for+quadriplegic+patients%22%2C+IEEE+Transactions+on+Engineering+in+Medicine+and+Biology+Society%2C+pp%2E+1647-1650%2C+2007%2E" target="_blank">Google Scholar</ulink></para>
<para>[24] E. Sardini, M. Serpelloni, R. Fiorentini, &#x201C;Wireless intraoral sensor for the physiological monitoring of tongue pressure&#x201D;, IEEE Transactions on Solid-State Sensors, Actuators and Microsystems, pp. 1282&#x2013;1285, 2013. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B24%5D+E%2E+Sardini%2C+M%2E+Serpelloni%2C+R%2E+Fiorentini%2C+%22Wireless+intraoral+sensor+for+the+physiological+monitoring+of+tongue+pressure%22%2C+IEEE+Transactions+on+Solid-State+Sensors%2C+Actuators+and+Microsystems%2C+pp%2E+1282-1285%2C+2013%2E" target="_blank">Google Scholar</ulink></para>
<para>[25] H. Park, J. Kim, M. Ghovanloo, &#x201C;Development and preliminary evaluation of an intraoral tongue drive system&#x201D;, IEEE Transactions on Engineering in Medicine and Biology Society, pp. 1157&#x2013;1160, 2012. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B25%5D+H%2E+Park%2C+J%2E+Kim%2C+M%2E+Ghovanloo%2C+%22Development+and+preliminary+evaluation+of+an+intraoral+tongue+drive+system%22%2C+IEEE+Transactions+on+Engineering+in+Medicine+and+Biology+Society%2C+pp%2E+1157-1160%2C+2012%2E" target="_blank">Google Scholar</ulink></para>
<para>[26] H. Park, M. Kiani, H. Lee, J. Kim, J. Block, B. Gosselin, M. Ghovanloo, &#x201C;A wireless magnetoresistive sensing system for an intraoral tonguecomputer interface&#x201D;, IEEE Transactions on Biomedical Circuits and Systems, pp. 571&#x2013;585, 2012.</para>
<para>[27] J. H. Kim, J. H. Jung, A. Y. Jeon, S. H. Yoon, J. M. Son, S. Y. Ye, G. R. Jeon, &#x201C;System development of indwelling wireless pH Telemetry of intraoral acidity&#x201D;, IEEE Transactions on Information Technology Applications in Biomedicine, pp. 302&#x2013;305, 2007. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B27%5D+J%2E+H%2E+Kim%2C+J%2E+H%2E+Jung%2C+A%2E+Y%2E+Jeon%2C+S%2E+H%2E+Yoon%2C+J%2E+M%2E+Son%2C+S%2E+Y%2E+Ye%2C+G%2E+R%2E+Jeon%2C+%22System+development+of+indwelling+wireless+pH+Telemetry+of+intraoral+acidity%22%2C+IEEE+Transactions+on+Information+Technology+Applications+in+Biomedicine%2C+pp%2E+302-305%2C+2007%2E" target="_blank">Google Scholar</ulink></para>
<para>[28] Sannino G., Cianca E., Hamitouche C., Ruggieri M. M2M Communications in Dentistry: a wireless communications perspectives. Chapter Book title: Future Access Enablers for Ubiquitous and Intelligent Infrastructures Volume 159 of the series Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering pp 118&#x2013;124 First International Conference, FABULOUS 2015, Ohrid, Republic of Macedonia, September 23&#x2013;25, 2015. DOI 10.1007/978-3-319-27072-2 15</para>
<para>[29] Cho, N., Yoo, J., Song, S., Lee, J., Jeon, S., Yoo, H. The human body characteristics as a signal transmission medium for intrabody communication. IEEE Trans. on Microwave Theory and Techniques, 1080&#x2013;1086, (2007). <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B29%5D+Cho%2C+N%2E%2C+Yoo%2C+J%2E%2C+Song%2C+S%2E%2C+Lee%2C+J%2E%2C+Jeon%2C+S%2E%2C+Yoo%2C+H%2E+The+human+body+characteristics+as+a+signal+transmission+medium+for+intrabody+communication%2E+IEEE+Trans%2E+on+Microwave+Theory+and+Techniques%2C+1080-1086%2C+%282007%29%2E" target="_blank">Google Scholar</ulink></para>
<para>[30] Delnavaz, A., Voix, J. Flexible piezoelectric energy harvesting from jaw movements. Smart Mater. Struct. 23, 1&#x2013;8 (2014). <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B30%5D+Delnavaz%2C+A%2E%2C+Voix%2C+J%2E+Flexible+piezoelectric+energy+harvesting+from+jaw+movements%2E+Smart+Mater%2E+Struct%2E+23%2C+1-8+%282014%29%2E" target="_blank">Google Scholar</ulink></para>
<para>[31] Mannoor, M. S., et al., Graphene-based wireless bacteria detection on tooth enamel. Nat. Commun. 27, 763 (2012). <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B31%5D+Mannoor%2C+M%2E+S%2E%2C+et+al%2E%2C+Graphene-based+wireless+bacteria+detection+on+tooth+enamel%2E+Nat%2E+Commun%2E+27%2C+763+%282012%29%2E" target="_blank">Google Scholar</ulink></para>
<para>[32] Diaz Lantada, A., Gonz&#x00E1;lez Bris, C., Lafont Morgado, P., Sanz Maudes, J.: Novel System for Bite-Force Sensing and Monitoring Based on Magnetic Near Field Communication, Sensors, 12, 11544&#x2013;11558 (2012). <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B32%5D+Diaz+Lantada%2C+A%2E%2C+Gonz%E1lez+Bris%2C+C%2E%2C+Lafont+Morgado%2C+P%2E%2C+Sanz+Maudes%2C+J%2E%3A+Novel+System+for+Bite-Force+Sensing+and+Monitoring+Based+on+Magnetic+Near+Field+Communication%2C+Sensors%2C+12%2C+11544-11558+%282012%29%2E" target="_blank">Google Scholar</ulink></para>
<para>[33] Sannino G., Cianca E., Coletta M., Prasad R., Ruggieri M., Sbardella D. Integrated Wireless and Sensing Technology? for Dentistry? an Early Warning System for Implant-Supported Prosthesis. 2015 IEEE International Symposium on Systems Engineering (ISSE), Rome September 28&#x2013;30. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B33%5D+Sannino+G%2E%2C+Cianca+E%2E%2C+Coletta+M%2E%2C+Prasad+R%2E%2C+Ruggieri+M%2E%2C+Sbardella+D%2E+Integrated+Wireless+and+Sensing+Technology%B4+for+Dentistry%B4+an+Early+Warning+System+for+Implant-Supported+Prosthesis%2E+2015+IEEE+International+Symposium+on+Systems+Engineering+%28ISSE%29%2C+Rome+September+28-30%2E" target="_blank">Google Scholar</ulink></para>
</section>
<section class="lev1" id="sec11-7">
<title>About the Authors</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig11_5.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Marina Ruggieri</emphasis> is Full Professor of Telecommunications Engineering at the University of Roma &#x201C;Tor Vergata&#x201D; and therein member of the Board of Directors.</para>
<para>She is IEEE 2016 Vice President-Elect, Technical Activities. She is Past Director of IEEE Division IX (2014&#x2013;2015).</para>
<para>She is member of the IEEE Public Visibility and Fellow Committees. She has been member of the IEEE Governance Committee. She is Sr. past President of the IEEE Aerospace and Electronic Systems Society.</para>
<para>She is proboviro of the Italian Industries Federation for Aerospace, Defense and Security (AIAD); member of the Technical-Scientific Committee of the Center for Aeronautical Military Studies. She has been Vice President of the Roma Chapter of AFCEA (2006&#x2013;2015).</para>
<para>She is co-founder and Chair of the Steering Board of the interdisciplinary Center for Teleinfrastructures (CTIF) at the University of Roma &#x201C;Tor Vergata&#x201D;. The Center, that belongs to the CTIF global network, with nodes in USA, Europe and Asia, focuses on the use of the Information and Communications Technology (ICT) for vertical applications (health, energy, cultural heritage, economics, law) by integrating terrestrial, air and space communications, computing, positioning and sensing.</para>
<para>She is Principal Investigator of the 40/50 GHz TPD#5 Communications Experiment on board Alphasat (launched on July 2013).</para>
<para>She received: 1990 Piero Fanti International Prize; 2009 Pisa Donna Award as women in engineering; 2013 Excellent Women in Roma Award; Excellent and Best Paper Awards at international conferences.</para>
<para>She is IEEE Fellow. She is author/co-author of 330 papers, 1 patent and 12 books.</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig11_6.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Gianpaolo Sannino</emphasis> is a CTIF Global Capsule (CGC) funder member and graduated in dentistry from the University of Rome Tor Vergata (URTV, Rome, Italy). He obtained a first Ph.D. in Odontostomatological Sciences and a second Ph.D. in Materials for Health Environments and Energy, both at the URTV. He has been Adjunct Professor at the URTV teaching General Dentistry and Oral Implantology. He has further been Adjunct Professor at UZKM (Tirana, Albania) teaching General Dentistry, Prosthodontics and Gnathology. He is now Adjunct Professor at the Postgraduate School in Hospital pharmacy (Pharmacy School) teaching Pain Management at University of Salerno (Salerno, Italy). He is also clinical and didactic tutor at Vita-Salute University, San Raffele Hospital (Milan, Italy). He participated to several European and national projects. His background is on: Prosthodontics, Periodontology and Oral Implantology (bone and tissue regeneration procedures), endodontics, radiology, oral surgery, material sciences, biomechanics of dental system, numerical methods. His recent research interest has moved towards Information and Communications Technology (ICT) related to Health services. He is the vice-chair Chair of the Steering Board of the interdisciplinary Center for Teleinfrastructures (CTIF) at the URTV. He is author of several papers, on international journals/transactions and proceedings of international conferences.</para>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig11_7.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Cosimo Stallo</emphasis> graduated in Electronic Engineering with specialization in Microelectronic Design at Polytechnic of Bari in 2005. He was involved in studying, analysing and simulating Optical Model of a selectively oxidized VCSEL (Vertical Cavity Surface Emitting Laser) emitting at 850 nm. He received cum laude a M.Sc. Degree in &#x201C;Advanced Communication and Navigation Satellite Systems&#x201D; in 2006 at University of Rome Tor Vergata. He obtained a scholarship funded by Italian Space Agency for the Ph.D. course in Microelectronics and Telecommunications XXII cycle (2006&#x2013;2009) at University of Rome &#x201C;Tor Vergata&#x201D;. He obtained cum laude the Ph.D. in Microelectronics and Telecommunications at Electronic Department of Engineering Faculty of University of Rome &#x201C;Tor Vergata&#x201D; on June 3 2010 with the Thesis: &#x201C;Wireless Technologies for Future Multi-Gigabit Communications Beyond 60 GHz: Design Issue and Performance Analysis for Terrestrial and Satellite Applications&#x201D;.</para>
<para>In 2007 he entered in Center for TeleInFrastruktur (CTIF), an international research centre, operating in the fields of ICT, with offices in Denmark (Aalborg) (headquarter), Italy (Rome), India, Japan and U.S. (www.ctif.org).</para>
<para>Currently, he is the Assistant Professor for the course in Signal Processing and Power Electronics at Mechatronic Engineering, University of Rome Tor Vergata in Colleferro (Rome). Since 2011 he is Professor for the course on Satellite Navigation at Master of Science on &#x201C;Advanced Satellite Communication and Navigation Systems&#x201D; of University of Rome Tor Vergata, Rome. Since 2013&#x2013;14 he is tutor for the course on Communication Systems at University of Trento, Italy.</para>
<para>From May 2007 to January 2015 he was the Italian Chair of the IEEE Professional Activities Affinity Group (formerly GOLD).</para>
<para>Since February 2010 he is the Chair of the Space Systems Technical Panel. From 2010 to 2015 he was the Chair of the IEEE AESS Professional Activities Affinity Group.</para>
<para>He was the Editor in Chief of the IEEE AESS Quarterly Email Blast (QEB) since October 2011 from December 2013. Since 2013 he participates to the initiative IEEE Division IX for Quality of Life (Div IX-4-QoL). Since 2014 he is involved in TAB Awards and Recognition Committee (TABARC). His main fields of research concern terrestrial and satellite communications at Extremely High Frequency (EHF), design of payloads and subsystems for telecommunications at Q/V [35&#x2013;75 GHz] and W [75&#x2013;110 GHz] bands, satellite navigation, signal processing, and ICT for Quality of Life (biotechnology, health and energy). He is co-author of about 50 papers on international journals/transactions and proceedings of international conferences.</para>
</section>
</chapter>
<chapter class="chapter" id="ch12" label="12" xreflabel="12">
<title>802.11ax for 5G</title>
<para><emphasis role="strong">Richard van Nee</emphasis></para>
<para>Qualcomm, the Netherlands</para>
<section class="lev1" id="sec12-1">
<title>12.1 Introduction</title>
<para>It is expected that 5G is made up of several radio access technologies as there is probably no single technology capable of meeting all requirements. One likely candidate for being part of 5G is the new 802.11ax standard. This wireless LAN standard offers data rates up to 10 Gbps in channels up to 160 MHz. It improves capacity for large number of users by employing OFDMA which reduces overhead relative to the TDD approach of existing wireless LAN standards. At the same time, the use of uplink OFDMA provides a significant range benefit for clients that have less transmit power than access points, a situation that is pretty common for handheld devices. Further capacity enhancements are provided by the use of uplink MU-MIMO in addition to downlink MU-MIMO that was already present in the 802.11ac standard.</para>
<para>Peak throughputs of wireless LAN have grown exponentially for quite some time as shown in <link linkend="fig12_1">Figure 12.1</link>. From 2 Mbps for early 802.11 products in the nineties, peak rates have steadily climbed to several Gbps for current 802.11ac products and expect to reach approximately 10 Gbps with 802.11ax [1]. While early 802.11 standards primarily focused on single link rates, the attention shifted towards network throughput since 802.11ac with the introduction of MU-MIMO [2]. Improving network throughput in dense networks is the primary goal of 802.11ax. This is important to deal with increased levels of inter-network interference and to provide more capacity for networks with large numbers of clients, for instance in cases where WiFi is used for data offload to relieve the pressure on LTE spectrum. The latter use case is one of the main drivers to make WiFi part of 5G.</para>
<fig id="fig12_1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 12.1</label>
<caption><title>Wlan Data Rate Growth.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig12_1.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev1" id="sec12-2">
<title>12.2 802.11ax Features</title>
<para>The main new features in 802.11ax are:</para>
<orderedlist numeration="arabic" continuation="restarts" spacing="normal">
<listitem><para>Longer symbol durations with 4 times smaller subcarrier spacing</para></listitem>
<listitem><para>OFDMA</para></listitem>
<listitem><para>Uplink MU-MIMO</para></listitem>
<listitem><para>1024-QAM</para></listitem>
<listitem><para>Range extension with DCM</para></listitem>
<listitem><para>Dynamic CCA</para></listitem></orderedlist><para>Longer symbols with 4 times smaller subcarrier spacing are used for several reasons. First, it provides a larger data rate by reducing the relative duration of the guard interval and by a slight increase of the band filling. Second, it allows the use of larger guard intervals which provides more delay spread robustness. Guard intervals of 800 ns, 1600 ns and 3200 ns are defined in 802.11ax together with a 12.8 microseconds FFT interval whereas 802.11ac uses a guard interval of 800 ns or 400 ns with a 3.2 microseconds FFT interval. The additional delay spread robustness is especially useful for outdoor use where RMS delay spreads in the order of a microsecond may occur. A third reason for using longer symbol durations is that it provides a more relaxed synchronization requirement for uplink OFDMA and uplink MU-MIMO.</para>
<para>To enable channel estimation, an 11ax preamble contains a number of HE-LTF symbols equal to or larger than the total number of spatial steams, similar to 11ac. One disadvantage of using larger symbol durations is that the overhead of this channel estimation would be 4 times larger than for 11ac if all HE-LTF symbols used the longest symbol interval of 16 microseconds. To reduce this overhead, 11ax specifies 4 different modes of operation with symbol durations of 4 &#x03BC;s (including 800 ns guard interval), 7.2 &#x03BC;s (including 800 ns guard interval), 8 &#x03BC;s (including 1.6 &#x03BC;s guard interval), and 16 &#x03BC;s (including 3.2 &#x03BC;s guard interval). All modes beside the longest 16 &#x03BC;s require tone interpolation to get the channel estimates for all data tones.</para>
<para>For non-OFDMA mode, 11ax uses 242 tones in 20 MHz including 8 pilots, giving a peak data rate of 1147 Mbps for 8 streams, 1024-QAM, coding rate 5/6, with 800 ns guard interval. For 40 MHz, 484 tones are used including 16 pilots, giving a peak rate of 2294 Mbps. 80 MHz uses 996 tones with 16 pilots, which are also used by 160 or 80+ 80 mode in each 80 MHz segment, giving a top rate for 80+ 80 of 9607.8 Mbps for 8 spatial streams and 1201 Mbps for a single spatial stream.</para>
</section>
<section class="lev1" id="sec12-3">
<title>12.3 Interoperability and Mode Detection</title>
<para>The new 802.11ax standard will be used both in the 2.4 GHz and 5 GHz band. Devices that implement 802.11ax have to be interoperable with existing 802.11 products which mean they need to support all existing 802.11 waveforms for either the 2.4 or 5 GHz band. At the same time, the new 802.11ax waveforms should not cause performance degradation for existing 802.11 devices that did not implement 802.11ax. To achieve the latter, all 802.11ax waveforms start with a 802.11a-like preamble, similar to 802.11n and 802.11ac. The signaled rate in the 802.11a preamble is set to 6 Mbps and the length field is set to match the duration of the 802.11ax packet. This ensures that all devices that can receive the 802.11a part will properly defer for the entire packet even though those devices may not be able to receive any 802.11ax data.</para>
<para>The existing preamble structures for 802.11a, 11n, and 11ac are depicted in <link linkend="fig12_2">Figure 12.2</link>. It is important that a device can quickly and reliably detect what preamble type is being received. For 11a, 11an and 11ac, this detection is based on the use of QBPSK at different parts of the preamble. QBPSK is equal to BPSK rotated by 90 degrees. An 11n greenfield preamble uses QBPSK at the first symbol after the LTF symbol. An 11a packet has a BPSK L-SIG symbol at this same location. Hence, a receiver can detect whether a packet is 11a or 11n-GF by estimating whether the constellation of this first symbol after LTF is BPSK or QBPSK. An 11n mixed-mode (MM) preamble has a BPSK L-SIG followed by two QBPSK HT-SIG symbols. The L-SIG symbol is a valid 11a-type signal field indicating the use of 6 Mps BPSK and with a length field that covers the entire 11n-MM packet. After decoding this L-SIG symbol, a receiver does not know yet whether the packet is 11a or 11n-MM, it only knows it cannot be 11n-GF based on the QBPSK check on L-SIG indicating BPSK. By doing a second QBPSK check on the symbol after L-SIG, it can detect whether the packet is 11n-MM versus 11a. For 11ac packets, a third QBPSK check is required at the second symbol after L-SIG. The packet is detected as 11ac based on the L-SIG being BPSK and signaling 6 Mbps, the first symbol after L-SIG also being BPSK, and the second symbol after L-SIG being QBPSK. Devices that did not implement 11ac will detect the 11ac packet as 11a based on the valid L-SIG symbol and the absence of QBPSK in the first two symbols after the LTF symbol.</para>
<fig id="fig12_2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 12.2</label>
<caption><title>Preamble structures for 11a, 11n and 11ac.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig12_2.jpg" mime-subtype="jpeg"/>
</fig>
<para><link linkend="fig12_3">Figure 12.3</link> shows the additional preambles defined by 11ax. There are 4 new preambles for Single User (SU) mode, Multi User (MU) modes being downlink MU-MIMO and downlink OFDMA, Trigger modes being uplink MU-MIMO and uplink OFDMA, and extended range mode. For existing devices that did not implement 11ax, all 11ax packet types are detected as 11a such that a proper defer will be done based on the L-SIG length field that is set to cover the entire duration of the 11ax packet. An 11ax device can discriminate 11ax versus 11n and 11ac based on the fact that the L-SIG length field modulo 3 is 1 or 2 for 11ax versus 0 for 11n and 11ac. The L-SIG length field indicates a number of bytes, but 11n, 11ac and 11ax only use this length field to indicate the total duration of the packet and not the byte length. Since the spoofed 11a rate of 6 Mbps gives 3 bytes per symbol, the same packet duration can be signaled by 3 different L-SIG length values with 1, 2, or 3 bytes in the last symbol. If the L-SIG length modulo 3 is 1 or 2, then a receiver knows that the packet cannot be 11n or 11ac, but it does not know yet whether it is 11a or 11ax. To detect this, there are 2 different checks that can be made. First, the L-SIG is repeated in 11a packets. This repetition can be used for mode detection. At the same time, it provides a range advantage in the extended range 11ax mode where all fields use half the lowest 11a rate. Second, the L-SIG, repeated L-SIG, HE-SIG-A, and HE-SIG-B symbols all have 4 edge tones more than 11a symbols. These extra tones contain known BPSK values and they can be used both for mode detection as well as for improving channel estimation on the HE-data.</para>
<fig id="fig12_3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 12.3</label>
<caption><title>Preamble structures for 11ax.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig12_3.jpg" mime-subtype="jpeg"/>
</fig>
<para>Once a receiver detected that a packet is 11ax and finds out the specific 11ax packet type, it starts to decode signaling data in HE-SIG-A. This field contains data that is needed to decode the rest of the packet such as the MCS (BPSK up to 1024-QAM, coding rate &#x00BD; up to 5/6), number of spatial streams, guard interval and LTF size, bandwidth, SU/MU, STBC, beamforming, and several other parameters. For downlink MU packets, there is a lot more signaling as every downlink client can have a different MCS, number of streams, and coding type. To accommodate this extra signaling, MU packets have a variable number of HE-SIG-B symbols. The length and MCS of the HE-SIG-B field is indicated in HE-SIG-A.</para>
</section>
<section class="lev1" id="sec12-4">
<title>12.4 OFDMA</title>
<para>Downlink OFDMA is used in 11ax to minimize the overhead of PHY preambles and MAC backoff when there are a significant number of clients and relatively small packets. The overhead reduction is obtained by combining multiple small packets into one large packet. Without OFDMA, large PHY rates tend to give a high efficiency loss when the packet size per client is relatively small as preamble and backoff times become much larger than the data portion of each packet. The smallest 11ax preamble is 40 &#x03BC;s, so a packet should preferably be at least 400 &#x03BC;s to make the preamble overhead no more than 10%. At a PHY rate of 10 Gbps, however, that means a single packet contains about 500 KB. For a single client, this requires a significant amount of aggregation, which may not be possible if there are latency constraints on parts of the traffic for that client. OFDMA helps in this case as the aggregation can be done over a group of clients.</para>
<para><link linkend="fig12_4">Figure 12.4</link> shows the resource unit (RU) allocation for 80 MHz OFDMA. There can be up to 37 simultaneous clients with 26 tones, or 16 clients with 52 tones, 8 clients with 106 tones, 4 clients with 242 tones, 2 clients with 484 tones, or a single client with 996 tones. The same RU sizes are used in other bandwidth modes. In 20 MHz mode, there can be up to 9 simultaneous clients with 26 tones each.</para>
<fig id="fig12_4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 12.4</label>
<caption><title>80 MHz OFDMA Resource Unit Allocations.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig12_4.jpg" mime-subtype="jpeg"/>
</fig>
<para><link linkend="fig12_5">Figure 12.5</link> shows the packet strucure including signaling per client for an 80 MHz downlink OFDMA packet. The first part of the preamble up to HE-SIG-A is identical for all clients and is repeated in each 20 MHz subchannel to make sure that overlapping networks are able to decode the length of the packet that is encoded in the L-SIG symbol. The HE-SIG-B field is present only in MU packets, either MU-MIMO or OFDMA. It consists of a signaling block that is common to all MU clients and a per-client signaling part. The common part has a separate CRC and tail bits. Each 20 MHz is encoded separately such that a client only needs to decode one 20 MHz subchannel. The per client part has a CRC and tail bits for each group of 2 clients, such that a client only needs to decode a small part of the entire HE-SIG-B correctly in order to decode his signaling info. In case of an odd number of clients, the last group just has one client followed by CRC and tail bits.</para>
<para>Uplink OFDMA is specified in 11ax for the same reason as downlink OFDMA to reduce both PHY and MAC overhead. There is an additional power accumulation gain benefit though; if all uplink clients transmit at the same maximum power in a 26-tone RU than in a full 20 MHz RU in non-OFDMA mode, then the maximum received power at the AP is almost 10 dB more if 9 uplink clients transmit simultaneously in a 20 MHz channel relatively to a single client. For the clients, this means they can transmit at a significantly higher data rate relatively to non-OFDMA mode. This provides a network throughput gain on top of the gain caused by reduced PHY and MAC overhead. Notice that in practice, the power accumulation gain may be limited because of regulatory constraints.</para>
<para>One major difference between uplink and downlink OFDMA is that uplink OFDMA requires time and frequency synchronization of uplink clients, as well as some level of power control. The same is true for uplink MU-MIMO. In an uplink frame, the packets from different clients should arrive at the AP with timing differences that are small relative to the guard interval. To achieve this, clients are required to have an accurate SIFS response time with an error not exceeding +<emphasis>/&#x2212;</emphasis>400 ns. The clients are allowed to transmit uplink frames only in response to a trigger frame by the AP. They have to synchronize their carrier frequency and sampling clock to that of the AP. The accuracy of the frequency synchronization has to better than 1% of a subcarrier spacing to prevent a significant degradation caused by inter-carrier interference. Since the subcarrier spacing is 78.125 kHz, the accuracy requirement is about +<emphasis>/&#x2212;</emphasis>780 Hz. Uplink MU-MIMO and uplink OFDMA clients also have to perform power control with an accuracy of +<emphasis>/&#x2212;</emphasis>3 dB. To enable power control, the AP signals its transmit power and a target received power level per client in the trigger frame. An uplink client can estimate the path loss from the received power level of the trigger frame and the signaled AP transmit power. By assuming reciprocity, it can then set its transmit power to achieve the desired received power at the AP as requested in the trigger frame.</para>
<fig id="fig12_5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 12.5</label>
<caption><title>11ax packet structure for 80 MHz OFDMA.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig12_5.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev1" id="sec12-5">
<title>12.5 Uplink MU-MIMO</title>
<para>In 802.11ac, downlink MU-MIMO was introduced as a way to increase the throughput in cases where the AP had more antennas than the clients. Since then, there has been a demand to increase uplink throughput as well, as the amount of uplink traffic has significantly increased over the past years with smartphone users producing large amounts of video data that is shared across social media. The downlink MU-MIMO throughput advantage is now extended to the uplink in 802.11ax by introducing uplink MU-MIMO. Without MU-MIMO, clients have to compete for the medium and transmit packets sequentially like depicted in <link linkend="fig12_6">Figure 12.6</link>. With uplink MU-MIMO, clients can transmit simultaneously like shown in <link linkend="fig12_7">Figure 12.7</link>, increasing the uplink throughput up to a factor of 4 for 4 uplink clients.</para>
<para>In addition to the throughput multiplication factor, uplink MU-MIMO has the same power accumulation benefit as uplink OFDMA. By having 4 simultaneous uplink MU clients, the received power at the AP is 6 dB more relative to having a single client. This means each uplink MU client can transmit at a higher MCS than in SU mode. Another benefit of uplink MU-MIMO that it benefits downlink MU-MIMO. Downlink MU-MIMO according to 11ac requires compressed channel feedback per client to be transmitted sequentially in the uplink as depicted in <link linkend="fig12_8">Figure 12.8</link>, creating a significant amount of overhead. In 11ax, it is possible &#x2013; but not required &#x2013; to transmit the compressed channel feedback in an uplink MU-MIMO mode as shown in <link linkend="fig12_9">Figure 12.9</link>. This reduces the overhead and hence improves the throughput of downlink MU-MIMO.</para>
<fig id="fig12_6" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 12.6</label>
<caption><title>Multiple clients sending a packet without use of uplink MU.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig12_6.jpg" mime-subtype="jpeg"/>
</fig>
<fig id="fig12_7" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 12.7</label>
<caption><title>Multiple clients sending a packet using 11ax uplink MU.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig12_7.jpg" mime-subtype="jpeg"/>
</fig>
<fig id="fig12_8" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 12.8</label>
<caption><title>Downlink MU TXOP for 11ac.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig12_8.jpg" mime-subtype="jpeg"/>
</fig>
<fig id="fig12_9" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 12.9</label>
<caption><title>Downlink and uplink MU for 11ax.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig12_9.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev1" id="sec12-6">
<title>12.6 Range Extension</title>
<para>If current WiFi clients are at the edge of the AP coverage range, they often suffer from the problem that they while they can hear the AP, they cannot associate as the AP cannot hear them. This uplink problem is caused by the fact that the AP generally has more transmit power and hence more range than typical client products. To solve this issue, 11ax defined a range extension mode with a special preamble shown in <link linkend="fig12_3">Figure 12.3</link>. The STF and LTF fields are boosted by 3 dB for the extend range preamble to make sure that the extended range performance is not limited by preamble detection. The preamble signaling symbols are repeated to provide 3 dB of gain in the signaling part. For the data part, Dual Carrier Modulation (DCM) can be used to provide a lowest data rate that is half of the lowest BPSK rate without DCM. DCM basically duplicates half of the tones. To reduce the peak-to-average power ratio caused by the duplication of tone values, for BPSK the odd copied tones are inverted while for QPSK and 16-QAM, the copied tones are conjugated. DCM provides lower rates with twice the diversity order and 3 dB gain relative to no DCM with the same constellation size.</para>
</section>
<section class="lev1" id="sec12-7">
<title>12.7 Dynamic CCA</title>
<para>The current 802.11 standard specifies a few power levels for which any device should defer. There are different power levels depending on bandwidth with higher defer level for larger bandwidth modes. Also, there is a separate level for the case that a valid preamble is detected versus a larger energy detect threshold for cases where the preamble had not been detected, which may happen for instance because the device was receiving some other packet that partially overlapped with another transmission. There are two mechanisms in 802.11ax to improve the defer behavior with the goal of increasing network capacity in dense environments. First, the HE-SIG-A field includes a BSS (Basic Service Set) color which is basically a shortened version of the AP address. After decoding the BSS color, a station knows whether the packet is from its own network or from some overlapping network. If the packet belongs to the same network, it is better to always defer regardless of received power. There is no advantage trying to transmit 2 simultaneous packets in this case because the AP can only receive one packet at a time. It may also be that the received packet is from the AP itself, in which case the AP is not able to receive until it is finished with its transmission. If the BSS color indicates that the packet is from another network, then it may be possible to transmit on top of it. Rather than using a fixed CCA threshold like in current 802.11, 802.11ax allows the use of a dynamic defer threshold where the threshold depends on the transmit power. The lower the transmit power, the higher the defer threshold. The reasoning is that a station with lower transmit power causes interference over a smaller range, hence it can increase its defer threshold such that it defers only for relatively nearby other stations.</para>
</section>
<section class="lev1" id="sec12-8">
<title>12.8 Conclusions</title>
<para>The 802.11ax standard increases the maximum single user and multi-user data rate to about 10 Gbps. Several enhancements are made to increase the throughput in dense networks with many clients, such as the introduction of OFDMA, uplink MU-MIMO, and dynamic CCA. These improvements make</para>
<para>802.11ax attractive for data offloading of crowded LTE networks and also make it a suitable candidate for inclusion in 5G.</para>
</section>
<section class="lev1" id="sec12-9">
<title>References</title>
<para>[1] IEEE P802.11ax/D0.1 draft standard, March 2016.</para>
<para>[2] IEEE Std 802.11ac-2013, amendment to IEEE Std 802.11-2012.</para>
</section>
<section class="lev1" id="sec12-10">
<title>About the Author</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig12_10.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Richard van Nee</emphasis> received the M.Sc. degree in Electrical Engineering from Twente University in Enschede, the Netherlands, in 1990, followed by a Ph.D. degree from Delft University of Technology in 1995 (both cum laude). From 1995 to 2000, he worked for Lucent Technologies Bell Labs. In 1996, he developed an OFDM based packet transmission system for the &#x2018;Magic WAND&#x2019; project, which was the first demonstration of OFDM for wireless LAN. Together with NTT, he made an OFDM based proposal that got adopted by the IEEE 802.11a standard. He was also co-author of the CCK-code proposal that got adopted by the IEEE 802.11b standard. The 802.11b CCK codes were originally published in a 1996 paper by Richard van Nee as a way to reduce the peak power in OFDM, but it also turned out to be a useful code set to boost the WLAN data rates to 11 Mbps in 802.11b, while keeping good delay spread robustness and conform to the FCC spreading rules that were still in place at that time. The 802.11b standard brought WLAN data rates on par with existing wired LAN at the time, which contributed to its rapid market adoption and to the formation of the WiFi alliance. In 2001, Richard van Nee co-founded Airgo Networks &#x2013; acquired by Qualcomm in 2006 &#x2013; that developed the first MIMO-OFDM modem for wireless LAN and which techniques formed the basis of the IEEE 802.11n standard. He was responsible for the algorithm design of the groundbreaking Airgo technology with many innovations like MIMO-OFDM preamble designs and near-maximum likelihood MIMO decoding techniques. In 2012, he presented the first spec framework of the 802.11ac standard on behalf of a large group of authors. This was the first standard to use MU-MIMO. Together with Ramjee Prasad, he wrote a book on OFDM, entitled &#x2018;OFDM for Mobile Multimedia Communications.&#x2019; This was the first book to describe OFDM for wireless communications, including the first book desciption of the 802.11a standard. It has been used by many engineers worldwide to learn about OFDM for wireless LAN. He also wrote chapters on wireless LAN in other books, including the Encyclopedia of Telecommunications edited by Proakis, as well as many papers. In 2002, he received the Dutch Veder award for his contributions to standardization of wireless LAN. He holds more than 60 patents related to various WiFi standards and served as an expert witness in several WiFi related lawsuits. He is currently a Senior Director at Qualcomm where he is responsible for WiFi algorithm design and for developing new 802.11 standards.</para>
</section>
</chapter>
<chapter class="chapter" id="ch13" label="13" xreflabel="13">
<title>5G for Personalized Health and Ambient Assisted Living</title>
<para><emphasis role="strong">Hermie J. Hermens</emphasis></para>
<para>University of Twente, Enschede, the Netherlands</para>
<para>Roessingh Research and Development, Enschede, the Netherlands</para>
<section class="lev1" id="sec13-1">
<title>13.1 Introduction</title>
<para>There is an increasing awareness that healthcare in the western countries cannot be continued in the way it has developed in the past; It is just not sustainable due to the increasing demand for volume of care, limits to the amount of qualified people to work in care and limits to the amount of money we can spend on healthcare. A main trend that is contributing to this need for change is the increased life expectancy of our western society. As the years that are added, come with longer period of time in which we have to cope with chronic conditions, the volume of required health care services is rapidly rising. This increase in volume of care needed cannot be met with a proportional increase in professional personnel and money. There is a strong belief that technology, especially information and communication technology can make a significant contribution to make care more sustainable, by supporting people in their wish for independent living and increase of self management capabilities. Areas that are especially relevant in this context are:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para>Unobtrusive monitoring of health related conditions and behavior.</para></listitem>
<listitem><para>Home based interventions. Enabling people to do therapy like physical and cognitive training at home, remotely supervised.</para></listitem>
<listitem><para>Personalized Health Systems that provide people in real-time personalized advices about their health, based on multimodal sensing.</para></listitem>
<listitem><para>Caring homes, supportive environment that intuitively feels the needs of its user and is able to react properly.</para></listitem></itemizedlist>
<para>These areas are coming up fast due to rapid developments in sensing technology, artificial intelligence and improved communication infrastructures. In this chapter, I would like to describe some recent developments in these areas of health care supporting technology, both from a technical and functional point of view and then, based on the present developments try to imagine how 5G will support and/or accelerate these.</para>
</section>
<section class="lev1" id="sec13-2">
<title>13.2 Technology to Support Personalized Health and Ambient Assisted Living</title>
<para>In this Section, different methods of health monitoring and health assisting systems are discussed. There are diverse projects in all over the world, which they focus on supporting people in need at their home or office without any requirements to visit hospitals or therapists.</para>
<section class="lev2" id="sec13-2-1">
<title>13.2.1 Exercising at Home</title>
<para>When patients are able to do their training at home, this would have great benefits for all stakeholders. Patients can do their training where and what time they want, not being obliged to go e.g., three times a week to a physical therapy practice or a rehabilitation centre. If it is partly replacing the intramural therapy sessions, it is also becoming more cost effective and enlarging the capacity of intramural care. If it is used as an extension of intramural rehabilitation, it will help in decreasing the fall back of capacities in the home situation. <link linkend="fig13_1">Figure 13.1</link> shows variety of activities could be done by remote supervision for patients.</para>
<para>In the EC project Clear, in the period 2011&#x2013;2013, 1000 patients in 4 European countries were using a system that was able to deliver videos of exercises, an exercise scheme, remote supervision and teleconsultation services. In the extensive health technology assessment it was shown that this remotely supervised treatment was cost effective and efficient when applied as partial replacement of the regular intramural therapy. Moreover, it was shown that the patients, who exercised more, improved more. This underlines that the patient is in the driver seat and is able to take control.</para>
<para>The advantage of this approach is that it is fully web based, making it independent of place and time and relatively low-tech, meaning that you only need a pc or a similar device to get the service working. As such, it is a good first step to introduce this kind of technology in daily healthcare.</para>
<fig id="fig13_1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 13.1</label>
<caption><title>Example of a patient platform, supporting web based exercising, video tele-consultation, self management and activity coaching (continuous care and coaching platform, RRD).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig13_1.jpg" mime-subtype="jpeg"/>
</fig>
<para>A next step in the training at home involves much more complex systems involving games to make the exercises more enjoyable and persuasive, combined with passive or active robotic support systems to correct the movement and/or support the patients in carrying out the desired movement when muscle force is still not sufficient. An example of such a combined system is the Script system, developed in the European Script project; targeting upper extremity training for stroke patients is shown in <link linkend="fig13_2">Figure 13.2</link>. It involves an arm/hand support system that allows personal adjustment of the amount of support, sensors to control the game and a number of games that vary in difficulty and a decision support system that recommends individual game setting and a choice of the games.</para>
<para>With respect to required bandwidth, and technical complexity, systems like Script are much more demanding. Optimally, one would allow experienced clinicians to look at the performance of the patient exercising remotely, but also have real-time control of the robotic device as well as the virtual world where the patient is experiencing. The evaluation studies of the Script system show that such systems are promising with respect to independent and motivating exercising at home, but still rather fragile.</para>
<fig id="fig13_2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 13.2</label>
<caption><title>Upper extremity exercise system including robotic support for the hand functioning, gravity compensation and individually tailored video games (Scriptproject.eu).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig13_2.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev2" id="sec13-2-2">
<title>13.2.2 Movement Analysis and Monitoring</title>
<para>Movement analysis is an important step in the functional diagnosis in rehabilitation. It focuses on quantification of the movement pattern and to investigate the underlying deviations in neuromuscular control and the compensation mechanisms that occur.</para>
<para>Gait analysis has been restricted to laboratories, where gait was quantified using optical, marker based systems. Reflecting markers are placed at specific places on the body and assessed using video cameras placed around the subject that pulse with infrared lights to obtain a three dimensional image. Off-line these images are then combined with a three-dimensional model and force plates to calculate joint forces. In the past years, this is being seen more and more as a so-called capacity measurement as the laboratory situation is a rather perfect environment with a very clean context, where the patient can be totally focused on the task at hand. A need has arisen to be able to have quantitative movement data from realistic situations, like at home. In the past years this has been enabled by rapid development of inertial sensor technology and processing algorithms to generate the movements from the data. A recent example of progress made in this area concerns the Interaction project is illustrated in <link linkend="fig13_3">Figure 13.3</link>.</para>
<para>Here a complete movement analysis system has been developed with motion sensors embedded in smart textiles, able to monitor the activities of a person in his own environment. It involves different modalities of sensing like inertial sensors to detect posture and movements, surface EMG sensors to measure muscle activation patterns and 3D force measurement under the foot. The system is presently being applied in stroke patients to monitor how they use their movement capacities in daily life, after a period of rehabilitation. The responses from the clinical users are in general very positive, underlining that these kind of unobtrusive monitoring systems have great promise for future integrated care.</para>
<fig id="fig13_3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 13.3</label>
<caption><title>The different components of the Interaction monitoring system (https://www. xsens.com/news/interaction-project/).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig13_3.jpg" mime-subtype="jpeg"/>
</fig>
</section>
<section class="lev2" id="sec13-2-3">
<title>13.2.3 Personal Coaching Systems</title>
<para>The amount of people with chronic conditions is rapidly growing especially because we live substantially longer but this extension of our lives is going hand in hand with a longer life with chronic conditions. Chronis conditions cannot be cured but it has been shown in many studies that quality of life and the occurrence of co-morbidities is strongly related to the extend we behave healthy, in terms of physical activity, healthy food and avoidance of stress. We, human are not good in changing our behavior, proper and intensive coaching is essential. As we do not have the ability to do this with persons, the idea was born to do this with technical systems using on body and context sensing, smart context aware reasoning and user friendly interaction. The concept of such Personal Coaching System (PCS) is shown in <link linkend="fig13_4">Figure 13.4</link>.</para>
<para>Several PCS have been realized in the past years. <link linkend="fig13_5">Figure 13.5</link> shows some examples of past and ongoing work. Probably the first PCS was a system to treat neck/shoulder pain during activities of daily living. It involved measurement of the muscle activity in the Trapezius muscles, well-known to be sensitive for stress and pain, processing the signal in terms of amount of relaxation and giving personal feedback via vibration to warn the subject when there is not sufficient relaxation. This system was successfully evaluated in a European trial, showing the system can be applied in neck/shoulder pain patients, without affecting their activities of daily living.</para>
<fig id="fig13_4" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 13.4</label>
<caption><title>Schematic presentation of an artificial Personal coaching system, involving on-body sensing, context aware reasoning and persuasive feedback.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig13_4.jpg" mime-subtype="jpeg"/>
</fig>
<fig id="fig13_5" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 13.5</label>
<caption><title>Three examples of Personal coaching systems that use sensor and context information to reason about a health condition to provide personalized and persuasive feedback.</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig13_5.jpg" mime-subtype="jpeg"/>
</fig>
<para>A second system is a smart activity coach, developed to coach people with chronic conditions towards a more healthy activity pattern through the day. This often concerns a higher level of activity but also in many cases better balancing the amount of activity over the day, to avoid a too early exhaustion. It measures the amount of activity during the day, using a 3D inertial sensor. This measurement is continuously compared with a desired activity pattern and based on the result it provides encouraging, discouraging or neutral messages. Both the content and timing of the messages are dynamically personalized, using a model which takes into account many activity variables and context information. The system is still under development but has been successfully applied in over 100 patients with different chronic conditions.</para>
<para>The third example is a stress management system. Stress appears to be a complex, not well-defined phenomenon. People also respond in different ways to stress, which makes that for a PCS a personal set of sensors are required and a personalized model that is able to weight the different inputs into one estimate of stress. Experimental studies in the lab show that this approach is feasible. Experiments in free living condition show that a great amount of context information has to be taken into account to provide a good real-time stress estimate.</para>
</section>
<section class="lev2" id="sec13-2-4">
<title>13.2.4 The Caring Home; Supportive Home Environments</title>
<para>In order to enable people to live as long as possible in their own environment, there is a need for intelligent support systems. Ideally, the system should &#x201C;feel&#x201D; the needs of the user intuitively and able to react when required. In addition it is important that the system is personalized and able to offer a wide range of services in the area of health, well-being and comfort.</para>
<para>Presently, many projects are going on in this area dealing with several sub goals in the context of the caring home. For example Projects that aims to determine the behavior of the person using different modalities of sensing. Key target population here is people with MCI or dementia as there is a great and rapidly growing need to supervise them as long as they live in their own houses.</para>
<para>A good example of an overall approach to this challenge is the eWall project. The concept of eWall is to offer services in a user-friendly way using a large interactive screen, run in a browser and supported by an extensive cloud service infrastructure. The way the services are presented is innovative by using a 50&#x2019;s home room environment. It offers a personalized set of services including health services like an activity coach, video based exercising, a sleep qualification system and a personalized guidance through the day. <link linkend="fig13_6">Figure 13.6</link> shows how the eWall screen is look like at patients&#x00B4; ends.</para>
<para>Integrated approaches, like eWall, require considerable bandwidth for these services as there is lot of sensing, real-time data processing and human computer interaction with animations. It is generally expected that such approach with an integration of services and using a cloud-based infrastructure will become common soon.</para>
<fig id="fig13_6" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 13.6</label>
<caption><title>Example of an integrated caring home environment, offering health, wellness and safety services to people with chronic conditions (http://ewallproject.eu/).</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig13_6.jpg" mime-subtype="jpeg"/>
</fig>
</section>
</section>
<section class="lev1" id="sec13-3">
<title>13.3 Opportunities Due to 5G</title>
<para>Overlooking the described upcoming areas that will have impact on the healthcare, especially the care for people with chronic conditions, on the on hand and trying to understand and forecast the contribution 5G can have to these areas, one could make the following predictions.</para>
<section class="lev2" id="sec13-3-1">
<title>13.3.1 Movement Analysis and Monitoring</title>
<para>For monitoring purposes, especially in the area of the analysis of functional movements, more and more rather complex multimodal sensors are used, like combinations of gyroscopes, accelerometers, magnetometers and ultrasound to get a complete 3D picture of the subject and his movements.</para>
<para>When these are combined with EMG measurements of several muscles, a considerable bandwidth is required. 5G would allow such simultaneous measurements in a free condition outside the lab. And probably also beyond the present set of measurements, like addition of EEG to assess motor control and mood in real-time would become possible, making a holistic monitoring of all relevant health and behavior aspects possible.</para>
<para>At the other side, the viewing of all these sensor data in an understandable and comprehensive way is a considerable challenge, especially when the data set is expanded extensively. An upcoming technical opportunity is the use of holographic projections. This would allow the presentation of the data to the care professional in a way he/she is used to, like in his daily practice. Seeing the subject move, while information is added like in enhanced reality. The 5G bandwidth would have a big impact in making this feasible.</para>
</section>
<section class="lev2" id="sec13-3-2">
<title>13.3.2 Personal Coaching Systems</title>
<para>Personal coaching systems are attracting more and more attention as the way forward to support people in changing their behavior. A near real-time response of the PCS is essential, as the user has to be able to link his behavior to the recommendations the system is providing, so he is able to be aware of his behavior and able to change it directly. More complex PCS like one for stress do require an individually modeled combination of several sensors to get an estimate of stress for feedback. The capacities of 5G would support real-time data collection and processing centrally, enabling the use of complex behavior modeling.</para>
</section>
<section class="lev2" id="sec13-3-3">
<title>13.3.3 The Caring Home</title>
<para>The caring home is just at the beginning of its time. The upcoming Internet of things (IoT) will extend the sensing and interaction capabilities of the home environment considerably and 5G will enable real-time data collection of all the on-body and contextual IoT data, enabling a better intuitive identification of the user needs and required responses of the home environment. It will also enable the incorporation of new sensing methods that involve more data; like mood detection using real-time video processing.</para>
</section>
</section>
<section class="lev1" id="sec13-4">
<title>13.4 Discussions</title>
<para>Present healthcare is not yet fully exploiting the capacity of the present 3G and 4G networks. Electronic patient records do use a limited amount of traffic and, apart from the imaging data, involve small amounts of data. Only rehabilitation exercising at home where videos are used to enable independent exercising does require some substantial bandwidth. Nevertheless, it is expected that this will change the upcoming years, now that many health care institutes have their EPD ready and are now looking for technology supported innovations of their care services. And this will mean that the described areas will receive increasing attention. It is expected that 5G will enable significant steps forward in the areas. The expected large bandwidth combined with high reliability and availability, will enable real-time data collection from large amount of sensors (on body, IoT), the use of complex user modeling and new ways of user interaction. It will also increase trust in these areas both by the end-users and care professional community, speeding up the large scale deployment of these care supporting solutions.</para>
</section>
<section class="lev1" id="sec13-5">
<title>References</title>
<para>[1] Amirabdollahian, F. and Ates, S. and Basteris, A. and Cesario, A. and Buurke, J. H. and Hermens, H. J. and Hofs, D. and Johansson, E. and Mountain, G. and Nasr, N. and Nijenhuis, S. M. and Prange, G. B. and Rahman, N. and Sale, P. and Sch&#x00E4;tzlein, F. and Schooten, B. van and Stienen, A. H. A. (2014) Design, development and deployment of a hand/wrist exoskeleton for home-based rehabilitation after stroke &#x2013; SCRIPT project. Robotica, 32 (8), pp. 1331&#x2013;1346. ISSN 0263-5747</para>
<para>[2] Akker, Harm op den and Tabak, Monique and Marin-Perianu, Mihai and Huis in &#x2018;t Veld, Rianne and Jones, Valerie M. and Hofs, Dennis and T&#x00F6;nis, Thijs M. and Schooten, Boris W. van and Vollenbroek-Hutten, Miriam M. R. and Hermens, Hermie J. (2012) Development and evaluation of a sensor-based system for remote monitoring and treatment of chronic diseases &#x2013; the continuous care &#x0026; coaching platform. In: 6th International Symposium on eHealth Services and Technologies, EHST 2012, 3&#x2013;4 July 2012, Geneva, Switzerland (pp. 19&#x2013;27).</para>
<para>[3] Akker, Harm op den and Cabrita, Miriam and Akker, Rieks op den and Jones, Valerie M. and Hermens, Hermie J. (2015) Tailored motivational message generation: a model and practical framework for realtime physical activity coaching. Journal of biomedical informatics, 55. pp. 104&#x2013;115. ISSN 1532-0464 <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B3%5D+Akker%2C+Harm+op+den+and+Cabrita%2C+Miriam+and+Akker%2C+Rieks+op+den+and+Jones%2C+Valerie+M%2E+and+Hermens%2C+Hermie+J%2E+%282015%29+Tailored+motivational+message+generation%3A+a+model+and+practical+framework+for+realtime+physical+activity+coaching%2E+Journal+of+biomedical+informatics%2C+55%2E+pp%2E+104-115%2E+ISSN+1532-0464" target="_blank">Google Scholar</ulink></para>
<para>[4] Broens, Tom H. F. and Huis in &#x2018;t Veld, Rianne M. H. A. and Vollenbroek-Hutten, Miriam M. R. and Hermens, Hermie J. and Halteren, Aart van and Nieuwenhuis, Lambert J. M. (2007) Determinants of successful telemedicine implementations: a literature study. Journal of Telemedicine and Telecare, 13 (6), pp. 303&#x2013;309. ISSN 1357-633X <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B4%5D+Broens%2C+Tom+H%2E+F%2E+and+Huis+in+%27t+Veld%2C+Rianne+M%2E+H%2E+A%2E+and+Vollenbroek-Hutten%2C+Miriam+M%2E+R%2E+and+Hermens%2C+Hermie+J%2E+and+Halteren%2C+Aart+van+and+Nieuwenhuis%2C+Lambert+J%2E+M%2E+%282007%29+Determinants+of+successful+telemedicine+implementations%3A+a+literature+study%2E+Journal+of+Telemedicine+and+Telecare%2C+13+%286%29%2C+pp%2E+303-309%2E+ISSN+1357-633X" target="_blank">Google Scholar</ulink></para>
<para>[5] Car, Josip and Huckvale, Kit and Hermens, Hermie (2012) Telehealth for long term conditions. BMJ: British Medical Journal, 344 . E4201. ISSN 0959-8138</para>
<para>[6] Hermens, H. and Akker, H. op den and Tabak, M. and Wijsman, J. and Vollenbroek, M. (2014) Personalized Coaching Systems to support healthy behavior in people with chronic conditions. Journal of electro-myography and kinesiology, 24(6), pp. 815&#x2013;826. ISSN 1050-6411 <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B6%5D+Hermens%2C+H%2E+and+Akker%2C+H%2E+op+den+and+Tabak%2C+M%2E+and+Wijsman%2C+J%2E+and+Vollenbroek%2C+M%2E+%282014%29+Personalized+Coaching+Systems+to+support+healthy+behavior+in+people+with+chronic+conditions%2E+Journal+of+electro-myography+and+kinesiology%2C+24%286%29%2C+pp%2E+815-826%2E+ISSN+1050-6411" target="_blank">Google Scholar</ulink></para>
<para>[7] Hermens, Hermie J. and Vollenbroek-Hutten, Miriam M. R. (2008) Towards remote monitoring and remotely supervised training. Journal of Electromyography and Kinesiology, 18 (6), pp. 908&#x2013;919. ISSN 1050-6411</para>
<para>[8] Huis in &#x2018;t Veld, M. H. A. and Voerman, G. E. and Hermens, H. J. and Vollenbroek-Hutten, M. M. R. (2007) The receptiveness toward remotely supported myofeedback treatment. Telemedicine and E-health, 13 (3), pp. 293&#x2013;302. ISSN 1530-5627 <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B8%5D+Huis+in+%27t+Veld%2C+M%2E+H%2E+A%2E+and+Voerman%2C+G%2E+E%2E+and+Hermens%2C+H%2E+J%2E+and+Vollenbroek-Hutten%2C+M%2E+M%2E+R%2E+%282007%29+The+receptiveness+toward+remotely+supported+myofeedback+treatment%2E+Telemedicine+and+E-health%2C+13+%283%29%2C+pp%2E+293-302%2E+ISSN+1530-5627" target="_blank">Google Scholar</ulink></para>
<para>[9] Huis in &#x2018;t Veld, Rianne M. H. A. and Huijgen, Barbara C. H. and Schaake, Leendert and Hermens, Hermie J. and Vollenbroek-Hutten, Miriam M. R. (2008) A staged approach evaluation of remotely supervised myofeedback treatment (RSMT) in women with neck-shoulder pain due to computer work. Telemedicine and E-health, 14 (6), pp. 545&#x2013;551. ISSN 1530-5627</para>
<para>[10] Huijgen, Barbara C. H. and Vollenbroek-Hutten, Miriam M. R. and Zampolini, Mauro and Opisso, Eloy and Bernabeu, Montse and Nieuwenhoven, Johan van and Ilsbroukx, Stephan and Magni, Riccardo and Giacomozzi, Claudia and Marcellari, Velio and Scattareggia Marchese, Sandro and Hermens, Hermie J. (2008) Feasibility of a home-based telerehabilitation system compared to usual care: arm/hand function in patients with stroke, traumatic brain injury and multiple sclerosis. Journal of Telemedicine and Telecare, 14 (5), pp. 249&#x2013;256. ISSN 1357-633X</para>
<para>[11] Huis in &#x2018;t Veld, Rianne M. H. A. and Huijgen, Barbara C. H. and Schaake, Leendert and Hermens, Hermie J. and Vollenbroek-Hutten, Miriam M. R. (2008) A staged approach evaluation of remotely supervised myofeedback treatment (RSMT) in women with neck-shoulder pain due to computer work. Telemedicine and E-health, 14 (6), pp. 545&#x2013;551. ISSN 1530-5627</para>
<para>[12] Tabak, M. and Vollenbroek-Hutten, M. M. R. and Valk, P. D. van der and Palen, J. A. M. van der and Tonis, T. M. and Hermens, H. J. (2012) Telemonitoring of daily activity and symptom behavior in patients with COPD. International journal of telemedicine and applications, 2012 (438736). ISSN 1687-6415</para>
<para>[13] Tabak, M. and Flierman, I. and Schooten, B. van and Hermens, H. J. (2013) Development of a trusted healthcare service to support self-management and a physically active lifestyle in COPD patients. In: Telemedicine &#x0026; eHealth 2013: Aging well &#x2013; how can technology help?, >25&#x2013;26 November 2013, London, UK.</para>
<para>[14] Voerman, Gerlienke E. and Sandsj&#x00F6;, Leif and Vollenbroek-Hutten, Miriam M. R. and Larsman, Pernilla and Kadefors, Roland and Hermens, Hermie J. (2007) Effects of Ambulant Myofeedback Training and Ergonomic Counselling in Female Computer Workers with Work-Related Neck-Shoulder Complaints: A Randomized Controlled Trial. Journal of Occupational Rehabilitation, 17 (1), pp. 137&#x2013;152. ISSN 1573-3688</para>
<para>[15] Voerman, Gerlienke E. and Sandsj&#x00F6;, Leif and Vollenbroek-Hutten, Miriam M. R. and Larsman, Pernilla and Kadefors, Roland and Hermens, Hermie J. (2007) Changes in Cognitive-Behavioral Factors and Muscle Activation Patterns after Interventions for Work-Related Neck-Shoulder Complaints: Relations with Discomfort and Disability. Journal of Occupational Rehabilitation, 17 (4), pp. 593&#x2013;609. ISSN 1053-0487</para>
<para>[16] Vollenbroek-Hutten, M. M. R. and Huis in &#x2018;t Veld, M. H. A. and Hermens, H. J. (2008) Myotel: adressing motor behavior in neck shoulder pain by assessing and feedback semg in the daily (work) environment. In: International conference on ambulatory monitoring of physical activity and movement, conference book, 21&#x2013;24 May 2008, Rotterdam, Netherlands (p. 86). <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B16%5D+Vollenbroek-Hutten%2C+M%2E+M%2E+R%2E+and+Huis+in+%27t+Veld%2C+M%2E+H%2E+A%2E+and+Hermens%2C+H%2E+J%2E+%282008%29+Myotel%3A+adressing+motor+behavior+in+neck+shoulder+pain+by+assessing+and+feedback+semg+in+the+daily+%28work%29+environment%2E+In%3A+International+conference+on+ambulatory+monitoring+of+physical+activity+and+movement%2C+conference+book%2C+21-24+May+2008%2C+Rotterdam%2C+Netherlands+%28p%2E+86%29%2E" target="_blank">Google Scholar</ulink></para>
<para>[17] Vollenbroek-Hutten, Miriam M. R. and Hermens, Hermie J. (2010) Remote care nearby. Journal of Telemedicine and Telecare, 16 (6), pp. 294&#x2013;301. ISSN 1357-633X <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B17%5D+Vollenbroek-Hutten%2C+Miriam+M%2E+R%2E+and+Hermens%2C+Hermie+J%2E+%282010%29+Remote+care+nearby%2E+Journal+of+Telemedicine+and+Telecare%2C+16+%286%29%2C+pp%2E+294-301%2E+ISSN+1357-633X" target="_blank">Google Scholar</ulink></para>
<para>[18] Vollenbroek-Hutten, Miriam M. R. and Hermens, Hermie J. and Kadefors, Roland and Danneels, Lieve and Nieuwenhuis, Lambert J. M. and Hasenbring, Monika (2010) Telemedicine services: from idea to implementation. Journal of Telemedicine and Telecare, 16 (6), pp. 291&#x2013;293. ISSN 1357-633X <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B18%5D+Vollenbroek-Hutten%2C+Miriam+M%2E+R%2E+and+Hermens%2C+Hermie+J%2E+and+Kadefors%2C+Roland+and+Danneels%2C+Lieve+and+Nieuwenhuis%2C+Lambert+J%2E+M%2E+and+Hasenbring%2C+Monika+%282010%29+Telemedicine+services%3A+from+idea+to+implementation%2E+Journal+of+Telemedicine+and+Telecare%2C+16+%286%29%2C+pp%2E+291-293%2E+ISSN+1357-633X" target="_blank">Google Scholar</ulink></para>
<para>[19] Weering, Marit van and Vollenbroek-Hutten, M. M. R. and Kotte, E. M. and Hermens, H. J. (2007) Daily physical activities of patients with chronic pain or fatigue versus asymptomatic controls: a systematic review. Clinical Rehabilitation, 21 (11), pp. 1007&#x2013;1023. ISSN 0269-2155</para>
<para>[20] Wijsman, Jacqueline and Grundlehner, Bernard and Penders, Julien and Hermens, Hermie (2010) Trapezius Muscle EMG as Predictor of Mental Stress. In: Wireless Health, WH 2010, 5&#x2013;7 October 2010, San Diego, California (pp. 155&#x2013;163).</para>
<para>[21] Wijsman, Jacqueline and Grundlehner, Bernard and Liu, Hao and Hermens, Hermie and Penders, Julien (2011) Towards Mental Stress Detection Using Wearable Physiological Sensors. In: 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, EMBC 2011, 30 Aug&#x2013;3 Sept 2011, Boston, USA (pp. 1798&#x2013;1801).</para>
</section>
<section class="lev1" id="sec13-6">
<title>About the Author</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig13_7.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Hermie J. Hermens</emphasis> did his masters in biomedical engineering at the University of Twente and became head of the research group of the Roessingh Rehabilitation Centre. In 1990 he was co-founder of Roessingh Research and Development, now the largest research institute in the Netherlands in the area of rehabilitation technology and Telemedicine.</para>
<para>He did his Ph.D. in surface Electromyography and became in 2001 Professor in Biomedical Engineering, specialized in human motor control and in 2010 professor in Telemedicine. Currently, he supervises 15 Ph.D. students; over 20 Ph.D. students finished under his (co)supervision.</para>
<para>He is (co)-author of over 300 peer reviewed scientific journal publications and his work was cited over 12000 times (H-index 50). Additional professional functions include: Editor in chief of the Journal of Back and Musculoskeletal Rehabilitation, Past-President and fellow of the int. Society of Electromyography and Kinesiology.</para>
<para>The research focus of Hermens is the creation of innovative health care services by combining biomedical engineering with ICT. He coordinated 3 European projects (Seniam, Crest and Impulse (award successful project)) and participated in over 25 other European projects as key partner. He is strongly involved in many E-Health and Personalised Health related projects, especially at European level (recent: eWall, Perssilaa, In-Life, Deci, Mobiguide).</para>
</section>
</chapter>
<chapter class="chapter" id="ch14" label="14" xreflabel="14">
<title>Multi Business Model Innovations in a World of 5G &#x2013; Towards a World of Advanced Persuasive Business Models Embedded with Sensor- and Persuasive Technologies</title>
<para><emphasis role="strong">Peter Lindgren</emphasis></para>
<para>Aarhus University, Department of Business Development and Technology, Denmark</para>
<section class="lev1" id="sec14-1">
<title>14.1 Introduction</title>
<para>Why focus on persuasive business models (PBM) related to sensor- and persuasive technologies in a future world of 5G?</para>
<para>The answer could be</para>
<para>&#x201C;Technology will always be in need of a Business Model&#x201D;</para>
<para>Or</para>
<para>&#x201C;No technology&#x201D; &#x2013; neither persuasive technology in a world of 5G &#x2013; &#x201C;will go or do without a Business Model&#x201D; &#x2013; or in fact many Business Models&#x201D; (Inspired by Chesbrough) [2, 3]</para>
<para>Further what can the world of 5G provide related to ethics, trust and security of these PBM&#x2019;s.</para>
<para>It appears that researchers and practitioners have yet not researched widely on PBM&#x2019;s related to 5G and how they can and will be applied in the benefit of business, society &#x2013; and humans. What can businesses and society gain of PBM but what can they probably also loose from the invasion of PBM.</para>
<para>The chapter discusses different aspects and expected evolvement of PBM innovation in a world of 5G in reference of a definition and proposed framework of a PBM.</para>
<para>PBM embedded with sensors and persuasive technology could potentially lead businesses and society into a new area of growth in 2030&#x2019;s 5G world &#x2013; if 5G technologies and support ethics, trust and security.</para>
<para>Research carried out by Boston Consulting Group back in 2009 showed that &#x201C;Business Model Innovators earned in an average premium that was four times greater than that enjoyed by product or process Innovators&#x201D; [12]. Which results can we expect from PBM in a world of 5G?</para>
<para>Businesses focusing on Business model innovation (BMI) have until recently delivered returns that are larger and more sustainable than product and process innovation&#x201D; [12]. However this is predictably not going to stay on as more and more businesses realize the importance of BMI and gain the competence to do BMI. Further as BM&#x2019;s face the same high speed trends as products did in the early 2000&#x2019;s &#x2013; the lifetime of BM&#x2019;s shrinks and must even shrink dramatically more every day.</para>
<para>As this race of development and innovation of technologies in the &#x201C;slip stream&#x201D; of 5G is going on.</para>
<para>&#x201C;How will the business models and business model innovation in a world of 5G expectable look like and be influenced by 5G?&#x201D;</para>
<para>&#x201C;What will expectable are the next era of BMI related to the evolving 5G technologies developed?&#x201D;</para>
<para>Well our research in the MBIT group certainly points firstly to the era of multi business models. Secondly to the raise of PBM&#x2019;s embedded with persuasive technologies.</para>
</section>
<section class="lev1" id="sec14-2">
<title>14.2 Persuasive Business Models and Business Model Language</title>
<para>&#x201C;Technology will always be in need of a Business Model&#x201D; [2] but Business models will however also in a world of 5G &#x2013; maybe even more than in the past &#x2013; be in need, based on and dependent on advanced technologies.</para>
<para>BMI these days is influenced by the growing numbers of sensors embedded in everything, everybody and anywhere. Just in 2020, 300 billion sensors are expected spread out in our society &#x2013; making our lifestyle and thereby BMI different. The intelligent sensors and not least printed, flexible and biological sensors are expected to change the game of BMI. Sensor technology will e.g., mean inspired by Bryzek [1] and Drupa [4]:</para>
<itemizedlist mark="bullet" spacing="normal">
<listitem><para><emphasis role="strong">&#x2018;unobservable&#x2019; sensing BM</emphasis> which will break new ground in the technology <emphasis role="strong">component</emphasis> of the BM e.g., the dimension of sensing biohazards, smells, material stresses, pathogens, level of corrosion and chemicals in BM&#x2019;s.</para></listitem>
<listitem><para><emphasis role="strong">Micro-sensor implants</emphasis> in humans, animals and environments &#x2013; which will track e.g., the healing process for internal injuries, illness, enable health and animal care professionals and machines to take remedial action based on continual data &#x2013; big and mega data &#x2013; from the BM eco system.</para></listitem>
<listitem><para><emphasis role="strong">Biodegradable sensors</emphasis> monitoring e.g., soil moisture or nutrient content for optimum crop production or healthcare for human&#x2019;s suffering from diabetes.</para></listitem>
<listitem><para><emphasis role="strong">Self-powered sensors</emphasis> powered by using the heat difference between the human&#x2019;s, animal&#x2019;s or machines &#x201C;body&#x201D; and surrounding air.</para></listitem>
<listitem><para><emphasis role="strong">Self-healing sensors</emphasis> repairing themselves in the event of disaster or other structural disruptions.</para></listitem>
<listitem><para><emphasis role="strong">Live cell-based sensing</emphasis> e.g., an amalgamation of sensor technology and living cells, allow scientist and business people to understand the biological effect of medicines, drugs, environment and biohazards.</para></listitem>
<listitem><para><emphasis role="strong">Sensor swarms</emphasis> coordinate their activities, deciding interactively what to measure and where through a self-learning system directing their movements, data collection and persuasiveness.</para></listitem>
<listitem><para><emphasis role="strong">Smart dust</emphasis>, microscopic sensors powered by vibrations, monitor situations ranging from battlefield activities, structural strength of buildings, clogged arteries or BM ecosystems.</para></listitem></itemizedlist>
<para>The sensor technology in 2030 will expectable be even more advanced than today &#x2013; as expected covering all 5 sensors &#x2013; and enabling all 5 sensor technologies to speak together and be intelligent integrated [5&#x2013;7, 11].</para>
<para>We thereby step into the intersection of different sensors, industries, disciplines, business models, cultures and backgrounds &#x2013; in other words, embrace diversity in technologies and business models &#x2013; of thought, perspectives, experience, expertise &#x2013; and values &#x2013; which will drive BMI into a new era.</para>
<para>Inspired by the Medici family in Florence, whose patronage of artists, architects, scientists, philosophers &#x2013; the interdisciplinary approach &#x2013; which in the Renaissance helped bring about a new age of creativity, discovery and innovation in Europe &#x2013; is now turning back &#x2013; The concept of the Medici Effect [9].</para>
<para>An increasing development of persuasive technology enabled by the evolvement of sensor technology, big data and 5G changes the game of BMI. The evolution and era of persuasive business models will result in more advanced PT&#x2019;s expected to come, evolve with tremendous speed and having such impact on business, society and humans never seen and imagined before.</para>
<para>PT [15 A] is still a vibrant interdisciplinary research field, focusing on the design, development and evaluation of interactive technologies &#x2013; changing users&#x2019; &#x2013; human and machines &#x2013; attitudes or behaviors through persuasion and social influence. PB has still to be accepted and be researched deeply. Persuasive technologies can with the aid of 5G be used to change peoples and machines behavior in various domains. Persuasive technologies will be a vital component in the competence dimension of any persuasive business model in the future [16]. Expectably product-, service-, production- and process technology will be embedded with persuasive technologies in future business models &#x2013; and thereby become PB BM&#x2019;s:</para>
<para><emphasis>&#x201C;the persuasive business model are strategically designed with the aim to change users, customers, networkpartners and employees behavior via its value proposition(s) acting interactively together with the other 6 BM dimensions and related BM&#x2019;s&#x201D;</emphasis> [16].</para>
<para>The application of the persuasive BMs will expectably really take off with &#x201C;the 5G roll-out&#x201D; in the next 5 to 10 years [15]. The development of sensors and persuasive technologies makes it possible to create business model ecosystems with persuasive business models. Although persuasive business model use persuasive technologies and are basically created to &#x201C;persuade&#x201D; for a certain behavior in accordance with the strategy of the BM and business numerous examples shows that they have not just advantaged but also a backside. They should therefore be ethically being constructed secure &#x2013; but today however they are mostly uncontrolled, unregistered and free of use.</para>
<para>We claim &#x2013; there are some steps to be taken before we &#x2013; the businesses and society reach a deeper understanding of how persuasive businesses really can use persuasive business models and what they really can do with persuasive business models.</para>
<para>On behalf of inputs from SW2010 [18]&#x2013;SW2015 [19], lab experiments in the MBIT and Stanford Peace Innovation Lab together with state of the art persuasive business model and technology research we conceptual elaborate on a futuristic outlook to persuasive business models. What can we expect of persuasive business Models and persuasive business model innovation in a future world of 5G.</para>
</section>
<section class="lev1" id="sec14-3">
<title>14.3 A World of 5G and Persuasive Business Models</title>
<para>&#x201C;In the past ten years the number of sensor-, wireless and persuasive technologies in our everyday life, have increased many-fold. We are now moving fast towards a world of 5G which obviously will by standard have embedded persuasive technologies [4, 5, 15, 17] &#x2013; and therefore it will soon be a reality to business to deal with these persuasive technologies. &#x201C;The study of these persuasive technologies, and how they affect our lives and routines are still very young &#x2013; and we know little about how they will affect our future lives &#x2013; but we know that what we can expect of persuasive technologies cannot even we imagine today [6, 15, 17].</para>
<para>Researchers, business and public players alike are keenly devoting themselves to understanding how these different persuasive technologies might be designed, so that desirable technologies, behaviour and not least &#x201C;business models&#x201D; are obtained and can be created, captured, delivered, received and consumed &#x2013; hopefully secure and sustainable. There is large expectation to that 5G and persuasive business models both will enable better business. Especially healthcare and well care sector expects much of persuasive technologies [13] to overcome some of their big economic burden due to amongst others a growing elderly population and increasing medicine costs.</para>
<para>The power and importance of persuasive technologies embedded in a multitude of business models is therefore obvious! &#x2013; and to some extent would some say &#x2013; on the dark site scary &#x2013; if not secured and lead in a valuable and sustainable directions. However the evolvement of persuasive technologies and persuasive business models are not to be stopped and their impact will be enormous in the future and even be clearer &#x2013; as we move into a world of 5G.</para>
</section>
<section class="lev1" id="sec14-4">
<title>14.4 Persuasive Business Models and Business Model Language in a World of 5G</title>
<para>Today most businesses are not really able to carry out and innovate persuasive business models. As the sensor-, persuasive- and 5G technologies develop there is suddenly no excuse and barriers technologically to not innovate persuasive business models. The challenges lay a whole different area. There is not yet an alignment and an accepted business model language in the business model community [20&#x2013;23] are one of the major reason to this &#x201C;barrier&#x201D; &#x2013; preventing business to take the next step into persuasive business modeling. A common agreed business model language is highly needed to make it possible for business to communicate their Business Model dimensions and components with one another &#x2013; but more important using the full potential of persuasive and sensing business models [13, 14]. Many businesses are still what could be classified as &#x201C;Business Model analphabetic&#x201D;.</para>
<para>In a world of 5G this language will be even more important to develop and have clarified. If all businesses could agree upon a common business model language then persuasive business modeling and the use of persuasive business models could really take off &#x2013; and not just be reserved for the use of large businesses with powerful computers and high skilled employees.</para>
<para>Today most businesses are just able to see a 2D mapping of their BM value exchange as we illustrate from one of our research projects in <link linkend="fig14_1">Figure 14.1</link>.</para>
<para>5G will enable them with technologically to see data and get information of much more of the BM and its value stream. The abilities to really &#x201C;see&#x201D; the complex world of Business Models and the impact of Business Model Innovation.</para>
<para>Due to all the interactions that 5G technology will give us combined with advanced visualization technology business will be able to &#x201C;see&#x201D; and sense much more &#x2013; and faster. It will provide them with enormous amount of new data, knowledge and insights, which they can be able to understand when they agreed on &#x201C;a common language&#x201D; and where to look [10].</para>
<para>&#x201C;Unwrapping&#x201D; BM knowledge in small lab experiments with a small part of a business &#x2013; in this example just with few different BM&#x2019;s the picture shows us a rather complex and less operational picture of the value exchange between business models. This is shown in <link linkend="fig14_2">Figure 14.2</link>.</para>
<para>Understanding this complex Business Model value creation, capturing, delivering, receiving and consumption process, of both tangible (full line) and intangible (dotted line) value exchanges between Business Models will however be essential and form the platform for persuasive business modeling in a world of 5G.</para>
<para>Our hypothesis is that PBM&#x2019;s will be in common in near future but before that we will see several generations of PBM. We expect that the real application of the persuasive BMs would begin with the 5G roll-out in the next 5 to 10 years.</para>
<fig id="fig14_1" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 14.1</label>
<caption><title>2D Mapping of one BM value exchange sequence from an industrial business [16].</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig14_1.jpg" mime-subtype="jpeg"/>
</fig>
<fig id="fig14_2" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 14.2</label>
<caption><title>2D Mapping of a multitude of BM value exchange sequence between BM&#x2019;s inside a business [16].</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig14_2.jpg" mime-subtype="jpeg"/>
</fig>
<para>Both users, customers, networkpartners, employees and businesses of today &#x2013; in general will find initially those persuasive business models and persuasive business model innovation processes highly risky, foreign and radical related to existing BM&#x2019;s and BM innovation processes &#x2013; that they&#x2019;ve been experimenting with in their past. Certainly society and politicians need soon &#x2013; and fast &#x2013; involve themselves in the debate and rulemaking of Persuasive Business Modeling.</para>
<para>The history of the persuasive business model concept is still relatively young. As 3G and 4G based business ecosystems emerged, many business (Google, Face book, Amazon, Ebay, Zinga, Blizzard began rethinking their business model and business model structure [16]. They began to build in persuasive components (motivating colors, text, tabs, sounds), dimensions (value propositions, value chain activities, relations and networks) even BM&#x2019;s which could &#x201C;motivate&#x201D; &#x2013; some would say &#x201C;persuade&#x201D; &#x2013; users, customers, network and employees to certain behaviors. These attempts were initially rather simple and have up to for some years ago been very harmless and relative simple constructed.</para>
<para>However when highly professional promotion experts, psychologists, sociologist, computer scientist and business model experts are brought together in interdisciplinary BMI teams with the aim of creating persuasive business models &#x2013; then the next generation persuasive business model innovation could really begin and find their way to Business Model Ecosystems (BMES). If no control and influence &#x2013; then situations where people, business and machines forget to take human and society ethics into consideration begin to emerge.</para>
<para>Persuasive business models demands therefore several and different competences and this is exactly where we expect BMI investment in next coming years will be focused by many businesses.</para>
<para>The persuasive business model approach bring the business model in to a more advanced step compared to previous development &#x2013; a new era &#x2013; by answering the question &#x2013;</para>
<para><emphasis>What if we really could use the sensors and the mega data they generate and could create knowledge in real-time interaction with people, things and businesses &#x2013; to really &#x201C;influence&#x201D; or &#x201C;persuade&#x201D; for certain behaviors?</emphasis></para>
<para>It proposes that the persuasive business model in a world of 5G becomes a business model framework that is reasonably simple, logical, measurable, comprehensive, operational and meaningful. The persuasive Business Model we propose as related to 7 dimensions can be seen in <link linkend="tbl14_1">Table 14.1</link> [16].</para>
<para>Our previous research [13] show that a persuasive business model at an optimum adapt a multi business model approach combining and relating different &#x201C;ingredients&#x201D; from more than one business model, meaning that persuasive business models are in relations with other persuasive business models and they have embedded, interactive, dynamic persuasive technology built in.</para>
<table-wrap id="tbl14_1">
<label>Table 14.1</label>
<caption><title>Generic dimensions and questions to any persuasive business model [16] Core Questions Related to a</title></caption>
<table cellspacing="5" cellpadding="5" frame="hsides" rules="rows">
<thead>
<tr>
<td valign="bottom" align="left">Dimensions in a Generic BM</td>
<td valign="bottom" align="left">Core Questions Relatead to a Generic Persuasive BM</td>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Value proposition/s (products, services and processes) that the business offers (Physical, Digital, Virtual)</td>
<td valign="top" align="left">What are our value propositions?</td>
</tr>
<tr>
<td valign="top" align="left">Customer/s and Users (Target users, customers, market segments that the business serves &#x2013; geographies, physical, digital, virtual).</td>
<td valign="top" align="left">Who do we serve?</td>
</tr>
<tr>
<td valign="top" align="left">Value chain [internal] configuration.(physical, digital, virtual)</td>
<td valign="top" align="left">What value chain functions do we provide?</td>
</tr>
<tr>
<td valign="top" align="left">Competences (assets, processes and activities) that translate business&#x2019; inputs into value for customers and/or users (outputs). (Physical, digital, Virtual) Network &#x2013; Network and Network partners (strategic partners, suppliers and others (Physical, digital, virtual)</td>
<td valign="top" align="left">What are our competences?</td>
</tr>
<tr>
<td valign="top" align="left">Network &#x2013; Network and Network partners (strategic partners, suppliers and others (Physical, digital, virtual)</td>
<td valign="top" align="left">What are our networks?</td>
</tr>
<tr>
<td valign="top" align="left">Relations(s) e.g., physical, digital and virtual relations, personal. (Physical, digital, virtual) Value formula (Profit formulae and other value formulae. (physical, digital, virtual)</td>
<td valign="top" align="left">What are our relations?</td>
</tr>
<tr>
<td valign="top" align="left">Value formula (Profit formulae and other value formulae. (physical, digital, virtual)</td>
<td valign="top" align="left">What are our value formulae?</td>
</tr>
</tbody>
</table>
</table-wrap>
<para>It can be argued that strategy [16], are simply embedded with the persuasive business model approach, providing the larger platform for the business who strategically have decided to be based upon and act with one or more persuasive business models.</para>
<para>With other words &#x2013; a persuasive business model includes an interactive, dynamic business model and business model innovation strategy vision, mission and goal(s) where the PBM seeks to achieve impact on business models including users, customers, and technologies &#x2013; all dimensions of other business models [16].</para>
<para>The persuasive business model will in this context by nature try to attach to anything, anybody, anywhere and anytime &#x2013; with the overall aim to &#x201C;persuade&#x201D;. 5G is expected to be the backbone of these persuasive business models and persuasive business model ecosystems.</para>
<para>5G enables both the vision of creating persuasive business models any time, any place, with anybody and anything. In the future all human beings, all things at any time and in any place will have the possibility to act persuasively.</para>
<para>We expect that the persuasive business model based on advanced sensor- and persuasive technology will indeed not only be important but also add increasingly high value to the stakeholders involved. However we still have some challenge to overcome before we reach a final destination where all business models are persuasive in a world of 5G &#x2013; hereunder hopefully respecting and acknowledge security, trust and ethic challenges.</para>
<para>An even stronger focus on security, personal security, and network based security technology must be expected of a 5G world. Business models that are continuously persuasive, in process and changing &#x2013; run by businesses, humans but importantly more and more machines &#x2013; continuously in different BMES context sets 5G business and researchers under high pressure to quickly find solutions &#x2013; both technological and business wise to meet the requirements of all kind of stakeholders for increasing agility, flexibility, individualization, privacy related to persuasiveness.</para>
<para>A concept proposal for persuasive technology and business models which are independent of time, place, bodies and things &#x2013; and at the same time are secure was proposed earlier (Lindgren 2016) as seen in <link linkend="fig14_3">Figure 14.3</link>. This was however shown as proposed in a first generation proposal &#x2013; an &#x201C;ecosystem&#x201D; of secure persuasive business model innovation showing the future context to come &#x2013; the full integration between physical, digital and virtual persuasive business models operating in a secure context [16].</para>
<fig id="fig14_3" position="float" xmlns:xlink="http://www.w3.org/1999/xlink">
<label>Figure 14.3</label>
<caption><title>A &#x201C;ecosystem&#x201D; of the secure persuasive physical, digital and virtual business model [16].</title></caption>
<graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig14_3.jpg" mime-subtype="jpeg"/>
</fig>
<para>The fulfillment of embedding persuasive BM&#x2019;s anytime, anyplace, with anybody and any things seems to be achievable in the very near future of 5G. Persuasive business models in a world of 5G will not only be a matter of security on the &#x201C;surface&#x201D; of things, places, people, animals and time but also will be about persuasive business models placed both inside and outside things, bodies, species and time.</para>
</section>
<section class="lev1" id="sec14-5">
<title>14.5 Conclusions</title>
<para>Persuasive business models in a world of 5G we expect will become one of the most important BMI concepts for future business and business model innovation. It will also be one of the most discussed topics related to ethics, trust a security &#x2013; actually the discussion has already begun [16].</para>
<para>Persuasive Business Models are integrated and embedded with advanced persuasive business model technology. It is in this context that the fast evolvement of persuasive business models related to the vision of the secure, persuasive and sustainable business; business model ecosystem, business model ecosystems and world of 5G should be seen.</para>
<para>The secure persuasive business model concept has not yet been fully realized &#x2013; but business and societies in general continue to evolve and embrace new perceptions of persuasive business models as the challenges of business model innovation gets more complex, their business models lifetime shrinks and the opportunities of the persuasive business model growths with the emerging world of 5G.</para>
<para>Persuasive business models will exist in physical, digital and virtual worlds &#x2013; operating in a continuous process &#x2013; integrated, agile, dynamic and better connected business model ecosystems. Delivering in a continuously process of persuasive value propositions &#x2013; wherever, whenever, whatever the user, customer, network partner, employees, things and business demands it. Persuasive business models will at an optimum operate together in a multi business model setup &#x2013; a business model network collaboration outside and inside things, bodies, species and businesses in the future.</para>
<para>One must imagine that all 7 dimensions of a persuasive BM can and will change continually in a world of 5G and persuasive business model innovation processes. This makes it extremely difficult to measure, control persuasive BM and BMI processes and thereby control and leadership from outside either it is a user, customer, network partner, competitor or society is highly necessary to begin.</para>
<para>Expectations are that majority of all future business models will be persuasive. This of course only if human being, global society and the business behind the business models including the technology will allow it.</para>
<para>Future persuasive business models will use and take advantage of all opportunities of the 5G technologies given. How persuasive business models can be controlled in this context is however still for the 5G community to discuss and research.</para>
</section>
<section class="lev1" id="sec14-6">
<title>References</title>
<para>[1] Bryzek, J Fairchild (2013) *&#x201D;Emergence of Trillion Sensor Opportunity,&#x201D; SemiconWest, http://www.semiconwest.org/sites/semiconwest.org/files/docs/SW2013_Janusz_Bryzek_Fairchild_Semiconductor.pdf.</para>
<para>[2] Chesbrough, H. and Rosenbloom, R. S. (2000) The role of the business model in capturing value from innovation: Evidence from XEROX Corporation&#x2019;s technology spinoff companies, Industrial and Corporate Change, Vol. 11, No. 3, pp. 529&#x2013;555. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B2%5D+Chesbrough%2C+H%2E+and+Rosenbloom%2C+R%2E+S%2E+%282000%29+The+role+of+the+business+model+in+capturing+value+from+innovation%3A+Evidence+from+XEROX+Corporation%27s+technology+spinoff+companies%2C+Industrial+and+Corporate+Change%2C+Vol%2E+11%2C+No%2E+3%2C+pp%2E+529-555%2E" target="_blank">Google Scholar</ulink></para>
<para>[3] Chesbrough, H. (2006) Open Business Models. How to Thrive in the New Innovation Landscape, Harvard Business School Press. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B3%5D+Chesbrough%2C+H%2E+%282006%29+Open+Business+Models%2E+How+to+Thrive+in+the+New+Innovation+Landscape%2C+Harvard+Business+School+Press%2E" target="_blank">Google Scholar</ulink></para>
<para>[4] Drupa (2013) ***&#x201D;IDTechEx: Printed sensors market will increase by more than $1 billion by 2020,&#x201D; Drupa, http://www.drupa.com/cipp/md_drupa/custom/pub/content,oid,30443/lang,2/ticket,g_u_e_s_t/local_lang,2 <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B4%5D+Drupa+%282013%29+%2A%2A%2A%22IDTechEx%3A+Printed+sensors+market+will+increase+by+more+than+%241+billion+by+2020%2C%22+Drupa%2C+http%3A%2F%2Fwww%2Edrupa%2Ecom%2Fcipp%2Fmd%5Fdrupa%2Fcustom%2Fpub%2Fcontent%2Coid%2C30443%2Flang%2C2%2Fticket%2Cg%5Fu%5Fe%5Fs%5Ft%2Flocal%5Flang%2C2" target="_blank">Google Scholar</ulink></para>
<para>[5] Fogg, B. J. (2003). Persuasive technology: Using computers to change what we think and do. San Francisco, CA, USA: Morgan Kaufmann Publishers. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B5%5D+Fogg%2C+B%2E+J%2E+%282003%29%2E+Persuasive+technology%3A+Using+computers+to+change+what+we+think+and+do%2E+San+Francisco%2C+CA%2C+USA%3A+Morgan+Kaufmann+Publishers%2E" target="_blank">Google Scholar</ulink></para>
<para>[6] Fogg, B. J., &#x0026; Eckles, D. (Eds.). (2007). Mobile Persuasion: 20 Perspectives on the Future of Behavior Change. Stanford, California: Stanford Captology Media. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B6%5D+Fogg%2C+B%2E+J%2E%2C+%26+Eckles%2C+D%2E+%28Eds%2E%29%2E+%282007%29%2E+Mobile+Persuasion%3A+20+Perspectives+on+the+Future+of+Behavior+Change%2E+Stanford%2C+California%3A+Stanford+Captology+Media%2E" target="_blank">Google Scholar</ulink></para>
<para>[7] Fogg, B. J. 2012. Persuasive Technology Stanford University Press Persuasive Technologies.</para>
<para>[8] Intille Stephen S. (2004). A New Research Challenge: Persuasive Technology to Motivate Healthy Aging IEEE Transactions on Information Technology in Biomedicine, Vol. 8, No. 3, September 2004, 235. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B8%5D+Intille+Stephen+S%2E+%282004%29%2E+A+New+Research+Challenge%3A+Persuasive+Technology+to+Motivate+Healthy+Aging+IEEE+Transactions+on+Information+Technology+in+Biomedicine%2C+Vol%2E+8%2C+No%2E+3%2C+September+2004%2C+235%2E" target="_blank">Google Scholar</ulink></para>
<para>[9] Johansson Frans (2004), The concept of the Medici effect &#x2013; Breakthrough Insights at the Intersection of Ideas, Concepts, and Cultures Harvard Business School Press. ISBN 1591391865</para>
<para>[10] Horn Ole Rasmussen et al. (2016) How important are business model relations in innovation management? Preceedings &#x2013; ISPIM Innovation Forum forum.ispim.org Boston <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B10%5D+Horn+Ole+Rasmussen+et+al%2E+%282016%29+How+important+are+business+model+relations+in+innovation+management%B4+Preceedings+-+ISPIM+Innovation+Forum+forum%2Eispim%2Eorg+Boston" target="_blank">Google Scholar</ulink></para>
<para>[11] Ligthart, L. P. and Ramjee Prasad (2016) &#x201C;The Role of ICT for Multi-Diciplinary Applications in 2030 &#x2013; Conasense River Publisher.</para>
<para>[12] Lindgarth, Z et al. (2009) &#x201C;Business Model innovation &#x2013; When the game gets tough &#x2013; change the game&#x201D; Research carried out by Boston Consulting Group.</para>
<para>[13] Lindgren P., Morten Karn&#x00F8;e S&#x00F8;ndergaard, Mark Nelson, and B. J. Fogg (2013). Persuasive Business Models Journal of Multi Business Model Innovation and Technology, Vol. 1, 70&#x2013;98. River Publishers. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B13%5D+Lindgren+P%2E%2C+Morten+Karn%F8e+S%F8ndergaard%2C+Mark+Nelson%2C+and+B%2E+J%2E+Fogg+%282013%29%2E+Persuasive+Business+Models+Journal+of+Multi+Business+Model+Innovation+and+Technology%2C+Vol%2E+1%2C+70-98%2E+River+Publishers%2E" target="_blank">Google Scholar</ulink></para>
<para>[14] Lindgren P, and Annabeth Aagaard (2014). The Sensing Business Model Wireless Personal Communications May 2014, Volume 76, Issue 2, pp. 291&#x2013;309. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B14%5D+Lindgren+P%2C+and+Annabeth+Aagaard+%282014%29%2E+The+Sensing+Business+Model+Wireless+Personal+Communications+May+2014%2C+Volume+76%2C+Issue+2%2C+pp%2E+291-309%2E" target="_blank">Google Scholar</ulink></para>
<para>[15] Persuasive technology Conference Austria 2016. http://persuasive2016.org/</para>
<para>[16] Prasad Ramjee and Dr. Sudhir Dixit (2016) Beyond 2050 The Wireless World in 2050 and Beyond: A Window into the Future River Publisher &#x2013; Chapter xx <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B16%5D+Prasad+Ramjee+and+Dr%2E+Sudhir+Dixit+%282016%29+Beyond+2050+The+Wireless+World+in+2050+and+Beyond%3A+A+Window+into+the+Future+River+Publisher+-+Chapter+xx" target="_blank">Google Scholar</ulink></para>
<para>[17] Prasad R. (2014) &#x201C;5G and Beyond&#x201D; Springer Verlag.</para>
<para>[18] SW2010 Strategic Workshop 2010 held at Hotel Relais Certosa, Florence, Italy MAY 26&#x2013;28 , 2010 &#x2013; 12TH STRATEGIC WORKSHOP 2010 Distributed and Secure Cloud Clustering (DISC).</para>
<para>[19] SW2015 Strategic Workshop 2015 held at Villa Mondragone Via Frascati, 51, 00040 Monte Porzio Catone, Napoli Italy Human Bond Communications (HBC) Seventeenth Strategic Workshop (SW&#x2019;15) May 18&#x2013;20, 2015.</para>
<para>[20] Teece, D. J. (2010). Business models, business strategy and innovation. Long Range Planning, 45(2&#x2013;3), 172&#x2013;194. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B20%5D+Teece%2C+D%2E+J%2E+%282010%29%2E+Business+models%2C+business+strategy+and+innovation%2E+Long+Range+Planning%2C+45%282-3%29%2C+172-194%2E" target="_blank">Google Scholar</ulink></para>
<para>[21] Teece, D.J. 2015, &#x201C;Chapter 16 &#x2013; Technological Innovation and the Theory of the Firm: The Role of Enterprise-Level Knowledge, Complementarities, and (Dynamic) Capabilities&#x201D; in Handbook of the Economics of Innovation North-Holland, pp. 679&#x2013;730. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B21%5D+Teece%2C+D%2EJ%2E+2015%2C+%22Chapter+16+-+Technological+Innovation+and+the+Theory+of+the+Firm%3A+The+Role+of+Enterprise-Level+Knowledge%2C+Complementarities%2C+and+%28Dynamic%29+Capabilities%22+in+Handbook+of+the+Economics+of+Innovation+North-Holland%2C+pp%2E+679-730%2E" target="_blank">Google Scholar</ulink></para>
<para>[22] Zott, C., &#x0026; Amit, R. &#x0026; Massa, L. 2011 The business model: recent developments and future research &#x201C;Electronic copy available at: http: //ssrn.com/abstract=1674384&#x201D; <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B22%5D+Zott%2C+C%2E%2C+%26+Amit%2C+R%2E+%26+Massa%2C+L%2E+2011+The+business+model%3A+recent+developments+and+future+research+%22Electronic+copy+available+at%3A+http%3A+%2F%2Fssrn%2Ecom%2Fabstract%3D1674384%22" target="_blank">Google Scholar</ulink></para>
<para>[23] Zott, C. &#x0026; Amit, R. 2013, &#x201C;The business model: A theoretically anchored robust construct for strategic analysis&#x201D;, Strategic Organization, vol. 11, no. 4, pp. 403. <ulink url="https://scholar.google.com/scholar?hl=en&amp;q=%5B23%5D+Zott%2C+C%2E+%26+Amit%2C+R%2E+2013%2C+%22The+business+model%3A+A+theoretically+anchored+robust+construct+for+strategic+analysis%22%2C+Strategic+Organization%2C+vol%2E+11%2C+no%2E+4%2C+pp%2E+403%2E" target="_blank">Google Scholar</ulink></para>
</section>
<section class="lev1" id="sec14-7">
<title>About the Author</title>
<para><graphic xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="graphics/fig14_4.jpg" mime-subtype="jpeg"/></para>
<para><emphasis role="strong">Peter Lindgren</emphasis>, holds a full Professorship in Multi business model and Technology innovation at Aarhus University &#x2013; Business development and technology innovation and has researched and worked with network based high speed innovation since 2000. He is author to several articles and books about multi business model innovation in networks and Emerging Business Models. He has been researcher at Politechnico di Milano in Italy (2002/03) and Stanford University, USA (2010/11) and has in the time period 2007&#x2013;2010 been the founder and Center Manager of International Center for Innovation www.ici.aau.dk at Aalborg University. He works today as researcher in many different multi business model and technology innovations projects and knowledge networks among others E100 &#x2013; http://www.entovation.com/kleadmap/, Stanford University project Peace Innovation Lab http://captology.stanford.edu/projects/peace-innovation.html, The Nordic Women in business project &#x2013; www.womeninbusiness.dk/, The Center for TeleInFrastruktur (CTIF) at Aalborg University www.ctif.aau.dk, EU FP7 project about &#x201C;multi business model innovation in the clouds&#x201D; &#x2013; www.Neffics.eu. He is co-author to several books. He has an entrepreneurial and interdisciplinary approach to research and has initiated several Danish and International research programmes. He is one of the founders of MBIT research group and the CTIF Global Capsule.</para>
<para>His research interests are multi business model and technology innovation in networks, multi business model typologies and new global business models.</para></section>
</chapter>
</book>
