kth.sePublications
Change search
Refine search result
1234567 1 - 50 of 1505
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    Abbasi, Abdul Ghafoor
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    CryptoNET: Generic Security Framework for Cloud Computing Environments2011Doctoral thesis, monograph (Other academic)
    Abstract [en]

    The area of this research is security in distributed environment such as cloud computing and network applications. Specific focus was design and implementation of high assurance network environment, comprising various secure and security-enhanced applications. “High Assurance” means that

    -               our system is guaranteed to be secure,

    -               it is verifiable to provide the complete set of security services,

    -               we prove that it always functions correctly, and

    -               we justify our claim that it can not be compromised without user neglect and/or consent.

     

    We do not know of any equivalent research results or even commercial security systems with such properties. Based on that, we claim several significant research and also development contributions to the state–of–art of computer networks security.

    In the last two decades there were many activities and contributions to protect data, messages and other resources in computer networks, to provide privacy of users, reliability, availability and integrity of resources, and to provide other security properties for network environments and applications. Governments, international organizations, private companies and individuals are investing a great deal of time, efforts and budgets to install and use various security products and solutions. However, in spite of all these needs, activities, on-going efforts, and all current solutions, it is general belief that the security in today networks and applications is not adequate.

    At the moment there are two general approaches to network application’s security. One approach is to enforce isolation of users, network resources, and applications. In this category we have solutions like firewalls, intrusion–detection systems, port scanners, spam filters, virus detection and elimination tools, etc. The goal is to protect resources and applications by isolation after their installation in the operational environment. The second approach is to apply methodology, tools and security solutions already in the process of creating network applications. This approach includes methodologies for secure software design, ready–made security modules and libraries, rules for software development process, and formal and strict testing procedures. The goal is to create secure applications even before their operational deployment. Current experience clearly shows that both approaches failed to provide an adequate level of security, where users would be guaranteed to deploy and use secure, reliable and trusted network applications.

    Therefore, in the current situation, it is obvious that a new approach and a new thinking towards creating strongly protected and guaranteed secure network environments and applications are needed. Therefore, in our research we have taken an approach completely different from the two mentioned above. Our first principle is to use cryptographic protection of all application resources. Based on this principle, in our system data in local files and database tables are encrypted, messages and control parameters are encrypted, and even software modules are encrypted. The principle is that if all resources of an application are always encrypted, i.e. “enveloped in a cryptographic shield”, then

    -               its software modules are not vulnerable to malware and viruses,

    -               its data are not vulnerable to illegal reading and theft,

    -               all messages exchanged in a networking environment are strongly protected, and

    -               all other resources of an application are also strongly protected.

     

    Thus, we strongly protect applications and their resources before they are installed, after they are deployed, and also all the time during their use.

    Furthermore, our methodology to create such systems and to apply total cryptographic protection was based on the design of security components in the form of generic security objects. First, each of those objects – data object or functional object, is itself encrypted. If an object is a data object, representing a file, database table, communication message, etc., its encryption means that its data are protected all the time. If an object is a functional object, like cryptographic mechanisms, encapsulation module, etc., this principle means that its code cannot be damaged by malware. Protected functional objects are decrypted only on the fly, before being loaded into main memory for execution. Each of our objects is complete in terms of its content (data objects) and its functionality (functional objects), each supports multiple functional alternatives, they all provide transparent handling of security credentials and management of security attributes, and they are easy to integrate with individual applications. In addition, each object is designed and implemented using well-established security standards and technologies, so the complete system, created as a combination of those objects, is itself compliant with security standards and, therefore, interoperable with exiting security systems.

    By applying our methodology, we first designed enabling components for our security system. They are collections of simple and composite objects that also mutually interact in order to provide various security services. The enabling components of our system are:  Security Provider, Security Protocols, Generic Security Server, Security SDKs, and Secure Execution Environment. They are all mainly engine components of our security system and they provide the same set of cryptographic and network security services to all other security–enhanced applications.

    Furthermore, for our individual security objects and also for larger security systems, in order to prove their structural and functional correctness, we applied deductive scheme for verification and validation of security systems. We used the following principle: “if individual objects are verified and proven to be secure, if their instantiation, combination and operations are secure, and if protocols between them are secure, then the complete system, created from such objects, is also verifiably secure”. Data and attributes of each object are protected and secure, and they can only be accessed by authenticated and authorized users in a secure way. This means that structural security properties of objects, upon their installation, can be verified. In addition, each object is maintained and manipulated within our secure environment so each object is protected and secure in all its states, even after its closing state, because the original objects are encrypted and their data and states stored in a database or in files are also protected.

    Formal validation of our approach and our methodology is performed using Threat Model. We analyzed our generic security objects individually and identified various potential threats for their data, attributes, actions, and various states. We also evaluated behavior of each object against potential threats and established that our approach provides better protection than some alternative solutions against various threats mentioned. In addition, we applied threat model to our composite generic security objects and secure network applications and we proved that deductive approach provides better methodology for designing and developing secure network applications. We also quantitatively evaluated the performance of our generic security objects and found that the system developed using our methodology performs cryptographic functions efficiently.

    We have also solved some additional important aspects required for the full scope of security services for network applications and cloud environment: manipulation and management of cryptographic keys, execution of encrypted software, and even secure and controlled collaboration of our encrypted applications in cloud computing environments. During our research we have created the set of development tools and also a development methodology which can be used to create cryptographically protected applications. The same resources and tools are also used as a run–time supporting environment for execution of our secure applications. Such total cryptographic protection system for design, development and run–time of secure network applications we call CryptoNET system. CrytpoNET security system is structured in the form of components categorized in three groups: Integrated Secure Workstation, Secure Application Servers, and Security Management Infrastructure Servers. Furthermore, our enabling components provide the same set of security services to all components of the CryptoNET system.

    Integrated Secure Workstation is designed and implemented in the form of a collaborative secure environment for users. It protects local IT resources, messages and operations for multiple applications. It comprises four most commonly used PC applications as client components: Secure Station Manager (equivalent to Windows Explorer), Secure E-Mail Client, Secure Web Browser, and Secure Documents Manager. These four client components for their security extensions use functions and credentials of the enabling components in order to provide standard security services (authentication, confidentiality, integrity and access control) and also additional, extended security services, such as transparent handling of certificates, use of smart cards, Strong Authentication protocol, Security Assertion Markup Language (SAML) based Single-Sign-On protocol, secure sessions, and other security functions.

    Secure Application Servers are components of our secure network applications: Secure E-Mail Server, Secure Web Server, Secure Library Server, and Secure Software Distribution Server. These servers provide application-specific services to client components. Some of the common security services provided by Secure Application Servers to client components are Single-Sign-On protocol, secure communication, and user authorization. In our system application servers are installed in a domain but it can be installed in a cloud environment as services. Secure Application Servers are designed and implemented using the concept and implementation of the Generic Security Server. It provides extended security functions using our engine components. So by adopting this approach, the same sets of security services are available to each application server.

    Security Management Infrastructure Servers provide domain level and infrastructure level services to the components of the CryptoNET architecture. They are standard security servers, known as cloud security infrastructure, deployed as services in our domain level could environment.

    CryptoNET system is complete in terms of functions and security services that it provides. It is internally integrated, so that the same cryptographic engines are used by all applications. And finally, it is completely transparent to users – it applies its security services without expecting any special interventions by users. In this thesis, we developed and evaluated secure network applications of our CryptoNET system and applied Threat Model to their validation and analysis. We found that deductive scheme of using our generic security objects is effective for verification and testing of secure, protected and verifiable secure network applications.

    Based on all these theoretical research and practical development results, we believe that our CryptoNET system is completely and verifiably secure and, therefore, represents a significant contribution to the current state-of-the-art of computer network security.

    Download full text (pdf)
    FULLTEXT01
  • 2.
    Abbasi, Abdul Ghafoor
    et al.
    KTH, School of Industrial Engineering and Management (ITM), Machine Design (Dept.), Machine Elements.
    Muftic, Sead
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    CryptoNET: Security Management Protocols2010In: ADVANCES IN DATA NETWORKS, COMMUNICATIONS, COMPUTERS / [ed] Mastorakis, NE; Mladenov, V, ATHENS: WORLD SCIENTIFIC AND ENGINEERING ACAD AND SOC , 2010, p. 15-20Conference paper (Refereed)
    Abstract [en]

    In this paper we describe several network security protocols used by various components of CryptoNET architecture. The protocols are based on the concept of generic security objects and on well-established security standards and technologies. Distinctive features of our security protocols are: (1) they are complete in terms of their functionality, (2) they are easy to integrate with applications, (3) they transparently handle security credentials and protocol-specific attributes using FIPS 201 (PIV) smart cards, and (4) they are based on generic security objects. These protocols are: remote user authentication protocol, single-sign-on protocol, SAML authorization protocol, and secure sessions protocol. Security protocols use our Security Provider as a collection of cryptographic engines implemented either in software or using FIPS 201 (NV) smart cards. It also manages protocols' attributes using security applets stored in Ply smart card.

  • 3.
    Abdullah, Nazri
    et al.
    Universiti Tun Hussien Onn Malaysia, Malaysia .
    Kounelis, Ioannis
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Muftic, Sead
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Security Extensions for Mobile Commerce Objects2014In: SECURWARE 2014, The Eighth International Conference on Emerging Security Information, Systems and Technologies, 2014Conference paper (Refereed)
    Abstract [en]

    Electronic commerce and its variance mobile commerce have tremendously increased their popularity in the last several years. As mobile devices have become the most popular mean to access and use the Internet, mobile commerce and its security are timely and very hot topics. Yet, today there is still no consistent model of various m–commerce applications and transactions, even less clear specification of their security. In order to address and solve those issues, in this paper, we first establish the concept of mobile commerce objects, an equivalent of virtual currencies, used for m–commerce transactions. We describe functionalities and unique characteristics of these objects; we follow with security requirements, and then offer some solutions – security extensions of these objects. All solutions are treated within the complete lifecycle of creation and use of the m–commerce objects.

  • 4. Abeywickrama, S.
    et al.
    Furdek, Marija
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab). University of Zagreb, Faculty of Electrical Engineering and Computing, Dept. of Telecommunications, Croatia.
    Monti, Paolo
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Wosinska, Lena
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Nag, A.
    Wong, E.
    Dual-homing based protection for enhanced network availability and resource efficiency2014In: Asia Communications and Photonics Conference, ACP, Optica Publishing Group , 2014Conference paper (Refereed)
    Abstract [en]

    An approach to enhance core network survivability by utilizing dual-homing capabilities of the access network. Results reveal significant improvements in core network resource utilization and connection availability, suggesting benefits to network operators and service providers.

  • 5. Abeywickrama, S.
    et al.
    Wong, E.
    Furdek, Marija
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Monti, Paolo
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Wosinska, Lena
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Energy-efficient survivability for core networks using dual-homing2015In: Asia Communications and Photonics Conference, ACPC 2015, 2015Conference paper (Refereed)
    Abstract [en]

    This paper studies the energy efficiency of exploiting dual-homing in access network to provide core network survivability. Simulation results show reduced number of utilized wavelengths, suggesting significant energy saving opportunities in the core network. 

  • 6. Abeywickrama, Sandu
    et al.
    Furdek, Marija
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Monti, Paolo
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Wosinska, Lena
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Wong, Elaine
    Protecting core networks with dual-homing: A study on enhanced network availability, resource efficiency, and energy-savings2016In: Optics Communications, ISSN 0030-4018, E-ISSN 1873-0310, Vol. 381, p. 327-335Article in journal (Refereed)
    Abstract [en]

    Core network survivability affects the reliability performance of telecommunication networks and remains one of the most important network design considerations. This paper critically examines the benefits arising from utilizing dual-homing in the optical access networks to provide resource-efficient protection against link and node failures in the optical core segment. Four novel, heuristic-based RWA algorithms that provide dedicated path protection in networks with dual-homing are proposed and studied. These algorithms protect against different failure scenarios (i.e. single link or node failures) and are implemented with different optimization objectives (i.e., minimization of wavelength usage and path length). Results obtained through simulations and comparison with baseline architectures indicate that exploiting dual-homed architecture in the access segment can bring significant improvements in terms of core network resource usage, connection availability, and power consumption.

  • 7.
    Abtahi, Farzad
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Cavdar, Cicek
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Chen, Jiajia
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Khanmohamadi, Sahar
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Wosinska, Lena
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Mantelet, G.
    Archambault, E.
    Tremblay, C.
    Bélanger, M. P.
    Optimal Design of Cost- and Energy-Efficient Scalable Passive Optical Backbone Networks2012In: 2012 Asia Communications And Photonics Conference (ACP), 2012, p. AS3D.4-Conference paper (Refereed)
    Abstract [en]

    We propose an optimization model minimizing number of wavelengths in passive optical backbone networks and obtaining the same resource usage as in networks based on active switching while reducing both cost and power consumption.

  • 8.
    Adigozalov, Niyaz
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab).
    The Intelligent Use of Multiple Interfaces: Using multiplexing to reduce the overhead for small packets2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Long-Term Evolution (LTE) is the latest development in wide area cellular mobile network technology. In contrast with the earlier generations of circuit-switched mobile networks, LTE is all-IP packet-switched network. Both voice and data are sent inside IP packets. Voice over IP (VoIP) is used to provide voice service to LTE users. The speech frames are encapsulated into real-time protocol (RTP) packets and sent over the network. The underlying UDP and IP layers prepend their headers to this small RTP packet resulting in a relatively high overhead. The small size of the RTP packets containing voice/audio leads to an overhead problem as the protocol overhead is in addition to the large LTE frame overhead, thus wasting network resources. This master’s thesis project proposes to multiplex RTP and data packets at the user’s device as a solution to reduce the overhead. Moreover, the capability of modern user devices to switch between several interfaces (such as LTE and WLAN), is taken into account and the multiplexing of multiple traffic flows or a single traffic flow are studied in the case of a vertical handover. Performance and cost metrics are used to evaluate different potential demultiplexing points, and then the best possible demultiplexing point is identified. The results of this evaluation show that several demultiplexing points can be used based on the operator’s needs. The increased packet payload size increases the energy efficiency of LTE and may avoid the need of the UE to switch to WLAN to save power. In addition, to ensure high quality of service for VoIP traffic, the simultaneous use of multiple interfaces is efficient if the multiplexer is enabled. The multiplexing solution proposed by this thesis is also fully compatible with any virtual private network encapsulation protocol.

    Download full text (pdf)
    fulltext
  • 9.
    Agevik, Niklas
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Shared UMTS Networks - A Techno-Economic Study on Mobile Network Operators’ Possibilities to Deliver Unique Products and Services2005Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Historically, there has been a one-to-one mapping between a mobile network and the reseller of the network’s services. Recent developments challenge this model. Virtual operators have emerged in GSM networks and during the rollout of UMTS networks, many operators built shared UMTS networks. This study analyses the impact of shared networks on the mobile network operators’ abilities to deliver unique products and services to their customers. Four sharing models that are in use today are analysed and presented in detail. These are site sharing, geographical split networks, shared RAN and spectrum sharing.

    The research in this study has been done in two steps. In the first step, possible differentiation opportunities are identified through literature studies and interviews with key persons at network operators, equipment manufacturers, business analysts and the Swedish national post and telecom agency. In the second step, this study compares the implementation of these opportunities in the four forms of shared networks with their implementations in a wholly owned network. The opportunities are grouped in three categories: products, quality of service differentiation and multiaccess networks.

    By setting quality of service attributes on bearers, such as latency and the attention/retention policy, quality of service differentiation is a possibility in common shared networks and geographical split networks. Although unlicensed access technologies, such as WLAN standards, can provide coverage differentiation in one sense, this study shows that this is not economical compared to UMTS pico-cells.

    The study finds that implementing features in the underlying network requires extensive cooperation between operators in all sharing models except for site sharing. Certain services require quality of service parameters that are mutually exclusive without over-provisioning in terms of network resources. Such parameters include for example latency and capacity. Even though the 3GPP UMTS standard allow for a separation of the service creation layer and the underlying network, this study argues that many services will still be dependent upon network features, thus mitigating the advantage of developing services in the unshared domain.

  • 10.
    Agnihotri, Mohit
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Chirikov, R.
    Militano, F.
    Cavdar, C.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Topology Formation in mesh networks considering Role Suitability2016In: 2016 IEEE Wireless Communications and Networking Conference Workshops, WCNCW 2016, Institute of Electrical and Electronics Engineers (IEEE), 2016, p. 421-427Conference paper (Refereed)
    Abstract [en]

    The paper studies various mesh topology formation techniques that can be used to aid the development of large-scale capillary networks. The work focuses on how mesh networks can be established using Bluetooth Low Energy exploiting the heterogeneous characteristics of the devices in the network. A novel algorithm called Topology Formation considering Role Suitability (TFRS) is proposed aiming to maximize the network lifetime. The algorithm employs a newly introduced metric called role suitability metric (RSM) to assign the best role among master, relay and slave to a participating device. The RSM metric is computed from device characteristics including, but not limited to, energy, mobility and computational capability. We use system-level simulation to evaluate the performance of the proposed algorithm against a reference under a homogeneous deployment scenario consisting of heterogeneous devices. Results show that the network lifetime can be improved significantly when the topology is formed considering the device characteristics for both master role selection and relay selection. TFRS can achieve 20% to 40% higher network lifetime depending on the deployment characteristics over the reference algorithm.

  • 11.
    Agnihotri, Mohit
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Chirikov, R.
    Militano, F.
    Cavdar, Cicek
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Topology formation in mesh networks considering role suitability2016In: IEEE Wireless Communications and Networking Conference, WCNC, IEEE, 2016Conference paper (Refereed)
    Abstract [en]

    The paper studies various mesh topology formation techniques that can be used to aid the development of large-scale capillary networks. The work focuses on how mesh networks can be established using Bluetooth Low Energy exploiting the heterogeneous characteristics of the devices in the network. A novel algorithm called Topology Formation considering Role Suitability (TFRS) is proposed aiming to maximize the network lifetime. The algorithm employs a newly introduced metric called role suitability metric (RSM) to assign the best role among master, relay and slave to a participating device. The RSM metric is computed from device characteristics including, but not limited to, energy, mobility and computational capability. We use systemlevel simulation to evaluate the performance of the proposed algorithm against a reference under a homogeneous deployment scenario consisting of heterogeneous devices. Results show that the network lifetime can be improved significantly when the topology is formed considering the device characteristics for both master role selection and relay selection. TFRS can achieve 20% to 40% higher network lifetime depending on the deployment characteristics over the reference algorithm.

  • 12.
    Aguilar, Antonio
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    A Patient Identification System using RFID and IEEE 802.11b Wireless Networks2007Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The recent increased focus on patient safety in hospitals has yielded a flood of new technologies and tools seeking to improve the quality of patient care at the point of care. Hospitals are complex institutions by nature, and are constantly challenged to improve the quality of healthcare delivered to patients while trying to reduce the rate of medical errors and improve patient safety. Here a simple mistake such as patient misidentification, specimen misidentification, wrong medication, or wrong blood transfusion can cause the loss of a patient’s life. Misidentification of patients is a common problem that many hospitals face on the daily basis. Patient misidentification is one of the leading causes of medical errors and medical malpractice in hospitals and it has been recognised as a serious risk to patient safety.

    Recent studies have shown that an increasing number of medical errors are primarily caused by adverse drug events which are caused directly or indirectly by incorrect patient identification. In recognition of the increasing threat to patient safety, it is important for hospitals to prevent these medical errors from happening by adopting a suitable patient identification system that can improve upon current safety procedures.

    The focus of this master’s thesis is the design, implementation, and evaluation of a handheld-based patient identification system that uses radio frequency identification (RFID) and IEEE 802.11b wireless local area networks to identify patients. In this solution, each patient is given a RFID wristband which contains demographic information (patient ID number, ward number, hospital code, etc.) of the patient. A handheld device equipped with IEEE 802.11b wireless local area network connectivity and a RFID reader is then used by the medical staff to read the patient’s wristband, identify the patient, and access the relevant records of this patient.

    This work was carried out at the Department of Medical Physics and Bioengineering at the University College Hospital Galway (UCHG), Ireland and the National University of Ireland, Galway.

    Download full text (pdf)
    fulltext
  • 13.
    Aguilar, Antonio
    et al.
    Digital Enterprise Research Institute, National University of Ireland, Galway, Ireland.
    van der Putten, Wil
    Department of Medical Physics, University College Hospital Galway, Galway, Ireland .
    Maguire Jr., Gerald Q.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab).
    Positive Patient Identification using RFID and Wireless  Networks2006In: Proceedings of the HISI 11th Annual Conference and Scientific Symposium, Dublin, Ireland, Dublin, Ireland, 2006Conference paper (Refereed)
    Abstract [en]

    The increased focus on patient safety in hospitals has yielded a flood of new technologies and tools seeking to improve the quality of patient care at the point-of-care. Hospitals are complex institutions by nature, and are constantly challenged to improve the quality of healthcare delivered to patients while trying to reduce the rate of medical errors and improve patient safety. Here a simple mistake such as patient misidentification, specimen misidentification, wrong medication, or wrong blood transfusion can cause the loss of a patient's life. The focus of this paper is the implementation and evaluation of a handheld-based patient identification system that uses radio frequency identification (RFID) and 802.11b wireless networks to identify patients. In this approach, each patient is given a RFID wristband which contains demographic information (patient ID number, patient summary, hospital code) of the patient. A handheld device equipped with 802.11b wireless connectivity and a RFID reader is then used by the medical staff to read the patient's wristband and identify the patient. This work was carried out at the Department of Medical Physics and Bioengineering at the University College Hospital Galway, Ireland and in co-operation with the National University of Ireland, Galway.

  • 14.
    Agüero, Ramón
    et al.
    University of Cantabria, Spain.
    Berg, Miguel
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Choque, Johnny
    University of Cantabria, Spain.
    Hultell, Johan
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Jennen, Ralf
    RWTH Aachen University, Germany.
    Markendahl, Jan
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS. KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Muñoz, Luis
    University of Cantabria, Spain.
    Prytz, Mikael
    Ericsson Research.
    Strandberg, Ove
    Nokia, Finland.
    RRM Challenges for Non-Conventional and Low-Cost Networks in Ambient Networks2005Conference paper (Refereed)
    Abstract [en]

    This paper presents an overview of the Radio Resource Management (RRM) functionalities needed for Non-Conventional and Low-Cost Networks. These types of networks are characterized by increased cooperation between different types of networks and providers and they are believed to play a fundamental role for future wireless network networking. The paper describes three specific concepts, which latter is used to identify new RRM challenges. In addition, it identifies the relation between the RRM challenges and the Ambient Networks architecture and functionalities, in particular the multiradio resource management functionality.

  • 15. Ahlberg, M.
    et al.
    Lindmark, B.
    Simons, J.
    Beckman, Claes
    KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth. KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Downlink propagation measurements in the GSM 900 and 1800 MHz bands1999In: IEEE Antennas and Propagation Society International Symposium. 1999 Digest. Held in conjunction with: USNC/URSI National Radio Science Meeting (Cat. No.99CH37010), 1999, Vol. 3, p. 1506-1509 vol.3Conference paper (Refereed)
    Abstract [en]

    The authors investigate radio propagation in the GSM 900 and 1800 MHz bands in a typical Swedish suburban environment to determine whether or not it is practically feasible to co-site GSM 900 with GSM 1800 systems. They show that propagation in the GSM 1800 band is considerable higher (about 12 dB) than in the old GSM 900. In many cases this difference can be reduced by using dual band sector antennas with 3 dB higher gain at 1800 MHz. However, they also show that in small cells (radius <1000 m) this difference is of little concern and therefore it is possible to co-locate GSM 1800 sites within existing 900 MHz sites as a cost-effective way to increase the system capacity.

  • 16. Ahlgren, B.
    et al.
    Hidell, Markus
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Network Systems Laboratory (NS Lab).
    Ngai, E. C. -H
    Internet of Things for Smart Cities: Interoperability and Open Data2016In: IEEE Internet Computing, ISSN 1089-7801, E-ISSN 1941-0131, Vol. 20, no 6, p. 52-56, article id 7781549Article in journal (Refereed)
    Abstract [en]

    The Internet of Things (IoT) has become a promising technology for addressing societal challenges by connecting smart devices and leveraging Big Data analytics to create smart cities worldwide. As the IoT scales up, it's important to provide interoperability among different devices. Yet current simple standard protocols lack sufficient openness and interoperability. IoT for smart cities needs to guarantee the accessibility of open data and cloud services to allow industries and citizens to develop new services and applications. Here, the authors provide a case study of the GreenIoT platform in Uppsala, Sweden, to demonstrate the idea of interoperability and open data for smart cities.

  • 17.
    Ahlin, Lars
    et al.
    FOI.
    Zander, Jens
    KTH, School of Information and Communication Technology (ICT).
    Ben Slimane, Slimane
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Principles of Wireless Communications2006Book (Refereed)
    Abstract [en]

    This textbook provides the reader with a basic understanding of the design and analysis of wireless and mobile communication systems. It deals with the most important techniques, models and tools used today in the design of mobile wireless links and gives an introduction to the design of wireless networks. Topics covered include: fundamentals of radio propagation and antennas; transmission schemes, including modulation, coding and equalising schemes for broadband wireless communications; diversity systems; wireless data transmission; introduction to Wireless Network design and resource management. The fundamentals are illustrated by examples from state-of-the-art technologies such as OFDM, WCDMA, WLANs and others. The book contains a significant number of worked examples and more than 160 problems with answers. It is intended for use in a first graduate course in wireless communications and the reader should be familiar with the fundamentals of probability and communication theory.

  • 18.
    Ahmed, Ashraf Awadelkarim Widaa
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab).
    Towards Affordable Provisioning Strategies for Local Mobile Services in Dense Urban Areas: A Techno-economic Study2017Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    The future mobile communication networks are expected to cope with growing local usage patterns especially in dense urban areas at more affordable deployment and operation expenses. Beyond leveraging small cell architectures and advanced radio access technologies; more radio spectrum are expected to be required to achieve the desired techno-economic targets. Therefore, the research activity has been directed towards discussing the benefits and needs for more flexible and local spectrum authorization schemes. This thesis work is meant to be a contribution to this ongoing discussion from a techno-economic perspective.

     

    In chapter three, the engineering value of the different flexible authorization options are evaluated from the perspective of established mobile network operators using the opportunity cost approach. The main results in chapter three indicate the economic incentives to deploy more small cells based on flexible spectrum authorization options are subject to the potential saving in the deployment and operation costs. Nonetheless; high engineering value can be anticipated when the density of small cells is equal or larger than the active mobile subscribers’ density.

     

    While in chapter four, the possible local business models around different flexible authorization options are investigated from the perspective of emerging actors with limited or ’no’ licensed spectrum resources. In this context, dependent or independent local business can be identified according to surrounding spectrum regulations. On possible independent local business models for those emerging actors is to exploit the different flexible spectrum authorization options to provision tailored local mobile services. Other viable dependent local business models rest with the possibility to enter into different cooperation agreements to deploy and operate dedicated local mobile infrastructure on behalf established mobile network operators.

    Download full text (pdf)
    fulltext
  • 19.
    Ahmed, Ashraf Awadelkarim Widaa
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Chatzimichail, Konstantinos
    KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Markendahl, Jan
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Cavdar, Cicek
    KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Techno-economics of Green Mobile Networks Considering Backhauling2014In: 20th European Wireless Conference, EW 2014, Barcelona: VDE Verlag GmbH, 2014, p. 415-6Conference paper (Refereed)
    Abstract [en]

    In this paper we consider a comparative analysis of different deployment solutions in terms of total cost of ownership (TCO) and impact of energy efficiency as a cost parameter, i.e. mobile operator's electric bill. Different deployment options for the wireless segment of the network are considered: macro only versus heterogeneous networks with femto cells to support indoor traffic demand. In addition to the wireless segment different technologies for the backhauling segment are also considered: microwave versus fiber (10G-PON). Considering different user traffic intensities in an urban area and different environments such as business and residential areas, the impact of energy consumption on the TCO has been analyzed. The scope of the paper is extended to compare different backhaul technologies considering the annual increase in the traffic demand up to year 2020. The obtained results indicate that the impact of electric bill becomes more significant over the TCO especially after year 2018. Moreover, the heterogeneous deployment strategy utilizing indoor femto-cells achieves significant savings in terms of electric bill and TCO compared to the macro only solution. However, the saving ratio varies according to the adopted backhauling technology.

  • 20.
    Ahmed, Ashraf Awadelkarim Widaa
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Markendahl, Jan
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Impact of the flexible spectrum aggregation schemes on the cost of future mobile network2015In: 2015 22nd International Conference on Telecommunications, ICT 2015, IEEE conference proceedings, 2015, p. 96-101Conference paper (Refereed)
    Abstract [en]

    Nowadays the spectrum regulations landscape is changing towards more flexible spectrum management schemes, such trends are expected to make additional spectrum resources available and lowers the spectrum access hurdles. In this paper, different spectrum aggregation scenarios have been compared focusing on the tradeoff between the total cost of ownership and the targeted QoS under different market conditions. The main finding in this study thereof indicates that the addition of more spectrum resources will lead to an overall reduction in the total cost of ownership (TCO) as long as the spectrum price remains small compared to the cost of the network infrastructure. Moreover, schemes such as LSA and secondary access will enable operators who have insufficient licensed spectrum resource to expand their mobile network infrastructure especially in hotspots with high subscribers demand in a cost-effective way. In this regard, the harmonization of spectrum use for LSA and TVWS across multiple countries stands as a key requirement for the reduction of the production cost of equipment and hence, the creation of an economy of scale considering both of the network equipment (i.e. radio base station) and end-subscriber devices. 

  • 21.
    Ahmed, Ashraf Awadelkarim Widaa
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Markendahl, Jan
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS. KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Cavdar, Cicek
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Interplay Between Cost,Capacity and Power Consumption in Heterogeneous Mobile Networks2014In: 2014 21st International Conference on Telecommunications, ICT 2014, Lisbon: IEEE Press, 2014, , p. 5p. 98-102Conference paper (Refereed)
    Abstract [en]

    Mobile operators nowadays tend to deploy dense heterogeneous layers of 3G and 4G networks in outdoor and indoor environments by adding more macrocells and small cells (e.g. microcells, picocells and femtocells) in response to the increasing demand for coverage and capacity. Another main driver and enabler behind this tendency is the phenomenon that around 80% of power consumption in mobile communication networks stems from the radio base stations. This situation makes mobile operators opt for the use of lowpower radio base stations to provide better coverage, capacity and an environmentally-friendly operation. In this paper the interplay between the deployment costs, targeted QoS and power consumptions have been studied considering two deployment options for the provisioning of the required mobile broadband coverage and capacity; namely the heterogeneous network (HetNet) option versus the homogenous macrocell deployment option. The main findings indicate that, the perceived saving in the total cost of ownership (TCO) resulting from offloading percentage of network traffic to indoor smallcell, in the case of HetNet, is bounded by the mobile subscriber density per area, their usage patterns, the adopted backhaul solution and the used spectrum resources. In general, a quite paying cost and power saving can be achieved by the heterogonous deployment solution for scenarios with high demand levels especially when there is a need to use the spectrum resources more efficiently.

  • 22.
    Ahmed, Ashraf Awadelkarim Widaa
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Markendahl, Jan
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Cavdar, Cicek
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Ghanbari, Amirhossein
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Study on the effects of backhual solutions on indoor mobile deployment "macrocell vs. femtocell"2013In: 2013 IEEE 24th International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), IEEE conference proceedings, 2013, p. 2444-2448Conference paper (Refereed)
    Abstract [en]

    The deployment of low cost and low power base stations has been recognized in recent years as a promising cost-efficient solution and energy-efficient strategy. In this paper the femtocell and macrocell deployment options have been compared in the context of indoor mobile broadband deployment, with focus on the effect of different backhauling solutions in power consumption and the total deployment cost. This study has been based on the deployment of mobile broadband services within an area of one square kilometers in a new densely populated business district where the different user demands, spectrum bandwidths, backhaul technologies and radio access technologies are taken into account. Moreover, various deployment scenarios reflecting the business perspectives of mobile operators have been looked into as well. The main findings reached indicate that backhaul solutions contribute differently to cost and power consumption depending on the employed deployment strategy. However, contributions to the total power consumption and to the CapEx and OpEx elements of the total deployment cost elements turned to be more significant in the case of femtocell deployment scenarios than in the case of macrocell ones. It is worthy of notice that the femtocell deployment is more cost-efficient, especially in high demand situation when new macro sites are needed to be deployed.

  • 23.
    Ahmed, Ashraf Awadelkarim Widaa
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Markendahl, Jan
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Ghanbari, Amirhossein
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Evaluation of Spectrum Access Options for Indoor Mobile Network Deployment2013In: 2013 IEEE 24th International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC Workshops), IEEE , 2013, p. 138-142Conference paper (Refereed)
    Abstract [en]

    The investments in indoor mobile networks are highly related to the spectrum availability and its associated authorization options. The aim of this paper is to discuss the differences in the spectrum demand taking into consideration both wide and local area network deployment requirements and the kind of actor that provides the indoor wireless access. The analysis covers different authorizations options namely licensed, unlicensed, licensed shared access (LSA) and secondary access. A quantitative approach is used to analyze the differences between macrocell and femtocell deployments focusing on deployment cost and spectrum demand. This is complemented by a qualitative study to explore and discuss the strategic business decisions of different actors in view of the available spectrum bands and spectrum authorization options. The main conclusions from this study are; spectrum has more value in macrocell deployment scenarios than in femtocell ones. More spectrum in macrocell deployment scenarios means that operators can deploy less number of new sites and exploit previous infrastructure investments. Femtocell networks are often coverage limited which allows for frequency re-use. As a consequence, the value of spectrum is not the same for mobile network operators (MNOs) and for local network operator (LNOs). MNOs are traditionally confined to macrocell deployment strategies which entail the exclusive usage of licensed bands. While, the use of licensed spectrum by LNOs may incur more cost than the cost of infrastructure deployment. This explains why the use of unlicensed bands is lucrative and viable for LNOs. Furthermore, the LSA scheme may or could soon become an enabler for LNO's business due to the prevailing technical, regulation and policies developments.

  • 24.
    Ahmed, Ashraf Awadelkarim Widaa
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Markendahl, Jan
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Ghanbari, Amirhossein
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Investment strategies for different actors in indoor mobile market: "in view of the emerging spectrum authorization schemes"2013In: 24th European Regional Conference of the International Telecommunication Society, Florence, Italy, 20-23 October 2013, 2013Conference paper (Refereed)
    Abstract [en]

    The regulatory landscape is changing towards more flexible spectrum management schemes. Such schemes are expected to make additional spectrum resources available and lower the spectrum access barriers. Emerging spectrum authorization schemes such as secondary access (TV White Space) and Licensed Shared Access (LSA) are expected to open doors for new actors rather than traditional MNOs to access licensed spectrum resources at reasonable costs. These schemes will allow actors such as Facility Owners (FO), Mobile Virtual Network Operators (MVNO) and Internet Service Providers (ISPs) to invest in indoor mobile network infrastructure. These actors can act as Local Network Operators (LNO) and build their business models around provisioning of mobile services in locations where there seems to be a hole or lack of service coverage in a particular area within the mobile network operators (MNOs) service footprint. This paper highlights the differences between indoor deployment and outdoor deployment in the light of the available spectrum bands to be used and the possible business models for MNOs and LNOs. In short, the possible investment strategies for provisioning indoor mobile services vary between MNOs and LNOs cases due to economic and regulatory aspects surrounding them. The main finding in this study indicates that the willingness of MNOs to invest in dedicated indoor solutions is driven by the balance between the potential revenues and the deployment cost. Moreover MNOs have more spectrum and investment options compared to LNOs who must bond their investment strategies to the available spectrum resources (i.e. the regulations of spectrum access).

  • 25.
    Ahmed, Ashraf Awadelkarim Widaa
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Markendahl, Jan
    KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth. KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab).
    Ghanbari, Amirhossein
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    The Incentives and Challenges of Delivering Linear Broadcasting Services over Cellular Network in Developing Countries: Sudan as Case study2014In: The 25th European Regional Conference of the International Telecommunications Society,Brussels, Belgium, 22nd - 25th June 2014, Brussels: nternational Telecommunications Society , 2014Conference paper (Other academic)
    Abstract [en]

    The Broadcasting sector has been evolved in terms of service production, transmission platform and reception devices in the last few decades. In contrast to cable and satellite platform, which are suitable for fixed reception only, the terrestrial digital platform can support portable, mobile and fixed reception scenarios. In general, there are two options of mobile multimedia service; one is based on a mobile communication network with IP cast known as MBMS (Multimedia Broadcast Multicast Services), while the other is based on broadcast technology. In the context of convergence, the players in the mobile sector argues that unlike traditional mobile  network systems, where the use was restricted to a given application, emerging  mobile networks will be able to carry a variety of services and accordingly separate broadcasting networks will no longer be required. In line with argument, it is not economically viable to roll out dedicated wireless broadband networks by the broadcasters to meet the increasing demand for interactive broadcasting services. That is why the broadcasters may look for innovative mechanism to deliver the broadcast services over mobile broadband network owned by the telecommunication operators.

    The focus on this paper is to investigate the incentives and challenges for such trend in developing countries; taking Sudan as case study. The main conclusion in this paper indicate that a potential economic incentive for delivering the broadcasting service over cellular network in Sudan subject to the deployment of high efficient mobile network. Moreover, the mobile operators may consider support such approach considering the increase demand for additional frequency resource.  However, the key challenges remain in how to develop a suitable regulations landscape to assure fair and competitive business practices on hand while guaranteeing the continuation of the public broadcasting service. In this regard, a new regulation framework needs to be developed to separate the three key functions in digital terrestrial broadcasting value chain (namely the content production and distribution). Further on, the necessary interconnection regulations need to put on place in order to pave the way for rollout of common platform that are necessary for interactive and nonlinear services. 

    Download full text (pdf)
    fulltext
  • 26.
    Ahmed, Ashraf Awadelkarim Widaa
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Markendahl, Jan
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Ghanbari, Amirhossein
    KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Toward capacity-efficient, cost-efficient and power-efficient deployment strategy for indoor mobile broadband2013In: 24th European Regional ITS Conference, Florence 2013, 2013Conference paper (Refereed)
    Abstract [en]

    Mobile operators nowadays tend to deploy dense heterogeneous layers of 3G and 4G networks in outdoor and indoor environments by adding more macrocells and smallcells (e.g. microcells, picocells and femtocells) in response to the increasing subscriber demand for coverage and capacity. The main driver and enabler behind this tendency is the phenomenon that around 80% of power consumption in mobile communication networks stems from the radio base stations. This situation makes mobile operators opt for the use low-power radio base stations to provide better coverage, capacity and a more environment-friendly operation. The use of low-power radio base stations leads to reduction of energy consumption in mobile communication networks power. The aim of this study is to conduct a comparative study between homogenous macrocell deployment and indoor smallcell deployments as alternative solutions for provision of the required indoor coverage and capacity. Moreover, the study highlights the importance of backhaul solutions being critical components in the smallcell network deployment. Furthermore, the scope of the study is extended to cover the investigation of the value of the heterogeneous (i.e. hybrid marcocell-femtocell) deployment scenario as a cost and power-efficient solution versus the homogenous marcocell deployment scenario in view of the variations in the mobile network traffic during the day. The main findings indicate that the CapEx and OpEx of the backhaul solution represent the major part of the total deployment cost in the indoor smallcell deployment scenario (i.e. femtocell case) compared to those of the macrocell deployment scenario. Nonetheless, the perceived saving in the total cost of ownership (TCO) resulting from the use of indoor smallcell (i.e. femtocell) remains a satisfactory and convenient motivation considering the traffic variation across the day, traffic distribution between indoor and outdoor locations and the keenness to use the spectrum resources more efficiently.

  • 27.
    Ahmed, Ashraf
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab).
    Yang, Yanpeng
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab).
    Won Sung, Ki
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab).
    Markendahl, Jan
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab).
    On the Engineering Value of Spectrum in Dense Mobile Network Deployment Scenarios2015Conference paper (Refereed)
    Abstract [en]

    the continuing growth in the mobile data traffic magnifies the challenges for the design and deployment of scalable high-capacity mobile networks that can meet the future demand at reasonable cost levels. In order to meet the future traffic demand, an operator should invest on both infrastructure, i.e. densification of base stations, and more radio spectrum. Knowing the effectiveness of each element is thus of utmost importance for minimizing the investment cost. In this paper, we study the economic substitutability between spectrum and densification. For this, we measure the engineering value of spectrum, which refers to the potential saving in the total cost of ownership (TCO) as result of acquiring additional spectrum resources. Two countries are considered to represent different market situations: India with dense population and high spectrum price and Sweden with moderate population density and low spectrum fee. Numerical results indicate that additional amount of spectrum substantially relieves the need for densifying radio base stations, particularly for providing high user data rate in dense India. Nonetheless, the engineering value of spectrum is low in India (i.e. spectrum acquisition has less cost benefit) under the high spectrum price of today, whereas spectrum is instrumental in lowering the total cost of ownership in Sweden. Our finding highlights the importance of affordable and sufficient spectrum resources for future mobile broadband provisioning.

  • 28.
    Ahmed, Jawwad
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Dynamic Resource Provisioning and Survivability Strategies in Optical Networks2013Doctoral thesis, comprehensive summary (Other academic)
    Abstract [en]

    Optical networks based on Wavelength Division Multiplexing (WDM) technology show many clear benefits in terms of high capacity, flexibility and low power consumption. All these benefits make WDM networks the preferred choice for today’s and future transports solutions which are strongly driven by a plethora of emerging online services.

    In such a scenario, capability to provide high capacity during the service provisioning phase is of course very important, but it is not the only requirement that plays a central role. Traffic dynamicity is another essential aspect to consider because in many scenarios, e.g., in the case of real time multimedia services, the connections are expected to be provisioned and torn down quickly and relatively frequently. High traffic dynamicity may put a strain on the network control and management operations (i.e., the overhead due to control message exchange can grow rapidly) that coordinate any provisioning mechanisms. Furthermore, survivability, in the presence of new failure scenarios that goes beyond the single failure assumption, is still of the utmost importance to minimize the network disruptions and data losses. In other words, protection against any possible future failure scenario where multiple faults may struck simultaneously, asks for highly reliable provisioning solutions.

    The above consideration have a general validity i.e., can be equally applied to any network segment and not just limited to the core part. So, we also address the problem of service provisioning in the access paradigm. Long reach Passive Optical Networks (PONs) are gaining popularity due to their cost, reach, and bandwidth advantages in the access region. In PON, the design of an efficient bandwidth sharing mechanism between multiple subscribers in the upstream direction is crucial. In addition, Long Reach PONs (LR-PONs) introduces additional challenges in terms of packet delay and network throughput, due to their extended reach. It becomes apparent that effective solutions to the connection provisioning problem in both the core and access optical networks with respect to the considerations made above can ensure a truly optimal end-to-end connectivity while making an efficient usage of resources.

    The first part of this thesis focuses on a control and management framework specifically designed for concurrent resource optimization in WDM-based optical networks in a highly dynamic traffic scenario. The framework and the proposed provisioning strategies are specifically designed with the objective of: (i) allowing for a reduction of the blocking probability and the control overhead in a Path Computation Element (PCE)-based network architecture, (ii)  optimizing resource utilization for a traffic scenario that require services with diverse survivability requirements which are achieved by means of  dedicated and shared path-protection, and (iii) designing provisioning mechanism that guarantees high connection availability levels in Double Link Failures (DLF) scenarios. The presented results show that the proposed dynamic provisioning approach can significantly improve the network blocking performance while making an efficient use of primary/backup resources whenever protection is required by the provisioned services. Furthermore, the proposed DLF schemes show good performance in terms of minimizing disruption periods, and allowing for enhanced network robustness when specific services require high connection availability levels.

    In the second part of this thesis, we propose efficient resource provisioning strategies for LR-PON. The objective is to optimize the bandwidth allocation in LR-PONs, in particular to: (i) identify the performance limitations associated with traditional (short reach) TDM-PON based Dynamic Bandwidth Allocation (DBA) algorithms when employed in long reach scenarios, and (ii) devise efficient DBA algorithms that can mitigate the performance limitations imposed by an extended reach. Our proposed schemes show noticeable performance gains when compared with conventional DBA algorithms for short-reach PON as well as specifically devised approaches for long reach.

    Download full text (pdf)
    JA_Thesis
  • 29.
    Ahmed, Jawwad
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Cavdar, Cicek
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Monti, Paolo
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Wosinska, Lena
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    A Dynamic Bulk Provisioning Framework for Concurrent Optimization in PCE-Based WDM Networks2012In: Journal of Lightwave Technology, ISSN 0733-8724, E-ISSN 1558-2213, Vol. 30, no 14, p. 2229-2239Article in journal (Refereed)
    Abstract [en]

    A centralized network control and management plane, such as the one based on a path computation element (PCE), is highly beneficial in terms of resource optimization in wavelength division multiplexing optical networks. Benefits of centralized provisioning are even more evident when connection requests are provisioned in batches, i.e., they allow a better use of network resources via concurrent optimization. In this study, a dynamic bulk provisioning framework is presented with the objective of optimizing the use of network resources that also presents, as an additional benefit, the ability to yield a reduction of the control plane overhead. The rationale behind the proposed framework is based on a mechanism in which the PCE client is allowed to bundle and simultaneously send multiple labeled switch path (LSP) requests to the PCE where, in turn, several bundles can be concurrently processed together as a single bulk. From the network deployment perspective, a PCE-based network architecture is proposed to practically realize this approach. For dynamic bulk provisioning of optical LSP requests, a time-efficient integer linear programming (ILP) model (LSP BP ILP) is presented to minimize the request blocking, the network resource consumption, and the network congestion. In addition, a heuristic based on a greedy randomized adaptive search procedure (GRASP), namely LSP_BP_GRASP, is also proposed as a scalable alternative. The presented results demonstrate significant advantages of the proposed PCE bulk provisioning framework based on concurrent optimization in terms of reduced blocking probability and control overhead when compared with conventional dynamic connection provisioning approaches processing a single connection request at a time.

  • 30.
    Ahmed, Jawwad
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Cavdar, Cicek
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab).
    Monti, Paolo
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Wosinska, Lena
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Hybrid Survivability Schemes Achieving High Connection Availability With a Reduced Amount of Backup Resources2013In: Journal of Optical Communications and Networking, ISSN 1943-0620, E-ISSN 1943-0639, Vol. 5, no 10, p. A152-A161Article in journal (Refereed)
    Abstract [en]

    Maximizing connection availability in WDM networks is critical because even small disruptions can cause huge data losses. However, there is a trade-off between the level of network survivability and the cost related to the backup resources to be provided. The 100% survivability can be achieved by dedicated path protection with multiple pre-reserved protection paths for each provisioned connection, i.e., DPP (1:N). Unfortunately, the blocking probability performance of DPP (1:N) is negatively affected by the large number of pre-reserved backup wavelengths standing-by unutilized. On the other hand, path restoration (PR)-based solutions ensure good blocking performance at the expense of lower connection availability.

    The work in this paper aims at finding hybrid network survivability strategies that combine the benefits of both techniques (i.e., high availability with low blocking rate). More specifically, the paper focuses on a double link failure scenario and proposes two strategies. The first one, couples dedicated path protection DPP (1:1) with path restoration (referred to as DPP + PR) to minimize the number of dropped connections. The second scheme adds up the concept of backup reprovisioning (BR), referred to as DPP + BR + PR, in order to further increase the connection availability achieved by DPP + PR. Integer Linear Programming (ILP) models for the implementation of the proposed schemes are formulated. Extensive performance evaluation conducted in a PCE-based WDM network scenario shows that DPP + BR + PR and DPP + PR can significantly lower the blocking probability value compared to DPP (1:2) without compromising too much in terms of connection availability.

  • 31.
    Ahmed, Jawwad
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Cavdar, Cicek
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Monti, Paolo
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Wosinska, Lena
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Survivability strategies for PCE-based WDM networks offering high reliability performance2013In: National Fiber Optic Engineers Conference, NFOEC 2013, Optical Society of America, 2013Conference paper (Refereed)
    Abstract [en]

    Two approaches based on backup reprovisioning and path restoration are proposed for dynamic failure recovery in survivable, PCE-based, WDM networks. Results show that proposed schemes can achieve high connection availability in double link failure scenarios.

  • 32.
    Ahmed, Jawwad
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Chen, Jiajia
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Wosinska, Lena
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Chen, Biao
    Department of Optical Engineering, Zhejiang University.
    Mukherjee, Biswanath
    Efficient Inter-Thread Scheduling Scheme for Long-Reach Passive Optical Networks2013In: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, Vol. 51, no 2, p. S35-S43Article in journal (Refereed)
    Abstract [en]

    These days there is a clear trend toward extending the reach of passive optical networks to cover large geographical areas, which enables reduction of the number of central offices and hence has the potential of cost saving in network operation. On the other hand, this reach extension necessitates the design of efficient dynamic bandwidth allocation schemes in order to tackle performance degradation caused by the increased propagation delay in long reach PONs. Among many existing approaches, the multi-thread-based DBA scheme where several bandwidth allocation processes are performed in parallel is considered one of the most effective options to improve network performance in LRPONs. We have found that without proper intercommunication between the overlapped threads, multi-thread DBA may lose efficiency and even perform worse than the conventional single-thread algorithm. With this in mind, this article reviews different inter-thread scheduling schemes for LR-PONs, and proposes a novel approach of integrating the key ideas of the existing ones. Extensive simulation results confirm that our proposed scheme can significantly improve DBA performance for LR-PONs under a variety of scenarios with consideration of different values of network load and reach.

  • 33.
    Ahmed, Jawwad
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Computer Science, Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Monti, Paolo
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Wosinska, Lena
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Spadaro, S
    Enhancing restoration performance using service relocation in PCE-based resilient optical clouds2014In: Conference on Optical Fiber Communication, Technical Digest Series, 2014Conference paper (Refereed)
    Abstract [en]

    This paper investigates the benefits of dynamic restoration with service relocation in resilient optical clouds. Results from the proposed optimization model show that service availability can be significantly improved by allowing a few service relocations.

  • 34.
    Ahmid, Abdel
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    More than downloading: Toward a scale with wireless connectivity2012Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    Sensors are light-weight, low powered devices that measure some aspect of a physical or virtual environment and transmit this information in some format. This thesis describes how to integrate a sensor onto devices to enable network connectivity.

    The phrase “internet of things” suggests that within a few years many devices will be connected to an internet. Devices, including common household appliances, will transmit and receive data over a network. The CEO of Ericsson has stated that there will be more than 50 billion connected devices by 2020[1]. These devices could be microwaves, fridges, lights, or temperature sensors. Devices that are usually not associated with internet connectivity will be integrated into networks and play a larger role in providing information and controlling other devices. Sensors will have a major role in “the internet of things”. These small computers could be integrated in any appliances and transmit data over the network. The sensors’ low power and low cost, as well as their light weight, makes them very attractive to integrate them into many devices. The goal of this thesis project is to build upon this trend toward “The internet of things” by integrating a sensor into a bathroom scale thus enabling the scale to have networking connectivity. The sensor will be low cost and simple. It should wirelessly or via USB transmit the current weight that it measures to a receiver (specifically a gateway). This gateway will forward the message over the network to a website or mobile phone for visual presentation of the data. This thesis describes different techniques and approaches toward developing this sensor. The thesis also evaluates these different choices in order to select one technique that will be implemented. This solution will be evaluated in terms of its cost and ease of integration into an existing commercially produced scale.

    Download full text (pdf)
    fulltext
  • 35.
    Ahsin, Tafzeel ur Rehman
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Cooperative Communications: Link Reliability and Power Efficiency2012Doctoral thesis, monograph (Other academic)
    Abstract [en]

    Demand for high data rates is increasing rapidly for the future wireless generations, due to the requirement ofubiquitous coverage for wireless broadband services. More base stations are needed to deliver these services, in order tocope with the increased capacity demand and inherent unreliable nature of wireless medium. However, this would directly correspond to high infrastructure costand energy consumption in cellular networks. Nowadays, high power consumption in the network is becoming a matter of concern for the operators,both from environmental and economic point of view.

    Cooperative communications, which is regarded as a virtual multi-input-multi-output (MIMO) channel, can be very efficient in combating fading multi-path channels and improve coverage with low complexity and cost. With its distributed structure, cooperativecommunications can also contribute to the energy efficiency of wireless systems and green radio communications of the future. Using networkcoding at the top of cooperative communication, utilizes the network resources more efficiently.

    Here we look at the case of large scale use of low cost relays as a way of making the links reliable, that directly corresponds to reductionin transmission power at the nodes. A lot of research work has focused on highlighting the gains achieved by using network codingin cooperative transmissions. However, there are certain areas that are not fully explored yet. For instance, the kind of detectionscheme used at the receiver and its impact on the link performance has not been addressed.The thesis looks at the performancecomparison of different detection schemes and also proposes how to group users at the relay to ensure mutual benefit for the cooperating users.Using constellation selection at the nodes, the augmented space formed at the receiver is exploited for making the links more reliable. Thenetwork and the channel coding schemes are represented as a single product code, that allows us to exploit the redundancy present in theseschemes efficiently and powerful coding schemes can also be designed to improve the link performance.

    Heterogeneous network deployments and adaptive power management has been used in order to reduce the overall energy consumption in acellular network. However, the distributed structure of nodes deployed in the network, is not exploited in this regard. Here we have highlightedthe significance of cooperative relaying schemes in reducing the overall energy consumption in a cellular network.  The role of differenttransmission and adaptive resource allocation strategies in downlink scenarios have been investigated in this regard.It has been observed that the adaptive relaying schemes can significantly reduce the total energy consumption as compared to the conventionalrelaying schemes. Moreover, network coding in these adaptive relaying schemes, helps in minimizing the energy consumption further.The balance between the number of base stations and the relays that minimizes the energy consumption, for each relaying scheme is also investigated.

    Download full text (pdf)
    Cooperative Communications
  • 36.
    Ahsin, Tafzeel ur Rehman
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Link Reliability in Cooperative Relaying Using Network Coding2010Licentiate thesis, monograph (Other academic)
    Abstract [en]

    Demand for high data rates is increasing rapidly for future wireless systems.This trend is due to the increase in the number of mobile subscribers that need bandwidth hungry multimedia applications anywhere, anytime. Fourth generation cellular systems like IMT-advanced are being developed to meet these requirements. The unreliable nature of the wireless medium is one of the main hinderance in providing high data rates. Cooperative communication in cellular networks is emerging as a new paradigm to deal with the channel impairments. User cooperation via fixed relays in cellular systems form multiple access relay channels (MARCs) and provide an effective and cost efficient solution to achieve spatial diversity gains. Network resources can be utilized efficiently by using network coding at cooperating nodes.

    A lot of research work has focused on highlighting the gains achieved by using network coding in MARCs. However, there are certain areas that are not fully explored yet. For instance, the kind of the detection scheme used at the base station receiver and its impact on the link performance has not been addressed. In most cases, the outage probability has been used as a performance measure of MARCs. However, it is well known that the outage probability gives information about the signal availability, but it does not give the complete picture about the reliability of the link and the achieved quality of service.

    This thesis work looks at the link performance, in terms of symbol error probability, of multiple access relay channels that employ network coding at the relay node. Different types of detection schemes are considered and their performance is compared under different link conditions. Analytical expressions for the average symbol error probability of the cooperating users are derived. Focusing on the uplink of cellular systems, certain rules are devised on how to group users at relay node to ensure mutual benefit for the cooperating users. As a way of improving the link performance of multiple access relay channels and their robustness, the thesis considers constellation selection for the different branches. This method takes advantage of the redundancy between the transmitted symbols created by network coding and the augmented signal space obtained at the base station receiver. The obtained results show that, with a proper selection of the constellation sets, the link performance of MARCs can be improved. The thesis further looks at the interaction between the channel coding schemes of the cooperating users and network coding. It is shown that joint channel-network coding in MARCs can be seen as a product code. This new representation provides considerable flexibility in selecting efficient decoding algorithms at the base station receiver and gives the possibility to use more powerful network coding schemes for MARCs.

    Download full text (pdf)
    FULLTEXT01
  • 37.
    Ahsin, Tafzeel Ur Rehman
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Ben Slimane, Slimane
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Constellation Selection in Network Coded Distributive Antenna System2009In: GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference / [ed] Ulema M, IEEE , 2009, p. 342-346Conference paper (Refereed)
    Abstract [en]

    Relays can improve wireless links by providing an extra path to the direct path which together form a virtual multiple antenna system. Network Coded-Distributive Antenna System (NC-DAS) and Plain-Distributive Antenna System (P-DAS) are examples of realizations of such scenario. Although the asymptotic diversity gain for both the schemes is comparable, the network coded scheme can further take advantage of the redundancy and the extra dimension provided by the relay link. This extra signal dimension can be very useful when multilevel modulation is employed as it gives the possibility for a better spread of the modulation signal points within the augmented signal space. This article presents a simple and effective Constellation Selection (CS) scheme for all the three links within the NC-DAS system. This selection procedure improves the bit error probability in both AWGN and Rayleigh fading channels. Two different detections schemes are considered in the paper. Joint detection where the both users are decoded simultaneously and detection with successive cancelation where the strongest user is detected first followed by cancelation and maximum ratio combining. Analytical expressions for the error probability supported by simulation results are presented. The obtained results show that constellation selection provides good performance gain as compared to the case of same constellation.

  • 38.
    Ahsin, Tafzeel Ur Rehman
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Ben Slimane, Slimane
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS. KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Energy Efficiency using Cooperative Relaying2011In: 2011 IEEE 22nd International Symposium On Personal Indoor And Mobile Radio Communications (PIMRC), New York: IEEE , 2011, p. 1698-1702Conference paper (Refereed)
    Abstract [en]

    The rising demand for the high data rates in the future cellular systems, is directly linked with the power consumption at the transmitting nodes. Due to the various economical and environmental factors, it is becoming difficult to maintain the current rate of power consumption per unit of data, for the upcoming generations of the cellular systems. This has shifted the focus of many researchers towards the energy efficiency aspect of the cellular systems and power consumption has become an important design parameter in the recent works. In this article, we propose the use of cooperative communications using low cost fixed relays, in order to reduce the energy consumption at the transmitting nodes for a given quality of service requirement. It has been investigated that, how different factors, such as cell radius, relay position, number of relays and target data rate effects the area energy consumption for the different relaying schemes. It has been shown that, the cooperative relaying schemes along with adaptive resource allocation provides minimum energy consumption along with the better coverage as compared to the non adaptive cooperative relaying schemes.

  • 39.
    Ahsin, Tafzeel ur Rehman
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Ben Slimane, Slimane
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Network coding based on product codes in cooperative relaying2010In: IEEE Wireless Communications and Networking Conference 2010, WCNC 2010, 2010Conference paper (Refereed)
    Abstract [en]

    Employing network coding at the relay in cooperative relay system can improve the system throughput. However, XOR based network coding does not provide a strong error correction capability that can be used at the base station (receiver) in decoding the information of the cooperating users. Instead a block code can be used to combine the received user packets at the relay station where only the extra redundancy of the block code are forwarded by the relay station. With this structure a better error correction capability is embedded to the network coding scheme providing a better help to the receiver when decoding the user information. Combining this network coding structure with the individual block codes of the users, an overall product code can be obtained which gives the possibility of generating more powerful overall codes and increases the correction capability of the decoding process at the receiver. The obtained results show that the proposed scheme outperforms the conventional XOR based network coding scheme and gives the possibility of combining more users in the cooperation process.

  • 40.
    Ahsin, Tafzeel ur Rehman
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Slimane, Ben
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Detection strategies in cooperative relaying with network coding2010In: IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 2010, p. 12-17Conference paper (Refereed)
    Abstract [en]

    Network coding in cooperative relaying can improve the performance of both users and provide improved efficiency as compared to the conventional relaying. This paper considers different detection schemes for cooperative relaying with network coding. Analytical upper bounds on the bit error probability are derived and used to assess the performance of the different schemes. The obtained results show that simple and low complexity detectors can provide good performance, quite close to that of joint detection.

  • 41.
    Ahsin, Tafzeel Ur Rehman
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS. KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Slimane, Ben
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS. KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Energy efficient resource allocation and deployment strategies for wireless networks2012In: 2012 5th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2012 Conference and Workshops, IEEE , 2012, p. 6208715-Conference paper (Refereed)
    Abstract [en]

    Future wireless systems are being designed for extremely high data rates and are directly contributing to the global energy consumption. This trend is undesirable not only due to the environmental concerns, but to cost as well since energy costs are becoming a significant part of the operating expenditures for the telecom operators. Recently, energy efficient wireless systems have become a new research paradigm. Cooperative communication has shown good potential in improving coverage, providing robust radio links, reducing infrastructure cost, and has the possibility to reduce the total system energy consumption. This paper looks at possible deployment strategies for wireless networks that can reduce the energy consumption. We look at the tradeoff between the number of relay nodes and the number of base stations and their implications on the total energy consumption of wireless networks. The obtained results show that adaptive resource allocation between the base station and the relay node is an efficient way of reducing the energy consumption of the system. Furthermore, this reduction in energy consumption increases with increasing the system target spectral efficiency.

  • 42.
    Aidi, Laili
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Markendahl, Jan
    KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Tollmar, Konrad
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS. KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Blennerud, Greger
    Ericsson.
    Competing or Aligning? Assessment for Telecom Operator's strategy to address OTT TV/Video services2012Conference paper (Refereed)
    Abstract [en]

    Up until recently, it was rarely direct competition between telecom operators, cable and satellite Pay-TV providers in digital TV/Video, as their business area were different and value chain was well established. However, technology advance has altered digital TV/Video landscape, made these Communication Service Providers (CSPs) cross other’s area and opened door for new actor (OTT player) to enter the market. This triggers second change in the landscape, as it potentially bypasses CSP’s role in digital media value chain.

    There are generic potential options for telecom operator to address OTT service‘s treat, where the trend shows gradual shifts toward allowing or promoting. This study assesses telecom operator’s reaction strategies to react to this digital TV/Video convergence trend. Our analysis reveals two typical relation patterns in the value network, used by telecom operators based on strategy options above, which are ”point-to-point” and ”point-to-multipoint” relation model. We explore the underlining motivations that based these strategies, as well as analysis of the eco-systems: actors identification, business roles and distributed responsibilities among them, where we use ARA (Actors, Resource, Activities) point of view to model these value networks.

  • 43.
    Akhtar, Nadeem
    et al.
    University of Surrey, UK.
    Markendahl, Jan
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS. KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Queseth, Olav
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Analysis of Signaling Load and Negotiation Complexity using Network Composition2007Conference paper (Refereed)
    Abstract [en]

    In future mobile communications networks using Ambient Networks (AN) technology, users will be able to connect to a multitude of networks operated by different business entities. The technology enablers are advertising of access and service offers, multi-radio access, network selection and roaming support, negotiation of terms and conditions for attachment to networks. In this paper, we investigate the additional load on users and network resources for establishment and management of multiple network connections and business relations. The administrative load is analyzed using commercial uses cases and scenarios with a number of available networks, service providers and payment and ID providers. The signaling load for multiple attachment and negotiation procedures is estimated by modeling signaling sequences for a WLAN system enabled with AN technology. The signaling load is computed for varying numbers of users and for users with varying "willingness to evaluate and negotiate offers". The results show that the most important parameters are the number of attachment attempts per time unit. In the investigated scenarios, the relative load of business related signaling is 0.1 -1.0 % of the transferred user data. Although a large of number of different networks may be used, the number of business agreements and network connections that need to be handled simultaneously will be quite low.

  • 44.
    Al Rifai, Ahmad
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Indoor Positioning at Arlanda Airport2009Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Recent years have witnessed remarkable developements in wireless positioning systems to satisfy the need of the market for real-time services. At Arlanda airport in Stockholm, LFV - department of research and developement wanted to invest in an indoor positioning system to deliver services for customers at the correct time and correct place.

    In this thesis, three different technologies, WLAN, Bluetooth, and RFID and their combination are investigated for this purpose. Several approaches are considered and two searching algorithms are compared, namely Trilateration and RF fingerprinting. The proposed approaches should rely on an existing WLAN infrastructure which is already deployed at the airport. The performances of the different considered solutions in the aforementioned approaches are quantified by means of simulations.

    This thesis work has shown that RF fingerprinting provide more accurate results than Trilateration algorithm especially in indoor environments, and that infrastructures with a combination of WLAN and Bluetooth technologies result in lower average error if compared to infrastructures that adopt only WLAN.

    Download full text (pdf)
    fulltext
  • 45.
    Alabbasi, Abdulrahman
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Cavdar, Cicek
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Delay-Aware Green Hybrid CRAN2017In: 2017 15th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 201727 June 2017, IEEE conference proceedings, 2017, article id 7959942Conference paper (Refereed)
    Abstract [en]

    As a potential candidate architecture for 5G systems,cloud radio access network (CRAN) enhances the system’s capacityby centralizing the processing and coordination at the centralcloud. However, this centralization imposes stringent bandwidthand delay requirements on the fronthaul segment of the networkthat connects the centralized baseband processing units (BBUs)to the radio units (RUs). Hence, hybrid CRAN is proposed toalleviate the fronthaul bandwidth requirement. The concept ofhybrid CRAN supports the proposal of splitting/virtualizing theBBU functions processing between the central cloud (centraloffice that has large processing capacity and efficiency) and theedge cloud (an aggregation node which is closer to the user,but usually has less efficiency in processing). In our previouswork, we have studied the impact of different split points onthe system’s energy and fronthaul bandwidth consumption. Inthis study, we analyze the delay performance of the end user’srequest. We propose an end-to-end (from the central cloud tothe end user) delay model (per user’s request) for differentfunction split points. In this model, different delay requirementsenforce different function splits, hence affect the system’s energyconsumption. Therefore, we propose several research directionsto incorporate the proposed delay model in the problem ofminimizing energy and bandwidth consumption in the network.We found that the required function split decision, to achieveminimum delay, is significantly affected by the processing powerefficiency ratio between processing units of edge cloud and centralcloud. High processing efficiency ratio ( 1) leads to significantdelay improvement when processing more base band functionsat the edge cloud.

    Download full text (pdf)
    fulltext
  • 46.
    Alabbasi, Abdulrahman
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS. King Abdullah University of Science and Technology, Thuwal, Saudi Arabia.
    Rezki, Zouheir
    Shihada, Basem
    Outage Analysis of Spectrum Sharing Over M-Block Fading With Sensing Information2017In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 66, no 4, p. 3071-3087Article in journal (Refereed)
    Abstract [en]

    Future wireless technologies, such as fifth-generation (5G), are expected to support real-time applications with high data throughput, e.g., holographic meetings. From a bandwidth perspective, cognitive radio (CR) is a promising technology to enhance the system's throughput via sharing the licensed spectrum. From a delay perspective, it is well known that increasing the number of decoding blocks will improve system robustness against errors while increasing delay. Therefore, optimally allocating the resources to determine the tradeoff of tuning the length of the decoding blocks while sharing the spectrum is a critical challenge for future wireless systems. In this paper, we minimize the targeted outage probability over the block-fading channels while utilizing the spectrum-sharing concept. The secondary user's outage region and the corresponding optimal power are derived, over two-block and M-block fading channels. We propose two suboptimal power strategies and derive the associated asymptotic lower and upper bounds on the outage probability with tractable expressions. These bounds allow us to derive the exact diversity order of the secondary user's outage probability. To further enhance the system's performance, we also investigate the impact of including the sensing information on the outage problem. The outage problem is then solved via proposing an alternating optimization algorithm, which utilizes the verified strict quasi-convex structure of the problem. Selected numerical results are presented to characterize the system's behavior and show the improvements of several sharing concepts.

    Download full text (pdf)
    fulltext
  • 47.
    Alabbasi, Abdulrahman
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Shihada, Basem
    Optimal Cross-Layer Design for Energy Efficient D2D Sharing Systems2017In: IEEE Transactions on Wireless Communications, ISSN 1536-1276, E-ISSN 1558-2248, Vol. 16, no 2, p. 839-855Article in journal (Refereed)
    Abstract [en]

    In this paper, we propose a cross-layer design, which optimizes the energy efficiency of a potential future 5G spectrum-sharing environment, in two sharing scenarios. In the first scenario, underlying sharing is considered. We propose and minimize a modified energy per good bit (MEPG) metric, with respect to the spectrum sharing user's transmission power and media access frame length. The cellular users, legacy users, are protected by an outage probability constraint. To optimize the non-convex targeted problem, we utilize the generalized convexity theory and verify the problem's strictly pseudoconvex structure. We also derive analytical expressions of the optimal resources. In the second scenario, we minimize a generalized MEPG function while considering a probabilistic activity of cellular users and its impact on the MEPG performance of the spectrum sharing users. Finally, we derive the associated optimal resource allocation of this problem. Selected numerical results show the improvement of the proposed system compared with other systems.

  • 48.
    Alabbasi, Abdulrahman
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Shihada, Basem
    Cavdar, Cicek
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab).
    On Energy Efficiency of Prioritized IoT Systems2017In: Globecom 2017 - 2017 IEEE Global Communications Conference, IEEE, 2017Conference paper (Refereed)
    Abstract [en]

    The inevitable deployment of 5G and the Internet of Things (IoT) sheds the light on the importance of the energy efficiency (EE) performance of Device-to- Device (DD) communication systems. In this work, we address a potential IoT application, where different prioritized DD system, i.e., Low-Priority (LP) and High-Priority (HP) systems, co-exist and share the spectrum. We maximize the EE of each system by proposing two schemes. The first scheme optimizes the individual transmission power and the spatial density of each system. The second scheme optimizes the transmission power ratio of both systems and the spatial density of each one. We also construct and analytically solve a multi- objective optimization problem that combines and jointly maximizes both HP and LP EE performance. Unique structures of the addressed problems are verified. Via numerical results we show that the system which dominates the overall EE (combined EEs of both HP and LP) is the system corresponding to the lowest power for low/high power ratio (between HP and LP systems). However, if the power ratio is close to one, the dominating EE corresponds to the system with higher weight.

    Download full text (pdf)
    fulltext
  • 49.
    Alasali, Mohammad
    et al.
    KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Beckman, Claes
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS. KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    LTE MIMO Performance Measurements on Board Passenger Trains2013Conference paper (Other academic)
    Abstract [en]

    Providing passenger internet on board trains with continuous connectivity at high speeds and over large rural distances is a challenging issue. A frequently used solution to the problem is to use an on board WiFi network connected to the 3G or 4G networks deployed outside the train. In order to be able to provide the capacity and the data rates that tomorrow's business travelers are expecting it has been suggested to use a combination of MIMO and carrier aggregation in the LTE-Advance standard. In this study, we practically investigate the plausibility of using MIMO functionality in an 900 LTE system when the receive antennas are mounted at a train roof about 4m above ground and the base stations antennas are on average placed 2.3km away from the track in towers with an average height of 45m and, hence, most of the time in line of site. It is found that along our test route MIMO is in practice supported by the radio channel at around 70% of the time when the train is travelling with an average speed of 185km/h and the MIMO antennas are mounted 10.5m apart.

  • 50.
    Alasali, Mohammad
    et al.
    KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    Beckman, Claes
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Radio Systems Laboratory (RS Lab). KTH, School of Information and Communication Technology (ICT), Centres, Center for Wireless Systems, Wireless@kth.
    LTE MIMO performance measurements on trains2013In: 2013 7th European Conference on Antennas and Propagation (EuCAP), New York: IEEE , 2013, p. 2327-2330Conference paper (Refereed)
    Abstract [en]

    Providing passenger internet on board trains with continuous connectivity at high speeds and over large rural distances is a challenging issue. A frequently used solution to the problem is to use an on board WiFi network connected to the 3G or 4G networks deployed outside the train. In order to be able to provide the capacity and the data rates that tomorrow's business travelers are expecting it has been suggested to use a combination of MIMO and carrier aggregation in the LTE-Advance standard. In this study, we practically investigate the plausibility of using MIMO functionality in an 900 LTE system when the receive antennas are mounted at a train roof about 4m above ground and the base stations antennas are on average placed 2.3km away from the track in towers with an average height of 45m and, hence, most of the time in line of site. It is found that along our test route MIMO is in practice supported by the radio channel at around 70% of the time when the train is travelling with an average speed of 185km/h and the MIMO antennas are mounted 10.5m apart.

1234567 1 - 50 of 1505
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf