Sunteți pe pagina 1din 23

Optimal Design of 5G Networks in Rural Zones with UAVs

A Technical Seminar Report submitted in partial fulfillment of the requirements For


the award of degree of

BACHELOR OF TECHNOLOGY

In

ELECTRONICS AND COMMUNICATION ENGINEERING

Of

JAWAHARLAL NEHRU TECHNOLOGICAL UNIVERSITY ANANTAPURAMU

By

H DILIPKUMARREDDY (16G31A0448)

Department of Electronics and Communication Engineering

St.JOHNS COLLEGE OF ENGINEERING & TECHNOLOGY


YERRAKOTA, YEMMIGANUR
KURNOOL – 518 360 (A.P)
2019 – 2020
St.JOHNS COLLEGE OF ENGINEERING & TECHNOLOGY
YERRAKOTA, YEMMIGANUR
KURNOOL – 518 360 (A.P)
(Permanently Affiliated to J.N.T.U.A)

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

CERTIFICATE

This is to certify that the Technical Seminar Report entitled “Optimal Design of 5G
Networks in Rural Zones with UAV” being submitted by H DILIPKUMARREDDY
(16G31A0433) in partial fulfillment of the requirement of the award of the degree of Bachelor of
Technology in Electronics and Communication Engineering of Jawaharlal Nehru Technological
University Anantapuramu during the year 2019-2020.

Mr. C. BHARGAVM.Tech. Mr. K.SUDHAKAR, M.Tech, Ph. D


Asst Professor Professor & Head of the
Department
& Dept. of E.C.E
Ms P RAMA THULASIM Tech S.J.C.E.T
Asst Professor
Seminar Supervisors
Dept. of E.C.E
S.J.C.E.T
Place : Date
:

ABSTRACT

We focus on the problem of designing a 5G network architecture


to provide coverage in rural areas. The proposed architecture is
composed of 5G Base Stations carried by Unmanned Aerial Vehicles
(UAVs), and supported by ground sites interconnected through optical
fiber links.

We also consider the dimensioning of each site in terms of the


number of Solar Panels (SPs) and batteries.

We then formulate the problem of cost minimization of the


aforementioned architecture, by considering: i) the cost for installing the
sites, ii) the costs for installing the SPs and the batteries in each site, iii)
the costs for installing the optical fiber links between the installed sites,
and iv) the scheduling of the UAVs to serve the rural areas. Our results,
obtained over a representative scenario, reveal that the proposed solution
is effective in limiting the total costs, while being able to ensure the
coverage over the rural areas.
ACKNOWLEDGEMENT

I take this oppurtunity to remember and acknowledge the cooperation. Good will and support
moral and technical extended by several individuals out of which this technical seminar has
evolved . I shall always cherish our association with them.

I greatly thankful to Mr. K.SUDHAKAR, Head Of The Department , Department of


ELECTRONICS AND COMMUNICATION ENGINEERING, for extending his help. I shall
forever cherish my association with him for his encouragement. Perennial approachability,
absolute freedom of thought and action.

I greatly thankful to Mr. C. BHARGAV,In-Charge,Asst Professor, Department of


ELECTRONICS AND COMMUNICATION ENGINEERING,for his enthusiastic
assistance.I have immense pleasure in expressing my thanks and deep sense of gratitude for his
guidance and assistance offered in an amiable and pleasant manner through my technical seminar.

A lot of thanks to other faculty members of the department who gave their valuable suggestion at
different stages of my technical seminar.

BY:
H DILIPKUMARREDDY
(16G31A0448)

CONTENTS

Abstract i
Acknowledgement ii
List of Figures iii
Documentation iv

CHAPTER 1
INTRODUCTION

CHAPTER 2
COMMUNICATION CHANNEL

CHAPTER 3
WAVE PROPOGATION

CHAPTER 4
ACOUSTIC MODEM

CHAPTER 5
UNDER WATER CONNECTIONS

CHAPTER 6
APPLICATIONS

CHAPTER 7
DISADVANTAGE

CHAPTER 8
CONCLUSION

CHAPTER 9
REFERENCE
List of Figures

Figure. No Title Description Page.No

1 Shallow water multipath propagation


2 Ensemble of channel impulse responses (magnitudes).
3 Multichannel adaptive decision-feedback equalizer (DFE)
4 The WHOI Micromodem dual mode of operation: low 5
Centralized network topology.
6. Decentralized network topology.
7 A deep-sea observatory
8 Under Water links
1.Introduction
5G will be the dominant technology to provide wide area connectivity in the forthcoming
years. In order to provide extremely large throughput, coupled with low latency, new 5G
equipment will be installed at selected sites.

In general, 5G is expected to be initially installed in urban areas, where the Return on


Investment (RoI) is guaranteed to the operator(s). On the other hand, rural zones are less
appealing for installing 5G sites, due to the fact that the relatively low density of users is
not able to generate a sufficient profit for the operator. Hence, there is the imminent risk
that rural zones will not be covered by 5G. Clearly, the lack of 5G deployments in rural
zones will inevitably increase the digital divide for the users living in such areas.

To overcome such issues, in this work we study the design of a cheaper 5G architecture,
where the 5G Base Stations (BSs) are carried on board of Unmanned Aerial Vehicles
(UAVs). The exploitation of UAVs to provide radio connectivity is receiving considerable
attention from the research community. However, the evaluation of the installation costs
of UAV-based radio architectures, as well as a thorough comparison with traditional
architectures, is still an open issue.

To tackle this aspect, we formulate the problem of minimizing the installation costs of an
UAV-based 5G architecture. More in detail, we consider the costs for installing a site, the
costs for acquiring the radio equipment, the costs for placing the optical fiber links
between the sites, the UAV costs, the costs for installing the Solar Panels (SPs) and the
batteries on each site. We then target the minimization of the total installation costs, by
ensuring the 5G coverage over a set of areas.

To further reduce the costs, the proposed architecture is able to exploit the energy coming
solely from the SPs and batteries. Results, obtained over a representative scenario, prove
that the proposed architecture is able to notably reduce the costs compared to a classical
solution, which instead assumes to provide radio connectivity by installing fixed 5G BSs.
2. UAV-BASED 5G ARCHITECTURE DESCRIPTION

We briefly review the UAV-based 5G architecture, based on the reference


architecture. In brief, we assume the deployment of a softwarized architecture,
where the radio functionalities are decomposed into elementary blocks. In this
context, the low-level functionalities are deployed on the dedicated HardWare (HW)
carried by the UAV, while the commodity HW, hosting high-level virtual
functionalities, is installed at ground sites.
The decoupling between high-level and low-level functionalities allows to decrease
the amount of HW carried by the UAV, and consequently to move the UAVs over the
territory to cover selected areas. Finally, we assume that an area is covered by an
UAV when the UAV reaches the central point of the area.
In order to provide the 5G connectivity, a maximum distance constraint needs to
be ensured between the UAV covering the area and the site at which it is connected
through a radio link. This is an essential condition to maintain the radio connectivity
between the low-level functionalities flying on the UAV and the high-level ones
placed at the ground sites.
In addition, time is discretized in Time Slots (TSs). In each TS, coverage over the
territory has to be ensured, i.e., each area is covered by exactly one UAV. In each TS,
an UAV can either: i) cover an area, or ii) recharge itself at a ground site. Each site
provides at each TS an amount of power to the UAV(s) attached to it.
3.WIRELESS NETWORKING WITH UAV’S
A. UAV Aerial Base Station in 5G and Beyond
Here, we discuss the key applications of UAV-mounted aerial base stations in 5G.
1) Coverage and Capacity Enhancement of Beyond 5G Wireless Cellular Networks: The need for high-speed
wireless access has been incessantly growing, fueled by the rapid proliferation of highly capable mobile
devices such as smartphones, tablets, and more recently drone-UEs and IoT-style gadgets . As such, the
capacity and coverage of existing wireless cellular networks have been extensively strained, which led to
the emergence of a plethora of wireless technologies that seek to overcome this challenge. Such
technologies, which include device-to-device (D2D) communications, ultra dense small cell networks, and
millimeter wave (mmW) communications, are collectively viewed as the nexus of next-generation 5G
cellular systems
2) In addition, UAV-enabled mmW communications is a porpoising application of UAVs that can establish
LoS communication links to users. This, in turn, can be an attractive solution to provide high capacity
wireless transmission, while leveraging the advantages of both UAVs and mmW links. Moreover,
combining UAVs with mmW and potentially massive multiple input multiple output (MIMO) techniques
can create a whole new sort of dynamic, flying cellular network for providing high capacity wireless
services, if well planned and operated.
3) UAVs can also assist various terrestrial networks such as D2D and vehicular networks. For instance,
owing to their mobility and LoS communications, drones can facilitate rapid information dissemination
among ground devices. Furthermore, drones can potentially improve the reliability of wireless links in
D2D and vehicle-to-vehicle (V2V) communications while exploiting transmit diversity. In particular, flying
drones can help in broadcasting common information to ground devices thus reducing the interference
in ground networks by decreasing the number of transmissions between devices. Moreover, UAV base
stations can use air-to-air links to service other cellular-connected UAV-UEs, to alleviate the load on the
terrestrial network.
4.Acoustic modem
Acoustic modem technology today offers two types of modulation/detection: frequency
shift keying (FSK) with noncoherent detection and phase-shift keying (PSK) with coherent
detection. FSK has traditionally been used for robust acoustic communications at low bit rates
(typically on the order of 100 bps). To achieve bandwidth efficiency, i.e. to transmit at a bit rate
greater than the available bandwidth, the information must be encoded into the phase or the
amplitude of the signal, as it is done in PSK or quadrature amplitude modulation (QAM). For
example, in a 4-PSK system, the information bits (0 and 1) are mapped into one of four possible
symbols, ±1±j.

The symbol stream modulates the carrier, and the so-obtained signal is transmitted over
the channel. To detect this type of signal on a multipath-distorted acoustic channel, a receiver
must employ an equalizer whose task is to unravel the inter symbol interference. Since the
channel response is not a-priori known (moreover, it is time-varying) the equalizer must ―learn‖
the channel in order to invert its effect. A block diagram of an adaptive decision-feedback
equalizer (DFE) is shown in Figure 3. In this configuration, multiple input signals, obtained from
spatially diverse receiving hydrophones, can be used to enhance the system performance. The
receiver parameters are optimized to minimize the mean squared error in the detected data stream.
After the initial training period, during which a known symbol sequence is transmitted, the
equalizer is adjusted adaptively, using the output symbol decisions. An integrated Doppler
tracking algorithm enables the equalizer to operate in a mobile scenario.

This receiver structure has been used on various types of acoustic channels. Current
achievements include transmission at bit rates on the order of one kbps over long ranges (10-100
nautical miles) and several tens of kbps over short ranges (few km) as the highest rates reported to
date. On a more unusual note, successful operation was also demonstrated over a basin scale
(3000 km) at 10 bps, as well as over a short vertical channel at a bit rate in excess of 100 kbps.
The multichannel DFE forms the basis of a high-speed acoustic modem implemented at the
Woods Hole Oceanographic Institution. The modem, shown in Figure 4, is implemented in a
fixed-point DSP, with a floating-point co-processor for high-rate mode of operation. When active,
it consumes about 3 W in receiving mode, and 10-50 W to transmit.

The board measures 1.75 _ 5 in, and accommodates four input channels. The modem has
successfully been deployed in a number of trials, including autonomous underwater vehicle
(AUV) communications at 5 kbps.

Fig. 4: The WHOI micromodemhas dual mode of operation: low

OFDM
OFDM involves sending several signals at one given time over several different frequency
channels, or subcarriers. In our case, the usable frequency range of our equipment will be
determined, and that frequency range will be divided into a certain number of channels. At any
given time interval during transmission, each subcarrier will be transmitting data. An illustration
of OFDM for one time instance is given.

Figure 1

The principle of orthogonality helps to ensure that cross talk does not occur between the
carrier frequencies. Despite the fact that the signals overlap in the frequency domain, it is
possible, from a receiver’s point of view, to extract data from one specific carrier simply by
knowing its frequency.

Figure 2: transmitted data, s(n) is convolved with a channel, h(n) as part of the transmission process. The receiver
then must extract s(n) from y(n).

Orthogonality alone does not ensure that data won’t overlap. Once a data packet, s(n),
(which takes the form of an array) is transmitted, it becomes convolved with the channel, h(n) on
which it is sent. The receiver then picks up the useful data convolved with the channel, y(n). The
length of this array is now equal to the length of the data packet plus the length of the channel.
This means that the transmitter needs to wait for a certain amount of time before sending the next
packet of data. This time periods between where the transmitter is sending useful data are known
as guard intervals. They can be varied in length to suit various factors in the transmission process.
They must be a certain length to ensure transmitted data will not overlap before reaching the
receiver. This will make distinguishing between two packets of data almost impossible. In most
transmission schemes, extracting s(n) from y(n) is a matter of deconvolution.
The receiver, upon receiving y(n), must analyze the channel, form an array, h’(n), which closely
matches h(n) and deconvolve the two to extract s(n). In OFDM this process is somewhat
different. Channel analysis is still necessary in order to form h’(n), but from this point, s(n) is
attained by dividing y(n) by h’(n). This is due to the properties of what is known as a flat-fading
channel.
Determining why this occurs is a matter of examining the mathematics behind it. On a
basic level, the process of OFDM takes the following form:

Figure 3

Before transmission, a stream of data is converted to parallel form where each bit is assigned to a
carrier frequency. Then the IFFT is taken, a cyclic prefix (which will be discussed further later
on) is added to the data, transmission and reception occurs, the cyclic prefix is removed, and the
FFT is taken to get y(n). This process can be represented as a series of matrix multiplications of
the following form:

y FFTCPRHIFFTCPs
 

After arranging the matrices in the above equation and multiplying through, y(n) takes a new
form:

Quadrature Phase Shift-Keying (QPSK)


The concept of QPSK is simple; modulate two bits from a signal at a time into one modulated

h1' 0 0 0  s1   h1's1


 0 h2' 0 
y 0 ... 0  s2
0
h2's2 
*
0   ...   ... 
       0 0 0 hN ' sN
hN 'sN
symbol. QPSK uses a constellation shown in figure 4 to determine the phase and qaudrature of
00 01

10 11

Figure 4.1

the signal. Grey coding will be used in the constellation to reduce the number of bit errors when
the signal is demodulated. (The grey coded constellation can be seen in figure 1 as well) QPSK at
its most basic will decide what the two bits to be modulated are it will set an i value of 1, 2, 3, 4
and then modulates the signal using the following equation.

 
2Es cos(2fct  (2i 1) ,i

1,2,3,4 xc(t) 
Ts  4

This allows for each modulation point to be 90o from each other and allows for 45o in error in
either phase direction as seen in figure 4. For example the point 01 is at 45 o on the circle and
point 00 is at 135o on the circle so the difference between the two points is 90 o. The decision
region between the two points is half way so there can be a maximum of 45 o phase shift before
the receiver will demodulate the sign wrong causing a symbol error. A symbol error then in tern
causes two bit errors because each symbol represents 2 bits. The constellation consists of a four
 Es E
, s
 2 2
 point signal space and each point is set at
 where Es is the signal energy.
Modulation (figure 5)
QPSK has two basis functions for modulating and demodulating. One of the functions is a sine
and the other is a cosine.
2
1t Ts cos2f t c

2
2t Ts sin2f t c

The 2 basis functions


These basis functions make up the x and y axes. One being a cosine and the other being a sine,
they are orthogonal to each other allowing for both to be transmitted at the same time. (This is
slightly different from the definition of orthogonal in OFDM) The first basis function is used for
the in phase component and the second for the quadrature component of the signal. After each bit
E E
has been separated it will go though a filter to assign it to either a b (usually 1 is b and 0
 E
is b ) This is then multiplied by the two basis functions and then those multiplications are

summed together and forms the final QPSK function..


2
1 
t 
Ts
cos 
2f c t 

Eb Eb  E b
1010
Bit energy  Eb
assignment

QPSK Signal
01001110 Demultiplexer

Bit energy  Eb  Eb Eb Eb
0011 assignment

2
2 
t 
Ts
sin2f c t 

Figure 4.2

Demodulation Figure .
Demodulation is just as easily as modulation. To demodulate the signal the basis functions need
 E
to be re-injected into the QPSK signal. This will return the b and the decision device will

sample the signal at Ts which is set when the system is designed. The decision device will then
E
return a 1 or a 0 based on the b value.
Match Filter for Φ1 Decision Device 1010

QPSK Signal Sampling At Time Ts


01001110

Match Filter for Φ2 Decision Device 0011

Synchronization
Synchronization is an essential part of OFDM transmission. Synchronization is defined as
the process of adjusting the corresponding significant instants of two signals to obtain the desired
phase relationship between these instants.1[1] This process allows the receiver to make sense of
the data it receives, and to single out the useful portions of it. In OFDM, synchronization is
performed in two major steps; by the estimation of the timing symbol and by the detection of the
carrier frequency offset.
The particular method of synchronization that we will be implementing in our model is
known as the Schmidl/Cox method. Developed by Timothy M. Schmidl and Donald C. Cox, it is
far less computational than the Classens method2[2] from which it is derived.
For the receiver, signal recovery relies on training symbols. These symbols are composed of two
identical halves in the time domain and are added to the useful data as a prefix (often referred to
as a cyclic prefix). These identical halves contain pseudonoise (PN) which has arbitrary values at
even frequencies and zeros at odd frequencies. This PN sequence would be transmitted on each
subcarrier to generate the time domain samples. These time-domain samples are repeated to form
the first training symbol. Then this process is repeated to form the second, identical, training
symbol. The PN at the odd frequencies are used to measure the subchannels while the PN at the
even frequencies help determine the frequency offset.
Autocorrelation is an important step in estimating the timing symbol. Essentially,
autocorrelation finds where there the timing symbols correlate most. This point allows the
receiver to determine their starting points. Knowing where the prefix begins and its length allows
the receiver to estimate where the useful data begins.
The carrier frequency offset can cause complexities which we will need to account for. In an
ideal transmission scheme, the oscillator of the transmitter and receiver are at the exact same rate.

1 Webster’s Online Dictionary


2 [2] Uses a trial and error method where the carrier frequency is incremented in small steps over the entire
acquisition range until the correct carrier frequency is found
However, in a physical environment, the two oscillators will be very close to one another but
never quite equal. In order to interpret the received data correctly, the offset between the two
oscillators must be accounted for. We will develop a means for this in our software simulation
and see how altering the frequencies of the receiver and transmitter will affect our performance.
Then, if our system performs satisfactorily, it will be put to the test in a physical environment.

5.UNDER WATER NETWORK’S


With advances in acoustic modem technology, sensor technology and vehicular technology,
ocean engineering today is moving towards integration of these components into autonomous
underwater networks. While current applications include supervisory control of individual AUVs,
and telemetry of oceanographic data from bottom-mounted instruments, the vision of future is
that of a ―digital ocean‖ in which integrated networks of instruments, sensors, robots and
vehicles will operate together in a variety of underwater environments. Examples of emerging
applications include fleets of AUVs deployed on collaborative search missions, and ad hoc
deployable sensor networks for environmental monitoring.

Fig. 5: Centralized network topology


Fig. 6: Decentralized network topology.
Depending on the application, future underwater networks are likely to evolve in two directions:
centralized and decentralized networks. The two types of topologies are illustrated in Figure 5 and
Figure 6. In a centralized network, nodes communicate through a base station that covers one cell.
Larger area is covered by more cells whose base stations are connected over a separate
communications infrastructure.

The base stations can be on the surface and communicate using radio links, as shown in
the figure, or they can be on the bottom, connected by a cable. Alternatively, the base station can
be movable as well. In a decentralized network, nodes communicate via peer-to-peer, multi-hop
transmission of data packets. The packets must be relayed to reach the destination, and there may
be a designated end node to a surface gateway. Nodes may also form clusters for a more efficient
utilization of communication channel.

To accommodate multiple users within a selected network topology, the communication


channel must be shared, i.e. access to the channel must be regulated. Methods for channel sharing
are based on scheduling or on contention. Scheduling, or deterministic multiple-access, includes
frequency, time and code-division multiple-access (FDMA, TDMA, CDMA) as well as a more
elaborate technique of space-division multiple access (SDMA).

Contention-based channel sharing does not rely on an a-priori division of channel


resources; instead, all the nodes contend for the use of channel, i.e., they are allowed to transmit
randomly at will, in the same frequency band and at the same time, but in doing so they must
follow a protocol for medium-access control (MAC) to ensure that their information packets do
not collide. All types of multiple-access are being considered for the underwater acoustic systems.

Experimental systems today favor either polling, TDMA, or multiple-access collision


avoidance (MACA) based on a hand-shaking contention procedure that requires an exchange of
requests and clearances to send (RTS/CTS). Intelligent collision avoidance appears to be
necessary in an underwater channel, where the simple principle of carrier sensing multiple access
(CSMA) is severely compromised due to the long propagation delay—the fact that the channel is
sensed as idle at some location does not guarantee that a data packet is not already in transmission
at a remote location. one of the major aspects of the evolving underwater networks is the
requirement for scalability. A method for channel sharing is scalable if it is equally applicable to
any number of nodes in a network of given density. For example, a pure TDMA scheme is not
scalable, as it rapidly looses efficiency on an underwater channel due to the increase in maximal
propagation delay with the area of coverage. In order to make this otherwise appealing scheme
scalable, it can be used locally, and combined with another technique for spatial reuse of channel
resources. The resulting scheme is both scalable and efficient; however, it may require a
sophisticated dynamic network management.

In contrast, contention-based channel allocation offers simplicity of implementation, but


its efficiency is limited by the channel latency. Hence, there is no single best approach to the
deployment of an underwater network. Instead, selection of communication algorithms and
network protocols is driven by the particular system requirements and performance/complexity
trade-offs.

Fig. 7:A deep-sea observatory.


Research today is active on all topics in underwater communication networks: from fundamental
capacity analyses to the design of practical network protocols on all layers of the network
architecture (including medium access and data link control, routing, transport control and
application layers) as well as cross-layer network optimization.
In addition to serving as stand-alone systems, underwater acoustic networks will find application
in more complex, heterogeneous systems for ocean observation. Figure 7 shows the concept of a
deep sea observatory.

At the core of this system is an underwater cable that hosts a multitude of sensors and
instruments, and provides high-speed connection to the surface. A wireless network, integrated
into the overall structure, will provide a mobile extension, thus extending the reach of
observation. While we have focused on acoustic wireless communications, it has to be noted that
this will not be the only way of establishing wireless communication in the future underwater
networks.

Optical waves, and in particular those in the blue-green region, offer much higher
throughput (Mbps) albeit over short distances (up to about 100 m). As such, they offer a wireless
transmission capability that complements acoustic communication.
Fig 8: Under water links

6.Applications
 Future applications could enhance myriad industries, ranging from the offshore oil
industry to aquaculture to fishing industries, she noted. Additionally, pollution control,
climate recording, ocean monitoring (for prediction of natural disturbances) and detection
of objects on the ocean floor are other areas that could benefit from enhanced underwater
communications.
 Environmental monitoring to gathering of oceanographic data
 Marine archaeology
 Search and rescue missions
 Defence
7.Disadvantages
 Battery power is limited and usually batteries cannot be recharged also because solar
energy cannot be exploited .
 The available bandwidth is severly limited.
 Channel characteristics including long and variable propagation delays  Multipath and
fading problems.
 High bit error rate.

8.Conclusion

In this topic we overviewed the main challenges for efficient communication in under water
acoustic sensor networks. We outlined the peculiarities of the under water channel with particular
reference to networking solutions the ultimate objective of this topic is to encourage research
efforts to lay down fundamental basics for the development of new advanced communication
techniques for efficient under water communication and networking for enhanced ocean
monitoring and exploration applications

 The aim of this is to build a acoustic communication


 This is not only the way for underwater communication

 By using optical waves which offers higher throughput (Mbps) over short distances (up to
about 100 m)

9.REFERENCES

www.redtacton.com www.wikipedia.com
www.howstuffworks.com

S-ar putea să vă placă și