You are on page 1of 3

HANDLING POWER LATENCY IN 5G WIRELESS NETWORK COMMUNICATION

WITH TAIL THEFT CONCEPT

ABSTRACT:

5G technology has stimulated a wide variety of high band width applications on smart phones,
such as video streaming and content-rich web browsing. Although having those applications
mobile is quite appealing, high data rate transmission also poses huge demand for power. It has
been revealed that the tail effect in 5G radio operation results in significant energy drain on smart
phones. Recent fast dormancy technique can be utilized to remove tails but, without care, can
degrades user experience. Implement TailTheft in the Network Simulator with a model for
calculating energy consumption that is based on parameters measured from mobile phones.
When allowing for delays of a few seconds (acceptable for background applications), the energy
savings increase to between 62% and 75% for 3G, and 71% for LTE and 80%. The increased
delays reduce the number of state switches to be the same as in current networks with existing
inactivity timers.

INTRODUCTION:

The evolution of the cellular network generations is influenced primarily by continuous growth
in wireless user devices, data usage, and the need for a better quality of experience (QoE). More
than 50 billion connected devices are expected to utilize the cellular network services by the end
of the year 2020 , which would result in a tremendous increase in data traffic. So Cellular
telecommunication is one of the most developed and demandable transmittal usages.
Development of wireless access technologies is about to the reach its fourth generation and
finally added fifth generation. The first generation has satisfied with the mobile voice, while the
Second generation has introduced capability and coverage of mobile. This is followed by the
third generation, which the mission of it was higher speeds in data to open the “mobile
broadband” know-how. The fourth generation mobile communication services provide
broadband, large-capacity, high-speed data transmission, providing users with high-quality
interactive multimedia services, including teleconferencing, color video images, 3D graphic
animation games, and audio services.

Fifth-generation wireless, or 5G, is the latest iteration of cellular technology, engineered to


greatly increase the speed and responsiveness of wireless networks. With 5G, data transmitted
over wireless broadband connections could travel at rates as high as 20 Gbps by some estimates
exceeding wire line network speeds Latency of 1 ms or lower for uses that require real-time
feedback. 5G will also enable a sharp increase in the amount of data transmitted over wireless
systems due to more available bandwidth and advanced antenna technology. The fifth generation
(5G) of the cellular networks will highlight and address the following three broad views: (i) user-
centric (by providing 24×7 device connectivity, uninterrupted communication services, and a
smooth consumer experience), (ii) service-provider-centric (by providing a connected intelligent
transportation systems, road-side service units, sensors, and mission critical monitoring/tracking
services), and (iii) network-operator-centric (by providing an energy-efficient, scalable, low-cost,
uniformly-monitored, programmable, and secure communication infrastructure).

METHODOLOGY:

Ad-hoc multipath On-Demand Distance Vector (AMODV) protocol initiates route discovery
process only when desired by a source node. Source sends RREQ message to neighbors if it is
unaware of the destination node. Neighbor nodes further rebroadcast if they do not have a fresh
enough route. Every node has RREQ-ID and Sequence Number An RREP message is sent from
Source to Destination via revere route.

The Main advantages High resolution and bi-directional large bandwidth shaping. Technology to
gather all networks on one platform. More effective and efficient. Technology to facilitate
subscriber supervision tools for the quick action. Most likely, will provide a huge broadcasting
data (in Gigabit), which will support more than 60,000 connections. Easily manageable with the
previous generations. Technological sound to support heterogeneous services (including private
network). Possible to provide uniform, uninterrupted, and consistent connectivity across the
world.

MODULES:

In this system have three module and they are listed in below. First, Tail Theft provides a
customized application programming. Second, a mechanism called virtual tail time is proposed .
Third, to schedule all requests under their constraints.

DESCRIPTION:

TAIL THEFT PROVIDES A CUSTOMIZED APPLICATION PROGRAMMING


MODULE

TailTheft provides a customized application programming interface (API) for applications.


Applications indicate the type of request, the time that can be delayed or prefetched by calling
the TailTheft API, as well as the type of action taken as the deadline approaches.

VIRTUAL TAIL TIME

virtual tail time is to determine the time during which batching and prefetching can be
conducted. When the tail time is used for data transmission, inactivity timers α and β are reset.
To complete the state transitions originally triggered by timers α and β, Tail Theft introduces two
timers, γ and θ, to replace the functions of α and β in the UE as well as to determine the time that
can be used for batching and prefetching.
REQUESTS UNDER THEIR CONSTRAINTS

A dual queue scheduling algorithm is proposed maintained for data requests: one for real-time
and unsuccessfully prefetched requests and another for delay-tolerant requests and previous
attempts. We refer to delay-tolerant requests and previous attempts as Tail Theft requests. When
a request is added to the Tail Theft request queue, Tail Theft starts a timer θ, the timeout value of
which is the latest deadline of all the requests in the queue. Timer θ ensures that all delayed
requests are processed before the specified deadline.

EXPECTED OUTCOMES:

Throughput: 50 Mbit/s to over 2 gigabit

Latency: 10–20 ms

Bandwidth: Open up the 3.6 and 26 GHz bands

Delivery Ratio : Estimated at 15 to 50% better

You might also like