Skip to main content Accessibility help
×
Home
  • Get access
    Check if you have access via personal or institutional login
  • Cited by 1
  • Print publication year: 2016
  • Online publication date: December 2015

7 - Big data aware wireless communication: challenges and opportunities

from Part II - Big data over cyber networks

Summary

The fast-growing wireless data service is pushing our communication network's processing power to its limit. The ever-increasing data traffic poses imminent challenges to all aspects of the wireless system design, such as spectrum efficiency, computing capabilities, and backhaul link capacity, etc. At the same time, the massive amount of mobile data traffic may also lead to potential system performance gain that is otherwise not achievable with conventional wireless signal processing models. In this chapter, we investigate the challenges and opportunities in the design of scalable wireless systems to embrace such a “big data” era.We review state-of-the-art techniques in wireless big data processing and study the potential implementations of key technologies in the future wireless systems. We show that proper wireless system designs could harness, and in fact take advantages of the mobile big data traffic.

Introduction

After decades of rapid growth in data services, modern society has entered the so-called “big dataera, where the mobile network is a major contributor. As of the year 2013, the global penetration of mobile subscribers had reached 92%, producing staggeringly 6800 PetaBytes (6.8 × 1018) of mobile data worldwide [1]. The surge of mobile data traffic in recent years is mainly attributed to the popularity of smartphones, mobile tablets, and other smart mobile devices. Mobile broadband applications such as web surfing, social networking, and online videos are now ubiquitously accessible by these mobile devices, without limitations from time and location. The recent survey shows that the number of smartphone users currently accounts for merely 25%–30% of the entire mobile subscribers. However, the figure will double in the next three years and continue to grow given the considerable room in the smartphone market for further uptake.With a compound annual growth rate of 45%, it is expected that the mobile data traffic will increase by ten times from 2013 to 2019.

In addition to the vast amount of wireless data, wireless signal processing often amplifies the system big data effect in the pursuit of higher performance gain. To combat the fading channel, diversity schemes, especially the MIMO antenna technologies, are extensively used in both mobile terminals (MTs) and base stations (BSs). Numerous schemes with co-located and distributed antennas have been proposed over the years to increase the data rate or extend the cellular coverage.

[1] Ericsson Mobility Report, http://www.ericsson.com/res/docs/2013/ericsson-mobilityreport- november-2013.pdf, November 2013.
[2] E.G., Larsson, O., Edfors, F., Tufvesson, and T. L., Marzetta, “Massivemimo for next generation wireless systems,” IEEE Communications Magazine, vol. 52, no. 2, pp. 186–195, February 2014.
[3] J.G., Andrews, “Sevenways that hetnets are a cellular paradigm shift,” IEEE Communications Magazine, vol. 51, no. 3, pp. 136–144, March 2013.
[4] R., Irmer, H., Droste, P., Marsch, M., Grieger, G., Fettweis, S., Brueck, H. P., Mayer, L., Thiele, and V., Jungnickel, “Coordinated multipoint: concepts, performance, and field trial results,” IEEE Communications Magazine, vol. 49, no. 2, pp. 102–111, February 2011.
[5] China Mobile, “C-RAN: the road towards green RAN,” White Paper, ver 2 (2011).
[6] U., Paul, A. P., Subramanian, M. M., Buddhikot, and S. R., Das, “Understanding traffic dynamics in cellular data networks,” in Proceedings IEEE International Conference on Computer Communications (INFOCOM), Orlando, FL, USA, June 2011.
[7] S., Woo, E., Jeong, S., Park, et al., “Comparison of caching strategies in modern cellular backhaul networks,” in Proceedings ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), Taipei, Taiwan, June 2013.
[8] N., Yu and Q., Han, “Context-aware communities and their impact on information influence in mobile social networks,” in Proceedings IEEE International Conference on Pervasive Computing and Communications (PERCOM) Workshops, Lugano, Switzerland, March 2012.
[9] Open Networking Foundation, “Software-defined networking: the new norm for networks,” white paper, 2012.
[10] M. C., Teich and B. E. A., Saleh, Fundamentals of Photonics, Canada: Wiley Interscience, 1991.
[11] P., Lukowicz, A., Pentland, and A., Frescha, “From context awareness to socially aware computing,” IEEE Pervasive Computing, vol. 11, no. 1, pp. 32–14, January–March 2012.
[12] B., Sundararaman, U., Buy, and A. D., Kshemkalyani, “Clock synchronization for wireless sensor networks: a survey,” Ad Hoc Networks, vol. 3, no. 3, pp. 281–323, December 2003.
[13] C. P., Liu and A. J., Seeds, “Transmission of wireless mimo-type signals over a single optical fiber without wdm,” IEEE Transactions on Microwave Theory and Techniques, vol. 58, no. 11, pp. 3094–3102, November 2010.
[14] A. E., Gamal and Y. H., Kim, Network Information Theory, Cambridge University Press, 2011.
[15] A., Sanderovich, O., Somekh, H. V., Poor, and S., Shamai, “Uplink macro diversity of limited backhaul cellular network,” IEEE Trans. Information Theory, vol. 55, no. 8, pp. 3457–3478, August 2009.
[16] A. D., Coso and S., Simoens, “Distributed compression for mimo coordinated networks with a backhaul constraint,” IEEE Transactions on Communications, vol. 8, no. 9, pp. 4698–4709, September 2009.
[17] Y., Zhou and W., Yu, “Optimized backhaul compression for uplink cloud radio access network,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 6, pp. 1295–1307, June 2014.
[18] S., Park, O., Simeone, O., Sahin, and S., Shamai, “Joint decompression and decoding for cloud radio access networks,” IEEE Signal Processing Letters, vol. 20, no. 5, pp. 503–506, May 2013.
[19] S., Park, O., Simeone, O., Sahin, and S., Shamai, “Robust and efficient distributed compression for cloud radio access networks,” IEEE Transactions on Vehicular Technology, vol. 62, no. 2, pp. 692–703, February 2013.
[20] L., Zhou and W., Yu, “Uplink multicell processing with limited backhaul via per-base-station successive interference cancellation,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 10, pp. 1981–1993, October 2013.
[21] O., Simeone, O., Somekh, and S., Shamai, “Downlink multicell processing with limitedbackhaul capacity,” EURASIP Journal on Advances in Signal Processing, pp. 1–10, May 2009.
[22] S. H., Park, O., Simeone, O., Sahin, and S., Shamai, “Joint precoding and multivariate backhaul compression for the downlink of cloud radio access networks,” IEEE Transactions on Signal Processing, vol. 61, no. 22, pp. 5646–5658, November 2013.
[23] P., Marsch and G., Fettweis, “A framework for optimizing the uplink performance of distributed antenna systems under a constrained backhaul,” in Proceedings IEEE International Conference on Communications (ICC), Glasgow, Scotland, June 2007.
[24] R., Zhang and J. M., Cioffi, “Exploiting opportunistic multiuser detection in decentralized multiuser mimo systems,” IEEE Transactions on Wireless Communications, vol. 10, no. 8, pp. 2474–2485, August 2011.
[25] S., Park, C. B., Chae, and S., Bahk, “Before/after precoded massive mimo in cloud radio access networks,” in Proceedings International Conference on Communications (ICC) Workshop, Budapest, Hungary, June 2013.
[26] P. D., Kerret and D., Gesbert, “Sparse precoding in multicell mimo systems,” in Proceedings IEEE Wireless Communications and Networking Conference (WCNC), Paris, France, April 2012.
[27] M., Hong, R., Sun, H., Baligh, and Z. Q., Luo, “Joint base station clustering and beamformer design for partial coordinated transmission in heterogeneous networks,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 2, pp. 226–240, February 2013.
[28] F., Zhuang and V. K. N., Lau, “Backhaul limited asymmetric cooperations for mimo cellular networks via semidefinite relaxation,” IEEE Transactions on Signal Processing, vol. 62, no. 3, pp. 684–693, February 2014.
[29] J., Zhao, T., Quek, and Z., Lei, “Coordinated multipoint transmission with limited backhaul data transfer,” IEEE Transactions on Wireless Communications, vol. 12, no. 6, pp. 2762– 2775, June 2013.
[30] R., Zakhour and D., Gesbert, “Optimized data sharing in multicell mimo with finite backhaul capacity,” IEEE Transactions on Signal Processing, vol. 59, no. 12, pp. 6102–6111, December 2011.
[31] Q., Zhang, C., Yang, and A., Molisch, “Downlink base station cooperative transmission under limited-capacity backhaul,” IEEE Transactions on Wireless Communications, vol. 12, no. 8, pp. 3746–3759, August 2013.
[32] A., Chowdhery, W., Yu, and J. M., Cioffi, “Cooperative wireless multicell ofdma network with backhaul capacity constraints,” in Proceedings IEEE International Conference on Communications (ICC), Kyoto, Japan, June 2011.
[33] N., Golrezaei, K., Shanmugam, A. G., Dimakis, A. F., Molisch, and G., Caire, “Femtocaching: wireless video content delivery through distributed caching helpers,” in Proceedings International Conference on Computer Communications (INFOCOM), Orlando, FL, USA, March 2012.
[34] A., Liu and V., Lau, “Cache-enabled opportunistic cooperative mimo for video streaming in wireless systems,” IEEE Transactions on Signal Processing, vol. 62, no. 2, pp. 390–402, January 2014.
[35] N., Golrezaei, A. G., Dimakis, and A. F., Molisch, “Wireless device-to-device communications with distributed caching,” in IEEE International Symposium on Information Theory Proceedings (ISIT), Cambridge, MA, USA, July 2012.
[36] M., Ji, G., Caire, and A. F., Molisch, “Optimal throughput-outage trade-off in wireless one-hop caching networks,” in IEEE International Symposium on Information Theory Proceedings (ISIT), Istanbul, Turkey, July 2012.
[37] K., Tutschku and P., Tran-Gia, “Spatial traffic estimation and characterization for mobile communication network design,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 5, pp. 804–811, June 1998.
[38] S., Ha, S., Sen, C., Joe-Wong, Y., Im, and M., Chiang, “Tube: time-dependent pricing for mobile data,” ACM SIGCOMM Computer Communication Review, vol. 42, no. 4, pp. 247–258, August 2012.
[39] F., Yu and V., Leung, “Mobility-based predictive call admission control and bandwidth reservation in wireless cellular networks,” Computer Networks, vol. 38, no. 5, pp. 577–589, October 2002.
[40] A., Krause, A., Smailagic, and D. P., Siewiorek, “Context-aware mobile computing: learning context-dependent personal preferences from a wearable sensor array,” IEEE Transactions on Mobile Computing, vol. 5, no. 2, pp. 113–127, February 2006.
[41] H., Zang and J. C., Bolot, “Mining call and mobility data to improve paging efficiency in cellular networks,” in Proceedings ACM Mobile Computing and Networking (MobiCom), Montreal, Canada, September 2007.
[42] G., Liu and G. M., Jr, “A class of mobile motion prediction algorithms for wireless mobile computing and communication,” Mobile Networks and Applications, vol. 1, no. 2, pp. 113–121, October 1996.
[43] T., Liu, P., Bahl, and I., Chlamtac, “Mobility modeling, location tracking, and trajectory prediction in wireless atm networks,” IEEE Journal on Selected Areas in Communications, vol. 6, no. 6, pp. 922–936, August 1998.
[44] M. M., Zonoozi and P., Dassanayake, “User mobility modeling and characterization of mobility patterns,” IEEE Journal on Selected Areas in Communications, vol. 15, no. 7, pp. 1239–1252, September 1997.
[45] P. S., Prasad and P., Agrawal, “Movement prediction in wireless networks using mobility traces,” in Proceedings IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, January 2010.
[46] P. N., Pathirana, A. V., Savkin, and S., Jha, “Mobility modelling and trajectory prediction for cellular networks with mobile base stations,” in Proceedings ACM International Symposium on Mobile ad hoc Networking and Computing (MobiHoc), Annapolis, MD, USA, June 2003.
[47] T., Zhang, E., van den Berg, J., Chennikara, et al., “User mobility modeling and characterization of mobility patterns,” IEEE Journal on Selected Areas in Communications, vol. 19, no. 10, pp. 1931–1941, October 2001.
[48] I. F., Akyildiz and W., Wang, “The predictive user mobility profile framework for wireless multimedia networks,” IEEE/ACM Trans. Networking, vol. 12, no. 6, pp. 1021–1035, December 2004.
[49] W. C., Peng and M. S., Chen, “Mining user moving patterns for personal data allocation in a mobile computing system,” in Proceedings IEEE International Conference on Parallel Processing (ICPP), Toronto, Canada, August 2000.
[50] F., Yu and V., Leung, “Mobility-based predictive call admission control and bandwidth reservation in wireless cellular networks,” Computer Networks, vol. 38, no. 5, pp. 577–589, April 2002.
[51] E., Miluzzo, N. D., Lane, K., Fodor, et al., “Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application,” in Proceedings ACMconference on Embedded Network Sensor Systems (Sensys), Raleigh, NC, USA, November 2008.
[52] L., Gueguen and B., Sayrac, “Traffic prediction from wireless environment sensing,” in Proceedings IEEE Wireless Communications and Networking Conference (WCNC), Budapest, Hungary, April 2009.
[53] N., Eagle and A., Pentland, “Reality mining: sensing complex social systems,” Personal and Ubiquitous Computing, vol. 10, no. 4, pp. 255–268, May 2006.
[54] A., Sridharan and J., Bolot, “Location patterns of mobile users a large-scale study,” in Proceedings IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy, April 2013.
[55] C., Jedrzycki and V. C. M., Leung, “Probability distribution of channel holding time in cellular telephony systems,” in Proceedings IEEE Vehicular Technology Conference (VTC), Atlanta, GA, USA, April 1996.
[56] K., Farrahi and D., Gatica-Perez, “What did you do today?: discovering daily routines from large-scale mobile data,” in Proceedings ACM International Conference on Multimedia, Vancouver, BC, Canada, October 2008.
[57] N., Li and G., Chen, “Analysis of a location-based social network,” in Proceedings IEEE International Conference on Computational Science and Engineering (CSE), Vancouver, BC, Canada, August 2009.
[58] K. L. A., Yau, P., Komisarczuk, and P. D., Teal, “Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues,” Journal of Network and Computer Applications, vol. 35, no. 1, pp. 253–267, January 2012.
[59] D. P., Palomar and M., Chiang, “A tutorial on decomposition methods fornetwork utility maximization,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 8, pp. 1439–1451, August 2006.
[60] S., Boyd, N., Parikh, E., Chu, B., Peleato, and J., Eckstein, “Distributed optimization and statistical learning via the alternating direction method of multipliers,” Foundations and Trends in Machine Learning, vol. 3, no. 1, pp. 1–122, January 2011.
[61] G., Mateos and G. B., Giannakis, “Robust PCA as bilinear decompositionwith outlier-sparsity regularization,” IEEE Transactions on Signal Processing, vol. 60, no. 10, pp. 5176–5190, October 2012.
[62] N. D., Sidiropoulos, G. B., Giannakis, and R., Bro, “Blind PARAFAC receivers for DS-CDMA systems,” IEEE Transactions on Signal Processing, vol. 48, no. 3, pp. 810–823, March 2000.
[63] E., Acar and B., Yener, “Unsupervised multiway data analysis: A literature survey,” IEEE Transactions on Knowledge and Data Engineering, vol. 21, no. 1, pp. 6–20, January 2009.
[64] N. D., Sidiropoulos and A., Kyrillidis, “Multi-way compressed sensing for sparse low-rank tensors,” IEEE Signal Processing Letters, vol. 19, no. 11, pp. 757–760, October 2012.
[65] B., Settles, “Active learning literature survey,” Technical Report, University of Wisconsin, Madison, vol. 52, pp. 55–66, January 2010.
[66] G. E., Hinton, S., Osindero, and Y. W., Teh, “A fast learning algorithm for deep belief nets,” Neural Computation, vol. 18, no. 7, pp. 1527–1554, July 2006.
[67] P., Blasco and D., Gunduz, “Learning-based optimization of cache content in a small cell base station,” in IEEE International Conference on Communications (ICC) 2014, 2014, accepted and available at http://arxiv.org/abs/1402.3247.
[68] S., Shalev-Shwartz, “Online learning and online convex optimization,” Foundations and Trends in Machine Learning, vol. 4, no. 2, pp. 107–194, February 2012.
[69] M., Satyanarayanan, “Mobile computing: the next decade,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 15, no. 2, pp. 2–10, January 2011.
[70] E. E., Marinelli, “Hyrax: cloud computing on mobile devices using mapreduce,” Masters Thesis, Carnegie Mellon University, 2009.
[71] G., Huerta-Canepa and D., Lee, “A virtual cloud computing provider for mobile devices,” in Proceedings ACM Workshop on Mobile Cloud Computing and Services: Social Networks and Beyond (MCS), San Francisco, CA, USA, June 2010.
[72] M., Satyanarayanan, P., Bahl, R., Caceres, and N., Davies, “The case for vm-based cloudlets in mobile computing,” IEEE Pervasive Computing, vol. 8, no. 4, pp. 14–23, October– December 2009.
[73] M., Webb, Z., Li, P., Bucknell, T., Moulsley, and S., Vadgama, “Future evolution in wireless network architectures: towards a 'cloud of antennas’,” in Proceedings IEEE Vehicular Technology Conference (VTC), Quebec City, Canada, September 2012.
[74] P., Papakos, L., Capra, and D. S., Rosenblum, “Volare: context-aware adaptive cloud service discovery for mobile systems,” in Proceedings ACM International Workshop on Adaptive and Reflective Middleware, Bangalore, India, November 2010.
[75] N., Ravi, J., Scott, L., Han, and L., Iftode, “Context-aware battery management for mobile phones,” in Pervasive Computing and Communications (PerCom), Hong Kong, China, March 2008.
[76] I., Roussaki, N., Kalatzis, N., Liampotis, et al., “Context-awareness inwireless and mobile computing revisited to embrace social networking,” IEEE Communications Magazine, vol. 50, no. 6, pp. 74–81, June 2012.
[77] H., Kim and N., Feamster, “Improving network management with software defined networking,” IEEE Communications Magazine, vol. 51, no. 2, pp. 114–119, February 2013.
[78] N., McKeown, T., Anderson, H., Balakrishnan, et al., “Openflow: enabling innovation in campus networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, March 2008.
[79] N., Gude, T., Koponen, J., Pettit, et al., “Nox: towards an operating system for networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 3, pp. 105–110, July 2008.
[80] W., Tuttlebee, Software Defined Radio: Origins, Drivers, and International Perspectives, West Sussex, England: John Wiley & Sons, 2002.
[81] K. K., Yap, R., Sherwood, M., Kobayashi, et al., “Blueprint for introducing innovation into wireless mobile networks,” in Proceedings ACM SIGCOMM Workshop, New Delhi, India, August 2010.
[82] A., Gudipati, D., Perry, L. E., Li, and S., Katti, “Softran: software defined radio access network,” in Proceedings ACM SIGCOMM Workshop, Hong Kong, China, August 2013.
[83] X., Jin, L. E., Li, and L., Vanbevery, “Softcell: scalable and flexible cellular core network architecture,” in Proceedings ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT), Santa Barbara, CA, USA, December 2013.
[84] W. C., Liao, M., Hong, H., Farmanbar, et al., “Min flow rate maximization for software defined radio access networks,” http://arxiv.org/abs/1312.5345, 2013.