Skip to main content Accessibility help
×
Hostname: page-component-8448b6f56d-m8qmq Total loading time: 0 Render date: 2024-04-16T04:05:18.475Z Has data issue: false hasContentIssue false

7 - Big data aware wireless communication: challenges and opportunities

from Part II - Big data over cyber networks

Published online by Cambridge University Press:  18 December 2015

Suzhi Bi
Affiliation:
National University of Singapore, Singapore
Rui Zhang
Affiliation:
National University of Singapore, Singapore
Zhi Ding
Affiliation:
University of California at Davis, USA
Shuguang Cui
Affiliation:
Texas A&M University, USA
Shuguang Cui
Affiliation:
Texas A & M University
Alfred O. Hero, III
Affiliation:
University of Michigan, Ann Arbor
Zhi-Quan Luo
Affiliation:
University of Minnesota
José M. F. Moura
Affiliation:
Carnegie Mellon University, Pennsylvania
Get access

Summary

The fast-growing wireless data service is pushing our communication network's processing power to its limit. The ever-increasing data traffic poses imminent challenges to all aspects of the wireless system design, such as spectrum efficiency, computing capabilities, and backhaul link capacity, etc. At the same time, the massive amount of mobile data traffic may also lead to potential system performance gain that is otherwise not achievable with conventional wireless signal processing models. In this chapter, we investigate the challenges and opportunities in the design of scalable wireless systems to embrace such a “big data” era.We review state-of-the-art techniques in wireless big data processing and study the potential implementations of key technologies in the future wireless systems. We show that proper wireless system designs could harness, and in fact take advantages of the mobile big data traffic.

Introduction

After decades of rapid growth in data services, modern society has entered the so-called “big dataera, where the mobile network is a major contributor. As of the year 2013, the global penetration of mobile subscribers had reached 92%, producing staggeringly 6800 PetaBytes (6.8 × 1018) of mobile data worldwide [1]. The surge of mobile data traffic in recent years is mainly attributed to the popularity of smartphones, mobile tablets, and other smart mobile devices. Mobile broadband applications such as web surfing, social networking, and online videos are now ubiquitously accessible by these mobile devices, without limitations from time and location. The recent survey shows that the number of smartphone users currently accounts for merely 25%–30% of the entire mobile subscribers. However, the figure will double in the next three years and continue to grow given the considerable room in the smartphone market for further uptake.With a compound annual growth rate of 45%, it is expected that the mobile data traffic will increase by ten times from 2013 to 2019.

In addition to the vast amount of wireless data, wireless signal processing often amplifies the system big data effect in the pursuit of higher performance gain. To combat the fading channel, diversity schemes, especially the MIMO antenna technologies, are extensively used in both mobile terminals (MTs) and base stations (BSs). Numerous schemes with co-located and distributed antennas have been proposed over the years to increase the data rate or extend the cellular coverage.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2016

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] Ericsson Mobility Report, http://www.ericsson.com/res/docs/2013/ericsson-mobilityreport- november-2013.pdf, November 2013.
[2] E.G., Larsson, O., Edfors, F., Tufvesson, and T. L., Marzetta, “Massivemimo for next generation wireless systems,” IEEE Communications Magazine, vol. 52, no. 2, pp. 186–195, February 2014.Google Scholar
[3] J.G., Andrews, “Sevenways that hetnets are a cellular paradigm shift,” IEEE Communications Magazine, vol. 51, no. 3, pp. 136–144, March 2013.Google Scholar
[4] R., Irmer, H., Droste, P., Marsch, M., Grieger, G., Fettweis, S., Brueck, H. P., Mayer, L., Thiele, and V., Jungnickel, “Coordinated multipoint: concepts, performance, and field trial results,” IEEE Communications Magazine, vol. 49, no. 2, pp. 102–111, February 2011.Google Scholar
[5] China Mobile, “C-RAN: the road towards green RAN,” White Paper, ver 2 (2011).
[6] U., Paul, A. P., Subramanian, M. M., Buddhikot, and S. R., Das, “Understanding traffic dynamics in cellular data networks,” in Proceedings IEEE International Conference on Computer Communications (INFOCOM), Orlando, FL, USA, June 2011.Google Scholar
[7] S., Woo, E., Jeong, S., Park, et al., “Comparison of caching strategies in modern cellular backhaul networks,” in Proceedings ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), Taipei, Taiwan, June 2013.Google Scholar
[8] N., Yu and Q., Han, “Context-aware communities and their impact on information influence in mobile social networks,” in Proceedings IEEE International Conference on Pervasive Computing and Communications (PERCOM) Workshops, Lugano, Switzerland, March 2012.Google Scholar
[9] Open Networking Foundation, “Software-defined networking: the new norm for networks,” white paper, 2012.
[10] M. C., Teich and B. E. A., Saleh, Fundamentals of Photonics, Canada: Wiley Interscience, 1991.Google Scholar
[11] P., Lukowicz, A., Pentland, and A., Frescha, “From context awareness to socially aware computing,” IEEE Pervasive Computing, vol. 11, no. 1, pp. 32–14, January–March 2012.Google Scholar
[12] B., Sundararaman, U., Buy, and A. D., Kshemkalyani, “Clock synchronization for wireless sensor networks: a survey,” Ad Hoc Networks, vol. 3, no. 3, pp. 281–323, December 2003.Google Scholar
[13] C. P., Liu and A. J., Seeds, “Transmission of wireless mimo-type signals over a single optical fiber without wdm,” IEEE Transactions on Microwave Theory and Techniques, vol. 58, no. 11, pp. 3094–3102, November 2010.Google Scholar
[14] A. E., Gamal and Y. H., Kim, Network Information Theory, Cambridge University Press, 2011.Google Scholar
[15] A., Sanderovich, O., Somekh, H. V., Poor, and S., Shamai, “Uplink macro diversity of limited backhaul cellular network,” IEEE Trans. Information Theory, vol. 55, no. 8, pp. 3457–3478, August 2009.Google Scholar
[16] A. D., Coso and S., Simoens, “Distributed compression for mimo coordinated networks with a backhaul constraint,” IEEE Transactions on Communications, vol. 8, no. 9, pp. 4698–4709, September 2009.Google Scholar
[17] Y., Zhou and W., Yu, “Optimized backhaul compression for uplink cloud radio access network,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 6, pp. 1295–1307, June 2014.Google Scholar
[18] S., Park, O., Simeone, O., Sahin, and S., Shamai, “Joint decompression and decoding for cloud radio access networks,” IEEE Signal Processing Letters, vol. 20, no. 5, pp. 503–506, May 2013.Google Scholar
[19] S., Park, O., Simeone, O., Sahin, and S., Shamai, “Robust and efficient distributed compression for cloud radio access networks,” IEEE Transactions on Vehicular Technology, vol. 62, no. 2, pp. 692–703, February 2013.Google Scholar
[20] L., Zhou and W., Yu, “Uplink multicell processing with limited backhaul via per-base-station successive interference cancellation,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 10, pp. 1981–1993, October 2013.Google Scholar
[21] O., Simeone, O., Somekh, and S., Shamai, “Downlink multicell processing with limitedbackhaul capacity,” EURASIP Journal on Advances in Signal Processing, pp. 1–10, May 2009.Google Scholar
[22] S. H., Park, O., Simeone, O., Sahin, and S., Shamai, “Joint precoding and multivariate backhaul compression for the downlink of cloud radio access networks,” IEEE Transactions on Signal Processing, vol. 61, no. 22, pp. 5646–5658, November 2013.Google Scholar
[23] P., Marsch and G., Fettweis, “A framework for optimizing the uplink performance of distributed antenna systems under a constrained backhaul,” in Proceedings IEEE International Conference on Communications (ICC), Glasgow, Scotland, June 2007.Google Scholar
[24] R., Zhang and J. M., Cioffi, “Exploiting opportunistic multiuser detection in decentralized multiuser mimo systems,” IEEE Transactions on Wireless Communications, vol. 10, no. 8, pp. 2474–2485, August 2011.Google Scholar
[25] S., Park, C. B., Chae, and S., Bahk, “Before/after precoded massive mimo in cloud radio access networks,” in Proceedings International Conference on Communications (ICC) Workshop, Budapest, Hungary, June 2013.Google Scholar
[26] P. D., Kerret and D., Gesbert, “Sparse precoding in multicell mimo systems,” in Proceedings IEEE Wireless Communications and Networking Conference (WCNC), Paris, France, April 2012.Google Scholar
[27] M., Hong, R., Sun, H., Baligh, and Z. Q., Luo, “Joint base station clustering and beamformer design for partial coordinated transmission in heterogeneous networks,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 2, pp. 226–240, February 2013.Google Scholar
[28] F., Zhuang and V. K. N., Lau, “Backhaul limited asymmetric cooperations for mimo cellular networks via semidefinite relaxation,” IEEE Transactions on Signal Processing, vol. 62, no. 3, pp. 684–693, February 2014.Google Scholar
[29] J., Zhao, T., Quek, and Z., Lei, “Coordinated multipoint transmission with limited backhaul data transfer,” IEEE Transactions on Wireless Communications, vol. 12, no. 6, pp. 2762– 2775, June 2013.Google Scholar
[30] R., Zakhour and D., Gesbert, “Optimized data sharing in multicell mimo with finite backhaul capacity,” IEEE Transactions on Signal Processing, vol. 59, no. 12, pp. 6102–6111, December 2011.Google Scholar
[31] Q., Zhang, C., Yang, and A., Molisch, “Downlink base station cooperative transmission under limited-capacity backhaul,” IEEE Transactions on Wireless Communications, vol. 12, no. 8, pp. 3746–3759, August 2013.Google Scholar
[32] A., Chowdhery, W., Yu, and J. M., Cioffi, “Cooperative wireless multicell ofdma network with backhaul capacity constraints,” in Proceedings IEEE International Conference on Communications (ICC), Kyoto, Japan, June 2011.Google Scholar
[33] N., Golrezaei, K., Shanmugam, A. G., Dimakis, A. F., Molisch, and G., Caire, “Femtocaching: wireless video content delivery through distributed caching helpers,” in Proceedings International Conference on Computer Communications (INFOCOM), Orlando, FL, USA, March 2012.Google Scholar
[34] A., Liu and V., Lau, “Cache-enabled opportunistic cooperative mimo for video streaming in wireless systems,” IEEE Transactions on Signal Processing, vol. 62, no. 2, pp. 390–402, January 2014.Google Scholar
[35] N., Golrezaei, A. G., Dimakis, and A. F., Molisch, “Wireless device-to-device communications with distributed caching,” in IEEE International Symposium on Information Theory Proceedings (ISIT), Cambridge, MA, USA, July 2012.Google Scholar
[36] M., Ji, G., Caire, and A. F., Molisch, “Optimal throughput-outage trade-off in wireless one-hop caching networks,” in IEEE International Symposium on Information Theory Proceedings (ISIT), Istanbul, Turkey, July 2012.Google Scholar
[37] K., Tutschku and P., Tran-Gia, “Spatial traffic estimation and characterization for mobile communication network design,” IEEE Journal on Selected Areas in Communications, vol. 16, no. 5, pp. 804–811, June 1998.Google Scholar
[38] S., Ha, S., Sen, C., Joe-Wong, Y., Im, and M., Chiang, “Tube: time-dependent pricing for mobile data,” ACM SIGCOMM Computer Communication Review, vol. 42, no. 4, pp. 247–258, August 2012.Google Scholar
[39] F., Yu and V., Leung, “Mobility-based predictive call admission control and bandwidth reservation in wireless cellular networks,” Computer Networks, vol. 38, no. 5, pp. 577–589, October 2002.Google Scholar
[40] A., Krause, A., Smailagic, and D. P., Siewiorek, “Context-aware mobile computing: learning context-dependent personal preferences from a wearable sensor array,” IEEE Transactions on Mobile Computing, vol. 5, no. 2, pp. 113–127, February 2006.Google Scholar
[41] H., Zang and J. C., Bolot, “Mining call and mobility data to improve paging efficiency in cellular networks,” in Proceedings ACM Mobile Computing and Networking (MobiCom), Montreal, Canada, September 2007.Google Scholar
[42] G., Liu and G. M., Jr, “A class of mobile motion prediction algorithms for wireless mobile computing and communication,” Mobile Networks and Applications, vol. 1, no. 2, pp. 113–121, October 1996.Google Scholar
[43] T., Liu, P., Bahl, and I., Chlamtac, “Mobility modeling, location tracking, and trajectory prediction in wireless atm networks,” IEEE Journal on Selected Areas in Communications, vol. 6, no. 6, pp. 922–936, August 1998.Google Scholar
[44] M. M., Zonoozi and P., Dassanayake, “User mobility modeling and characterization of mobility patterns,” IEEE Journal on Selected Areas in Communications, vol. 15, no. 7, pp. 1239–1252, September 1997.Google Scholar
[45] P. S., Prasad and P., Agrawal, “Movement prediction in wireless networks using mobility traces,” in Proceedings IEEE Consumer Communications and Networking Conference (CCNC), Las Vegas, NV, USA, January 2010.Google Scholar
[46] P. N., Pathirana, A. V., Savkin, and S., Jha, “Mobility modelling and trajectory prediction for cellular networks with mobile base stations,” in Proceedings ACM International Symposium on Mobile ad hoc Networking and Computing (MobiHoc), Annapolis, MD, USA, June 2003.Google Scholar
[47] T., Zhang, E., van den Berg, J., Chennikara, et al., “User mobility modeling and characterization of mobility patterns,” IEEE Journal on Selected Areas in Communications, vol. 19, no. 10, pp. 1931–1941, October 2001.Google Scholar
[48] I. F., Akyildiz and W., Wang, “The predictive user mobility profile framework for wireless multimedia networks,” IEEE/ACM Trans. Networking, vol. 12, no. 6, pp. 1021–1035, December 2004.Google Scholar
[49] W. C., Peng and M. S., Chen, “Mining user moving patterns for personal data allocation in a mobile computing system,” in Proceedings IEEE International Conference on Parallel Processing (ICPP), Toronto, Canada, August 2000.Google Scholar
[50] F., Yu and V., Leung, “Mobility-based predictive call admission control and bandwidth reservation in wireless cellular networks,” Computer Networks, vol. 38, no. 5, pp. 577–589, April 2002.Google Scholar
[51] E., Miluzzo, N. D., Lane, K., Fodor, et al., “Sensing meets mobile social networks: the design, implementation and evaluation of the cenceme application,” in Proceedings ACMconference on Embedded Network Sensor Systems (Sensys), Raleigh, NC, USA, November 2008.Google Scholar
[52] L., Gueguen and B., Sayrac, “Traffic prediction from wireless environment sensing,” in Proceedings IEEE Wireless Communications and Networking Conference (WCNC), Budapest, Hungary, April 2009.
[53] N., Eagle and A., Pentland, “Reality mining: sensing complex social systems,” Personal and Ubiquitous Computing, vol. 10, no. 4, pp. 255–268, May 2006.Google Scholar
[54] A., Sridharan and J., Bolot, “Location patterns of mobile users a large-scale study,” in Proceedings IEEE International Conference on Computer Communications (INFOCOM), Turin, Italy, April 2013.Google Scholar
[55] C., Jedrzycki and V. C. M., Leung, “Probability distribution of channel holding time in cellular telephony systems,” in Proceedings IEEE Vehicular Technology Conference (VTC), Atlanta, GA, USA, April 1996.Google Scholar
[56] K., Farrahi and D., Gatica-Perez, “What did you do today?: discovering daily routines from large-scale mobile data,” in Proceedings ACM International Conference on Multimedia, Vancouver, BC, Canada, October 2008.Google Scholar
[57] N., Li and G., Chen, “Analysis of a location-based social network,” in Proceedings IEEE International Conference on Computational Science and Engineering (CSE), Vancouver, BC, Canada, August 2009.Google Scholar
[58] K. L. A., Yau, P., Komisarczuk, and P. D., Teal, “Reinforcement learning for context awareness and intelligence in wireless networks: Review, new features and open issues,” Journal of Network and Computer Applications, vol. 35, no. 1, pp. 253–267, January 2012.Google Scholar
[59] D. P., Palomar and M., Chiang, “A tutorial on decomposition methods fornetwork utility maximization,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 8, pp. 1439–1451, August 2006.Google Scholar
[60] S., Boyd, N., Parikh, E., Chu, B., Peleato, and J., Eckstein, “Distributed optimization and statistical learning via the alternating direction method of multipliers,” Foundations and Trends in Machine Learning, vol. 3, no. 1, pp. 1–122, January 2011.Google Scholar
[61] G., Mateos and G. B., Giannakis, “Robust PCA as bilinear decompositionwith outlier-sparsity regularization,” IEEE Transactions on Signal Processing, vol. 60, no. 10, pp. 5176–5190, October 2012.Google Scholar
[62] N. D., Sidiropoulos, G. B., Giannakis, and R., Bro, “Blind PARAFAC receivers for DS-CDMA systems,” IEEE Transactions on Signal Processing, vol. 48, no. 3, pp. 810–823, March 2000.Google Scholar
[63] E., Acar and B., Yener, “Unsupervised multiway data analysis: A literature survey,” IEEE Transactions on Knowledge and Data Engineering, vol. 21, no. 1, pp. 6–20, January 2009.Google Scholar
[64] N. D., Sidiropoulos and A., Kyrillidis, “Multi-way compressed sensing for sparse low-rank tensors,” IEEE Signal Processing Letters, vol. 19, no. 11, pp. 757–760, October 2012.Google Scholar
[65] B., Settles, “Active learning literature survey,” Technical Report, University of Wisconsin, Madison, vol. 52, pp. 55–66, January 2010.Google Scholar
[66] G. E., Hinton, S., Osindero, and Y. W., Teh, “A fast learning algorithm for deep belief nets,” Neural Computation, vol. 18, no. 7, pp. 1527–1554, July 2006.Google Scholar
[67] P., Blasco and D., Gunduz, “Learning-based optimization of cache content in a small cell base station,” in IEEE International Conference on Communications (ICC) 2014, 2014, accepted and available at http://arxiv.org/abs/1402.3247.
[68] S., Shalev-Shwartz, “Online learning and online convex optimization,” Foundations and Trends in Machine Learning, vol. 4, no. 2, pp. 107–194, February 2012.Google Scholar
[69] M., Satyanarayanan, “Mobile computing: the next decade,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 15, no. 2, pp. 2–10, January 2011.Google Scholar
[70] E. E., Marinelli, “Hyrax: cloud computing on mobile devices using mapreduce,” Masters Thesis, Carnegie Mellon University, 2009.
[71] G., Huerta-Canepa and D., Lee, “A virtual cloud computing provider for mobile devices,” in Proceedings ACM Workshop on Mobile Cloud Computing and Services: Social Networks and Beyond (MCS), San Francisco, CA, USA, June 2010.Google Scholar
[72] M., Satyanarayanan, P., Bahl, R., Caceres, and N., Davies, “The case for vm-based cloudlets in mobile computing,” IEEE Pervasive Computing, vol. 8, no. 4, pp. 14–23, October– December 2009.Google Scholar
[73] M., Webb, Z., Li, P., Bucknell, T., Moulsley, and S., Vadgama, “Future evolution in wireless network architectures: towards a 'cloud of antennas’,” in Proceedings IEEE Vehicular Technology Conference (VTC), Quebec City, Canada, September 2012.Google Scholar
[74] P., Papakos, L., Capra, and D. S., Rosenblum, “Volare: context-aware adaptive cloud service discovery for mobile systems,” in Proceedings ACM International Workshop on Adaptive and Reflective Middleware, Bangalore, India, November 2010.Google Scholar
[75] N., Ravi, J., Scott, L., Han, and L., Iftode, “Context-aware battery management for mobile phones,” in Pervasive Computing and Communications (PerCom), Hong Kong, China, March 2008.Google Scholar
[76] I., Roussaki, N., Kalatzis, N., Liampotis, et al., “Context-awareness inwireless and mobile computing revisited to embrace social networking,” IEEE Communications Magazine, vol. 50, no. 6, pp. 74–81, June 2012.Google Scholar
[77] H., Kim and N., Feamster, “Improving network management with software defined networking,” IEEE Communications Magazine, vol. 51, no. 2, pp. 114–119, February 2013.Google Scholar
[78] N., McKeown, T., Anderson, H., Balakrishnan, et al., “Openflow: enabling innovation in campus networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 2, pp. 69–74, March 2008.Google Scholar
[79] N., Gude, T., Koponen, J., Pettit, et al., “Nox: towards an operating system for networks,” ACM SIGCOMM Computer Communication Review, vol. 38, no. 3, pp. 105–110, July 2008.Google Scholar
[80] W., Tuttlebee, Software Defined Radio: Origins, Drivers, and International Perspectives, West Sussex, England: John Wiley & Sons, 2002.
[81] K. K., Yap, R., Sherwood, M., Kobayashi, et al., “Blueprint for introducing innovation into wireless mobile networks,” in Proceedings ACM SIGCOMM Workshop, New Delhi, India, August 2010.Google Scholar
[82] A., Gudipati, D., Perry, L. E., Li, and S., Katti, “Softran: software defined radio access network,” in Proceedings ACM SIGCOMM Workshop, Hong Kong, China, August 2013.Google Scholar
[83] X., Jin, L. E., Li, and L., Vanbevery, “Softcell: scalable and flexible cellular core network architecture,” in Proceedings ACM Conference on Emerging Networking Experiments and Technologies (CoNEXT), Santa Barbara, CA, USA, December 2013.Google Scholar
[84] W. C., Liao, M., Hong, H., Farmanbar, et al., “Min flow rate maximization for software defined radio access networks,” http://arxiv.org/abs/1312.5345, 2013.

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×