Achieving the low-latency constraints of public safety applications during disaster could be life-saving. In the context of public safety scenarios, in this paper, we propose an efficient radio resource slicing algorithm that enables first responders to deliver their life-saving activities effectively. We used the tool of stochastic geometry to model the base station distribution before and after a disaster. In addition, under this umbrella, we also proposed an example of public safety scenario, ultrareliable low-latency file sharing, via in-band device-to-device (D2D) communication. The example scenario is implemented in NS-3. The simulation results show that radio resource slicing and prioritization of first responders resources can ensure ultrareliable low-latency communication (URLLC) in emergency scenarios.
1. Introduction
The vision of future 5G cellular networks and beyond (B5G) has added various use cases to the current 4G cellular networks. Instead of sole mobile broadband, the aim is to provide full support for new technologies such as augmented reality, Internet of Things (IoT), Internet of Vehicles (IoV), Tactile Internet, and Machine-to-Machine (M2M) and Machine-to-Human (M2H) communications [1]. In parallel, the future 5G ecosystem [2] will also support governmental and defence communications, communications for disaster relief, humanitarian aid, and intelligent transportation systems. That means the plan is to make 5G the main infrastructure for future generations of public safety networks (PSNs).
5G and B5G will need to address several challenges to guarantee the desired key performance indicators (KPIs). In particular, these requirements are as follows:
Throughput: 10 times higher data rates to individual end users.
Latency: 1–10 ms round-trip time to allow also the support for URLLCs.
Higher bandwidth per unit area and enormous number of connected devices.
Perceived network availability of 99.999% to allow also the support for URLLCs.
Energy efficiency: energy-usage reduction of about 90%.
Service creation time: time to set up a service from application to individual service components in a second or less.
Battery lifetime: 10 times increase in battery life.
The scope of public safety networks is the provisioning of effective communications infrastructure in case of emergency/catastrophic events, which either can significantly reduce network coverage/capabilities or can create a complete outage. During these events, the first responders such as law enforcement, firefighters, emergency medical staff, the military, and volunteer organizations should have a robust and efficient network to rely on. In particular, Professional Mobile Radio (PMR) and Public Safety Land Mobile Radio (PLMR) are the current technologies used by public safety entities. Moreover, current PSNs can be categorized into two main families: LMSR (i.e., TETRA and APCO-25) and broadband networks (i.e., LTE for PSN such as FirstNet).
In the last decade, significant part of the research community focused on enhancing PSNs [5, 6]. The investigation has released several solutions mainly involving massive MIMO, small cells, unmanned aerial vehicles (UAVs), satellite networks, ad hoc networks, spectrum sharing, and cognitive radio.
Even if there is a wide panorama of solutions to enhance PSNs, actual assessments of disaster response capabilities in terms of response time and available capacity have underlined the limitations [7] of current PSNs and the open issues in case of real disasters (e.g., Japan Earthquake 2011). The main problems of that inefficiency are due to the following:
Lack of interoperability among networks of different rescue/emergency entities/organizations; no interoperability with information provided by normal users during and after the disaster.
High error rate due to outage and congestions; keep network robust.
Inefficiency to provide significant communication resources after the disaster; traffic congestion due to rapid traffic generation. Ten times larger traffic with low percentage of resources available. The round-trip time (RTT) after disaster could reach 100–150 ms and even hours in the worst cases.
No possibility of providing television/radio broadcasting support after disaster.
Thus, future 5G networks can provide the right infrastructure to address all the above problems via dedicated interfaces for ultrareliable low-latency communications (URLLCs), supported by efficient virtualization, slicing, and dynamic adaptation: this can guarantee an effective amount of bandwidth and significantly lower delays under critical conditions as well.
During the last years, part of the research tried to improve current PSNs by targeting the lack of coverage and bandwidth with the deployment of UAVs [8]. In particular, the use of unmanned aerial base stations (UABSs) can have the advantage of rapid deployment and large on-demand coverage provisioning. However, battery lifetime and interference management become crucial issues. Moreover, after a disaster, the correct setup of UABS-based access network still requires some time and does not address the immediate need of optimized resources.
This article provides an efficient and effective virtualized architecture to address URLLCs provisioning to PSNs in the presence of scarce resources: that may be due to a natural disaster, a terrorist attack, or other catastrophic events. In particular, the solution employs virtualization of resources at eNodeB, performing slicing operations, thus enabling first responders to use the existing scarce radio resources in an effective way until more resources are available via the deployment of UABS. Moreover, short-range and device-to-device communications provide efficient additional coverage and bandwidth while guaranteeing low delays. The whole architecture combines all the aforementioned technologies to guarantee robust communications and RTTs in line with 5G KPIs for URLLCs.
The main contributions of this paper include the following:
A novel architecture based on virtualization of network resources; a resource slicing algorithm tailored to handle the radio resource insufficiency to guarantee optimal integration of PSNs into current LTE cellular networks.
A novel solution to integrate software-defined networking (SDN) and short-range communications among user equipment to guarantee PSNs’ operational requirements in the context of 5G-based PSNs.
Simulations and numerical evaluations of the overall system to prove that URLLCs in PSNs can achieve the desired latency.
Moreover, the article introduces the basics to apply stochastic geometry to model the behavior of cellular networks after a disaster.
The paper is structured as follows. Section 2 introduces the system model and describes in detail the network structure and the architecture. It also provides a clear description of how slicing virtual resources works. Next, Section 3 discusses how optimization of resources works and how it can provide optimal coverage/capacity when scarce. Section 4 describes how the slicing of resources and the D2D communications are working together for optimal resources provisioning, towards low-latency communications. Finally, Section 5 shows and discusses the achieved results in terms of latency and efficiency. Furthermore, it gives some direction to guarantee the security of the D2D environment.
2. System Model
The following subsections introduce in detail the assumptions and hypotheses under which the system can provide URLLCs to public safety networks. Side by side, they discuss the network and the radio resource slicing models.
2.1. Network Model
Let us consider an urban scenario with a medium/high device density (greater than 103 devices per km2 [9]). Next, at a specific time t1, a general catastrophic event happens so that the infrastructure becomes limited [9]: in particular, that means only a small percentage of macro cell coverage and cellular resources remain available.
In order to provide an accurate model for the scenario, the article borrows the distribution of base stations (BSs) in the dense urban environment of London [10]. Then, the distribution of BSs can be modeled via a Poisson point process (PPP) of density (for time t<t1) λ=N/A=80 [10].
Nevertheless, at t=t1, the catastrophic event happens, and the PPP of the BSs changes. This change can be modeled as an independent thinning transformation [11]. In particular, this means removing certain points according to a probabilistic rule, independent of all points.
Let g:R→[0,1] be the thinning function applied to the PPP of BSs ΦBS, by deleting each point x∈ΦBS with probability 1-g(x), independently of all other points. At t>t1, ΦBS′ denotes the inhomogeneous PPP with new intensity λBSg(x).
Figure 1 depicts an example of how a London-like urban scenario changes because of a disaster. Figure 1(a) shows the map of the coverage, given the full network. Figure 1(b) represents the Voronoi tessellation generated by the thinned PPP. The disaster is simply modeled by a thinning function that randomly and uniformly selects a percentage of BSs, which remains active.
(a) Voronoi tessellation of PPP (t<t1), which models an urban scenario inspired by London [10]. (b) Voronoi tessellation of the urban scenario after the disaster (t>t1), considering 30% of BSs remain active to serve all the region.
Next, the probability mass function (PMF) of the amount of user equipment (UE) in a Voronoi cell can be approximated as(1)PrK=k=3431572π1k!λMTλBSkλMTλBS+72-k-7/2Γk+72. Let us assume a channel model, which has unbounded path loss and Rayleigh fading. The power path loss of a BS-to-UE link can be expressed as(2)l~r=4πνrα, where r is the distance of MT from BS, 4π/ν denotes the free space path loss (FSPL) at 1 meter from the transmitting device (ν is the wavelength), and α>2 is the path loss exponent.
Furthermore, a generic BS-to-UE link only experiences flat Rayleigh fading h with expected value E[h]=Ω and probability density function (PDF):(3)fhx=1Ωexp-xΩ. The fading of each link is independent and identically distributed (i.i.d.), and it is assumed to be constant during a transmission time slot and to independently change for each time slot.
Let BS0 be a general base station in the Voronoi cell V(0), located at the position x0: this Voronoi cell contains K mobile terminals. Let ΦBS∖0 be the set of base stations ΦBS∖0, which considers all the BSs not in V(0). So, the signal-to-interference-plus-noise ratio (SINR) at UEk in the Voronoi cell V(0) in time slot τ becomes(4)SINRkτ=Ph0,kτl~r0-1N0+P∑i∈ΦBS∖0hi,kτl~ri-1,where P is the transmission power, N0 is the variance of the additive white Gaussian noise (AWGN), r0=xk-y0, and ri=xk-yi.
Finally, the transmission success probability of a packet during time slot τ is(5)ps=PrSINRkτ>β, where β is the SINR threshold. In particular, this threshold is related to the transmission rate R at the physical layer, and it can be expressed as β=2R-1 due to Shannon’s capacity formula.
Hence, the above expressions analytically show that the reduction of BSs implies a new scenario with larger cells, containing more UE to be served, which can be at a significant distance from the serving BS. Furthermore, by keeping the same transmission power, it is possible to see that the SINR decreases together with the quality and the latency of the transmission.
2.2. Resource Slicing Model
As a result of the disaster, base stations are forced to extend their coverage area to accommodate more users as depicted in Figure 1(b), and thus the amount of available radio resources to serve users is reduced. To alleviate this issue, we propose an efficient way of allocating resources to enable reliable connection after disasters. In this section, we discuss the effects of dynamic radio resource slicing on achieving a low-latency constraint for a public safety scenario.
We consider a system model which is based on the work in [3], Figure 2, where the Slice Manager (SM) sends resource slicing trigger messages to the Radio Resource Slicer (RRS) (i.e., dynamic spectrum-level slicer (DSLS) and Priority-Based Resource Slicer (PBRS)) based on the radio resources available in virtual radio resource pool (VRRP) corresponding to each of the virtual networks (VNs). VRRP is the abstraction of radio resources, a three-dimensional (3D) pool of resources in time, frequency, and space, from the operational base stations as shown in Figure 1. The time,frequency dimensions represent the orthogonal frequency-division multiplexing (OFDM) resource blocks (RBs) considering LTE, while the space dimension represents the serving base station. The smallest 3D virtual radio resource block per slot is defined as a virtual RB (vRB). Each VN supports its own service and also allocates the sliced radio resources using dedicated radio resource scheduling algorithms, MAC Scheduler 1 and MAC Scheduler 2, optimized to VN1 and VN2, respectively, as shown in Figure 2. In this work, we consider that a total of NRB RBs are available in the system, that is, in VRRP.
System model for dynamic radio resource slicing [3].
For our analysis, we considered two types of users: (i) primary users (PUs), that is, the first responders belonging to virtual network 1 (VN1), and (ii) secondary users (SUs), that is, the rest of the users accessing the network belonging to VN2. In order to achieve a low latency for URLLCs after a disaster, the PUs need to be granted more radio resources as compared to the SUs. This enables the first responders to transmit/receive the required content in case of scarce radio resources to deliver the required disaster relief. Relying on the network and system models described above, the full details of the radio resource slicing and allocation are presented in the following section.
3. Optimization and Radio Resource Slicing
The main goal of the radio resource slicing and optimization is to give higher priority in case of disaster, in terms of resource allocation, to the first responders in order to fit the low-latency requirement. Otherwise, the resource slicing is just performed as it is proposed in [3]. To achieve this, we modify the resource slicing optimization problem defined in [3] by introducing a resource allocation priority parameter ζ. In Figure 2, the parameter Lkj represents the traffic load, the total number of radio resources required by all users per available radio resource, in slice (VN) j∈{1,2} in transmission time interval (TTI) k∈N. When Lkj>1, the SM sends a trigger message to the Radio Resource Slicer (RRS) to slice the available radio resources into two segments (ψkj), which is the optimal radio resource allocation of each slice.
The resource slicing algorithm that is tailored for the public safety scenario is presented by a pseudocode as shown in Algorithm 1. As it can be seen in the algorithm, the priority-based resource slicing is performed only if the traffic load (Lkj) is too high indicating that some of the available base stations are out of service. On the other hand, if the traffic load is reasonable, the SM decides to use the DSLS algorithm to slice the available radio resources. The initialization, Line (4), represents an equal number of vRB allocations for each VN. In Line (11), we have the resource schedulers, MAC Scheduler j, that are optimized to the services supported by each of the VNs.
Algorithm 1: Resource slicing algorithm for public safety application.
(1) procedureResourceSlicing
(2) for each simulation transmission time interval kdo
(3) for each j∈{1,2}do
(4) Intialization ψ0j←NRB/2
(5) end for
(6) ifLkj≫1then
(7) ψkj← Priority-based Resource Slicing (ζ)
(8) else
(9) ψkj← Perform DSLS [3]
(10) end if
(11) VNj Resource Scheduling (MAC Scheduler j)
(12) end for
(13) end procedure
Based on Algorithm 1, the SM (see Figure 2) decides which resource slicing algorithm to use. We describe the details of each resource slicing module as follows.
Priority-Based Resource Slicer (ζ). Depending on the intensity of the traffic load, we could assume a range of values for ζ that could be updated dynamically, that is, ζ∈[0.7,0.9], indicating more vRB allocation to VN1. Thus, the resource allocation for each of the VNs becomes(6)ψk1⟵ζNRB,ψk2⟵1-ζNRB,where ψk1 and ψk2 are the sliced radio resources for VN1 and VN2, respectively, in TTI k.
DSLS. The optimization problem for the DSLS [3] is targeted to maximize the overall system utility (logarithmic function) subjected to a set of constraints as shown below:(7)maximizeψkj∑jlnψkj,subjectto∑jψkj=NRB,ψkjest≤ψkj,ψkj≥0,where ψkjest represents the total number of vRBs needed to satisfy the current traffic in VN j in TTI k.
Applying Algorithm 1, we can be able to slice a pool of radio resources that are abstracted in a central entity with a reasonably low computational complexity. In addition, since the resource slicing algorithm will not be executed every TTI, as indicated in [3], we can still be able to perform the computation without exceeding the latency constraint given by each VN’s services.
4. An Example Scenario: A D2D-Based Application
This section discusses the detail of D2D communication in VN1 among first responders in the emergency scenarios or traffic hotspot situations. MAC Scheduler 1 residing in VN1 allocates radio resource blocks to first responders to achieve the URLLC latency constraint. To measure the latency of group communication among first responders, we consider a content distribution scenario, where first responders want to share emergency content among each other.
The group communication among first responders has been standardized in 3rd-generation partnership project (3GPP) release 12 under the name of proximity services (ProSe). The scenarios supported by ProSe in 3GPP release 12 are shown in Table 1. In this work, we consider an in-band, in-network coverage, D2D scenario wherein public safety UE is given a high priority over commercial cellular UE. It is important to note that as D2D radio resource allocation and communication are controlled by a cellular network, we do not consider the device discovery phase in estimating the network latency.
Supported ProSe functions in 3GPP release 12 to enable D2D communication in public safety and non-public safety applications [4].
Scenarios
Within network coverage
Outside network coverage
Partial network coverage
Supported applications
Supported ProSe functions
Non-public safety
Discovery
-
-
Public safety
Discovery, communication
Communication
Communication
In our simulations, we measure the network latency by assuming that resource allocation is performed every TTL (1 ms), while the optimization algorithm is run only when needed. Once a group is formed, the first responders start communicating with each other on D2D links using the allocated resources. A first responder shares an emergency content with the others in the group.
A visual illustration of the considered scenario is shown in Figure 3, where one of the base stations is collapsed, highlighted with a red circle, due to a natural disaster. The UE tries to reach the nearest base station (BS) by increasing the transmitted power. This flood of traffic from the out-of-coverage area of the network results in a congestion in other areas of the network due to the scarce resources available at the BS. In this situation, we prioritize the radio resources for D2D communication among first responders, which are shown by a red circle in Figure 3.
Disaster scenario [12].
5. Results and Discussions
For simulations, we use NS-3 [13] network simulator extended with LTE functionality from LENA project. The distance among UE, participating in the direct D2D communication, ranges from 10 m to 50 m, while their distance from the LTE BS varies from 250 m to 500 m. UE transfers a 20 MB content to the rest of the UE in the group. The UE is free to move within the aforementioned distance range. We assume that all UE of a group is identical in terms of communication and processing capabilities.
Figure 4 shows the average latency of a D2D network in sharing a 20 MB content within a group by utilizing the aforementioned slicing and resource allocation policies between VNs. It is important to note that, in order to calculate the average network latency, we measure the latencies of individual UE from the source and average it with the total amount of destination UE in a group.
Average network latency: the network latency increases with the average distance among UE and with the group size.
It can be observed from the figure that the network latency in our scenario depends not only on the distance among UE but also on the mobility of UE. Moreover, latency is directly proportional to the average distance among UE and the amount of UE in a group.
We also measure the task completion time to offload computations to a different D2D group. In this scenario, we divide a computational extensive application into smaller tasks and offload them to the UE of a D2D group to compute the result. We change the size of the group as shown in Figure 5. It can be observed from the figure that, for data sizes less than 5 MB, the task completion time remains independent of the amount of D2D UE in a group. On the other hand, for larger data sizes, an increase in the amount of UE in D2D group makes offloading more efficient in terms of task completion time. However, after a certain threshold, further increase in the amount of UE results in a slight increase in the task execution time. This upper bound of the amount of UE in a D2D group is due to the fact that having too much UE in a group increases the communication and task slicing overhead, which contributes to an increase in the task execution time.
Average task completion time: the task completion time to offload a task to D2D UE and get the result back decreases with the amount of UE in a group. However, after a certain threshold, further increase of D2D group size starts increasing the task completion time.
6. Conclusions
In this work, we presented an architecture combining stochastic geometry, resource slicing, and device-to-device communication to guarantee reliability and low latency for public safety networks. Service type and network traffic situation-aware resource slicing increase the flexibility in reconfigurability of the future cellular networks, thus enabling diverse services to be handled over a single infrastructure lowering the capital and operational expenditures to mobile operators. Furthermore, the proposed resource slicing algorithm is tailored to give more priority to first responders, improving their communication in public safety scenarios by efficiently allocating the highly scarce radio resources. Moreover, priority-based resource slicing enables reliable communication for first responders.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
AgiwalM.RoyA.SaxenaN.Next generation 5G wireless networks: A comprehensive survey2016183161716552-s2.0-8498484825110.1109/COMST.2016.2532458NetWorld20205G: Challenges, research priorities, and recommendationspp. 1–45, Septemper 2014, https://networld2020.eu/wp-content/uploads/2015/01/Joint-Whitepaper-V12-clean-after-consultation.pdfGebremariamA. A.ChowdhuryM.GoldsmithA.GranelliF.Resource pooling via dynamic spectrum-level slicing across heterogeneous networksProceedings of the 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)January 2017Las Vegas, Nev, USA81882310.1109/CCNC.2017.7983239UsmanM.2017University of TrentoBaldiniG.KaranasiosS.AllenD.VergariF.Survey of wireless communication technologies for public safety201416261964110.1109/surv.2013.082713.000342-s2.0-84901195217KumbharA.KoohifarF.GüvençI.MuellerB.A survey on legacy and emerging technologies for public safety communications20171919712410.1109/COMST.2016.26122232-s2.0-85014060114ShibataY.UchidaN.ShiratoriN.Analysis of and proposal for a disaster information network from experience of the Great East Japan Earthquake201452344502-s2.0-8489691255110.1109/MCOM.2014.6766083MerwadayA.TuncerA.KumbharA.GuvencI.Improved throughput coverage in natural disasters: Unmanned aerial base stations for public-safety communications201611453602-s2.0-8500095655510.1109/MVT.2016.25899705GPPP5GPPP use cases and performance evaluation modelspp. 1–39, April 2016, https://5g-ppp.eu/wp-content/uploads/2014/02/5G-PPP-use-cases-and-performance-evaluation-modeling_v1.0.pdfLuW.Di RenzoM.Stochastic geometry modeling of cellular networksProceedings of the the 18th ACM International ConferenceNovember 2015Cancun, Mexico17918810.1145/2811587.2811597HaenggiM.2013Cambridge University PressUsmanM.GebremariamA. A.RazaU.GranelliF.A software-defined device-to-device communication architecture for public safety applications in 5G networks201531649165410.1109/access.2015.2479855NS-3, Network Simulatorhttps://www.nsnam.org/