UAV Aided Data Dissemination for Multi-hop Backhauling in RAN

Xiaoyan Shi, John S. Thompson, Majid Safari, Shenjie Huang, Rongke Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract / Description of output

Emerging applications in the radio access network (RAN), such as proactive caching and the massive machine type communications, will generate traffic with a Large Volume of data but can tolerate long Transmission Delay (LVTD). Together with a rapid growth of overall traffic demand, traffic with LVTD features brings lots of challenges to the backhaul in RANs. In this paper, we study how to schedule traffic in multi-hop backhaul networks with the help of unmanned aerial vehicles (UAVs), In the proposed system, the UAVs are employed to establish broadband connections with the ground terminals through free-space optical links and serve as data collectors between terrestrial access points so as to alleviate the communication burden on the terrestrial network. Through numerical simulations, it is demonstrated that the novel network scheduling scheme combined with dynamic UAV path planning can provide significant performance gain.

Original languageEnglish
Title of host publication2019 UK/China Emerging Technologies, UCET 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781728127972
DOIs
Publication statusPublished - 24 Oct 2019
Event2019 UK/China Emerging Technologies, UCET 2019 - Glasgow, Scotland, United Kingdom
Duration: 21 Aug 201922 Aug 2019

Publication series

Name2019 UK/China Emerging Technologies, UCET 2019

Conference

Conference2019 UK/China Emerging Technologies, UCET 2019
Country/TerritoryUnited Kingdom
CityGlasgow, Scotland
Period21/08/1922/08/19

Keywords / Materials (for Non-textual outputs)

  • Delay-tolerant traffic
  • dynamic programming
  • network scheduling
  • unmanned aerial vehicles

Fingerprint

Dive into the research topics of 'UAV Aided Data Dissemination for Multi-hop Backhauling in RAN'. Together they form a unique fingerprint.

Cite this