|
|
| [Participants](participants) | [Scope](themes) | [Publications](publications) | [Contact](contact) |
|
|
|
|----|----|----|----|
|
|
|
|
|
|
# Coexistence and isolation requirements of virtual radio access networks (VRAN)
|
|
|
|
|
|
In this theme, our proposal is to study the coexistence and isolation requirements of wireless virtual networks. Isolation is a very important requirement as it is critical for envisioned business models. It is essential that nay operation in a virtual network does not affect or interfere with other coexisting virtual networks. The solution to this problem should particularly consider the variability of the medium, the mobility of clients, the interference, etc.
|
|
|
The first step of the research will be to identify the technical requirements in different wireless access network technology. At a first glance, it appears that this problem highly depends on the technology and in particular on the used channel access method (if a fixed or random access method is used). This technology dependant characteristic can be a problem when virtualizing an heterogeneous network.
|
|
|
For the particular case of technologies that use random access methods like WiFi the problem of slicing and isolation in virtual networks over a shared infrastructure is difficult and poorly studied. The difficulty is caused by the fact that most methods try to assure a fair access to the medium which harms the performance of good links in benefit of bad links. Thus, in this case, specific isolation techniques need to be studied and designed.
|
|
|
Some new methods have been proposed to assure differentiated QoS in WiFi networks. For example, EDCA enables traffic differentiation to prioritize VoIP over other types of traffic. EDCA provides differentiated priority queues and enables to use different transmission parameters so as to prioritize certain type of traffic. A similar method could be used to differentiate traffic from different virtual networks and assure some kind of QoS.
|
|
|
Also, as different virtual networks could use the same medium, techniques for interference mitigation are needed. Therefore, techniques such as rate and power control, sensitivity control, construction of interference graphs, will be studied.
|
|
|
It is important to note that, random access methods are not only used in WiFi, but also in other local area technologies like: 802.11af which uses TV white-space frequencies; the new 802.11ah which uses low frequencies (below 1GHz) to get more coverage; and personal area networks standards (e.g. ZigBee). Therefore, the possible solutions to the aforementioned problems can be used in a wide range of technologies. UU will bring his long experience in the domain to the project. UEVE has also conducted several researches in the area of wireless communication and will bring also its expertise. |
|
|
\ No newline at end of file |