Cloud Computing - Architecture and Applications
نویسندگان
چکیده
The cloud radio access network (C-RAN) is one of the most efficient, low-cost, and energy-efficient radio access techniques proposed as a potential candidate for the implementation of next-generation (NGN) mobile base stations (BSs). A high-performance C-RAN requires an exceptional broadband radio frequency (RF) front end that cannot be guaranteed without remarkable antenna elements. In response, we present state-of-theart antenna elements that are potential candidates for the implementation of the C-RAN’s RF front end. We present an overview of C-RAN technology and different types of planar antennas operating at the future proposed fifth-generation (5G) bands that may include the following: (i) ultra-wide band (UWB) (3–12 GHz), (ii) 28/38 GHz, and (iii) 60-GHz radio. Further, we propose different planar antennas suitable for the implementation of C-RAN systems. We design, simulate, and optimize the proposed antennas according to the desired specifications covering the required frequency bands. The key design parameters are calculated, analyzed, and discussed. In our research work, the proposed antennas are lightweight, low-cost, and easy to integrate with other microwave and millimeter-wave (MMW) circuits. We also consider different implementation strategies that can be helpful in the execution of large-scale multiple-input multiple-output (MIMO) networks.
منابع مشابه
A Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملEnergy Aware Resource Management of Cloud Data Centers
Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased. Virtualization technology forms a key concept for new cloud computing architectures. The data centers are used to provide cloud services burdening a significant...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملTask Scheduling Algorithm Using Covariance Matrix Adaptation Evolution Strategy (CMA-ES) in Cloud Computing
The cloud computing is considered as a computational model which provides the uses requests with resources upon any demand and needs.The need for planning the scheduling of the user's jobs has emerged as an important challenge in the field of cloud computing. It is mainly due to several reasons, including ever-increasing advancements of information technology and an increase of applications and...
متن کاملData Replication-Based Scheduling in Cloud Computing Environment
Abstract— High-performance computing and vast storage are two key factors required for executing data-intensive applications. In comparison with traditional distributed systems like data grid, cloud computing provides these factors in a more affordable, scalable and elastic platform. Furthermore, accessing data files is critical for performing such applications. Sometimes accessing data becomes...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1707.09488 شماره
صفحات -
تاریخ انتشار 2017