Next Article in Journal
BAT—Block Analytics Tool Integrated with Blockchain Based IoT Platform
Next Article in Special Issue
ATMP-CA: Optimising Mixed-Criticality Systems Considering Criticality Arithmetic
Previous Article in Journal
Bagged Tree Based Frame-Wise Beforehand Prediction Approach for HEVC Intra-Coding Unit Partitioning
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Managing Wireless Communications for Emergency Situations in Urban Environments through Cyber-Physical Systems and 5G Technologies

by
Borja Bordel Sánchez
1,*,
Ramón Alcarria
2 and
Tomás Robles
1
1
Department of Information Systems, Universidad Politécnica de Madrid, UPM Campus Sur, Km 7.5 de la Autovía de Valencia, 28031 Madrid, Spain
2
Department of Geospatial Engineering, Universidad Politécnica de Madrid, UPM Campus Sur, Km 7.5 de la Autovía de Valencia, 28031 Madrid, Spain
*
Author to whom correspondence should be addressed.
Electronics 2020, 9(9), 1524; https://doi.org/10.3390/electronics9091524
Submission received: 11 August 2020 / Revised: 9 September 2020 / Accepted: 15 September 2020 / Published: 17 September 2020
(This article belongs to the Special Issue Emerging Advances for Cyber-Physical Systems)

Abstract

:
Currently, urban environments are the basic human habitat. Large and complex infrastructures coordinate urban life and make it possible in high-density scenarios. In this context, one basic infrastructure to be considered is communication networks. Nowadays, even emergency response teams (ERT) are dependent on those deployments. However, emergencies may cause important damage in those communication infrastructures and, then, a critical discoordination among ERT might appear, greatly affecting the ERT efficiency and response capacity. Different architectures to address this situation have been recently proposed, but none of them are able to dynamically adapt to highly variable situations such as emergency crisis. Therefore, in this paper, a new approach is proposed for ad hoc emergency wireless communications in urban environments based on 5G technologies and Cyber-Physical Systems (CPS). The proposed architecture consists of three layers, where different feedback control loops are defined and linked following the CPS paradigm. At physical level, the spectrum usage is monitored through CPS control loops, analyzing if power signals present a good quality. At network level, 5G virtualization technologies are employed to manage in a dynamic way the network configuration and user management. Finally, at service level, the global situation is analyzed to decide about what services from a catalogue, and according to their priority, can be deployed, including the amount of assigned resources. To evaluate the performance of the proposed solution, an experimental validation based on simulation techniques is also described.

1. Introduction

Urban environments and large cities are the most common living scenario for humans since the first industrial revolution [1]. Now, with Industry 4.0 revolution [2], this tendency has got even stronger, and mega-cities where millions of people live in super-populated spaces are born each year [3]. To make human life possible in those spaces, high-efficiency infrastructures coordinating individual behaviors and needs have been designed and developed, from transport infrastructures [4], to water management solutions [5] and urbanism [6]. In this context, communication networks are one of the most basic infrastructures to enable human life in urban environments [7]. Networks connecting thousands of people are essential for economy, social life, public administrations, etc. Even Emergency Response Teams (ERT) are totally dependent on those networks.
However, the referred dependency of ERT on standard communication networks is not an acceptable situation. Actually, many emergency situations, such as natural disasters, may cause important damage on communication infrastructures, which can even increase with time if the crisis has a long duration [8]. This lack of communication services might greatly affect the coordination capacities and response capabilities of ERT. Besides, in relevant emergencies, even international volunteers may join the national or local ERT, so these essential people must be integrated into existing communication networks to allow a global and efficient response, taking as much profit as possible from all existing human resources.
Thus, for most national ERT, it is clear that they must be able to deploy and manage autonomous ad hoc communication networks in emergency situations, providing them with the required services; however, it is also important to support (if possible) communications of citizens isolated because of the situation, as they will be wanting to communicate with their relatives [9]. Among all the existing communication technologies, wireless techniques are the most appropriate for emergency situations, as they do not require large physical deployments or complex civil works. Then, deployment time may be very reduced. Nevertheless, a large catalogue of wireless communication technologies could be employed, each one with a very different technical performance [10].
Although many different solutions to address this problem—based on almost any existing wireless communication technology—have been reported, none of them completely meet the demanding requirements of emergency situations [11,12]. In particular, these solutions tend to be very local and rigid, so they can barely adapt to variable emergency situation evolving for a long time or extended in a wide geographical area. Thus, innovative mechanisms to manage wireless communication in emergency situations in urban environments are required. Specifically, this new solution should be deployed ad hoc and have an important efficiency and adaptation capacity. The proposed mechanism must maximize the services provided according to the available resources but guaranteeing at any moment the essential emergency services for ERT.
Therefore, in this paper, we propose a new approach for managing ad hoc wireless communications in emergency situations in urban environments based on 5G mobile technologies [13] and the Cyber-Physical System paradigm [14]. The proposed architecture consists of three layers, where feedback control loops make evolve together the network status and the physical world, so the network performance is always adapted to the real-world situation. At physical level, feedback control loops are employed to guarantee the quality of power signals, ensure the minimum service performance, and avoid the frequency spectrum congestion. At network level, virtualization-based 5G mobile network technologies are used to distribute and manage network resources assigned to each service according to the dynamic evolution of the emergency, ensuring the viability of a very individual deployed service. Finally, in the service layer, a control algorithm is deciding what services are deployed, maintained, modified, or removed in the network. Services are selected from a catalogue where services are classified according to their priority, so they can be analyzed and dimensioned according to their impact in the emergency management.
Using the proposed solution, three basic improvements with respect to the state of the art are obtained:
  • For a given amount of network resources (radio channels, base stations, etc.), the proposed technology increases the amount of services that can be provided to ERT and general users, through real-time control loops and Cyber-Physical Systems (CPS).
  • The global and average Grade of Service (GoS) perceived by users is increased in emergency systems implementing the proposed mechanism.
  • The virtualization approach for 5G network allows the proposed technology to guarantee the provision of uncongested essential services to ERT by adapting the available resources to the users’ demand.
The rest of the paper is organized as follows: Section 2 introduces the state of the art on communication solutions for emergency situations. Section 3 presents the proposed technology, including the three abstraction levels (radio, network, and service levels) and their associated mechanisms. Section 4 provides an experimental validation of the proposal including the obtained results and their analysis. Finally, Section 5 explains the conclusions of our work.

2. State of the Art

Many different solutions for providing communication services in emergency situations have been reported in the last years. First, some works are focused on describing the pending challenges around communication networks related to emergency response [15]. These works, typically, propose traditional solutions such as large redundancies [16], the deployment of parallel secure networks for ERT [17] or the employment of other ad hoc point-to-point communication devices which do not require network infrastructure [18]. The main problem of all these solutions is their great cost, including costly investment in civil works, as well as their remaining vulnerability against large-scale disasters.
Other proposals are not focused on how to overcome damage on communication networks, but on how networks must be adapted to help in the emergency management [19]. In this case, metropolitan wireless networks, such as WiMax, are typically employed to define a solution where even satellites may be considered. Although these proposals may be useful, they cannot be employed if communication infrastructures are damage, so additional solutions are required.
Disaster-resilient networks [20] are probably one of the most common and interesting proposals around the analyzed topic. Two different approaches can be distinguished [20]: software-defined networks (SDN) and rapidly deployable hardware networks. In SDN for emergency situations, proposed architectures are focused ultra-low delays and self-management mechanisms [21], so software networks can react to changes in the situation in a very efficient manner. Works on design principles [22], datacenter management [23], SDN over optical networks [24], wide-area networks [21] and control-plane adaptation techniques [25] have been reported. Although this approach may seem successful, these works are only discussion the problem at network level, and no clue about how the deployed services are finally accessible by users is provided. In many cases, a physical infrastructure for the access network is required, so the proposed solutions are still dependent on existing infrastructure which could be damage and available.
Self-organizing networks for disaster management are also a group of popular technologies that have been largely studied in the last years. Different self-organizing technologies at different levels may be found, from radio solutions [26], to network mechanisms [27] and communication models [28]. Besides, specific protocols focused on an efficient use of battery resources [29] or, even, clustering mechanisms to share power resources among devices in emergency situations have been reported [30]. Although these solutions are very useful in emergency situations, they are, any case, complementary to the proposed technology in this paper (they could be, for example, employed to manage power resources). Self-organizing networks, as described nowadays, barely can manage services using a full-stack vertical approach as proposed in this article, as they tend to be very computationally heavy solutions. Contrary to these proposals, in our solution, real-time operation through control loops is allowed.
On the other hand, in rapidly deployable hardware networks, the minimum number of ad hoc devices required to create a functional communication network is studied, as well as their organization and architecture [31]. These works are sometimes based on the deployment of new ad genuine elements for the emergency [32], and other times are based on re-organizations of existing network elements [33]. This last approach is common in mobile networks [34,35]. In this case, no infrastructure is required to provide communication functionalities, but provided services are fixed and hardly managed, so typically only essential services for ERT are considered and deployed. Additional capabilities are, then, required.
In the last years, a very interesting popular topic to be analyzed are rapidly deployable hardware networks based on drones. Although problems in those solutions are common to other rapidly deployable hardware networks, in this context, many different trajectory calculation mechanisms [36] and efficient service provision schemes [37] have been described. In fact, mobile nodes [38] are a key element to be considered in any future solution.
Finally, some sparse works are analyzing how to apply modern technological paradigms to emergency communications. Solutions based on Cyber-Physical Systems (where control loops are employed to manipulate mobile node trajectory) [39], and ad hoc wireless networks [40] have been reported. The main handicap of these innovative proposals is their limited analysis: it is not clear how end-to-end communications can be provided or how the network architecture and structure is deducted considering the characteristics of every emergency. In general, these paradigms are very useful, but a complete communication solution is required to guarantee the needs and requirements of ERT are met.

3. Wireless Communications in Emergency Situations

In this Section, the main technological proposal is described. The proposed solution includes a three-level architecture, where different mechanisms to manage the wireless network at physical, network and service level are deployed. Section 3.1 describes a global overview of the proposed solution. Section 3.2 describes the proposed control solution to ensure the maximum signal quality of all users given a service and a geographical area. In Section 3.3, we analyze the entire network resources and how they are distributed and managed for a given communication service. Finally, in Section 3.4, the entire catalogue of services in the network is managed at the highest level in the architecture.

3.1. Global Overview

Figure 1 shows the proposed architecture. As can be seen, three different levels are considered: radio (or physical) level, network level and service level. In general, the proposed architecture follows the mobile network design principles, and presents a distributed structure.
The radio access network is distributed into two different layers: the access points at radio level and the mobile base stations at network level. The scheme follows the C-RAN (Cloud Radio Access Networks) architectures proposed for 5G technologies. In access networks (collection of access points), Network Virtual Functions (VNF) supporting different services are deployed, together with all physical capabilities required at radio level. These access points are deployed around the entire geographical area to be covered. They employ wireless communications and batteries to be totally independent. On the other hand, typically, in emergency situations, ad hoc base stations are deployed through medium-size mobile infrastructures, such as emergency cars, where a generic computing platform is included. These base stations are connected to the access point using any of the existing wireless technologies (we are not addressing this point in this article). In these base stations, the resource management of VNF and services is performed. Besides, all base stations are connected to a main coordination center, where global service management is located and acting as gateway to the global communication networks. This coordination center is, as well, deployed in large mobile infrastructures provided with general computation devices, however, in this case, tends to be placed in a fixed position, especially if satellite communications are employed.
At radio or physical level, we are using a Cyber-Physical System approach to define a feedback control loop integrating the physical and the computational processes affecting the communication services at the ratio links. To define these loops (one for each service and access point), we are considering three basic indicators: the Bit Error Rate (BER), the Signal over Interference and Noise Radio (SINR) and the available resources and congestion level at each moment. Using these state variables, we are controlling the power and bandwidth of signals at real time. As output, the access points generate a report about radio congestion which is processed by base stations (network level).
At network level, an optimization problem is posed. The objective is to distribute among VNF composing a service (and deployed in the different access points), the assigned resources to that service by the main coordination center. This problem considers the number of users and the provided Quality-of-Service (QoS), as well as the mobility of base stations moving at speed v   m / s . As communication services in our proposal are supported by virtualization technologies and 5G network slicing techniques, resources can be assigned to different VNF in a dynamic and variable way. As output, this optimization problem generates a report about the quality of the final resource distribution, so the main coordination center may learn about the global network situation.
Finally, at service level in the coordination center, all reports from the different services are collected. Then, using a priority algorithm, the coordination center decides if a new service may be deployed, some of them have to be cancelled or modified, etc., according to services described in a catalogue including their minimum requirements and priority. The objective of this algorithm is to guarantee the QoS of services with higher priority before deploying any service with a lower priority, and adapting the global situation to the current emergency evolution.

3.2. Physical Level: Power Signal Control

In the proposed architecture, radio and link levels are following the design principles for future 5G networks [41]. In particular, the frequency spectrum is organized using OFDMA (Orthogonal Frequency Multiple Access) and TDMA (Time Division Multiple Access) techniques. Then, each VNF (service instance) at each access point is provided with a set of time slots t i over a set of orthogonal frequencies f i . Radio resources are then represented by a set   (1) of ordered pairs ( t i , f j ) , where t i is the numerical order of the time slot, f j is the assigned orthogonal frequency, M T is the number of available time slots per orthogonal frequency, and M F   the number of frequency channels. Different modulations could be employed, although in this paper we are considering the family 2 P -QAM (Quadrature Amplitude Modulation), P being a natural number, usually between four and seven.
=   { ( t i , f j )       i [ 1 , . , M T ]     j [ 1 , , M F ] }
On the other hand, each frame at link level is protected through a Convolutional Error Correction Code (CECC). Frames have a length of B bits, including a header of H bits, enabling receptors to detect up to d bits and correct up to c bits. Using this code, the Bit Error Rate (BER) of the connection between the access point and the user device (at this point we are focusing on a given service, no difference among emergency or supplementary services is done at physical layer) may be calculated after collecting W different frames. Then, in this context, BER turns into a discrete measurement with an associated (power) quantification noise N q u a n t (2) and a maximum value depending on the employed CECC (3).
N q u a n t = 1 N 2
0   BER   d c W · ( B H )
Although BER shows univocally the QoS at physical level, this parameter is very complicated to manipulate in a direct manner, and physical parameters affecting that indicator are preferable improved. In particular, BER in OFDMA solutions depends on the Signal over Interference and Noise Ratio (SINR). This ratio (4) depends on the information signal power S , the interference power I and the noise power N . In MIMO (Multiple Input Multiple Output) solutions, this ratio is improved by considering a set of radio antennas. Although in standard 5G systems MIMO technologies are employed by default, they are very difficult to find and implement in ad hoc deployment for emergency situations. As in a realistic scenario we are not finding this technique, we are not considering it.
SIN R = S I + N
The information signal power S   may be aeasily increased or reduced if required. However, power associated to interferences, I , and noise, N , is more complicated to manage. In general, as these phenomena are environmental and uncontrollable effects (for example, in urban environments, caused by the high density of buildings and pollution), but frequency dependent, any change in the frequency channel employed to communicate causes a change in those powers. Thus, if the SINR is not adequate, a new radio resource ( t i , f j ) may be assigned to the user device to improve the situation.
The relation between BER and SINR depends on the selected modulation and spectrum structure. Specifically, in OFDMA solutions, this relation is not analytical and a numerical analysis involving the Discrete Fourier Transform must be developed. Figure 2 shows that relation for different p values.
BER and SINR characterizes the provided QoS, however, a second interesting analysis to consider is how users experience the service. This parameter is known as “Grade of Service” (GoS). As the number of available radio resources at each service and access point is limited (5), eventually, some users may be rejected as they cannot be served. The ratio between served U s and unserved U n s (rejected) users is called GoS (6). However, GoS cannot be calculated in a deterministic manner (like BER), as the number of accepted/rejected users does not follow a specific function, but a probabilistic distribution. Moreover, GoS evolves slowly, and a great amount of damage may be caused before a reduction in that value is detected. Then,
M R = c a r d { } = M T · M F
o S = U s U n s
To determine the probability of a user to get rejected by the service, we are using the teletraffic theory. The community of U users associated to the analyzed service and access point, in general, will be much greater than the available radio resources (5). Then, hereinafter, we are considering the number of users U as infinity. Besides, no waiting queue is included. In emergency situations, no delays are admissible, and users must either communicate immediately or be rejected at the moment, so they can look for a different communication option. Then, if all radio resources are assigned to current users, any additional and new user is automatically rejected (see Figure 3).
Two additional physical parameters are, besides, considered: the medium service time (usually expressed in hours) t s and the demand rate λ (typically in user per hour). Then, at any moment, the medium number of new users trying to get service will be λ and the number of users finishing their communications and liberating radio resources is 1/ t s . Besides, we are calling P r to the probability of being assigned r radio resources. Then, using simple equilibrium equations and a recursive process, we can calculate that probability (7).
This expression perfectly matches the Erlang-B distribution E B . Now, the probability of a user to get accepted p a c c e p t is the probability of all radio resources not being assigned (8). Hereinafter, we are using ρ to name the “congestion ratio” (9). This value must be below the unit (typically round 0.7 as maximum) to guarantee the service is not congested and near a relevant degradation of GoS parameter.
P r = ρ r r !   i = 0 M R ρ i i !   = E B ( ρ , M R ; r )
p a c c e p t = P r o b ( r   <   M R ) =   r = 0 M R 1 P r = 1   P M R
ρ =   λ · t s  
Using these expressions, we can obtain the probability distribution for GoS (11). It is enough to consider all service requests as independent events and the Poisson distribution with mean value λ (10) as the probability of receiving K service requests in a time period (typically expressed in hours) T —usually one hour.
P o i ( K   ; T ) = ( λ T ) K K !   · e λ T
G o S   ( x = U s U n s ) = P o i ( U s + U n s   ; T ) · p a c c e p t U s · ( 1 p a c c e p t ) U n s
Now, with all this previous information, it is possible to describe a Cyber-Physical System (CPS) based on a complex control feedback loop, in order to guarantee the service instance (VNF) in the access point under study reaches the expect and target values for QoS (BER and SINR) and GoS. The control loop will manage the radio resources in such a way the service presents the maximum quality, if possible. If, because of environmental conditions, the control loop cannot ensure a good enough quality according to the proposed targets, a congestion report will be sent to the network level. This report may be also sent periodically, to enable the algorithms at network and service level to operate. Figure 4 shows the proposed CPS using a block diagram.
This CPS is implemented in the wireless access points, where radio signals are generated. A similar solution could be deployed in user devices, but this approach would enforce ERT to employ a specific communication equipment. As said before, different ERT (even international teams) using different user and communication devices, could be integrated to address a particular emergency situation, and all of them should be easily connected through the proposed communication system. Thus, in our proposal, user devices may be standard mobile devices as no interaction of special information is required from them. Proposed CPS is implanted in access network (access points) estimating the user perception using different indicators and measures.
The interface module extract and monitors from the physical world four different state variables: SINR, BER, the service time t s and the demand rate λ . Different techniques may be employed to estimate these physical variables, from analog circuits to digital signal processing. All of them are adequate to be integrated into the proposed CPS. These variables connect the physical and the computational processes, and (as response) the algorithm may change the physical signal configuration (power and frequency). Those signals are generated using the signal generation module. It is important to note that, formally, the obtained variables are referred to the uplink, while we are acting over the downlink. However, in common scenarios, quality parameters present worse values for the uplink (as user devices have more limited capabilities), so, any case, we are considering a worse case than we are supposed to. The obtained results, then, are equally valid.
As BER cannot be manipulated directly, as previously said and using numerical functions in Figure 2, it is obtained a second SINR estimation S I N R B . The new value, and the physical value are merged using a standard average (12).
S I N R m = S I N R + S I N R B   2  
This value S I N R m is compared to the target SINR (so the QoS reaches the expected value) (13). The residue D S I N R is aggregated into two historical records controlled by two Exponential Moving Average (EMA) (14), where n is the temporal index. The first one is a short-period average ( α   1 ), designed to remove fast variations and temporary effects, ensuring the stability of the proposed CPS. Its output E M A S H O R T is introduced into a bank of two comparators with thresholds T H R E S H O L D S H O R T 1 and T H R E S H O L D S H O R T 2 (15). Both thresholds must fulfill a strict order condition, so the control loop can work properly (16). The first comparator is active at a low level. For values of E M A S H O R T between both thresholds, no action is taken. The difference between both thresholds is the tolerance margin the control loop accept as “standard situation”. Typically, it is around 10% of the higher value ( T H R E S H O L D S H O R T 2 ), although higher or lower tolerances could be considered depending on the application scenario. For values above T H R E S H O L D S H O R T 2 (they would be above T H R E S H O L D S H O R T 1 as well because of the order condition), the power signal control module is activated. For values below T H R E S H O L D S H O R T 1 (they would be below T H R E S H O L D S H O R T 2 as well because of the order condition), the second exponential average is employed. Basically, if S I N R m is near the target SINR no action is taken, if S I N R m is much higher than the target SINR a reduction in the information signal power may be done (so energy resources are saved), and if S I N R m is much lower than the target SINR, a large processing is required.
To select the specific value of both thresholds, the Shannon–Hartley theorem is considered (17), being W the bandwidth of the radio channel and B the channel capacity. The minimum bitrate to be provided at radio level may be employed to, though this law, obtain the lower threshold T H R E S H O L D S H O R T 1 . Later, and according to the selected tolerance level for the application scenario, T H R E S H O L D S H O R T 2 can be easily calculated.
D S I N R = S I N R m S I N R t a r g e t
E M A S H O R T [ n ] =   { D S I N R [ 0 ]               f o r   n = 0 α · D S I N R [ n ] + ( 1 α ) · E M A S H O R T [ n 1 ]               o t h e r w i s e
C o m p a r a t o r 1 ( x )   :   { 0                 i f   x >   T H R E S H O L D S H O R T 1 1                                                                             o t h e r w i s e C o m p a r a t o r 2 ( x )   :   { 0                 i f   x <   T H R E S H O L D S H O R T 2 1                                                                             o t h e r w i s e
T H R E S H O L D S H O R T 1 <   T H R E S H O L D S H O R T 2
B = W · l o g 2 ( 1 + S I N R )
The second EMA is a long-term average employed to determine if a certain situation has turned structural ( α   1 ). Its output is named E M A L O N G . Both E M A S H O R T and E M A L O N G are subtracted (18) and the difference D E M A is introduced into a new bank of two comparators with thresholds T H R E S H O L D L O N G 1 and T H R E S H O L D L O N G 2 (19). The first comparator is active at a low level. For values D E M A between both thresholds, changes in the frequency spectrum are required and the second branch of the proposed control loop is activated (the low value for S I N R m is structural). For any other value, the information signal power must be increased to improve the real SINR. This indicates either the SINR is upgrading from a low value or the SINR is suffering a decrease that is not structural, but it is not a temporary and transitory phenomenon.
D E M A = E M A S H O R T E M A L O N G
C o m p a r a t o r 1 ( x )   :   { 0                 i f   x >   THRESHOLD L O N G 1 1                                                                             o t h e r w i s e C o m p a r a t o r 2 ( x )   :   { 0                 i f   x <   THRESHOLD L O N G 2 1                                                                             o t h e r w i s e
On the other hand, the physical variables λ and t s are also injected into two EMA modules (20), but analyzing changes at medium period ( 0.2   < α < 0.7 ), so the real-time values for both parameters are obtained. The obtained results are injected into the congestion analysis module. The output of this module (9) is introduced into a comparator and, if the value is above the proposed threshold, an alarm is triggered to the network layer.
λ a v [ n ] =   { λ [ 0 ]               f o r   n = 0 α · λ [ n ] + ( 1 α ) · λ a v [ n 1 ]               o t h e r w i s e t s a v [ n ] =   { t s [ 0 ]               f o r   n = 0 α · t s [ n ] + ( 1 α ) · t s av [ n 1 ]               o t h e r w i s e
Moreover, if a change in the frequency spectrum is required the congestion parameter is introduced into the GoS analysis module. A new radio resource is, then, assigned to the user controlled by the corresponding CPS using the power signal control module. This new assignment, actually, is understood as a reduction in the total number of radio resources M R , as we are consuming this new resource, but no new users are served. Then, the GoS distribution must be calculated (11) for the new value of M R . If the probability for a given and limit value of GoS goes above a certain maximum admissible value (we are using a comparator to perform this check), then, an alarm is triggered to the network layer.
The signal power control module, basically, considers the interference and noise powers are constant in time, so it is easy to calculate the new information signal power to improve the SINR (4), just using the expression for electromagnetic losses in the vacuum (21), being ξ the power of an electromagnetic wave, ξ o the transmitted power and h the transmission distance.
ξ = ξ o h 2
As a result, the proposed loop and CPS will improve the physical configuration of the service in order to reach the target quality, until it is not possible to reach that objective (because of resource limitations); then, an alarm is triggered.
It is important to note that the proposed CPS is limited by the numerical noise of the BER and SINR estimations, but (in general) we can control this effect and guarantee the stability of the control loop by considering a large value for N .

3.3. Network Level: Optimal Resource Distribution

At a network level, we are focusing on only one service, but in all the access points and mobile base stations that may be supporting that service. In future 5G systems, virtualization technologies will be employed. For example, as seen in the previous section, VNF will be employed to create service instances in access points. To coordinate all these service instances (run the instance, control its lifecycle, etc.) commercial solutions may be used. For example, Kubernetes and Docker [13]. However, these virtualization and management technologies do not control where the different service instances are run or where and how the base stations are deployed and move. These basic variables are addressed in the proposed solution, through an optimization problem whose solution is here calculated.
Given a service S , the main coordination center allows this service to run simultaneously a maximum of S m a x service instances (VNF) at A m a x different access points, being A m a x     S m a x . These two parameters, { S m a x   , A m a x } , represent the resources assigned to the service by the coordination center. Then, we are considering an ordered list U s e r v i c e describing the number of connected or served users through each one of the A [ n ]   available access point at n -th time instant (22). We are representing as U t o t a l the total number of service users across the entire network.
U s e r v i c e =   ( u 1 , . , u i , ,   u A [ n ] )
The first objective of the optimization algorithm at network level is, then, to maximize the number of served users U t o t a l , while the number of service instances and employed access points is minimum. This problem, more precisely a bidimensional equalization problem, is solved to determine the geographical distribution of service instances before any further processing.
We are assuming each access point is provided with a hardware device, so it can inform the base station about its geographical position (typically using global coordinates), Q i (23). Besides, each access point a i is characterized by the number of service instances 𝕔 i it is running (24). Then, the base station managing the service can create a discrete vector function (bidimensional). The input vector represents the geographic position Q i of an access point, and output values G i represent a measure about the number of served users (Grade of Service) and the provided service quality (network congestion). The proposed function (25) is linear with respect to the GoS and logarithm regarding the network congestion. Both measures are combined in a natural product as any increasing or decreasing in any of the partial measures causes a global increasing or decreasing in the user perception. Any other function or mathematical definition could be freely selected for other application scenarios, but proposed function is selected to match the subjective perception of service quality by users [42] (which is linear for GoS and logarithmic for network congestion). If one access point is not executing an instance of the service, the corresponding geographical point is not considered.
Q i =   { q i 1 , q i 2 }
a i   =   { Q i , 𝓈 i   }
G i =   ( Q i ) =     ( { q i 1 , q i 2 } ) =   ( U s U n s ) i · l o g ( ρ i )     b e i n g   G o S ( U s U n s )   m a x i m u m
For this function, , we are representing the area where services are deployed as a squared reticulum (see Figure 5a), so the resulting function is a three-dimensional discrete surface, where peaks represent access point with a good performance (lots of server users and non-congested services), and low values represent congestion situations to be addressed. With the unique purpose of showing the formal shape of this function, Figure 5b represents a possible result for function (this example does not represent any real situation, so particular values are meaningless and must not be taken into account).
For every service and function, , a minimum value is defined, m t h , that must be reached at every point. Then, the problem we must solve is to determine the set A (26) of access points with the lower cardinality and the lower global number of service instances S t o t a l , so function is maximum for every input point and all of them get, at least, the value m t h (27).
A =   { a i         i [ 1 ,   A [ n ] ] }
A     s u c h   t h a t     c a r d { A } = A [ n ]   i s   m i n i m u m           𝓈 i   a i     A     𝓈 i = S t o t a l     i s   m i n i m u m G i = ( Q i )       m t h             Q i     a i     A    
To solve this problem, we are assuming it is created a solution reticulum d e f a u l t including all activated access points and the service instances each one of them is executing. Using this default configuration, and at any other moment, the following algorithm is run (see Algorithm 1).
The entire reticulum with all values G i is analyzed. If all values meet the optimization condition, no additional action is taken. However, if any point where G i   < m t h is detected, then the area Γ Q i   around the point Q i is analyzed. If the studied area Γ Q i   only that point Q i is executing a service instance, then any other point in the area Γ Q i   is a candidate to get activated. In that way, the coverage area is enlarged, and more users could be served, reducing the congestion in the original access point.
Algorithm 1. Service Instances Allocation
Input: Default reticulum d e f a u l t and coverage distance for access points d c o v e r
Output: New service instance distribution and reticulum new
Create list a d d of candidates to execute a new service instance
Create list r e m of candidates to remove a service instance
for each a i     A   d e f a u l t do
          if  𝓈 i 0   𝓈 i   a i then
                     if G i = ( Q i ) <   m t h     w i t h   Q i     a i       then
                              Calculate area Γ Q i   such that a j     Γ Q i   if Q j Q i < d c o v e r
                              if s i = 0 for all a j     Γ Q i   then
                                        Add a j to a d d , being a j randomly selected in Γ Q i
                              else
                                        for each Q j     a j     Γ Q i do
                                                  Calculate all G j = ( Q j )
                                        end for
                                        Calculate the average G m e a n of all G j
                                        if   G m e a n     <   m t h then
                                                  Add   a j to a d d so G j = ( Q j ) is minimum in Γ Q i
                                        else
                                                  Add a i to a d d
                                        end if
                              end if
                    end if
          end if
end for
Calculate a partition of d e f a u l t in subareas Γ i   with radius d c o v e r
for each Γ i do
          Calculate all G i = ( Q i ) , being Q i     a i     Γ i
          Calculate the average G m e a n of all G i
               if G m e a n   >   5 · m t h then
                    Add a i to r e m so G i = ( Q i ) is maximum in Γ i
          end if
end for
if c a r d { a d d } = c a r d { r e m } then
          Update the reticulum, instances are removed/added from all candidates
elseif c a r d { a d d } < c a r d { r e m } then
          Remove ( c a r d { a d d } +   c a r d { r e m } ) / 2       service instances from candidates randomly selected
          Add service instances to all candidates
else
          Remove all service instance from candidates
          if S t o t a l +   c a r d { a d d } <   S max       c a r d { default } + c a r d { a d d } <   A max then
                    Add service instance to all candidates
          else
                    Add c a r d { r e m } service instances to candidates randomly selected
                    Trigger an alarm
          end if
end if
On the other hand, if in the area Γ Q i   , more than one access point is executing the service and the spatial average value in the area Γ Q i   according to function is above m t h , the point Q i is a candidate to execute an additional service instance. In the last case, if the average value in the area Γ Q i   according to function is below m t h , the point in the area Γ Q i with a lower value is the candidate to execute a new service instance.
Equally, the reticulum is analyzed in subareas Γ i . Areas Γ i where the medium value is much above m t h are detected (typically more than five time the value m t h ). In these areas, a candidate to remove a service instance can be located. The candidate is the access point with a higher value according function .
After this analysis process, if candidates to execute a new service instance are equal in number to candidates to remove service instances, the network is updated. If the number of candidates to remove service instances is higher, only 50% of these candidates are requested to remove a service instance. In that way, we guarantee an uncontrollable decreasing in the service quality is not produced. If the number of candidates to execute a new service instance is higher, new instances are executed if possible (if there are available resources). If that is not possible, an alarm is sent to the service layer.
Once service instances are geographically distributed, the distribution and movement of base stations must be analyzed. The position of the base station Y (28) may vary at speed v m/s. To select the most appropriate position for this base station, we are considering a new optimization function. In this case, the base station must be placed or moved in such a way that all access points can communicate with the base station with the best possible quality. The distance h i between any access point and the base station (29) can be easily calculated using the Euclidean distance. On the other hand, an according to electromagnetic propagation laws, the power ξ of an electromagnetic wave decreases inversely proportional to the square distance (21), being ξ o the transmitted power. Finally, the second Shannon’s law (or Shannon-Hartley theorem) describes the capacity B of a wireless radio channel (17), with bandwidth W   hertz. Now all this information may be put together and simplified to relate the distance between access point and base stations to the bitrate between both elements (30). Two constant parameters b 1 and b 2 are considered, whose value may be obtained from the physical scenario under study. It is important to note that we are considering the channel bandwidth and noise (an interferences) as time constant variables.
Y [ n + 1 ] =   { y 1 [ n + 1 ] , y 2 [ n + 1 ] } =   { y 1 [ n ] ± v , y 2 [ n ] ± v } = Y [ n ] ± v
h i =   Y Q i =   ( y 1 q i 1 ) 2 + ( y 2 q i 2 ) 2
B ( Y ,   Q i ) = W · log 2 ( 1 + S N + I ) =   W · log 2 ( 1 + ξ o h 2 N + I ) = b 1 · log 2 ( 1 + b 2 Y Q i 2 )
Now, we can formally define an aggregated function along the entire mobile base station trajectory, so we can optimize the resulting expression (31). Basically, we must find the sequence of values ϕ = { Y [ n ] } , so the function B a g g takes the maximum possible value. If the optimal trajectory is composed of only on point, the base station will be fixed. On the contrary, it will be mobile.
B a g g =   i = 1 A [ n ] n = 0 T B ( Y [ n ] Q i ) = i = 1 A [ n ] n = 0 T b 1 · log 2 ( 1 + b 2 Y [ n ] Q i 2 )  
All access points must be served, so all of them must reach, at any moment, a minimum bitrate B m i n . Besides, the base station trajectory may be open, i.e., the base station is not forced to return to the same point it starts moving. To solve this problem, we are using a Dynamic Time Warping (DTW) algorithm [43,44]. Other mechanisms for optimum path calculation have been reported, but DTW is a very computationally low-cost solution, which perfectly meets the real-time requirements of control loops and CPS. In this technology, it is calculated the optimal path between two points, so a global cost function is minimum (or maximum, in our case). Basically, the idea is, at each point, to select the position which adds the higher cost the aggregate function as the next step. Besides, next step must be next to the current position (mobile base stations are moving in a continuous trajectory). The cost of each point may be easily calculated using previous expressions (30). The resulting path is open, no return is obtained. However, it could be calculated using the same procedure in reverse. Algorithm 2 describes the proposed solution.
Algorithm 2. Mobile Base Station Path Calculation Using DTW Technologies
Input: Reticula   describing the coverage area and geographical distribution of access points { Q i   }
Output: Optimal base station trajectory ϕ o p t
Create analysis reticula an
for each point Q j   do
          for each  Q i  do
                    Calculate B ( Q j Q i ) and add value to an   ( i , j )
          end for
end for
for each possible value of i do
          for each possible value of j do
                    Obtain the maximum value in an for the set of points { ( i + 1 , j ) ,   ( i ,   j + 1 ) , ( i + 1 ,   j + 1 ) }
                    Add the point with maximum value to ϕ o p t
          end for
end for

3.4. Service Level: Service Catalogue Management

Finally, at service layer, in the main coordination center, all services are considered together. This center takes profit from 5G solutions based on virtualization technologies to dimension services, so the largest possible catalogue is deployed, but only essential services are totally guaranteed. Besides, the service configuration can be dynamically modified, according to the environmental situation.
We are assuming our system is able to provide a catalogue of services (32), so each individual service 𝕔 i is characterized by four parameters (33): the code of the VNF to be executed v n f i , the minimum number of access point where the service must be deployed A m i n i , the minimum number of service instances S m i n i   and the service priority σ i .
  =   { 𝕔 i       i = 1 , , M c }
𝕔 i =   { v n f i , A m i n i , S m i n i , σ i }
Service priority is an integer number, so as higher the number, the priority goes down. Besides, service priority may be labeled as e , indicating that is an essential service for ERT (34). The function we would like to maximize is the number of deployed services M S . The main constrain to be considered is the available resources Ω in the network (35); being A n e t the number of access points in the networks and S n e t the number of service instances these points can support.
σ i         { e }
Ω =   { A net , S net }
Then, to select what services are finally deployed and the amount of assigned resources, three main design principles are followed:
  • Essential services are guaranteed, and their resources are exclusively assigned, i.e., each essential service makes a network slice.
  • Services with any other priority are packet and may share resources, according to a reutilization parameter β i , which is related to the service priority: as priority is higher, the reutilization parameter is lower.
  • A strategic reservation of resources is done to address unexpected situations. This reservation includes a percentage γ of total available resources.
Then, the initial service deployment is made following these principles, and always deploying first services with a higher priority (see Algorithm 3).
Algorithm 3. Initial Service Deployment
Input: Service catalogue and network resources Ω
Output: Initial service deployment
Available access points A a v are defined and equal to A net
Available service instances S a v are defined and equal to S net
Update A a v   =   A a v · ( 1   γ )
Update S a v   =   S a v · ( 1   γ )
for each service 𝕔 i in the service catalogue   do
          if  A m i n i   A a v           S m i n i     S a v
                     if  σ i = e    
                                   Deploy service 𝕔 i with resources { A m i n i , S m i n i }
                                   Update A a v   =   A a v A m i n i
                                        Update S a v   =   S a v S m i n i
                    else
                              Obtain β i = 1 / σ i
                                   Deploy service 𝕔 i with resources { β i · A m i n i , β i · S m i n i }
                                   Update A a v   =   A a v β i · A m i n i
                                        Update S a v   =   S a v β i · S m i n i
          end if
end for
Algorithm 4. Service Reconfiguration Process
Input: Networks alarms η
Output: Service redistribution
if  η     then
          for each service 𝕔 i referred in η do
                    if   σ i is the lowest among deployed services then
                               𝕔 i is removed
                    else
                              Look for service 𝕔 j so σ j <   σ i
                              if    β j · A m i n j   A j         β j ·   S m i n j     S j  then
                                        Resources of 𝕔 j are fixed to { β j · A m i n j , β j ·   S m i n j   }
                                        Increment resources of 𝕔 i in { A j β j · A m i n j , S j β j ·   S m i n j   } units
                              else
                                         𝕔 j is removed
                                        Increment resources of 𝕔 i in { β j · A m i n j , β j ·   S m i n j   } units
                              end if
                              if 𝕔 j = n u l l     σ i = e   s t r a t e g i c   r e s r v a t i o n   i s   n o t   e m p t y then
                                        Increment resources of 𝕔 i in { A m i n i , S m i n i   } units
                              end if
                    end if
          end for
else
          for each service 𝕔 i do
                    if β i · A m i n i   A i         β i ·   S m i n i     S i then
                              Resources of 𝕔 i are fixed to { β i · A m i n i , β i ·   S m i n i   }
                    end if
                    Run the service deployment procedure
          end for
end if
After the initial service deployment proposal, the main coordination center monitors the service performance. If from network level no alarm is received in network reports, it is assumed services are running adequately, and no action is taken. However, if alarms η are received, a resource redistribution is required. In particular, congested services need more resources. If services with lower priority are deployed, they are cancelled or reduced, so their resources are assigned to the congested service. If no service with lower priority is deployed, the congested service is cancelled. Only essential services can obtain resources from the strategic reservation if they are congested. This assignment is, any case, temporary. Besides, periodically, services with assigned resources above the minimum are modified to reduce their resources, so new services can be deployed. Essential services do not participate from this periodical revision process. Algorithm 4 shows this reconfiguration process.

4. Experimental Validation and Results

To evaluate the performance of the proposed solution, an experimental validation was designed and carried out. The proposed experimental validation was focused on two different objectives. On the one hand, evaluating the usability and good behavior of the proposed solution for emergency communications. On the other hand, analyzing the technical performance of the proposed mechanism, for example, in terms of temporal scalability.
To carry out this experimental validation a simulation scenario was built using the MATLAB 2018b software. The scenario represented a high-density urban scenario, where one coordination center, 15 base stations and a variable number of access points was deployed. The number of services considered in the service catalogue was also variable. The frequency spectrum was supposed to be very noise, because of users trying to communicate. A noise level of 30 dB in the standard frequency channel was configured. Among all proposals for radio channel for 5G technologies, we are considering our system is working in the E-band (60 GHz), where most innovative services are planned to be deployed. Base stations are considered mobile agents, moving at 10 km/h around the coverage area. The total geographical area covered by the proposed solution was supposed to be 20 km2, a reasonable surface for a large damage or natural disaster in an urban environment. Considered ERT included up to one hundred user devices to be served by the proposed architecture.
Wireless communications between base stations, access point and the coordination center were simulated as microwaves radio links (in the band of 54 GHz).
The simulation scenario represented an operation time of 24 h in all simulations. All simulations were performed using a Linux architecture (Ubuntu 18.04 LTS) with the following hardware characteristics: Dell R540 Rack 2U, 96 GB RAM, two processors Intel Xeon Silver 4114 2.2G, HD 2TB SATA 7.2k rpm.
Using this technological platform, four different experiments were designed and performed.
The first experiment was focused on analyzing how efficient is the proposed solution, compared to traditional approaches. To do that, the congestion level, the Grade of Service and the number of services deployed are analyzed. The simulation scenario was configured to deploy between one and one hundred different services, considering a fixed number of sixty access points. Two different simulations were performed. In the first one, the proposed architecture was implemented; in the second one, a traditional approach based on a fix service deployment is implemented. In this traditional approach, as many services as possible from the catalogue are deployed, and every service has assigned a fixed amount of resources that cannot be dynamically modified. Different works where this approach is described with details may be found [45,46]. Results from both simulations are compared. To reduce statistical noise, each simulation was repeated 12 times, and presented results are obtained as the average of all these simulations.
The second experiment analyzed the temporal order of the proposed solution. Different number of services, between one and one hundred, were considered. And different amount of access points between 30 and 150 were also considered. The reaction time required by the proposed solution to update the system configuration, so a new and more efficient situation is reached, is measured, and analyzed. To reduce statistical noise, each simulation was repeated 12 times, and the presented results are obtained as the average of all these simulations.
The third experiment was focused on analyzing if essential services are always guaranteed, so the basic requirement for communication solutions for emergency situations is met. To do that, from a standard situation identical to the described scenario for the second experiment, the ratio of requests peer time unit is increased. The congestion level for essential services is then monitored, to study if they may get offline at any time. As in all previous experiments, to reduce the statistical noise, each simulation was repeated 12 times, and presented results are obtained as the average of all these simulations.
Finally, the fourth experiment tried to analyze if paths described by base stations are optimal. In this experiment, access points are geographically distributed so the calculation of the optimum path can be calculated from a theorical point of view using the graph theory [47]. Twelve different distributions are considered, and each simulation is repeated 12 times to reduce statistical noise (and presented results are obtained as the average of all these simulations). The distance (according to the common Euclidean definition) between the theoretical and the calculated path is obtained. The experiment is repeated for different number of access points.
Figure 6 show the number of deployed services in emergency systems, considering our solution and traditional approaches. As can be seen, for both approaches the system evolution follows, approximately, a logarithm function. For small amount of services, all of them may be deployed in both technologies, but for catalogues with more than ten services there is a relevant difference. The proposed solution allows a higher number of services thanks to the proposed optimization algorithms at service level, so around 35% of planned services can be deployed, contrary to traditional approaches where resources are assigned in a fixed manner, so only 17% of services are finally executed. Thus, proposed mechanism improves up to 100% the traditional approach’s performance.
Figure 7 shows the reached Grade of Service for both approaches in the same scenario. As can be seen, in this case, the GoS is almost constant, as it is independent from the number of deployed services. As can be seen, the proposed solution is more efficient and reaches a GoS near 90 units, while traditional approaches reach the value of 70 units quite difficulty. This represents an improvement of around 30%.
Finally, the first experiment also analyzes the network congestion. Figure 8 represents this variable. As previously mentioned, the network congestion is independent from services consumed by users (they are consuming network resources in the same way, independently from the service), so evolution is almost constant. However, in this case, proposed solution presents worse behavior, increasing around 30% the congestion level associated to traditional mechanisms. These values, however, are affordable as (any case) are always below 0.35. The increasing in the network congestion is widely exploited, as it allows a great improvement in the GoS ratio (30%) and the deployed number of services (100%).
Now, we are analyzing results from the second experiment. Figure 9 shows the obtained results for this scalability study. As can be seen, as the number of services in the catalogue goes up, the processing delay also increases. Approximately, the temporal order of the proposed algorithm is n in respect to the number of services in the catalogue. This evolution is caused by the optimization algorithm at service level. However, most important effect is due to algorithms at network level, where the number of access points greatly affects the calculation delay. In this case, temporal order follows, approximately, n · l o g ( n ) . Any case, even scenarios with a large number of access points and services in the catalogue, the processing delay is below one second. Thus, the performance of the proposed solution perfectly meets the requirements of emergency scenarios.
Figure 10 shows the results from the third experiment. As can be seen, as the ratio of request per time unit increases, the congestion level goes up exponentially. Observed values are coherent with previous results and scenarios from previous experiments. However, right after the congestion level reaches the alert threshold, the control loops and dynamic resource management algorithms redistributes the network resources and the congestion level reduces to the base value (around 0.2). The cycle is repeated each time the requests per time unit ratio increases in three thousand units. Any case, this figure shows how the congestion level for essential services is always below critical values (i.e., values up to 0.8), so their provision is guaranteed, as required in emergency situations.
Finally, Figure 11 shows the results from the fourth experiment, analyzing the behavior of the optimum path calculation algorithm. As can be seen, the evolution in the calculation error of the optimal path follows a sigmoid function. For small numbers of access points, the error can be considered negligible (it is around 2%). However, for more complex problems involving more than 50 access points, a higher error in induced by DTW algorithm. This error, nevertheless, reaches a maximum (around 16%) when the problem includes more than 150 access points. Thus, the calculation error is bounded to an acceptable value (below 20%), and we can conclude the proposed optimal path calculation algorithm works as expected.

5. Conclusions and Future Works

In this paper it is proposed a new approach for ad hoc emergency wireless communications in urban environments based on 5G technologies and Cyber-Physical Systems (CPS). The proposed architecture consists of three layers, where different feedback control loops are defined and linked following the CPS paradigm. At physical level, the spectrum usage is monitored through CPS control loops, analyzing if power signals present a good quality. At network level, 5G virtualization technologies are employed to manage in a dynamic way the network configuration and user management. Finally, at service level, the global situation is analyzed to decide about what services from a catalogue, and according to their priority, can be deployed, including the amount of assigned resources.
The experimental validation shows the proposed solution improves up to 100% the number of services that can be deployed in a given network, as well as up to 30% the Grade of Service ratio. On the other hand, the proposed solution presents a linear scalability in respect to the number of services, and logarithmic in respect to the number of access points. As a global conclusion, the performance of the proposed solution perfectly meets the requirements of emergency scenarios.
In future works, we are evaluating the performance of the proposed solution in realistic scenarios, where the effect of exogenous variables (such as, for example, the climate or malfunctions in hardware devices) could be analyzed and their impact on the performance of the proposed solution evaluated. Besides, experiments for different emergency situations will be carried out, so the behavior of the proposed mechanism for different communication and application services is studied.
On the other hand, studies about the minimum required infrastructure (base stations, access points, etc.) to execute without congestion a given service catalogue will be performed. This is a complementary approach to the one presented in this paper, that may be useful in certain scenarios (for example, in large scale emergency situations when resources tend to be limited and insufficient).

Author Contributions

Conceptualization, B.B.S. and R.A.; methodology, R.A.; software, R.A.; validation, B.B.S., R.A. and T.R.; formal analysis, B.B.S.; investigation, B.B.S.; resources, T.R.; data curation, R.A.; writing—original draft preparation, B.B.S.; writing—review and editing, R.A.; visualization, B.B.S.; supervision, R.A.; project administration, T.R.; funding acquisition, T.R. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the Ministry of Science, Innovation and Universities through the COGNOS project.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Davis, K. The urbanization of the human population. Sci. Am. 1965, 213, 40–53. [Google Scholar]
  2. Bordel, B.; Alcarria, R.; Sánchez-de-Rivera, D.; Robles, T. Protecting industry 4.0 systems against the malicious effects of cyber-physical attacks. In International Conference on Ubiquitous Computing and Ambient Intelligence; Springer: Cham, Switzerland, 2017; pp. 161–171. [Google Scholar]
  3. Addanki, S.C.; Venkataraman, H. Greening the economy: A review of urban sustainability measures for developing new cities. Sustain. Cities Soc. 2017, 32, 1–8. [Google Scholar] [CrossRef]
  4. Bordel, B.; Alcarria, R.; Rizzo, G.; Jara, A. Creating predictive models for forecasting the accident rate in mountain roads using VANETs. In International Conference on Information Theoretic Security; Springer: Cham, Switzerland, 2018; pp. 319–329. [Google Scholar]
  5. Bordel, B.; Martin, D.; Alcarria, R.; Robles, T. A blockchain-based water control system for the automatic management of irrigation communities. In Proceedings of the 2019 IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 11–13 January 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–2. [Google Scholar]
  6. Rahmayanti, H.; Maulida, E.; Kamayana, E. The Role of Sustainable Urban Building in Industry 4.0. In Journal of Physics: Conference Series; IOP Publishing: Bristol, UK, 2019; Volume 1387, p. 012050. [Google Scholar]
  7. Pérez-Jiménez, M.; Sánchez, B.B.; Migliorini, A.; Alcarria, R. Protecting private communications in cyber-physical systems through physical unclonable functions. Electronics 2019, 8, 390. [Google Scholar] [CrossRef] [Green Version]
  8. Rubin, C.B. Long term recovery from disasters—The neglected component of emergency management. J. Homel. Secur. Emerg. Manag. 2009, 6. [Google Scholar] [CrossRef]
  9. White, J.D.; Fu, K.W. Who do you trust? Comparing people-centered communications in disaster situations in the United States and China. J. Comp. Policy Anal. Res. Pract. 2012, 14, 126–142. [Google Scholar]
  10. Robles, T.; Bordel, B.; Alcarria, R.; de Andrés, D.M. Mobile Wireless Sensor Networks: Modeling and Analysis of Three-Dimensional Scenarios and Neighbor Discovery in Mobile Data Collection. Ad Hoc Sens. Wirel. Netw. 2017, 35, 67–104. [Google Scholar]
  11. Habib, M.F.; Tornatore, M.; Dikbiyik, F.; Mukherjee, B. Disaster survivability in optical communication networks. Comput. Commun. 2013, 36, 630–644. [Google Scholar]
  12. Gomes, T.; Tapolcai, J.; Esposito, C.; Hutchison, D.; Kuipers, F.; Rak, J.; De Sousa, A.; Iossifides, A.; Travanca, R.; André, J.; et al. A survey of strategies for communication networks to protect against large-scale natural disasters. In Proceedings of the 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM), Halmstad, Sweden, 13–15 September 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 11–22. [Google Scholar]
  13. Bordel, B.; Alcarria, R.; Robles, T.; Sánchez-de-Rivera, D. Service management in virtualization-based architectures for 5G systems with network slicing. Integr. Comput.-Aided Eng. 2020, 27, 77–99. [Google Scholar]
  14. Bordel, B.; Alcarria, R.; Robles, T.; Martín, D. Cyber–physical systems: Extending pervasive sensing from control theory to the Internet of Things. Pervasive Mob. Comput. 2017, 40, 156–184. [Google Scholar]
  15. Manoj, B.S.; Baker, A.H. Communication challenges in emergency response. Commun. ACM 2007, 50, 51–53. [Google Scholar]
  16. Braunstein, B.; Trimble, T.; Mishra, R.; Manoj, B.S.; Lenert, L.; Rao, R. Challenges in using distributed wireless mesh networks in emergency response. In Proceedings of the 3rd International ISCRAM Conference, Newark, NJ, USA, 14–17 May 2006; pp. 30–38. [Google Scholar]
  17. Kyng, M.; Nielsen, E.T.; Kristensen, M. Challenges in designing interactive systems for emergency response. In Proceedings of the 6th Conference on Designing Interactive Systems, University Park, PA, USA, 26–28 June 2006; pp. 301–310. [Google Scholar]
  18. Plotnick, L.; Hiltz, S.R. Barriers to use of social media by emergency managers. J. Homel. Secur. Emerg. Manag. 2016, 13, 247–277. [Google Scholar] [CrossRef]
  19. Chiti, F.; Fantacci, R.; Maccari, L.; Marabissi, D.; Tarchi, D. A broadband wireless communications system for emergency management. IEEE Wirel. Commun. 2008, 15, 8–14. [Google Scholar] [CrossRef]
  20. Mauthe, A.; Hutchison, D.; Cetinkaya, E.K.; Ganchev, I.; Rak, J.; Sterbenz, J.P.; Gunkelk, M.; Smith, P.; Gomes, T. Disaster-resilient communication networks: Principles and best practices. In Proceedings of the 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM), Halmstad, Sweden, 13–15 September 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–10. [Google Scholar]
  21. Nguyen, K.; Minh, Q.T.; Yamada, S. A software-defined networking approach for disaster-resilient WANs. In Proceedings of the 2013 22nd International Conference on Computer Communication and Networks (ICCCN), Nassau, Bahamas, 30 July–2 August 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 1–5. [Google Scholar]
  22. Xie, A.; Wang, X.; Wang, W.; Lu, S. Designing a disaster-resilient network with software defined networking. In Proceedings of the 2014 IEEE 22nd International Symposium of Quality of Service (IWQoS), Hong Kong, China, 26–27 May 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 135–140. [Google Scholar]
  23. Habib, M.F.; Tornatore, M.; De Leenheer, M.; Dikbiyik, F.; Mukherjee, B. Design of disaster-resilient optical datacenter networks. J. Lightwave Technol. 2012, 30, 2563–2573. [Google Scholar] [CrossRef]
  24. Meixner, C.C.; Dikbiyik, F.; Tornatore, M.; Chuah, C.N.; Mukherjee, B. Disaster-resilient virtual-network mapping and adaptation in optical networks. In Proceedings of the 2013 17th International Conference on Optical Networking Design and Modeling (ONDM), Brest, France, 16–19 April 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 107–112. [Google Scholar]
  25. Savas, S.S.; Tornatore, M.; Habib, M.F.; Chowdhury, P.; Mukherjee, B. Disaster-resilient control plane design and mapping in software-defined networks. In Proceedings of the 2015 IEEE 16th International Conference on High Performance Switching and Routing (HPSR), Budapest, Hungary, 1–4 July 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 1–6. [Google Scholar]
  26. Di Felice, M.; Trotta, A.; Bedogni, L.; Bononi, L.; Panzieri, F.; Ruggeri, G.; Loscri, V.; Pace, P. STEM-mesh: Self-organizing mobile cognitive radio network for disaster recovery operations. In Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, Italy, 1–5 July 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 602–608. [Google Scholar]
  27. Di Felice, M.; Trotta, A.; Bedogni, L.; Chowdhury, K.R.; Bononi, L. Self-organizing aerial mesh networks for emergency communication. In Proceedings of the 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC), Washington, DC, USA, 2–5 September 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 1631–1636. [Google Scholar]
  28. Al-Taie, M.Z.; Ali, A. A self-organizing communication model for disaster risk management. Int. J. Adv. Soft Comput. Appl. 2017, 9, 17–30. [Google Scholar]
  29. Masaracchia, A.; Nguyen, L.D.; Duong, T.Q.; Nguyen, M.N. An energy-efficient clustering and routing framework for disaster relief network. IEEE Access 2019, 7, 56520–56532. [Google Scholar] [CrossRef]
  30. Ali, K.; Nguyen, H.X.; Vien, Q.T.; Shah, P.; Chu, Z. Disaster management using D2D communication with power transfer and clustering techniques. IEEE Access 2018, 6, 14643–14654. [Google Scholar] [CrossRef]
  31. Midkiff, S.F.; Bostian, C.W. Rapidly-deployable broadband wireless networks for disaster and emergency response. In Proceedings of the First IEEE Workshop on Disaster Recover Networks, New York, NY, USA, 24 June 2002. [Google Scholar]
  32. Sakano, T.; Fadlullah, Z.M.; Ngo, T.; Nishiyama, H.; Nakazawa, M.; Adachi, F.; Kato, N.; Takahara, A.; Kumagai, T.; Kasahara, H.; et al. Disaster-resilient networking: A new vision based on movable and deployable resource units. IEEE Netw. 2013, 27, 40–46. [Google Scholar] [CrossRef]
  33. Zhang, H.; Jiang, C.; Hu, R.Q.; Qian, Y. Self-organization in disaster-resilient heterogeneous small cell networks. IEEE Netw. 2016, 30, 116–121. [Google Scholar] [CrossRef] [Green Version]
  34. Gomez, K.; Goratti, L.; Rasheed, T.; Reynaud, L. Enabling disaster-resilient 4G mobile communication networks. IEEE Commun. Mag. 2014, 52, 66–73. [Google Scholar] [CrossRef]
  35. Tsai, C.H.; Tsai, A.H.; Chen, W.P. The Functionality Discussion with LTE Simulator for Emergency Disaster-Resilient Network Systems. J. Telecommun. Electron. Comput. Eng. (JTEC) 2017, 9, 43–48. [Google Scholar]
  36. Zhang, Y.; Cheng, W. Trajectory and Power Optimization for Multi-UAV Enabled Emergency Wireless Communications Networks. In Proceedings of the 2019 IEEE International Conference on Communications Workshops (ICC Workshops), Shanghai, China, 20–24 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–6. [Google Scholar]
  37. Zhao, N.; Lu, W.; Sheng, M.; Chen, Y.; Tang, J.; Yu, F.R.; Wong, K.K. UAV-assisted emergency networks in disasters. IEEE Wirel. Commun. 2019, 26, 45–51. [Google Scholar]
  38. Chen, W.P.; Tsai, A.H.; Tsai, C.H. Smart traffic offloading with Mobile edge computing for disaster-resilient communication networks. J. Netw. Syst. Manag. 2019, 27, 463–488. [Google Scholar] [CrossRef]
  39. Gelenbe, E.; Gorbil, G.; Wu, F.J. Emergency cyber-physical-human systems. In Proceedings of the 2012 21st International Conference on Computer Communications and Networks (ICCCN), Munich, Germany, 30 July–2 August 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 1–7. [Google Scholar]
  40. Gelenbe, E.; Gorbil, G. Wireless networks in emergency management. In Proceedings of the First ACM International Workshop on Practical Issues and Applications in Next Generation Wireless Networks, Istanbul, Turkey, 26 August 2012; pp. 1–6. [Google Scholar]
  41. Zaidi, A.; Athley, F.; Medbo, J.; Gustavsson, U.; Durisi, G.; Chen, X. 5G Physical Layer: Principles, Models and Technology Components; Academic Press: Cambridge, MA, USA, 2018. [Google Scholar]
  42. Reichl, P.; Tuffin, B.; Schatz, R. Logarithmic laws in service quality perception: Where microeconomics meets psychophysics and quality of experience. Telecommun. Syst. 2013, 52, 587–600. [Google Scholar] [CrossRef]
  43. Bordel, B.; Alcarria, R.; Sánchez-de-Rivera, D. A two-phase algorithm for recognizing human activities in the context of Industry 4.0 and human-driven processes. In World Conference on Information Systems and Technologies; Springer: Cham, Switzerland, 2019; pp. 175–185. [Google Scholar]
  44. Müller, M. Dynamic time warping. In Information Retrieval for Music and Motion; Springer: Berlin/Heidelberg, Germany, 2007; pp. 69–84. [Google Scholar]
  45. Huang, Y.; Fan, Y. Modeling uncertainties in emergency service resource allocation. J. Infrastruct. Syst. 2011, 17, 35–41. [Google Scholar] [CrossRef]
  46. Meissner, A.; Wang, Z.; Putz, W.; Grimmer, J. Mikobos-a mobile information and communication system for emergency response. In Proceedings of the 3rd International ISCRAM Conference, Newark, NJ, USA, 14–17 May 2006; pp. 92–101. [Google Scholar]
  47. Pinto, N.; Keitt, T.H. Beyond the least-cost path: Evaluating corridor redundancy using a graph-theoretic approach. Landsc. Ecol. 2009, 24, 253–266. [Google Scholar] [CrossRef]
Figure 1. Global overview of the proposed solution.
Figure 1. Global overview of the proposed solution.
Electronics 09 01524 g001
Figure 2. BER evolution considering different SINR ratios and p values in OFDMA.
Figure 2. BER evolution considering different SINR ratios and p values in OFDMA.
Electronics 09 01524 g002
Figure 3. Teletraffic model for emergency services at radio level.
Figure 3. Teletraffic model for emergency services at radio level.
Electronics 09 01524 g003
Figure 4. Block diagram for the proposed CPS control loop.
Figure 4. Block diagram for the proposed CPS control loop.
Electronics 09 01524 g004
Figure 5. (a) Geographical representation of the coverage area for computational purposes. (b) Function (fictional example only for clarification purposes).
Figure 5. (a) Geographical representation of the coverage area for computational purposes. (b) Function (fictional example only for clarification purposes).
Electronics 09 01524 g005
Figure 6. First experiment: number of deployed services.
Figure 6. First experiment: number of deployed services.
Electronics 09 01524 g006
Figure 7. First experiment: Grade of Service (GoS).
Figure 7. First experiment: Grade of Service (GoS).
Electronics 09 01524 g007
Figure 8. First experiment: congestion level.
Figure 8. First experiment: congestion level.
Electronics 09 01524 g008
Figure 9. Second experiment: scalability analysis.
Figure 9. Second experiment: scalability analysis.
Electronics 09 01524 g009
Figure 10. Third experiment: congestion level.
Figure 10. Third experiment: congestion level.
Electronics 09 01524 g010
Figure 11. Fourth experiment: optimal path evaluation.
Figure 11. Fourth experiment: optimal path evaluation.
Electronics 09 01524 g011

Share and Cite

MDPI and ACS Style

Bordel Sánchez, B.; Alcarria, R.; Robles, T. Managing Wireless Communications for Emergency Situations in Urban Environments through Cyber-Physical Systems and 5G Technologies. Electronics 2020, 9, 1524. https://doi.org/10.3390/electronics9091524

AMA Style

Bordel Sánchez B, Alcarria R, Robles T. Managing Wireless Communications for Emergency Situations in Urban Environments through Cyber-Physical Systems and 5G Technologies. Electronics. 2020; 9(9):1524. https://doi.org/10.3390/electronics9091524

Chicago/Turabian Style

Bordel Sánchez, Borja, Ramón Alcarria, and Tomás Robles. 2020. "Managing Wireless Communications for Emergency Situations in Urban Environments through Cyber-Physical Systems and 5G Technologies" Electronics 9, no. 9: 1524. https://doi.org/10.3390/electronics9091524

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop