A Survey of Online Data-Driven Proactive 5G Network Optimisation Using Machine Learning

被引:56
作者
Ma, Bo [1 ]
Guo, Weisi [2 ,3 ,4 ]
Zhang, Jie [1 ]
机构
[1] Univ Sheffield, Dept Elect & Elect Engn, Sheffield S1 3JD, S Yorkshire, England
[2] Univ Warwick, Sch Engn, Coventry CV4 7AL, W Midlands, England
[3] Alan Turing Inst, London NW1 2DB, England
[4] Cranfield Univ, Human Machine Intelligence Ctr Autonomous & Cyber, Bedford MK43 0AL, England
基金
欧盟地平线“2020”;
关键词
Online data; data analytics; proactive network optimisation; 5G; INDOOR FINGERPRINTING LOCALIZATION; CONTEXT-AWARE NETWORKING; BIG-DATA; HETEROGENEOUS NETWORKS; COVERAGE OPTIMIZATION; SELF-OPTIMIZATION; PREDICTION; ENERGY; EDGE; ORGANIZATION;
D O I
10.1109/ACCESS.2020.2975004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the fifth-generation (5G) mobile networks, proactive network optimisation plays an important role in meeting the exponential traffic growth, more stringent service requirements, and to reduce capital and operational expenditure. Proactive network optimisation is widely acknowledged as one of the most promising ways to transform the 5G network based on big data analysis and cloud-fog-edge computing, but there are many challenges. Proactive algorithms will require accurate forecasting of highly contextualised traffic demand and quantifying the uncertainty to drive decision making with performance guarantees. Context in Cyber-Physical-Social Systems (CPSS) is often challenging to uncover, unfolds over time, and even more difficult to quantify and integrate into decision making. The first part of the review focuses on mining and inferring CPSS context from heterogeneous data sources, such as online user-generated-content. It will examine the state-of-the-art methods currently employed to infer location, social behaviour, and traffic demand through a cloud-edge computing framework; combining them to form the input to proactive algorithms. The second part of the review focuses on exploiting and integrating the demand knowledge for a range of proactive optimisation techniques, including the key aspects of load balancing, mobile edge caching, and interference management. In both parts, appropriate state-of-the-art machine learning techniques (including probabilistic uncertainty cascades in proactive optimisation), complexity-performance trade-offs, and demonstrative examples are presented to inspire readers. This survey couples the potential of online big data analytics, cloud-edge computing, statistical machine learning, and proactive network optimisation in a common cross-layer wireless framework. The wider impact of this survey includes better cross-fertilising the academic fields of data analytics, mobile edge computing, AI, CPSS, and wireless communications, as well as informing the industry of the promising potentials in this area.
引用
收藏
页码:35606 / 35637
页数:32
相关论文
共 195 条
[41]  
Chen G., 2017, RT0483 INRIA, P17
[42]   Echo State Networks for Proactive Caching in Cloud-Based Radio Access Networks With Mobile Users [J].
Chen, Mingzhe ;
Saad, Walid ;
Yin, Changchuan ;
Debbah, Merouane .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2017, 16 (06) :3520-3535
[43]   Caching in the Sky: Proactive Deployment of Cache-Enabled Unmanned Aerial Vehicles for Optimized Quality-of-Experience [J].
Chen, Mingzhe ;
Mozaffari, Mohammad ;
Saad, Walid ;
Yin, Changchuan ;
Debbah, Merouane ;
Hong, Choong Seon .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2017, 35 (05) :1046-1061
[44]  
Chen S., 2018, Wireless Commun. Mobile Comput., V2018, P1
[45]   Energy-Efficiency Oriented Traffic Offloading in Wireless Networks: A Brief Survey and a Learning Approach for Heterogeneous Cellular Networks [J].
Chen, Xianfu ;
Wu, Jinsong ;
Cai, Yueming ;
Zhang, Honggang ;
Chen, Tao .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2015, 33 (04) :627-640
[46]   Social Context-Aware Mobile Data Offloading Algorithm Via Small Cell Backhaul Networks [J].
Cheon, Hye-Rim ;
Kim, Jae-Hyun .
IEEE ACCESS, 2019, 7 :39030-39040
[47]  
Cho E., 2011, P 17 ACM SIGKDD INT, P1082
[48]   The Last Mile for IoT Privacy [J].
Chow, Richard .
IEEE SECURITY & PRIVACY, 2017, 15 (06) :73-76
[49]  
Claussen H., 2008, P WIRELESS TELECOMMU, P278
[50]   The quality of online social relationships [J].
Cummings, JN ;
Butler, B ;
Kraut, R .
COMMUNICATIONS OF THE ACM, 2002, 45 (07) :103-108