Unmanned Aerial Vehicle (UAV)-Based Solutions for 5G and BeyondView this Special Issue
QoS-Aware Multilayer UAV Deployment to Provide VoWiFi Service over 5G Networks
Drones equipped with wireless network cards can provide communication services in open areas. This paper proposes a hierarchical two-layered network architecture with two types of drones according to their communication equipment: Access and Distribution. While access drones provide WiFi access to ground users, distribution drones act as WiFi-to-5G relay forwarding packets into the 5G Core Network. In this context, we formulate a novel optimization problem for the 3-D initial placement of drones to provide Voice over WiFi (VoWiFi) service to ground users. Our optimization problem finds the minimum number of drones (and their type and location) to be deployed constrained to coverage and minimum voice speech quality. We have used a well-known metaheuristic algorithm (Particle Swarm Optimization) to solve our problem, examining the results obtained for different terrain sizes (from to ) and ground users (from to ). In the most demanding case, we were able to provide VoWiFi service with four distribution drones and five access drones. Our results show that the overall number of UAVs deployed grows with the terrain size (i.e., with users’ sparsity) and the number of ground users.
Unmanned Aerial Vehicles (UAVs), also known as drones, have been widely studied in the literature for the last decade partly due to their versatility, which lets UAVs be used in different domains . The application considered in this paper is the UAV-assisted deployment of wireless communication services in open areas [2, 3]. UAVs equipped with communication electronics have been proposed in the past as mobile base stations or access points to enhance wireless coverage, improve capacity or reliability in existing infrastructure, or even replace damaged infrastructure in emergency situations [4, 5].
Provisioning a communication service to ground users typically requires the deployment of a UAV-to-ground access network and, if not in place, a UAV-to-UAV and/or UAV-to-infrastructure network or backhaul . Most research papers tend to focus on only one of these networks and its associated communication technology (e.g., WiMAX , cellular 3/4G , or 5G  for the backhaul and cellular for the access network). Clearly, ground users’ devices must share the radio technology in the access network, which could be a problem in practice often overlooked (e.g., scarcity of 5G users or the involvement of a telco operator). For this reason, some works have also suggested the use of WiFi [10–12] for the UAV-to-ground access network due to its low complexity, ubiquity (e.g., smartphones, tablets and some IoT devices), and independence from operators. UAV-enabled WiFi deployments bring new opportunities when creating provisional communications infrastructure in SAR (Search and Rescue) missions, which is actively investigated in scientific literature nowadays [12, 13]. However, designing a WiFi access network requires dealing with signal coverage and Quality of Service (QoS) issues at the IEEE 802.11 MAC sublayer. This challenge is translated to the problems addressed in the literature, such as 3-D placement, trajectory planning, energy efficiency, coverage, or backhaul connectivity [6, 14].
In this paper, we propose using UAVs to form a two-level hierarchical network that relays between IEEE 802.11 (WiFi) and cellular 5G for providing VoIP over WiFi (VoWiFi) service to ground users (see Figure 1). Access network drones implement WiFi, while distribution/backhaul drones implement a gateway between WiFi and 5G. This combination of technologies leverages the high bandwidth of 5G (up to 1 Gbps) to aggregate VoIP traffic flows in a low number of 5G radio links, reducing the number of mobile subscriptions and costs in 5G equipment. In this scenario, we address the problem of the initial 3-D placement of the UAVs in both networks. As Masroor et al. put it , “the placement of UAVs is an important parameter of resource management as this can affect the transmit power, coverage, and the QoS of the system.” More specifically, we propose a new optimization problem that considers constraints about signal coverage and QoS and finds the minimum number of drones that need to be deployed, their position, and type (i.e., access network—A-UAV—or distribution-network—D-UAV). This work extends our previous research [15, 16], where we studied the deployment of drones to form a WiFi access network for VoIP services. Now, we integrate the access network into a 5G Core Network using a second layer of drones that hove at a higher altitude and aggregate the VoIP traffic flows. Note that in this scenario, the quality of service depends not only on the congestion level of the access network but also on the distribution network and 5G operator backbone SLAs (Service Level Agreement). As such, UAVs’ optimal position may depend on users’ location, VoIP capacity, and backbone link capacity.
The main contributions of this paper are as follows: (i)We mathematically formulate a new problem for the optimal deployment of UAVs that includes coverage and QoS constraints in the access (WiFi), distribution (WiFi), and backbone (5G) networks.(ii)We propose a novel network reference architecture for the proposed scenario that provides seamless Voice over WiFi (VoWiFi) access to the 5G Core Network.(iii)We provide an analytical model to estimate the speech quality in our multilayered scenario. Our models assume realistic traffic conditions such as heterogeneous and nonsaturated stations.(iv)We use a metaheuristic search method (i.e., Particle Swarm Optimization) to solve the previous optimization problem.
The remainder of the paper is as follows. Section 2 presents a state-of-the-art analysis of UAV optimization problems for communications services. Then, Section 3 elaborates on the proposed network architecture and the voice quality assessment method. The proposed optimization problem is defined in Section 4, and Section 5 presents a solution search method based on a well-known meta-heuristics algorithm (Particle Swarm Optimization). Then, we examine the solutions obtained for different scenarios in Section 6 and analyze the performance. Finally, Section 7 summarizes the paper by providing conclusions and future work.
2. Related Works
The optimal placement of UAVs has been identified as an open challenge in the context of communication services that use drones as base stations (BS) or relaying nodes in 2D, 3D, single-, and multi-UAV environments . Table 1 summarizes the state of the art in UAV optimal location optimization problems for wireless coverage provisioning and clarifies how our work is different from related works. Works in Table 1 are classified in terms of (a) their objective function, (b) optimization variables (e.g., initial placement, trajectory, or resource allocation), and (c) any other constraints or considerations that might restrict its usage to a concrete scenario.
Optimal UAV placement for wireless coverage counts with a good deal of optimization problems in the literature. For example, Li et al.  propose to maximize throughput via power allocation and 3D placement for indoor communications. Maximizing the throughput has also been addressed in , where the authors suggest a 3D UAV placement and power allocation optimization problem based on software-defined cellular networks, or in  that also employs software-defined cellular networks but using rate instead of power allocation. Similarly, Yin et al.  suggest deploying a cellular network (FDMA) by maximizing the downlink rate under three optimization variables: user association, resource allocation, and UAV placement. Other authors  suggest combining UAV placement with user association in order to minimize the maximum traffic demand at UAVs, achieving a fair traffic distribution among them; or the deployment of NOMA (Nonorthogonal Multiple Access) networks to mitigate the path loss (i.e., maximize received signal strength) or energy consumption due to transmit power [22, 23], respectively. Finally, in [24, 25], the authors propose to minimize the number of deployed UAVs while finding the positioning that maximizes the coverage area while forming a robust backbone network.
Besides optimal initial positioning, trajectory optimization (i.e., a series of discrete points of a flying path that drones follow in a continuous movement while providing wireless network coverage ) has also been widely addressed, mainly focusing on energy efficiency. Chakareski et al.  proposed an energy-efficient framework for deploying mmWave 5G cellular networks, in [27, 28], the authors proposed a joint optimization problem for trajectory and power allocation, and finally, [29, 30] present a joint spectrum and energy efficiency optimization problem. Through put maximization optimization via trajectory has also been proposed in several works. Hu et al.  proposed a resource and trajectory optimization problem by introducing user scheduling and bandwidth allocation; and [32, 33] proposed to combine trajectory with radio resource allocation in vehicular and UAV-enabled relaying systems. Finally, other works such as [34, 35] proposed to maximize the end-to-end rate by considering trajectory power allocation optimization while deploying multi-hop relay networks. Finally,  proposed to minimize the probability of outage through a joint power allocation and trajectory optimization problem.
Few works have addressed the provision of VoIP service with drones. To the best of our knowledge, only our previous work [15, 16] has done it considering a single-layer of drones to set up a WiFi access network. In both papers, radio coverage and speech quality constrained the 3D multi-UAV placement optimization problem, seeking the minimum deployment costs (i.e., number of UAVs deployed). Between solutions with the same number of drones, we chose the one that minimized users’ radio energy or UAVs energy, respectively. However, both works addressed only the WiFi access network, leaving the distribution and backbone networks for future research. This paper takes a step further by considering a two-layered hierarchical network that performs access, distribution, and connection to the backbone using two different radio technologies: WiFi and 5G. Regarding the objective function, we propose to find the minimum number of deployed UAVs (independently of their type) needed to maximize user coverage. In light of Table 1, we can state that our work differs from those found in the literature in three main aspects: (a) a multilayered UAV placement that performs traffic aggregation, (b) more realistic constraints for real-time voice speech quality by modelling the MAC sublayer of the access network, and (c) the deployment of a WiFi access network instead of a cellular-based one, hence minimizing any compatibility issues regarding user smartphones.
3. Proposed Scenario and QoS Assessment
As shown in Figure 1, our scenario consists of a two-level hierarchical network that relays between IEEE 802.11 (WiFi) networks (i.e., for access and distribution) and cellular 5G backhaul links. The QoS experienced by users will be influenced by packet loss and delay in these networks. This section is devoted to defining the network architecture and the analytical model used to estimate the speech quality experienced by users in our scenario.
3.1. Network Architecture
Figure 2 illustrates the proposed network architecture. The network entities (from left to right) are as follows: (i)Ground users are equipped with WiFi-compliant terminals (e.g., smartphones) operating at the 2.4 GHz band associated to the Access Point installed at A-UAVs.(ii)A-UAVs play a double role: (a) for users, they act as access points (at the 2.4 GHz band), and (b) they are associated with the distribution (second) layer of drones through another WiFi connection at 5 GHz.(iii)D-UAVs behave as WiFi APs for associated A-UAVs, and they also provide a backbone link to the 5G network. As such, D-UAVs are seen as 5G User Equipment (UE) maintaining a connection to the 5G Core Network (i.e., GTP-U tunnels).
In the previous architecture, the speech quality experienced by users is impaired on each subnetwork due to the medium access control mechanism and network congestion. The following section elaborates on the proposed QoS assessment method considered in this paper (E-Model).
3.2. Voice Quality Assessment
Voice quality assessment has been studied during the last decades . Some of the approaches suggested in the literature to measure or estimate speech quality, such as P.863 or P.563, require invasive monitoring (e.g., sampling the original voice signal). On the contrary, the E-model  is an analytical model that allows one to estimate the speech quality assuming additive impairments to the quality. The E-model provides a quality score, namely, the factor, that ranges from 0 (poor) to 100 (excellent) that is calculated as follows [15, 39, 40]:
In the previous equation, two impairments ( and ) are subtracted from the maximum achievable quality (), which is a representation of the Signal-to-Noise Ratio.
represents a combination between impairment equipment parameter at zero packet loss () and a function that depends on , the packet loss rate, and packet loss behavior. is a codec-dependent constant associated with codec compression degradation (a list of values from ITU-T codecs were presented in ITU-T Rec. G.113 Appendix I), represents the codec packet loss robustness, which also has a specific value for each codec (listed in ITU-T Rec. G117 Appendix I), represents the packet loss rate (in %) in the WiFi channel, and finally, characterizes the burst ratio (i.e., equals 1 if the packet loss is random and greater otherwise). In this paper, we use the G.711 codec ( and ) and assume random losses (i.e., ).
The latest impairment, , is associated with the delay in the communication chain. A widely accepted approximation for can be obtained from one-way delay in the communication path , where is the Heaviside function ( for and for . In our case, . The one-way delay (in milliseconds) includes all additive delays from source to destination, which depend on the network topology and the chosen codec (i.e., packetization delay).
In order to solve Equation (1), one has to model both network performance parameters (i.e., network delay and the packet loss rate ). Since our scenario consists of WiFi access and distribution networks and a backhaul 5G link, the overall delay and packet loss ratio should be
where (), (), and () subscripts refer to impairments at the access, distribution (i.e., influenced by IEEE 802.11 physical and MAC sublayer), and backhaul link, respectively. Finally accounts for the packetization delay, which could be assumed as a constant (e.g., 20 ms for G.711 codec).
The previous performance metrics can be estimated for the IEEE 802.11 network through well-known analytical models (see [15, 16]) that enable the prediction of the packet loss ratio and delay in the WiFi network just by defining the number of stations, traffic models (i.e., packet size and frequency), and stations’ received signal strength. On the other hand, 5G links performance can be assumed to be included in the Service Level Agreement with the telco provider , so one can easily obtain and .
4. Problem Definition
In this section, we state the terminology, main assumptions, and a formal definition of the problem of optimal placement under the scenario illustrated in Figures 1 and 2.
Table 2 summarizes the notation used in this paper. We use three sets to represent distribution drones (), access drones (), and ground users (). The location of each element in these sets is represented in Cartesian’s coordinates: , , and , respectively.
Let us introduce some functions that will be recurrently used in this paper: (i)The coverage function, , represents the set of stations associated with a specific UAV-mounted AP identified by its location, e.g. . For example: (a) represents the set of A-UAVs associated with the -th D-UAV.(b) represents the set of users associated with the -th A-UAV.(c) represents the number of users covered by the system (and hence associated to any A-UAV).(ii)The speech quality function, , provides the speech quality experience by users associated with the -th A-UAV (see Equation (3)) which in turn is associated with the -th D-UAV. This function takes into account the level of congestion in the access and distribution networks(iii)The uplink throughput function, , provides the aggregated throughput (in Mb/s) handled by the -th D-UAV. Clearly, it cannot exceed the maximum throughput achievable by the 5G link ().
For the sake of tractability, the following assumptions are made: (i)Ground users are confined in a flat outdoor terrain with known dimensions. Their position is also known (this could be implemented through users’ smartphone’s GPS or image processing).(ii)Users’ calls go through a compatible VoIP application that uses a known audio codec.(iii)APs’ channelization is arranged in such a manner that the interference between adjacent radio channels is negligible. By using directional antennas, one could simply adjust the radio beam pattern to minimize inter-UAV interference.(iv)Ground users could potentially be simultaneously on a call. Thus, each A-UAV will not have more users associated than its VoIP Capacity  (maximum number of simultaneous calls under a guaranteed QoS). Then, VoIP Capacity is a harder constraint than coverage and will play a decisive role in determining the number of A-UAVs deployed.
4.3. Optimization Problem
The formal definition of our optimization problem is stated in
where and stand for the collection of valid positions for distribution and access UAVs, respectively; so one could restrict flying zones or establish a range of valid altitudes for each type of UAV.
The previous expression optimizes the location of Distribution and Access UAVs (, , respectively) that minimizes the total number of UAVs deployed () while maximizing user coverage () subject to the following constraints: (i)User coverage ratio, , must exceed a threshold ().(ii)Offered speech quality, , must be greater than a threshold ().(iii)D-UAVs uplink throughput, , must be lower than 5G links capacity ().
Observe that the analytical expression in Equation (4) is composed of two terms: () which is an integer (always since we need to deploy at least one drone of each kind) and () which represent the rate of uncovered users. The latter is a real number always less than 1 (e.g., a coverage of 80% would provide 0.2) and, as such, is subordinated to the first (which is an integer). So minimizing the number of drones in the solution always takes precedence over coverage (which is already a problem constraint). Thus, the second term is only used to break the deadlock between various solutions with the same number of drones (the one with greater coverage is preferred).
5. Problem Resolution
The optimization problem in (4) can be solved through metaheuristics search algorithms. In our previous work [15, 16], we demonstrated the effectiveness of Genetic Algorithm and Particle Swarm Optimization, comparing their results with exhaustive search. For simplicity’s sake, and given our previous experience, we will use a PSO algorithm (further proposed by other authors ) in this paper.
5.1. Search Algorithm
Algorithm 1 contains the pseudocode of the search algorithm used to solve the optimization problem in (4). The input of the algorithm is the set of valid positions for UAVs (), the set of ground users’ location (), and the problem constraints (, , , ). This algorithm looks for the optimal location of UAVs (, ) that meets the problem constraint and increases the number of drones (, and ) until a valid solution is found. For a given number of drones (), their positioning is jointly optimized by the SolveOptim_PSO function.
On each iteration, the SolveOptim_PSO (see Algorithm 2) is called to find the optimal location (, ) for the specified number of UAVs (i.e., and input parameters), returning an empty set if the problem constraints cannot be met. During execution, candidate locations (i.e., particles) are randomly created (CreateParticles), evolved (UpdateParticle), and evaluated (Check) following a common Particle Swarm Optimization approach: (i)The CreateParticles function returns a set of particles randomly generated, , by considering the collection of valid positions () and the number of Distribution and Access UAVs, and , respectively. Each element in represents a candidate set of locations for all UAVs, so they can be decomposed into the and sets(ii)The UpdateParticle function updates the set of particles () by considering the best-found location for each particle ()(iii)The Check function contains the fitness evaluation that returns a score for a given location. Then, the algorithm evaluates if the candidate position is valid (), and if it improves the best-found location for that particle (). If so, the best-found location for that particle is updated(iv)The algorithm finishes when the exit criterion is achieved (e.g., the overall improvement between two consecutive generations is lower than ). It returns the location for Distribution and Access UAVs ( and ) if any, or an empty set otherwise
The next section elaborates on the fitness evaluation procedure (Check function); the reader can find rest of the PSO-related functions in our previous work , along with some implementation details.
5.2. Fitness Evaluation (Check Function)
For every candidate solution (i.e., , ), a fitness score has to be calculated based on the optimization problem. Let us define the score of a particle (i.e., candidate solution) as : where constraints refers to coverage, quality of service, and throughput evaluation.
5.2.1. Coverage Evaluation
Checks if the total number of covered users () is greater than the threshold (). It uses the coverage function, , that returns a set of locations of associated Stations for an Access Point located at (i.e., in Cartesian coordinates).
This function can be applied to any AP in the system (i.e., both D-UAVs and A-UAVs). For example, (6) represents the coverage function for the -th D-UAV (), but it can be adapted for any A-UAV just by replacing and with and , respectively.
The previous expression returns the subset of stations that (a) are compliant with RSSI and SINR minimum thresholds and (b) have the greatest signal intensity. Then, RSSI and SINR can be calculated as follows. (i)The Received Signal Strength Indicator (RSSI) depends on the distance and angle between the transmitter and the receptor. Equation (7) represents the RSSI calculus (in dBm). In this expression, an initial transmission power is considered (), further adding power gains () and subtracting any losses ().
where 8 represent a simple gain pattern of an antenna (limited by ) and represents a path loss expression widely proposed in air-to-ground channel models [44–46]. It considers that ground users receive three different groups of signals: (a) Line-of-Sight (LoS), (b) Non-Line-of-Sight (NLoS), and (c) other reflected components which cause multipath fading. Each group has its own probability of occurrence depending on the environment, density, height, and elevation angle. According to , the probability of fading is significantly lower than the probability of receiving the LoS () and NLoS () components, so we will neglect it for simplicity. and represent the average path loss for LoS and NLoS components, respectively, and can be expressed as 
where the first term accounts for the free space propagation loss and represent any additional losses due to the environment (a list of values can be found in ) and is the channel frequency.
Finally, the probability of receiving each component is given by 
where and are environment-dependent constants (e.g., rural and urban) as defined in  (e.g., for no buildings). (i)The Signal-to-Interference-plus-Noise-Ratio (SINR) can be calculated by subtracting every noise and cochannel interference from the received signal strength. Let be the collection of APs operating at an overlapping channel (channel planning is out of the scope of this paper). Then, SINR can be expressed as
where represents the received signal power, accounts for the noise, and each stands for the received interference from any overlapping transmissions. Since we assume that the sources of interference are negligible due to a correct channel planning, SINR can be reduced to SNR and it can be calculated as
where is the noise, accounts for the receiver’s noise figure, and stands for the signal bandwidth, which depends on the IEEE 802.11 standard revision under consideration.
5.2.2. Speech Quality and Throughput Evaluation
The goal of this evaluation is to guarantee that (a) the speech quality, given by the QoS function for every D-UAV–A-UAV association in the system, is over a minimum threshold () and (b) that the aggregated throughput at D-UAVs do not exceed the maximum capacity of 5G links (). Both constraints can be formally represented as (17) and (18), respectively.
To verify these constraints, one has to estimate end-to-end performance parameters such as packet loss ratio, delay, and effective throughput. Then, as introduced in Section 3.2, the end-to-end speech quality (e.g., see factor in (1)) can be estimated through the E-model. This requires to know the end-to-end packet loss ratio () and delay (). Moreover, and can be further decomposed (see Equations (2) and (3)) considering the three networks traversed in the proposed network architecture: (a) the WiFi access network, (b) the WiFi distribution network, and (c) the 5G link SLA. Notice that the delay and loss in the 5G link can be agreed with the service provider (i.e., the telco operator) and hence can be seen as constant values. However, the first two (WiFi networks) have to be estimated.
To derive the VoIP Capacity of any AP in our system, we extend Bianchi’s Markov-chain analytical model  of the IEEE 802.11 MAC sublayer performance. Our analytical model takes the location of the access point (e.g., ) and its associated stations () as input parameters and returns a expression for each contending station as its probability of transmission attempt. The output of our analytical model can be used to derive the estimated delay, packet loss ratio, and aggregated throughput at a given AP as follows:
where stands for the average Frame Error Rate at the access point, which can be derived from its SINR and Modulation and Coding Scheme (MCS); is the expected number of back-off slots that a packet waits before transmission; and is the average slot duration and it can be calculated by averaging the duration of each type of event (e.g., transmission, collision) with its probability. The reader is encouraged to read a more detailed derivation of all these parameters in our previous works [15, 16, 40]. Finally, and represent the number of packets transmitted per second and their payload length, respectively (e.g., 50 packets/second and 160 Bytes for G.711 codec).
Finally, (2) and (3) can be completed as
where 20 ms accounts for the packetization interval for the G.711 codec. Once computed, and can be further substituted in (1) to obtain .
5.2.3. Computational Complexity
In terms of computational complexity, the most demanding procedure in our heuristic search is the fitness evaluation (Check function). If we assume that is upper bounded by and that the maximum number of calls to the Check function is upper bounded in our heuristics, the computational complexity of the SolveOptim_PSO function can be expressed as ; hence, the computational complexity of Algorithm 5.1 can be expressed as .
We have used our PSO-based search algorithm to find optimal solutions in different scenarios. This section begins with a scenario and 60 ground users for illustrative purposes. Then, we explore other scenarios changing the terrain size (from to ) and the number of users (from 10 to 100).
6.1. Example Solution
This section provides a first example solution in a terrain with 60 ground users randomly placed. The rest of the parameters used are listed in Table 3. Such settings are common to all experiments in this section unless otherwise specified.
The PSO-based search algorithm in Algorithm 2 has been implemented in Matlab 2020a, providing the results shown in Figure 3. In this scenario, four A-UAVs and two D-UAVs are required to cover 58 of the 60 ground users while guaranteeing a minimal speech quality of 65 (R factor).
In Figure 3, ground users are represented with circles filled with color (if covered) or not (if uncovered). Each ground user is associated with an A-UAV of the same color whose location has been derived from the algorithm. Finally, each A-UAV is associated with a D-UAV in a similar manner. As such, colors represent the final association between different layers. According to Figure 3, two 5G links would suffice to serve the 58 ground users under coverage.
6.2. Numerical Analysis
In this section, we examine the solutions found in several scenarios. In particular, the number of ground users has been increased from 10 to 100 (in steps of 10) in four square terrain sizes (, , , and ). Each experiment (i.e., scenario) has been repeated 30 times to obtain a 95% confidence interval by randomly placing ground users uniformly along the terrain. Finally, Figure 4 illustrates the average value of the results obtained with the corresponding confidence interval.
(a) Number of deployed D-UAVs
(b) Number of deployed A-UAVs
(c) Speech quality
(d) Percentage of covered users
(e) Average RSSI at ground users
(f) Average area covered by A-UAVs
Figures 4(a) and 4(b) show the optimal number of D-UAVs and A-UAVs, respectively, for different numbers of users () and terrain sizes. At first sight, it can be observed that the overall number of UAVs tends to grow when either the terrain size or the number of users increases.
If we take a closer look into the series, the number of A-UAVs experiences a steep growth after 20 users. This effect is due to network congestion, so more UAVs are required to satisfy the speech quality constraints. This behavior is reaffirmed in Figure 4(c), which represents the speech quality, and shows that speech quality degrades when more users are added to the system. Indeed, after 70 users, more D-UAVs are required to aggregate the traffic from the access network so that QoS is not negatively affected. In our results, it is likely that each D-UAV associates with up to three A-UAV hence reducing the number of 5G links required to provide the service. Although this behavior is similar various terrain sizes, the final number of UAVs changes with user sparsity (); if the terrain is increased with the same number of ground users, UAVs have to cover a larger area to satisfy coverage constraints (); hence, the number of drones is driven by the signal coverage constraint instead of the speech quality constraint.
Figure 4(d) shows the percentage of users covered in each scenario. Our results suggest that larger areas tend to provide lower ratios of user coverage due to a greater distance between users and A-UAVs. This, in turn, penalizes the path loss. Figure 4(e) represents the average received signal strength (RSSI) for each series of experiments. As illustrated, the RSSI increases with the number of ground users. This is attributable to the fact that requiring more A-UAVs to meet the speech quality requirements (e.g., reduce congestion) also produces UAVs located closer to users, hence increasing RSSI values. As a consequence, the effective area covered by each A-UAV is reduced (see Figure 4(f)).
6.3. Computational Performance
The previous series of experiments have also been analyzed in light of computational performance. To this end, we measured the average time spent during the execution of the algorithm. Figure 5 illustrates the execution time in seconds for the same series of experiments in an Intel Core™ i5-4460 processor with 8GB of RAM.
The results shown in Figure 5 suggest that the execution time increases with user density () for a given terrain size, so more dense scenarios require more CPU time. However, the execution time is almost linear when solving low user-density scenarios (e.g., ). In all cases, the results were obtained in less than 100 seconds.
7. Conclusion and Further Steps
This paper has dealt with the creation of a drone-assisted VoWiFi communication service, which could be of use in cases such as emergency situations or covering live events that lack better alternative infrastructure. We have defined a new optimization problem for the deployment of drones to create a two-layer network (access and distribution) connected to 5G. Our problem is aimed at finding the minimum number of drones (and their type and location) required to deploy the service constrained to a minimum user coverage and speech quality.
Using a PSO-based search algorithm, we have calculated the optimal solution for terrains up to and 100 users with moderate computational resources. The overall number of UAVs tends to increase with the terrain size (i.e., with users’ sparsity) or with the number of users. The next step planned is to explore new applications in this field: (a) to implement a model-based Call Admission Control (CAC) algorithm in UAVs, so new calls can be rejected if the network is saturated; and (b) to explore new applications of the 3-D UAV optimal placement, such as quality-guaranteed videocalls or IoT sensing through drones, that might require a different network architecture.
No data were used to support this study.
Conflicts of Interest
The authors declare that there is no conflict of interest regarding the publication of this article.
M. Hassanalian and A. Abdelkefi, “Classifications, applications, and design challenges of drones: a review,” Progress in Aerospace Sciences, vol. 91, pp. 99–131, 2017.View at: Publisher Site | Google Scholar
R. Clarke, “Understanding the drone epidemic,” Computer Law and Security Review, vol. 30, no. 3, pp. 230–246, 2014.View at: Publisher Site | Google Scholar
F. Al-Turjman, M. Abujubbeh, A. Malekloo, and L. Mostarda, “UAVs assessment in software-defined IoT networks: an overview,” Computer Communications, vol. 150, pp. 519–536, 2020.View at: Publisher Site | Google Scholar
R. Masroor, M. Naeem, and W. Ejaz, “Resource management in UAV-assisted wireless networks: an optimization perspective,” Ad Hoc Networks, vol. 121, article 102596, 2021.View at: Publisher Site | Google Scholar
R. Shahzadi, M. Ali, H. Z. Khan, and M. Naeem, “UAV assisted 5G and beyond wireless networks: a survey,” Journal of Network and Computer Applications, vol. 189, article 103114, 2021.View at: Publisher Site | Google Scholar
M. Mozaffari, W. Saad, M. Bennis, Y.-H. Nam, and M. Debbah, “A tutorial on uavs for wireless networks: applications, challenges, and open problems,” IEEE Communication Surveys and Tutorials, vol. 21, no. 3, pp. 2334–2360, 2019.View at: Publisher Site | Google Scholar
I. Dalmasso, I. Galletti, R. Giuliano, and F. Mazzenga, “Wimax networks for emergency management based on UAVs,” in 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL), pp. 1–6, Rome, Italy, 2012.View at: Publisher Site | Google Scholar
S. Rohde, M. Putzke, and C. Wietfeld, “Ad hoc self-healing of OFDMA networks using UAV-based relays,” Ad Hoc Networks, vol. 11, no. 7, pp. 1893–1906, 2013.View at: Publisher Site | Google Scholar
S. K. Khan, U. Naseem, H. Siraj, I. Razzak, and M. Imran, “The role of unmanned aerial vehicles and mmWave in 5g: recent advances and challenges,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 7, article e4241, 2021.View at: Publisher Site | Google Scholar
S. Morgenthaler, T. Braun, Z. Zhao, T. Staub, and M. Anwander, “Uavnet: a mobile wireless mesh network using unmanned aerial vehicles,” in 2012 IEEE Globecom Workshops, pp. 1603–1608, Anaheim, CA, USA, 2012.View at: Publisher Site | Google Scholar
S. Aust, R. V. Prasad, and I. G. Niemegeers, “Outdoor long-range wlans: a lesson for IEEE 802.11ah,” IEEE Communication Surveys and Tutorials, vol. 17, no. 3, pp. 1761–1775, 2015.View at: Publisher Site | Google Scholar
M. S. Alvissalim, B. Zaman, Z. A. Hafizh et al., “Swarm quadrotor robots for telecommunication network coverage area expansion in disaster area,” in 2012 Proceedings of SICE Annual Conference (SICE), pp. 2256–2261, Akita, Japan, 2012.View at: Google Scholar
M. Erdelj, M. Król, and E. Natalizio, “Wireless sensor networks and multi-UAV systems for natural disaster management,” Computer Networks, vol. 124, pp. 72–86, 2017.View at: Publisher Site | Google Scholar
H. Shakhatreh, A. H. Sawalmeh, A. Al-Fuqaha et al., “Unmanned aerial vehicles (UAVS): a survey on civil applications and key research challenges,” IEEE Access, vol. 7, pp. 48572–48634, 2019.View at: Publisher Site | Google Scholar
V. Mayor, R. Estepa, A. Estepa, and G. Madinabeitia, “Deploying a reliable UAV-aided communication service in disaster areas,” Wireless Communications and Mobile Computing, vol. 2019, Article ID 7521513, 20 pages, 2019.View at: Publisher Site | Google Scholar
“Energy-efficient UAVs deployment for QoS-guaranteed VoWiFi service,” Sensors, vol. 20, no. 16, p. 4455, 2020.View at: Publisher Site | Google Scholar
Y. Li, G. Feng, M. Ghasemiahmadi, and L. Cai, “Power allocation and 3-d placement for floating relay supporting indoor communications,” IEEE Transactions on Mobile Computing, vol. 18, no. 3, pp. 618–631, 2019.View at: Publisher Site | Google Scholar
C. Pan, C. Yin, J. Yu, and N. Kiran, “3d UAV placement and resource allocation in software defined cellular networks,” in 2018 IEEE/CIC International Conference on Communications in China (ICCC Workshops), pp. 136–141, Beijing, China, 2018.View at: Publisher Site | Google Scholar
C. Pan, J. Yi, C. Yin, J. Yu, and X. Li, “Joint 3d UAV placement and resource allocation in software-defined cellular networks with wireless backhaul,” IEEE Access, vol. 7, pp. 104279–104293, 2019.View at: Publisher Site | Google Scholar
S. Yin, L. Li, and F. R. Yu, “Resource allocation and basestation placement in downlink cellular networks assisted by multiple wireless powered UAVs,” IEEE Transactions on Vehicular Technology, vol. 69, no. 2, pp. 2171–2184, 2019.View at: Publisher Site | Google Scholar
Y. Sun, T. Wang, and S. Wang, “Location optimization and user association for unmanned aerial vehicles assisted mobile networks,” IEEE Transactions on Vehicular Technology, vol. 68, no. 10, pp. 10056–10065, 2019.View at: Publisher Site | Google Scholar
X. Liu, J. Wang, N. Zhao et al., “Placement and power allocation for NOMA-UAV networks,” IEEE Wireless Communications Letters, vol. 8, no. 3, pp. 965–968, 2019.View at: Publisher Site | Google Scholar
D. Hu, Q. Zhang, Q. Li, and J. Qin, “Joint position, decoding order, and power allocation optimization in UAV-based NOMA downlink communications,” IEEE Systems Journal, vol. 14, no. 2, pp. 2949–2960, 2019.View at: Publisher Site | Google Scholar
H. Zhao, H. Wang, W. Wu, and J. Wei, “Deployment algorithms for UAV airborne networks toward on-demand coverage,” IEEE Journal on Selected Areas in Communications, vol. 36, no. 9, pp. 2015–2031, 2018.View at: Publisher Site | Google Scholar
H. Wang, H. Zhao, W. Wu, J. Xiong, D. Ma, and J. Wei, “Deployment algorithms of flying base stations: 5g and beyond with UAVS,” IEEE Internet of Things Journal, vol. 6, no. 6, pp. 10009–10027, 2019.View at: Publisher Site | Google Scholar
J. Chakareski, S. Naqvi, N. Mastronarde, J. Xu, F. Afghah, and A. Razi, “An energy efficient framework for UAV-assisted millimeter wave 5g heterogeneous cellular networks,” IEEE Transactions on Green Communications and Networking, vol. 3, no. 1, pp. 37–44, 2019.View at: Publisher Site | Google Scholar
S. Zeng, H. Zhang, and L. Song, “Trajectory optimization and resource allocation for multi-user OFDMA UAV relay networks,” in 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6, Waikoloa, HI, USA, 2019.View at: Publisher Site | Google Scholar
H. Mei, K. Yang, Q. Liu, and K. Wang, “Joint trajectory-resource optimization in UAV-enabled edge-cloud system with virtualized mobile clone,” IEEE Internet of Things Journal, vol. 7, no. 7, pp. 5906–5921, 2019.View at: Publisher Site | Google Scholar
R. K. Patra and P. Muthuchidambaranathan, “Optimisation of spectrum and energy efficiency in UAV-enabled mobile relaying using bisection and PSO method,” in 2018 3rd International Conference for Convergence in Technology (I2CT), pp. 1–7, Pune, India, 2018.View at: Publisher Site | Google Scholar
J. Zhang, Y. Zeng, and R. Zhang, “Spectrum and energy efficiency maximization in UAV-enabled mobile relaying,” in 2017 IEEE International Conference on Communications (ICC), pp. 1–6, Paris, France, 2017.View at: Publisher Site | Google Scholar
Q. Hu, Y. Cai, A. Liu, and G. Yu, “Joint resource allocation and trajectory optimization for UAV-aided relay networks,” in 2019 IEEE Global Communications Conference (GLOBECOM), pp. 1–6, Waikoloa, HI, USA, 2019.View at: Publisher Site | Google Scholar
M. Samir, M. Chraiti, C. Assi, and A. Ghrayeb, “Joint optimization of UAV trajectory and radio resource allocation for drive-thru vehicular networks,” in 2019 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6, Marrakesh, Morocco, 2019.View at: Publisher Site | Google Scholar
Q. Chen, “Joint trajectory and resource optimization for UAV-enabled relaying systems,” IEEE Access, vol. 8, pp. 24108–24119, 2020.View at: Publisher Site | Google Scholar
X. Jiang, Z. Wu, Z. Yin, and Z. Yang, “Power and trajectory optimization for UAV-enabled amplify-and-forward relay networks,” IEEE Access, vol. 6, pp. 48688–48696, 2018.View at: Publisher Site | Google Scholar
G. Zhang, H. Yan, Y. Zeng, M. Cui, and Y. Liu, “Trajectory optimization and power allocation for multi-hop UAV relaying communications,” IEEE Access, vol. 6, pp. 48566–48576, 2018.View at: Publisher Site | Google Scholar
S. Zeng, H. Zhang, K. Bian, and L. Song, “UAV relaying: power allocation and trajectory optimization using decode-and-forward protocol,” in 2018 IEEE International Conference on Communications Workshops (ICC Workshops), pp. 1–6, Kansas City, MO, USA, 2018.View at: Publisher Site | Google Scholar
S. Karapantazis and F.-N. Pavlidou, “VoIP: a comprehensive survey on a promising technology,” Computer Networks, vol. 53, no. 12, pp. 2050–2090, 2009.View at: Publisher Site | Google Scholar
ITU-T, Recommendation G and Recommendation, G, “107: The E-model, a computational model for use in transmission planning,” Recommendation ITU-T, 2005.View at: Google Scholar
H. Assem, D. Malone, J. Dunne, and P. O’Sullivan, “Monitoring VOIP call quality using improved simplified e-model,,” in 2013 International Conference on Computing, Networking and Communications (ICNC), pp. 927–931, San Diego, CA, USA, 2013.View at: Publisher Site | Google Scholar
V. Mayor, R. Estepa, A. Estepa, and G. Madinabeitia, “Unified call admission control in corporate domains,” Computer Communications, vol. 150, pp. 589–602, 2020.View at: Publisher Site | Google Scholar
E. Hossain and M. Hasan, “5G cellular: key enabling technologies and research challenges,” IEEE Instrumentation and Measurement Magazine, vol. 18, no. 3, pp. 11–21, 2015.View at: Publisher Site | Google Scholar
Sangho Shin and H. Schulzrinne, “Measurement and analysis of the VOIP capacity in IEEE 802.11 WLAN,” IEEE Transactions on Mobile Computing, vol. 8, no. 9, pp. 1265–1279, 2009.View at: Publisher Site | Google Scholar
J. Sánchez-García, D. G. Reina, and S. L. Toral, “A distributed PSO-based exploration algorithm for a UAV network assisting a disaster scenario,” Future Generation Computer Systems, vol. 90, pp. 129–148, 2019.View at: Publisher Site | Google Scholar
A. Al-Hourani, S. Kandeepan, and A. Jamalipour, “Modeling air-toground path loss for low altitude platforms in urban environments,” in 2014 IEEE Global Communications Conference, pp. 2898–2904, Austin, TX, USA, 2014.View at: Publisher Site | Google Scholar
A. Al-Hourani, S. Kandeepan, and S. Lardner, “Optimal lap altitude for maximum coverage,” IEEE Wireless Communications Letters, vol. 3, no. 6, pp. 569–572, 2014.View at: Publisher Site | Google Scholar
M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Drone small cells in the clouds: design, deployment and performance analysis,” in 2015 IEEE Global Communications Conference (GLOBECOM), pp. 1–6, San Diego, CA, USA, 2015.View at: Publisher Site | Google Scholar
Q. Feng, J. McGeehan, E. K. Tameh, and A. R. Nix, “Path loss models for air-to-ground radio channels in urban environments,” in 2006 IEEE 63rd Vehicular Technology Conference, pp. 2901–2905, Melbourne, VIC, Australia, 2006.View at: Publisher Site | Google Scholar
Y. Zheng, Y. Wang, and F. Meng, “Modeling and simulation of pathloss and fading for air-ground link of haps within a network simulator,” in 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 421–426, Beijing, China, 2013.View at: Publisher Site | Google Scholar
G. Bianchi, “Performance analysis of the IEEE 802.11 distributed coordination function,” IEEE Journal on Selected Areas in Communications, vol. 18, no. 3, pp. 535–547, 2000.View at: Publisher Site | Google Scholar