IEEE Computational Intelligence Magazine - February 2020 - 46

cloud units. In such networks, all the functions originally implemented in base stations
(BSs) and core networks, including storage,
signal processing, scheduling, power control,
computations, access control, and mobility
management, and so on, are migrated to the
cloud [19], [20]. With powerful cloud technologies, these functions could be executed
efficiently and robustly. Furthermore, since
only radio frequency (RF) units are remained in front ends,
the complexity and operational cost of RRH networks will
be greatly reduced. Fronthaul networks are used to establish
connections and manage information exchanges between
RRH networks and the cloud, which normally adopt wired
physical mediums, such as cable and fiber, to enable high data
rate and low latency data delivery. Based on the control information and signaling from the cloud, IoT users will conduct
data transmissions and send feedback information to the
cloud, such as channel state information (CSI), measurements
report, and ACK/NACK signaling. Based on the feedback
information, the cloud will reconfigure transmission parameters for all IoT users to maintain communication quality. All
the transmissions between IoT users and the cloud will be
forwarded by RRH networks and fronthaul networks.
Obviously, centralized control could achieve good performance for IoT networks, since complicated algorithms and
mechanisms could be employed to globally optimize network
performance [21], [22]. However, the overhead of computations and signal processing would exponentially increase with
the growing number of IoT users. Therefore, centralized IoT
networks will introduce substantial control overhead due to a
large number of IoT users. Furthermore, centralized control
will restrict the flexibility and scalability of the underlying IoT
network, since IoT users may be required to follow the same
protocol. For example, to conduct channel measurements, the
control center in Fig.  1 may need to conduct measurement
configurations for all IoT users within the network, based on
which IoT users insert user-specific pilots, also referred as to
reference signals (RSs), in their physical (PHY) radio frames
[23]. Additionally, effective measurements of user-specific pilots
require the underlying pilots from different users to be synchronized and orthogonalized.

In the future, IoT networks may be configured with
a control center to provide centralized control to be
compatible with existing cellular mobile networks, or
may be designed in a distributed fashion for better
flexibility and scalability.
that may be encountered in distributed IoT networks. Finally,
we conclude the article in Section V.
II. Network Architecture

To be compatible with existing cellular mobile networks such
as the third Generation Partnership Project (3GPP) Long-Term
Evolution (LTE)/LTE-Advanced, IoT networks may be configured with a control center to provide centralized control.
On the other hand, for better flexibility and scalability, IoT networks may be also designed in a distributed fashion. Therefore,
in this section, the frameworks of both centralized and distributed IoT networks will be discussed.
A. Centralized IoT Networks

Currently, centralized IoT networks based on cloud computing technologies or fog computing technologies are widely
studied due to their remarkable advantages [16]-[18]. As
shown in Fig. 1, cloud computing technologies based IoT
networks consist of three main components: remote radio
head (RRH) networks, fronthaul networks, and baseband

Operator 2
Operator 1

Server 1
Server 2

Scheduling
Power Control
Computing

Storage
Access Control
Signal Processing

Mobility Management

FIGURE 1 The architecture of centralized IoT networks.

46

IEEE COMPUTATIONAL INTELLIGENCE MAGAZINE | FEBRUARY 2020

B. Distributed IoT Networks

Based on the above discussions, distributed IoT networks may
be more appealing compared with the centralized ones due to
low complexity, high flexibility, and high scalability [24]. The
architecture of distributed IoT networks can be seen most clearly in Fig. 2. Fig. 2 shows a low-complexity architecture that a
distributed IoT network can be configured to. In distributed
IoT networks, only low-complexity access points (APs) are
needed to be deployed with simplified protocol stacks. For
example, for PHY and medium access control (MAC) layers, an
AP only needs to fulfill some simple functions, such as modulation/demodulation, coding/decoding, and automatic repeat



IEEE Computational Intelligence Magazine - February 2020

Table of Contents for the Digital Edition of IEEE Computational Intelligence Magazine - February 2020

Contents
IEEE Computational Intelligence Magazine - February 2020 - Cover1
IEEE Computational Intelligence Magazine - February 2020 - Cover2
IEEE Computational Intelligence Magazine - February 2020 - Contents
IEEE Computational Intelligence Magazine - February 2020 - 2
IEEE Computational Intelligence Magazine - February 2020 - 3
IEEE Computational Intelligence Magazine - February 2020 - 4
IEEE Computational Intelligence Magazine - February 2020 - 5
IEEE Computational Intelligence Magazine - February 2020 - 6
IEEE Computational Intelligence Magazine - February 2020 - 7
IEEE Computational Intelligence Magazine - February 2020 - 8
IEEE Computational Intelligence Magazine - February 2020 - 9
IEEE Computational Intelligence Magazine - February 2020 - 10
IEEE Computational Intelligence Magazine - February 2020 - 11
IEEE Computational Intelligence Magazine - February 2020 - 12
IEEE Computational Intelligence Magazine - February 2020 - 13
IEEE Computational Intelligence Magazine - February 2020 - 14
IEEE Computational Intelligence Magazine - February 2020 - 15
IEEE Computational Intelligence Magazine - February 2020 - 16
IEEE Computational Intelligence Magazine - February 2020 - 17
IEEE Computational Intelligence Magazine - February 2020 - 18
IEEE Computational Intelligence Magazine - February 2020 - 19
IEEE Computational Intelligence Magazine - February 2020 - 20
IEEE Computational Intelligence Magazine - February 2020 - 21
IEEE Computational Intelligence Magazine - February 2020 - 22
IEEE Computational Intelligence Magazine - February 2020 - 23
IEEE Computational Intelligence Magazine - February 2020 - 24
IEEE Computational Intelligence Magazine - February 2020 - 25
IEEE Computational Intelligence Magazine - February 2020 - 26
IEEE Computational Intelligence Magazine - February 2020 - 27
IEEE Computational Intelligence Magazine - February 2020 - 28
IEEE Computational Intelligence Magazine - February 2020 - 29
IEEE Computational Intelligence Magazine - February 2020 - 30
IEEE Computational Intelligence Magazine - February 2020 - 31
IEEE Computational Intelligence Magazine - February 2020 - 32
IEEE Computational Intelligence Magazine - February 2020 - 33
IEEE Computational Intelligence Magazine - February 2020 - 34
IEEE Computational Intelligence Magazine - February 2020 - 35
IEEE Computational Intelligence Magazine - February 2020 - 36
IEEE Computational Intelligence Magazine - February 2020 - 37
IEEE Computational Intelligence Magazine - February 2020 - 38
IEEE Computational Intelligence Magazine - February 2020 - 39
IEEE Computational Intelligence Magazine - February 2020 - 40
IEEE Computational Intelligence Magazine - February 2020 - 41
IEEE Computational Intelligence Magazine - February 2020 - 42
IEEE Computational Intelligence Magazine - February 2020 - 43
IEEE Computational Intelligence Magazine - February 2020 - 44
IEEE Computational Intelligence Magazine - February 2020 - 45
IEEE Computational Intelligence Magazine - February 2020 - 46
IEEE Computational Intelligence Magazine - February 2020 - 47
IEEE Computational Intelligence Magazine - February 2020 - 48
IEEE Computational Intelligence Magazine - February 2020 - 49
IEEE Computational Intelligence Magazine - February 2020 - 50
IEEE Computational Intelligence Magazine - February 2020 - 51
IEEE Computational Intelligence Magazine - February 2020 - 52
IEEE Computational Intelligence Magazine - February 2020 - 53
IEEE Computational Intelligence Magazine - February 2020 - 54
IEEE Computational Intelligence Magazine - February 2020 - 55
IEEE Computational Intelligence Magazine - February 2020 - 56
IEEE Computational Intelligence Magazine - February 2020 - 57
IEEE Computational Intelligence Magazine - February 2020 - 58
IEEE Computational Intelligence Magazine - February 2020 - 59
IEEE Computational Intelligence Magazine - February 2020 - 60
IEEE Computational Intelligence Magazine - February 2020 - 61
IEEE Computational Intelligence Magazine - February 2020 - 62
IEEE Computational Intelligence Magazine - February 2020 - 63
IEEE Computational Intelligence Magazine - February 2020 - 64
IEEE Computational Intelligence Magazine - February 2020 - 65
IEEE Computational Intelligence Magazine - February 2020 - 66
IEEE Computational Intelligence Magazine - February 2020 - 67
IEEE Computational Intelligence Magazine - February 2020 - 68
IEEE Computational Intelligence Magazine - February 2020 - 69
IEEE Computational Intelligence Magazine - February 2020 - 70
IEEE Computational Intelligence Magazine - February 2020 - 71
IEEE Computational Intelligence Magazine - February 2020 - 72
IEEE Computational Intelligence Magazine - February 2020 - 73
IEEE Computational Intelligence Magazine - February 2020 - 74
IEEE Computational Intelligence Magazine - February 2020 - 75
IEEE Computational Intelligence Magazine - February 2020 - 76
IEEE Computational Intelligence Magazine - February 2020 - 77
IEEE Computational Intelligence Magazine - February 2020 - 78
IEEE Computational Intelligence Magazine - February 2020 - 79
IEEE Computational Intelligence Magazine - February 2020 - 80
IEEE Computational Intelligence Magazine - February 2020 - 81
IEEE Computational Intelligence Magazine - February 2020 - 82
IEEE Computational Intelligence Magazine - February 2020 - 83
IEEE Computational Intelligence Magazine - February 2020 - 84
IEEE Computational Intelligence Magazine - February 2020 - 85
IEEE Computational Intelligence Magazine - February 2020 - 86
IEEE Computational Intelligence Magazine - February 2020 - 87
IEEE Computational Intelligence Magazine - February 2020 - 88
IEEE Computational Intelligence Magazine - February 2020 - 89
IEEE Computational Intelligence Magazine - February 2020 - 90
IEEE Computational Intelligence Magazine - February 2020 - 91
IEEE Computational Intelligence Magazine - February 2020 - 92
IEEE Computational Intelligence Magazine - February 2020 - 93
IEEE Computational Intelligence Magazine - February 2020 - 94
IEEE Computational Intelligence Magazine - February 2020 - 95
IEEE Computational Intelligence Magazine - February 2020 - 96
IEEE Computational Intelligence Magazine - February 2020 - 97
IEEE Computational Intelligence Magazine - February 2020 - 98
IEEE Computational Intelligence Magazine - February 2020 - 99
IEEE Computational Intelligence Magazine - February 2020 - 100
IEEE Computational Intelligence Magazine - February 2020 - Cover3
IEEE Computational Intelligence Magazine - February 2020 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202311
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202308
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202305
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202302
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202211
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202208
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202205
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202202
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202111
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202108
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202105
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202102
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202011
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202008
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202005
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_202002
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201911
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201908
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201905
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201902
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201811
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201808
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201805
https://www.nxtbook.com/nxtbooks/ieee/computationalintelligence_201802
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring17
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring16
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring15
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring14
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_summer13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_spring13
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_winter12
https://www.nxtbook.com/nxtbooks/ieee/computational_intelligence_fall12
https://www.nxtbookmedia.com