Toward Greener 5G and Beyond Radio Access Networks - A Survey

Line M.P. Larsen*, Henrik L. Christiansen, Sarah Ruepp, Michael S. Berger

*Corresponding author for this work

Research output: Contribution to journalJournal articleResearchpeer-review

104 Downloads (Pure)

Abstract

Mobile network traffic is increasing and so is the energy consumption. The Radio Access Network (RAN) part is responsible for the largest share of the mobile network energy consumption, and thus; an important consideration when expanding mobile networks to meet traffic demands. This work analyses how the energy consumption of future mobile networks can be minimised by using the right RAN architecture, share the network with other operators and implementing the most efficient energy minimising technologies in the RAN. It is explored how the different approaches can be realised in real life networks as well as the research state of the art is highlighted. Furthermore, this work provides an overview of future research directions for 6G energy saving potentials. Different energy saving contributions are evaluated by a common methodology for more realistic comparison, based on the potential energy saving of the overall mobile network consumption. Results show that implementing selected technologies and architectures, the mobile network overall energy consumption can be reduced by approximately 30%, corresponding to almost half of the RAN energy consumption. Following this, a set of guidelines towards an energy optimised mobile network is provided, proposing changes to be made initially and in the longer run for brownfield network operators as well as a target network for greenfield network operators.

Original languageEnglish
JournalIEEE Open Journal of the Communications Society
Volume4
Pages (from-to)768-797
DOIs
Publication statusPublished - 2023

Keywords

  • 5G
  • 6G
  • AI
  • C-RAN
  • Green RAN
  • MOCN
  • MORAN
  • Network slicing
  • O-RAN
  • vRAN

Fingerprint

Dive into the research topics of 'Toward Greener 5G and Beyond Radio Access Networks - A Survey'. Together they form a unique fingerprint.

Cite this