1. Introduction
In an increasingly connected world, where information flows at unprecedented speeds, the demand for seamless and lightning-fast mobile communications has become paramount. Mobile networks have evolved from being simple voice communication platforms to sophisticated data networks that can be employed to deliver a wide and heterogeneous range of services, from video streaming and online gaming to remote healthcare and autonomous vehicles [
1,
2,
3,
4,
5]. Since the introduction of the first data services in mobile networks, the evolution of mobile communication technologies has been mainly characterised by an exponential growth in data-intensive applications and the emergence of transformative technologies for achieving higher data rates in mobile communication systems [
6]. The advent of 5G/6G introduced a paradigm shift in the way service requirements are perceived and prioritised, by means of encompassing a broader vision beyond mere data throughput and recognising that different applications have diverse needs that extend beyond raw data speed. Nevertheless, achieving higher data rates in mobile communication systems undoubtedly continues to be crucial for future services [
7].
Carrier aggregation (CA), a key technology in modern mobile communication systems, emerged as a response to the ever-increasing demand for higher data rates and improved network capacity. Initially introduced as part of the 3GPP specifications for 4G LTE-Advanced [
8,
9,
10], CA has become an integral part of subsequent mobile communication standards, including 5G/6G and beyond [
11,
12,
13,
14,
15,
16,
17,
18,
19,
20]. CA allows mobile devices to simultaneously use multiple frequency bands, or component carriers (CCs) in 3GPP terminology, effectively combining the available bandwidth and boosting the overall data throughput. By aggregating multiple carriers, mobile operators can efficiently utilise their spectrum resources, enhance the user experience by enabling faster download and upload speeds as well as reduced latency, seamlessly support bandwidth-intensive applications by providing the necessary data rates, and improve the overall network performance. Despite being introduced over a decade ago, CA continues to be a relevant technique in mobile communications and an active area of research. Several aspects of CA have recently been explored such as its delay performance [
12], energy efficiency [
12,
13,
14,
15], spectrum orchestration [
16], integration with O-RAN [
17], integrated sensing and communications [
18], sidelink communications [
19], and THz communications [
20].
The classical definition of the CA concept assumes that higher data rates are enabled through the aggregation of additional spectrum. In this work, a different approach is considered, where CA is employed to increase the data rates without requiring additional spectrum (the gain is obtained from a higher spectral efficiency). To this end, the proposed approach is to artificially divide an available block of spectrum (that would otherwise be used as a single carrier) into a number of sub-blocks, each of which is treated as a separate CC. The set of CCs into which the available spectrum is divided is then aggregated via regular CA. The motivation for this approach is to benefit from the frequency diversity available in frequency-selective channels with a sufficiently large bandwidth. Such frequency diversity can be exploited via CA because the data transmitted through each CC undergoes an individual instance of the MAC and PHY layers and their associated processes, which are individually adapted and optimised for each CC. Thus, CA can be effectively utilised as a diversity technique.
Frequency diversity has traditionally been exploited by means of PHY-layer techniques, mainly through diversity receivers such as maximum-ratio combining or selection combining [
21]. PHY-layer diversity receivers are designed based on the fact that the same data symbols at the PHY layer are transmitted in parallel through different physical channel paths and the replicas of the same data symbols are combined coherently at the PHY layer of the receiver. On the other hand, with CA usually a different data stream is transmitted in each CC and all data streams are reorganised at the MAC layer of the receiver in order to recover the original data sequence. Therefore, existing PHY-layer diversity techniques are based on different operating principles and can be employed in conjunction with the method proposed in this work given that CA is fundamentally a MAC-layer technique. The MAC layer can effectively be seen as an additional dimension to exploit the channel frequency diversity through CA with the method proposed in this work and obtain further performance improvements in addition to those achieved through PHY-layer diversity techniques.
The performance of CA as a diversity technique was preliminarily evaluated in [
22] by means of simulations carried out with the ns-3 simulator, where it was shown that CA can be exploited as a diversity technique to enhance the system performance and increase the network capacity without increasing the total amount of spectrum. While simulations can be valuable to explore the performance of a particular technique, an analytical study is also necessary to provide a comprehensive understanding of the technique being investigated. In this context, this work presents an analytical study that complements the simulation study presented in [
22] by developing a mathematical model and a corresponding set of closed-form expressions can characterise the operation of CA as a diversity technique, thus providing a theoretic basis that supports and explains the findings of the simulation study reported in [
22].
The following contributions are provided in this work:
A novel approach for the use of CA as a diversity technique is proposed. The proposed approach is discussed in detail, including its motivation, relevant design aspects and impact at various layers of the protocol stack. Some example configurations compatible with 3GPP frequency ranges and channels are presented as well.
In order to investigate the performance of CA as a diversity technique, the concept of effective SNR is introduced, which is defined as the equivalent SNR at which a single channel achieves the same performance as the considered CA scenario with the same total bandwidth. This concept provides a simple yet powerful tool for the mathematical analysis of CA. Two models for the effective SNR are considered (an ideal model and an average model). For both models two scenarios are considered, where the SNR is distributed homogeneously and heterogeneously across the aggregated CCs. Closed-form expressions for the statistical distribution of the effective SNR are then derived for the four possible cases considered in this work.
Capitalising on the model of effective SNR, the ergodic capacity of a system with CA as a diversity technique is analysed and mathematical expressions are derived for both homogeneous and heterogeneous SNR scenarios.
Similarly, the secrecy capacity of a system using CA as a diversity technique is also investigated and mathematical expressions are derived as well for the homogeneous and heterogeneous SNR scenarios. By considering both the ergodic and secrecy capacities, a robust communication system design can be achieved.
The remainder of this work is organised as follows. First,
Section 2 discusses the concept of CA being used as a diversity technique. The motivation and objectives of this work are then formulated in
Section 3. The considered system model is described in
Section 4. Afterwards,
Section 5 introduces and provides a formal definition of the concept of effective SNR along with mathematical expressions for its statistical distribution under both homogeneous and heterogeneous SNR scenarios, considering an ideal modelling approach as well as an average modelling approach. Based on the developed effective SNR model, analytical results for the performance of CA as a diversity technique in terms of the ergodic and secrecy capacities are presented in
Section 6 and
Section 7, respectively. Numerical results are then presented and discussed in
Section 8. A summarised discussion of the main results and findings of this study is presented in
Section 9. Finally,
Section 10 summarises and concludes this work.
2. Carrier Aggregation as a Diversity Technique
When CA is utilised, the data stream from the user application layer is divided into a number of sub-streams at the medium access control (MAC) layer and each sub-stream is transmitted through a different CC at the physical (PHY) layer. In this process, the PHY layer divides and maps higher-layer data onto physical resources while the MAC layer is in charge of the scheduling and resource management processes, with the radio resource control (RRC) layer controlling and configuring the aggregated CCs. At the receiver side, the data of the different sub-streams are recombined (aggregated) at the MAC layer and passed forward to the higher layers, as illustrated in
Figure 1. Thus, multiple chunks of (possibly non-contiguous) spectrum can be combined in a transparent manner so that they are effectively perceived as a single (larger) block of spectrum by the higher layers of the protocol stack. This enables the network to simultaneously transmit and receive data across multiple CCs, thereby enhancing data rates, increasing capacity, and optimising network performance.
Since the user’s main data stream is split into sub-streams at the MAC layer, the sub-streams transmitted through each CC will run a separate instance of the MAC and PHY layers and their associated processes. Consequently, each sub-stream will run an individual, dedicated instance of packet scheduler, HARQ retransmission process, transmission power control, dynamic adaptation of the modulation and coding scheme, and so on. As a result, these processes are dynamically adapted and optimised individually to the instantaneous channel quality conditions experienced in each CC. This observation suggests the possibility of utilising CA as a way to exploit the frequency diversity obtained through the use of different CCs. In general, the transmission through each CC will experience different propagation conditions due to frequency diversity, and each CC can, therefore, be seen as a different diversity path. By transmitting the user data through multiple CCs, frequency diversity can be exploited.
In order to employ CA as a diversity technique, a sufficiently large block of spectrum is divided into a number of sub-blocks, each of which is employed as a CC and combined via CA. The user data stream is then divided into the same number of data sub-streams when transmitted through the set of spectrum sub-blocks (CCs) via CA. For instance, a mobile operator with a spectrum block of 20 MHz could exploit the existing block of 20 MHz, not as a single carrier of 20 MHz, but instead as two CCs of 10 MHz each, or four CCs of 5 MHz each, which would then be combined via CA. The number of possibilities is actually much larger, in particular if the new bands introduced for 5G are considered. In Frequency Range 1 (FR1) [
23], a block of 100 MHz could be exploited based on the proposed framework as 2 CCs × 50 MHz, 4 CCs × 25 MHz, 5 CCs × 20 MHz, or 10 CCs × 10 MHz (the option of 20 CCs × 5 MHz is not allowed by the standard given that up to 16 CCs can be aggregated). In Frequency Range 2 (FR2) [
24], a block of 400 MHz could be exploited as 2 CCs × 200 MHz, 4 CCs × 100 MHz, or 8 CCs × 50 MHz. Many other combinations are also possible following a similar principle.
Note that this is different from the use of CA in classical sense. The traditional definition of the CA concept is to enable the incorporation of new additional frequency bands as a way to increase the data rate. On the other hand, the idea of CA as a diversity technique considered in this work does not require the addition of new spectrum; instead, it simply divides an existing block of contiguous spectrum into sub-blocks, treating each sub-block as a CC with a separate data sub-stream, and recombines the data sub-streams transmitted through each CC via CA. Note that in the proposed approach the use of CA would in principle not be needed; the operator could choose to transmit using the available block of spectrum as a single channel but, instead, artificially divides the available spectrum into a number of CCs that are recombined via CA in order to benefit from the frequency diversity that would normally be expected in channels with a sufficiently large bandwidth. Such frequency diversity can be exploited via CA because, as stated above, the data transmitted through each CC undergoes an individual instance of the MAC and PHY layers and their associated processes. Consequently, the parameters of the packet scheduler, HARQ retransmission process, transmission power control, dynamic adaptation of the modulation and coding scheme, etc., can be adapted and optimised individually for the instantaneous channel quality conditions of each CC. This individual adaptation and optimisation results in an improved capacity. Conversely, if the available spectrum is exploited as a single channel, then a single instance of the MAC/PHY layers and their processes is run and the selected operation parameters are unlikely to be optimum for the various instantaneous conditions experienced through the whole range of frequencies within the bandwidth of a frequency-selective channel, and as a result a lower capacity is obtained in this case. Thus, by artificially forcing separate data streams via different CCs in the available spectrum, the aim is to exploit the diversity in each frequency interval. As a result, in this context, CA can be effectively employed as a diversity technique to improve the overall performance without requiring additional spectrum. This performance improvement can be obtained regardless of any other diversity techniques that may be implemented in a mobile communication system, for example, at the physical layer.
Note that CA was originally proposed by 3GPP as a technique to increase data rates by incorporating additional bandwidth [
8,
9,
10]. On the other hand, the framework proposed in this work as discussed above does not require additional bandwidth since it simply splits the existing spectrum into smaller blocks in order to benefit from frequency diversity, thus effectively exploiting CA as a diversity technique. Therefore, while traditional CA aims to increase the capacity by increasing the available bandwidth (i.e., Hz), the proposed approach aims to increase the capacity by increasing the spectrum efficiency within the available spectrum (i.e., bit/s/Hz). This is a novel point of view for CA that, to the best of the authors’ knowledge, has not been considered by other authors before.
It is worth noting that the CA-based transmission scheme considered in this work does not involve a higher level of complexity compared to the traditional use of CA, both from the hardware and software points of view. The hardware complexity of CA is determined by the type of frequency deployment of CA, namely (in increasing order of complexity), intra-band contiguous CA, intra-band non-contiguous CA, or inter-band CA. The proposed CA-based scheme falls within the category of intra-band contiguous CA, which is the simplest form of CA with the lowest level of hardware complexity in the radio frequency front-end since all CCs are contiguous and belong to the same band, so they use the same numerology and transmission configuration. From the software point of view, the method considered in this work does not involve additional complexity compared to the traditional use of CA. The use of CA is certainly more complex than single-carrier transmission as it requires appropriate mechanisms to correctly execute the packet scheduling function, including the distribution of the user data across different CCs and the synchronisation of the scheduling information among CCs in a timely and efficient manner. However, commercial network equipment that supports CA must implement appropriate algorithms to address these issues. Such algorithms are usually vendor-specific and do not need to be modified to implement the CA-based scheme considered in this work. A mobile operator willing to implement the CA-based scheme presented in this work would only need to reconfigure the transmission in a broad channel from single-carrier mode to CA mode to benefit from the performance improvements offered by the proposed CA-based scheme.
7. Secrecy Capacity Analysis
The ergodic capacity analysed in
Section 6 represents the maximum theoretical achievable data rate over a wireless channel, which is an important aspect to achieve efficient data transmission and optimise the system performance. However, in practical scenarios, the communication security is also extremely relevant, and therefore, analysing the secrecy capacity becomes equally important. The secrecy capacity or secrecy rate is a concept primarily used in information theory and communication systems to quantify the amount of secrecy or confidentiality achieved when transmitting digital information over a communication channel, particularly in the presence of potential eavesdroppers. The secrecy capacity represents the maximum theoretical achievable data rate at which information can be transmitted reliably over a wireless channel while maintaining the confidentiality of communication against attackers (commonly referred to as eavesdroppers). The secrecy capacity is essentially a measure of the amount of information that can be transmitted securely over a communication channel and can, therefore, be employed to characterise the level of security of a communication system from a physical-layer point of view. The secrecy capacity is a critical metric in assessing the security and confidentiality of communication systems. A high secrecy rate indicates that a significant amount of information can be transmitted securely, reducing the risk of sensitive data being compromised by unauthorised parties. By considering both the ergodic and secrecy capacities, a robust communication system design can be accomplished. The analysis presented for the ergodic capacity in
Section 6 is here complemented by analysing the secrecy capacity.
The instantaneous secrecy capacity of a wiretap channel [
38] is defined as the difference between the instantaneous channel capacity for the legitimate receiver (i.e., the intended recipient) and the instantaneous channel capacity for the eavesdropper (i.e., the potential attacker). Mathematically, it is defined as
if
and zero otherwise, where
and
represent the instantaneous SNR of the main and eavesdropper links, respectively, and their instantaneous capacities are given by
and
, respectively. Note that the eavesdropper needs to use the same configuration as the main link in order to attempt to successfully decode its information. If the main link transmits over a bandwidth
B using CA with
N CCs, then the eavesdropper must do exactly the same. As a result, the bandwidth penalty parameter
will be the same for both links as will the net bandwidth available for data transmission, hence the presence of the same bandwidth
W in the expressions of both
and
.
The characteristics of the communication channel, such as bandwidth, noise, and fading effects, influence both the legitimate receiver’s channel capacity and the eavesdropper’s channel capacity. As a result, the instantaneous secrecy capacity will fluctuate randomly. In this context, a meaningful metric for the secrecy capacity is its average value, which can be calculated by averaging the instantaneous secrecy capacity over the fading statistics of the main and eavesdropper links. Thus, the average secrecy capacity (in bits per second) can be obtained as equations (38)–(41) in [
39]:
where
and
denote the PDF of the instantaneous SNR in the main and eavesdropper links, respectively, and
with
and
denoting the CDF of the instantaneous SNR in the main and eavesdropper links, respectively.
Based on the expressions shown above and capitalising on the effective SNR models proposed in
Section 5, this section analyses the secrecy capacity of CA when used as a diversity technique. Similar to
Section 6, analytical results will be provided for the average model of the effective SNR. The equivalent expressions for the ideal effective SNR model can be obtained by simply replacing
and
with
and
, respectively (for the homogeneous SNR scenario), and by replacing
and
with
and
, respectively (for the heterogeneous SNR scenario).
Theorem 4. Secrecy capacity of single carrier scenario
The secrecy capacity of the single carrier scenario is given bywhere is the exponential integral function. Proof. Since the control signalling overhead introduced by a single carrier requires a capacity equivalent to a bandwidth
, the bandwidth effectively available for data transmission is
. Introducing (
1)–(
2) in (
16)–(19) and noting that
, the resulting integrals can be solved with the help of equation (4.337.2) in [
34] and equation (5.1.7) in [
37]. □
Theorem 5. Secrecy capacity of CA with homogeneous SNR
The secrecy capacity of CA with homogeneous SNR iswhere represents the upper incomplete gamma function. Proof. The overhead introduced by
N CCs requires a capacity equivalent to a bandwidth
, thus
. Introducing (
8)–(9) in (
16)–(19), substituting the lower incomplete gamma function with its equivalent form in equation (8.352.1) in [
34] and noting that
, integrals of the form of equation (15.24) in [
29] are obtained, which can be resolved with the help of equation (15B.7) in [
29]. After reorganising and grouping terms, the expression shown in (
21) is obtained. □
Theorem 6. Secrecy capacity of CA with heterogeneous SNR
The secrecy capacity of CA with heterogeneous SNR is Proof. For
N CCs,
. Introducing (
10)–(11) in (
16)–(19) yields a sum of integrals, each of which can be resolved as discussed in the proof of Theorem 1. □
Remark 3. By comparing (20), (21) and (22) to (13), (14) and (15), respectively, it can be noted that the secrecy capacity is equivalent to the ergodic capacity minus a term that quantifies the amount of information that can be transmitted through the channel, but not in a confidential manner due to the presence of an eavesdropper (i.e., the secrecy capacity is lower than the ergodic capacity, as expected). 9. Discussion
The main aim of the analysis presented in
Section 8 was to determine whether the mathematical model and closed-form expressions derived in this work can correctly predict the trends observed by simulations in [
22] and evaluate the impact of various relevant parameters on the system performance. The numerical results obtained by evaluating the mathematical expressions derived in this work have been shown to be in line with our previous simulation study and demonstrate that CA can be effectively exploited as a diversity technique to increase the data rate of the system without increasing the available bandwidth (owing to a higher spectral efficiency per unit bandwidth), thus improving the capacity and performance of mobile communication systems compared to the case of single-carrier transmission over the same amount of bandwidth.
The performance of the considered CA-based transmission scheme has been evaluated under various SNR scenarios, namely, a homogeneous SNR scenario, where all CCs experience the same average SNR, and a heterogeneous counterpart, where the SNR values in the CCs are different and spread around a certain average SNR value. The performance has been observed to be noticeably higher in the heterogeneous SNR scenario than in the homogeneous counterpart, obtaining better performance improvements when the SNR values are spread over broader intervals. This is an indication not only of the ability of the proposed CA-based scheme to exploit and benefit from the frequency diversity existing in wireless communication channels but also the capability of the developed mathematical modelling framework to capture this phenomenon.
It has been shown that several parameters can affect, to different extents, the performance of CA when exploited as a diversity technique. The two main parameters are the number of CCs into which the available spectrum is divided (
N) and the overhead parameter, representing the fraction of the available bandwidth that needs to be sacrificed to accommodate for signalling traffic and guard bands between CCs (
). Increasing the number of CCs initially has a beneficial effect as it enhances the diversity gain of the system. However, each new CC has an associated bandwidth penalty as a result of its required signalling traffic and guard bands, which has a negative effect on performance. If
N is too low, the diversity gain may not be significant, while if
N is too high, the bandwidth penalty may completely cancel out the obtained diversity gain and even reduce the performance below that of the single-carrier transmission scenario. Therefore, the existence of an optimum number of CCs that provides the best trade-off between these two conflicting aspects and maximises the overall capacity has been shown. This optimum number of CCs, which was indeed suggested by the simulation results obtained in [
22], has a strong dependency on the bandwidth penalty parameter
.
An important practical limitation in real mobile communication systems is the maximum number of CCs that may be supported in certain versions of the 3GPP standard for mobile communication systems (e.g., up to five CCs in the case of 4G LTE systems). Even in those cases where a larger number of CCs is supported (e.g., 5G NR), mobile operators may actually implement a lower number of CCs in their real network deployments. As a result, the optimum number of CCs that provides the best capacity performance from a theoretical point of view may not be supported in some practical scenarios. However, even in those cases where the maximum number of CCs that can be employed is constrained by practical limitations, the use of CA as a diversity technique can still provide substantial capacity improvements with respect to the single carrier scenario. This indicates that the proposed CA-based transmission scheme is beneficial under practical conditions.
The secrecy performance of the considered CA-based transmission scheme was also evaluated as part of this work. In general, the use of CA as a diversity technique can improve the capacity not only of the links to legitimate users but also to undesired eavesdroppers. If both links experience similar SNR conditions, then the confidentiality of transmitted information may be compromised. However, such a situation should be unlikely in practical system implementations since, in a more realistic setup, the main link can typically be expected to experience a higher average SNR than the eavesdropper link, in particular with modern communication systems where the use of multiple antenna technologies and beamforming techniques are used to direct the transmitted signal towards the desired recipient. When the legitimate receiver in the main link experiences a higher average SNR than the eavesdropper link, then the use of CA can effectively result in an improvement in secrecy capacity as well. The observation above suggests that CA can in principle be safely used as a diversity technique to increase the user data rates and system ergodic capacity; however, when doing so, special attention should be paid to higher-layer techniques for communication confidentiality, since the secrecy capacity might in some unfavourable cases be potentially degraded when using CA as a diversity technique.