Probabilistic Shaping via Non-Binary Codes

  • Jardel F.
  • Joseph J. Boutros
  • Measson C.

Shaping refers to engineering methods that adapt the signal distribution to a communication channel for increased efficiency. Recently, shaping methods have regained interest especially in optical communications where current technologies operate close the fundamental limits of the linear fiber channel model. Probabilistic amplitude shaping (PAS) has been proposed in [1] ...

Compressed Sensing of Compressible Signals

  • Beygi S.
  • Jalali S.
  • Maleki A.
  • Mitra U.

We present a novel and general approach that elevates the scope of compressed sensing recovery algorithms far beyond simple structures such as sparsity. The proposed method, referred to as compressionbased gradient descent (C-GD), is capable of employing state-of-the-art compression algorithms to solve structured signal recovery problems. This enables CGD to ...

Telecom Microservices Orchestration

  • Luong D.
  • Mongazon-Cazavet B.
  • Outtagarts A.
  • Thieu H.

The introduction of microservices in cloud infrastructure provides modularity, flexible with distributed software components. In telecom, the Network Function Virtualization (NFV) approach enable running an application as a collection of small components and microservices that share an operating system (OS) or distributed platform across many servers in cloud. In this ...

The Era of 5G and Its Impacts on EMC Design and Testing

  • Yu Q.

It is part of presentation in Workshop "Equipment & System Design for EMC" at 2017 IEEE International Symposium on EMC, Washington, D.C. The presentation agenda is: 5G Era - Coming, What is 5G?, What are 5G Capabilities?, What are 5G Performance Requirements?, What is mmWave?, Why use mmWave spectrum?, 5G ...

POUX: Performance Optimization Strategy for Cloud Platforms Based on User Experience

  • Guo Z.
  • Liu Y.
  • Qiu Z.
  • Sun Y.
  • Wang Y.

Cloud computing has been widely used in almost every areas of our life. System virtualization is one of the key technologies in cloud computing. However, it is a great challenge to achieve a balance among the virtual machines (VMs) in different physical machines (PMs) by migrating overloaded VMs to underloaded ...

A Cloud Native Approach to 5G Network Slicing

  • Francini A.
  • Miller R.
  • Sharma S.

5G networks will have to support a set of very diverse and often extreme requirements. Network slicing offers an effective way to unlock the full potential of 5G networks and meet those requirements on a shared network infrastructure. This paper presents a cloud native approach to network slicing. The cloud ...

The era of 5G and its impacts on EMC design and testing

  • Yu Q.

Agenda â?¢ 5G Era â?" Coming â?¢ What is 5G? â?¢ What are 5G Capabilities? â?¢ What are 5G Performance Requirements?

Service-tailored User-Plane Design Framework and Architecture Considerations in 5G Radio Access Networks

  • Gebert J.
  • Venkatasubramanian V.

This paper presents a novel user plane framework, tailored for different 5G services with diverse and conflicting key performance requirements (KPIs). Subsequently, the paper discusses how various user plane design decisions related to the functional split options, multi-connectivity aspects, control / user plane split options and network slicing can potentially ...

5G US Spectrum Development , Products and mmWave Testing Including Measurements of Fixed Satellite Service (FSS) Earth Station Spillover Emissions.

  • Majkowski W.

The 5G shared spectrum for mobile wireless above 24 GHz was authorized by the FCC. This paper traces the development of the shared spectrum authorization, testing issues, 5G goals and interference measurements of Fixed Satellite Service (FSS) Earth Station Spillover Emissions.

Wireless MIMO Base Station Near and Far Field Measurement Challenges

  • Moongilan D.

Wireless communication systems use Multiple Input Multiple Output-antenna techniques to increase coverage, data throughput and spectral efficiency. Often beam forming techniques are used to provide additional antenna gain relative to Single Input Single Output systems. Regulatory compliance radiated emissions tests for wireless devices are performed using a single measurement antenna ...

Chirp Management in Silicon-Graphene Electro Absorption Modulators

  • Asselbergs I.
  • Contestabile G.
  • D'Errico A.
  • Galli P.
  • Huyghebaerts C.
  • Midrio M.
  • Pantouvaki M.
  • Romagnoli M.
  • Sorianello V.
  • Van Campenhout J.

We study the frequency chirp properties of Graphene-on- Silicon electro-absorption modulators (EAMs). By experimentally measuring the chirp of a 100 um long single layer Graphene EAM, we show that the optoelectronic properties of Graphene induce a large positive linear chirp (up to 1.8 GHz) on the optical signal generated by ...

Security Trust Zone in 5G networks

  • Bin Han
  • Dohler M.
  • Mannweiler C.
  • Schotten H.
  • Stan Wong

Fifth Generation (5G) telecommunication system is going to deliver a flexible radio access network (RAN). Security functions such as authorization, authentication and accounting (AAA) are expected to be distributed from central clouds to edge clouds. We propose a novel architectural security solution that applies to 5G networks. It is called ...

Queryable Kafka: An agile data analytic pipeline for mobile wireless networks

Owing to their promise of delivering real-time decisions, today's streaming analytics platforms are increasingly being used in the communications networks, where the impact of the decisions go beyond sentiment and trend analysis to include real-time detection of security attacks and prediction of network state (i.e., is the network transitioning towards ...

Modeling and simulation of RSOA with a dual-electrode configuration

  • De Valicourt G.
  • Liu Z.
  • Violas M.
  • Wang H.
  • Wu Q.

Based on the physical model of a bulk reflective semiconductor optical amplifier (RSOA) used as a modulator in radio over fiber (RoF) links, the distributions of carrier density, signal photon density, and amplified spontaneous emission photon density are demonstrated. One of limits in the use of RSOA is the lower ...

Localised Dynamics of Laminar Pulsatile Flow in a Rectangular Channel

  • Blythman R.
  • Jeffers N.
  • Murray D.
  • Persoons T.

The exploitation of flow pulsation in low-Reynolds number micro/minichannel flows is a potentially useful technique for enhancing cooling of high power photonics and electronics devices. Although the corresponding mechanical and thermal problems are inextricably linked, decoupling of the local instantaneous parameters provides insight into underlying mechanisms. Using two-dimensional, two-component particle ...

Virtualized environments, from connectivity to services

  • Barnaghi P.
  • Bertin E.
  • Hofmann M.

NFV: Security Threats and Best Practices

  • Dutta A.
  • Lal S.
  • Taleb T.

Network function virtualization (NFV) yields numerous benefits, particularly the possibility of a cost-efficient transition of telco hardware functionalities on the software platform to break the vendor lock-in problem. These benefits come at the price of some security flaws. Indeed, with NFV, virtual mobile networks become vulnerable to a number of ...

5G Network Slicing - Part 2: Algorithms and Practice

  • Banchs A.
  • Capone A.
  • Obana K.
  • Samdanis K.
  • Ulema M.
  • Wright S.

Effective Design of Multi-User Reception and Fronthaul Rate Allocation in 5G Cloud RAN

  • Boviz D.
  • Chen C.
  • Yang S.

Cloud Radio Access Network (C-RAN) is becoming more than ever timely in 5G for dense network deployments, but its design has to be adapted to 5G requirements. To ensure high uplink throughput in cell-edge regions affected by inter-cell interference, C-RAN enables multi-user reception techniques among cells. In this paper, we ...

TinySet-An Access Efficient Self Adjusting Bloom Filter Construction

  • Einziger G.
  • Friedman R.

Bloom filters are a very popular and efficient data structure for approximate set membership queries. However, Bloom filters have several key limitations as they require 44% more space than the lower bound, their operations access multiple memory words, and they do not support removals. This paper presents TinySet, an alternative ...