Real-Time All-Digital Radio-over-Fiber LTE Transmission

  • Bohn T.
  • Ferling D.
  • Guy Torfs
  • Haolin Li
  • Johan Bauwelinck
  • Joris Van Kerrebrouck
  • Laurens Breyne
  • Piet Demeester

Radio-over-fiber is a key-enabling-technology for next generation wireless networks. To support an increasing number of antennas, a CloudRAN approach that maximally aggregates basestation functionality of the different antenna sites is the most economically feasible. To support light weight antenna units, analog radio-over-fiber is most promising. To mitigate linearity constraints of ...

Flexible resource allocation for device-to-device communication in fdd system for ultra-reliable and low latency communications

  • Li Z.
  • Singh B.
  • Uusitalo M.

Ultra-reliable and low latency communications is envisioned to enable new services and applications with high reliability, availability and low latency, e.g, factory automation, Tactile Internet. Device-to-device communication is one such mean that allows devices to experience benefits in terms of shorter communication latency. Currently most device-to-device communication in frequency-division duplex ...

Distributed Wi-Fi Interference Coordination for Dense Deployments

  • Abinader F.
  • Almeida E.
  • Cavalcante A.
  • Chaves F.
  • Choudhury S.
  • Doppler K.
  • Sousa V.
  • Tuomaala E.
  • Vieira R.

Unlicensed spectrum is increasingly being used by mobile operators to meet the mobile traffic demand, and Wi-Fi is foreseen as one of the technologies for implementing mobile traffic offloading. However, Wi-Fi efficiency does not scale well as node density increases, and IEEE 802.11ax Task Group (TGax) was created in 2014 ...

Massive MIMO with Max-Min Power Control in Line-of-Sight Propagation Environment

  • Marzetta T.
  • Yang H.

A key component for the success of Massive MIMO is the asymptotic orthogonality of channel vectors. With M service antennas, the expected correlation between a pair of channel vectors in line-of-sight (LoS) propagation environment decreases at least as fast as log(M)/M while its counterpart in independent and identically distributed (iid) ...

Distributed Wi-Fi Interference Coordination for Dense Deployments

  • Abinader J.
  • Almeida E.
  • Cavalcante A.
  • Chaves F.
  • Choudhury S.
  • De Sousa J.
  • Doppler K.
  • Tuomaala E.
  • Vieira R.

Unlicensed spectrum is increasingly being used by mobile operators to meet the mobile traffic demand, and Wi-Fi is foreseen as one of the technologies for implementing mobile traffic offloading. However, Wi-Fi efficiency does not scale well as node density increases, and IEEE 802.11ax Task Group (TGax) was created in 2014 ...

Direct and Electroabsorption Modulation of a III-V-on-Silicon DFB Laser at 56 Gb/s

  • Abbasi A.
  • Bauwelinck J.
  • Duan G.
  • Moeneclaey B.
  • Morthier G.
  • Roelkens G.
  • Verbist J.
  • Yin X.

In order tocope with the ever-growing Internet traffic, high-speed optical interconnects are becoming indispensable. Silicon photonicsis emerging as a key technology for such inter-connects. In this paper, we demonstrate 56 Gb/s nonreturn to zeroon-off keying (NRZ-OOK) direct modulation based on a high bandwidth heterogeneously integrated III-V-on-silicon distributed feedback laser, as ...

A Wideband All-Digital CMOS RF Transmitter on HDI Interposers With High Power and Efficiency

This paper demonstrates a wideband CMOS all-digital polar transmitter with flip-chip connection to three high-density-interconnection PCB interposers. The interposers are designed to extract power from a CMOS open-drain inverse Class-D power amplifier core. For a wide frequency range from 0.7 to 3.5 GHz, continuous-wave output power higher than 25.5 dBm ...

Balanced Fair Resource Sharing in Computer Clusters

  • Bonald T.
  • Comte C.

We represent a computer cluster as a multi-server queue with some arbitrary bipartite graph of compabilities between jobs and servers. Each server processes its jobs sequentially in FCFS order. The service rate of a job at any given time is the sum of the service rates of all servers processing ...

Anthropogenic Space Weather

  • Baker D.
  • Balogh A.
  • Erickson P.
  • Gombosi T.
  • Huba J.
  • Lanzerotti L.

Anthropogenic effects on the space environment started in the late 19th century and reached their peak in the 1960s when high-altitude nuclear explosions were carried out by the USA and the Soviet Union. These explosions created artificial radiation belts near Earth that resulted in major damages to several satellites. Another, ...

An Economic Analysis of Distributed Access Architectures: The Next Major Cable Transformation

  • Glapa M.
  • Joseph J.
  • Vale R.

The use of Distributed Access Architectures DAA is one of the concepts transforming the future of cable networks in a way that has not been seen since the late 1980s early 1990s when fiber began to play a prominent role in access. We are moving from a network of today ...

High Energy Efficient Computing in Cloud RAN

  • Zhang Y.

Radio access network and data center are the main sources of network power consumption. Cloud RAN will be the key implementation form of RAN deployed at edge data center. The edge data center becomes the anchor point of network power consumption issue. On one side, with the adoption of the ...

Long-haul coherent communications using microresonator-based frequency combs

  • Abel Lorences-Riesgo
  • Andrew M. Weiner
  • Attila Fülöp
  • Dan E. Leaird
  • Eriksson T.
  • Mikael Mazur
  • Minghao Qi
  • Pei-Hsun Wang
  • Peter A. Andrekson
  • Victor Torres-Company
  • Yi Xuan

Microresonator-based frequency combs are strong contenders as light sources for wavelength-division multiplexing (WDM). Recent demonstrations have shown the potential of microresonator combs for replacing tens of WDM channels with a single laser-pumped device. These experiments relied on microresonators displaying anomalous dispersion. Devices operating in the normal dispersion offer the prospect ...

Connectivity graph reconstruction for networking cloud infrastructures

  • Dubus S.
  • Kanoun W.
  • Mensah P.
  • Morin C.
  • Piolle G.
  • Totel E.

Cloud providers have an incomplete view of their hosted virtual infrastructures managed by a Cloud Management System (CMS) and a Software Defined Network (SDN) controller. For various security reasons (e.g. isolation verification, modeling attack paths in the network), it is necessary to know which virtual machines can interact via network ...

Simplified extended Kalman filter phase noise estimation for CO-OFDM transmissions

  • Le S.
  • Megret P.
  • Nguyen T.
  • Wuilpart M.
  • Yakusheva T.

We propose a flexible simplified extended Kalman filter (S-EKF) scheme that can be applied in both pilot-aided and blind modes for phase noise compensation in 16-QAM CO-OFDM transmission systems employing a small-to-moderate number of subcarriers. The performance of the proposed algorithm is evaluated and compared with conventional pilot-aided (PA) and ...

Architectures for coded mobile edge computing

  • Avestimehr A.
  • Li S.
  • Mohammad Ali Maddah-Ali

We consider a mobile edge computing scenario, in which mobile users (e.g., smartphones) offload their computation requests to the computing nodes distributed at the network edge (e.g., base stations). The edge nodes process the offloaded requests in the “computation phase”, and return the results to the users in the “communication ...

Simultaneous four-channel thermal adaptation of polarization insensitive silicon photonics WDM receiver

  • Chen Y.
  • Dong P.
  • Gatdula R.
  • Kim K.
  • Melikyan A.

We propose a novel approach to demonstrate simultaneous multi-wavelength locking during temperature changes in a silicon photonic polarization insensitive microring-based wavelength division multiplexing (WDM) receiver. The DC component of a single monitoring photodetector at the through port of the microring filter array is exploited as a feedback signal with no ...

Broadcast Caching Networks with Two Receivers and Multiple Correlated Sources

  • Erkip E.
  • Hassanzadeh P.
  • Llorca J.
  • Tulino A.

The correlation among the content distributed across a cache-aided broadcast network can be exploited to reduce the delivery rate over the broadcast link. This paper considers a two-user three-file network with correlated content, and studies its fundamental limits for the worst-case demand. A class of schemes based on a two-step ...

Advances in extreme learning machines (ELM2015)

  • Huang G.
  • Lendasse A.
  • Miche Y.
  • Toh K.
  • Vong C.

Rich Network Anomaly Detection Using Multivariate Data

  • Mendiratta V.
  • Thottan M.

Modern telecommunication networks are complex, and generate massive amounts of data in the form of logs and metadata. Though these networks are designed for high reliability, when they do fail or encounter performance degradations, given the complexity, it is difficult to detect and diagnose problems in a timely manner. Existing ...

360-Degree Video Streaming and its Subjective Quality

  • Curcio I.
  • Naik D.
  • Toukomaa H.

Traditional challenges for deploying end-to-end streaming systems are made harder when considering 360-degree media content. One of these challenges relates to the lack of commonly accepted standardized methodologies for subjective 360-degree video quality assessment, especially oriented towards streaming services. The contribution of this paper falls in the area of subjective ...