A simplified deterministic channel model for user mobility investigations in 5G networks

  • Awada A.
  • Enqvist A.
  • Lobinger A.
  • Talukdar A.
  • Viering I.

High frequency bands are considered for the fifth generation (5G) mobile networks to handle the continuous increase in the demand for cellular data traffic. However, the propagation conditions in high frequency bands are more challenging than in low frequency bands, making the radio link more susceptible to obstruction. These new ...

A refactoring approach for optimizing mobile networks

  • Bujari A.
  • Flinck H.
  • Palazzi C.
  • Pozza M.
  • Rao A.
  • Tarkoma S.

Mobile networks are expected to serve a wide range of verticals, however the Long Term Evolution (LTE) network is optimized for basic mobile operator services only. The network functions serving LTE networks are largely implemented as dedicated single function devices that offer poor customization options. This intrinsic inflexibility makes current ...

Optimizing service replication for mobile delay-sensitive applications in 5G edge network

  • Bagaa M.
  • Farris I.
  • Flick H.
  • Taleb T.

Extending cloud infrastructure to the Network Edge represents a breakthrough to support delay-sensitive applications in next 5G cellular systems. In this context, to enable ultrashort response times, fast relocation of service instances between edge nodes is required to cope with user mobility. To face this issue, proactive service replication is ...

Pilot contamination is not a fundamental asymptotic limitation in massive MIMO

  • Bjornson E.
  • Hoydis J.
  • Sanguinetti L.

Massive MIMO (multiple-input multiple-output) provides great improvements in spectral efficiency over legacy cellular networks, by coherent combining of the signals over a large antenna array and by spatial multiplexing of many users. Since its inception, the coherent interference caused by pilot contamination has been believed to be an impairment that ...

Cache-aided interference management in wireless cellular networks

  • Avestimehr A.
  • Maddah-Ali M.
  • Naderializadeh N.

We consider the problem of interference management in wireless cellular networks with caches at both base stations and receivers and we characterize the degrees-of-freedom (DoF) per cell to within an additive gap of 1 and a multiplicative gap of 2 for all system parameters, under one-shot linear schemes. Our result ...

Assuring virtual network function image integrity and host sealing in Telco cloue

  • Lal S.
  • Oliver I.
  • Ravidas S.
  • Taleb T.

In Telco cloud environment, virtual network functions (VNFs) can be shipped in the form of virtual machine images and hosted over commodity hardware. It is likely that these VNF images will contain highly sensitive data and mission critical network operations. For this reason, these VNF images are prone to malicious ...

A Smart2 Gaussian process approach for indoor localization with RSSI fingerprints

  • Bisio I.
  • Lavagetto F.
  • Sciarrone A.
  • Yiu S.

Location Fingerprinting (LF) is a promising localization technique that enables many commercial and emergency Location-Based Services (LBS). The idea of this paper is two- folded. First, a Gaussian Process (GP) is used during the training (offline) phase of an indoor positioning algorithm to generate the fingerprint database, reducing the expensive ...

Enhancing coexistence in the unlicensed band with massive MIMO

  • Bonfante A.
  • Claussen H.
  • Garcia-Rodriguez A.
  • Geraci G.
  • Giordano L.
  • Lopez-Perez D.

We consider cellular base stations (BSs) equipped with a large number of antennas and operating in the unlicensed band. We denote such system as massive MIMO unlicensed (mMIMO-U). We design the key procedures required to guarantee coexistence between a cellular BS and nearby Wi-Fi devices. These include: neighboring Wi-Fi channel ...

How to optimally allocate resources for coded distributed computing?

  • Avestimehr A.
  • Li S.
  • Maddah-Ali M.
  • Yu Q.

To execute cloud computing tasks over a data center hosting hundreds of thousands of server nodes, it is natural to distribute computations across the nodes to take advantage of parallel processing. However, as we allocate more computing resources and further distribute the computations, a large amount of intermediate data must ...

Link scheduling for mmWave WMN backhaul

  • Chen D.
  • Kilpi J.
  • Paananen J.
  • Seppanen K.
  • Suihko T.
  • Wainio P.

A new link scheduling approach for millimeter wave wireless mesh network is presented. The proposed link scheduling solution is designed to work together with a multiple overlapping spanning trees-based routing schemes on a mesh network topology. The link schedule computation will minimize the end-to-end delay along a subset of shortest-hop ...

SMS and one-time-password interception in LTE networks

  • Holtmanns S.
  • Oliver I.

The Interconnection network connects the communication networks themselves to each other enabling features such as roaming and data services between those said networks. It has been known since 2014 that using the legacy SS7 (Signaling System No. 7) protocol SMS based traffic can be intercepted. Network providers are now moving ...

Lightweight service replication for ultra-short latency applications in mobile edge networks

  • Farris I.
  • Flinck H.
  • Iera A.
  • Taleb T.

Edge Cloud infrastructure will play a key role in extending the range of supported real-time cloud applications, by guaranteeing extremely fast response times. However, user mobility requires fast relocation of service instances, which represents an open challenge for resource-constrained cloudlets interconnected by high-latency and low-bandwidth links. In this paper, we ...

Double Iterative Waterfilling for Sum Rate Maximization in Multicarrier NOMA Systems

  • Chen C.
  • Chi Wan Sung
  • Marceau Coupechoux
  • Salaun L.
  • Yaru Fu

This paper investigates the subcarrier and power allocation for the downlink of a multicarrier non-orthogonal multiple access (MC-NOMA) system. A three-step algorithm is proposed to deal with the sum rate maximization problem. First, we assume each user could use all the subcarriers simultaneously and apply the synchronous iterative waterfilling algorithm ...

An experimental system for verifying topology changes in mobile communication networks

  • Ali-Tolppa J.
  • Carle G.
  • Sanneck H.
  • Tsvetkov T.

Automatic Configuration Management (CM) parameter change assessment, the so-called Self-Organizing Network (SON) verification, is an important enabler for stable and high-quality modern mobile communication networks. However, it also presents a new set of challenges. While improving network stability and resolving unexpected conflicts caused by parallel configuration changes, SON verification can ...

An adaptive detection and prevention architecture for unsafe traffic in SDN enabled mobile networks

  • Kantola R.
  • Khatri V.
  • Monshizadeh M.

The forthcoming 5G cloud networks will utilize software defined networking (SDN) and network functions virtualization (NFV) to provide new services. However, applying these technologies introduce new threats to network. To detect the security attacks and malicious traffic both on end user and cloudified mobile network, we apply centralized monitoring and ...

Sharing performance measurement events across domains

  • Apajalahti K.
  • Kapoor S.
  • Niiranen J.
  • Raisanen V.

Network management activities, such as fault analysis and configuration management, are eventually related to changes in network measurements. Some measurement event might be either a trigger or objective of a management activity. We argue that sharing the semantics of performance data across networks provides a basis for more advanced automation. ...

A Web-based framework for fast synchronization of live video players

  • De Turck F.
  • De Vleeschauwer D.
  • Pauwels D.
  • Petrangeli S.
  • Van Der Hooft J.
  • Wauters T.

The increased popularity of social media and mobile devices has radically changed the way people consume multimedia content online. As an example, users can experience the same event (e.g. a sports event or a concert) together using social media, even if they are not in the same physical location. Moreover, ...

Layer-independent PCI assignment method for Ultra-Dense multi-layer co-channel mobile Networks

  • Ali-Tolppa J.
  • Mwanje S.

Ultra-Dense Networks (UDNs) are Heterogeneous Networks (HetNets) that deploy a high density of small cells over-laying the traditional macro cells. If several Long Term Evolution (LTE) layers share the available spectrum, assigning the Physical Cell Identities (PCIs) becomes complicated due to the density and the diversity of the network. Since ...

Analysis of a large multimedia-rich web portal for the validation of personal delivery networks

  • Bostoen T.
  • De Turck F.
  • Huysegems R.
  • Petrangeli S.
  • Rahman R.
  • Van Der Hooft J.
  • Verzijp N.
  • Wauters T.

With the increasing popularity of multimedia-rich web portals, reducing latency has become more and more important. The current median web page load time is in the order of seconds, while research has shown that user waiting times must remain below two seconds to achieve optimal acceptance. In this paper, we ...

On non-parametric models for detecting outages in the mobile network

  • Camino R.
  • Falk E.
  • Gurbani V.
  • State R.

The wireless/cellular communications network is composed of a complex set of interconnected computation units that form the mobile core network. The mobile core network is engineered to be fault tolerant and redundant; small errors that manifest themselves in the network are usually resolved automatically. However, some errors remain latent, and ...