Wireless Ticket Exchange boosts Telecommunication Sector

  • Wajda W.

Market evolution poses challenges for future telecommunication networks. On one side, pressure on network operators regarding technology investments and decreasing revenue; while on the other side, changes in customer behavior and perception give rise to the quest for structural re-organization and for new business strategies in the telecommunications business. This ...

Impact of Temperature on Spatial Hole Burning and Modulation Bandwidth of Reflective Semiconductor Optical Amplifiers

  • Maho A.

Self-Seeded RSOA transmitters are a possible implementation of wavelength division multiplexing (WDM) passive optical networks (PON). Although good results were obtained [], their cost and power consumption are still an issue. To improve these performances, the RSOA should operated in an uncooled or a semi-uncooled regime and thus avoiding the ...

Vision for Network Softwarization and Security

  • Betge-Brezetz S.
  • Dietrich C.
  • Dotaro E.
  • Wary J.

This extended abstract introduces an overview of security challenges introduced by the evolution towards a new ICT generation based on IT and networks convergence using Virtualization and Software Defined approaches.

Multi-Connectivity Functional Architectures in 5G

  • Aziz D.
  • Bakker H.

This contribution will be the part of a full IEEE ICC 2016 conference paper with the above title which will be submitted under the EU-Funded 5G-NORMA consortium. On behalf of ALU, we contribute in 5G-NORMA research project on the topic of Multi-Connectivity with a focus on the integration of mmWave ...

A wavelength tunable ONU transmitter based on multi-mode Fabry-Perot laser and micro-ring resonator for bandwidth symmetric TWDM-PON

  • Gao Z.
  • Sun X.
  • Zhang K.

Wavelength tunable optical transmitter is an essential component for the newly standardized time and wavelength division multiplexed passive optical network (TWDM-PON), where tunable ONU with 10Gb/s bit rate is desired to provide 40Gb/s symmetric bandwidth. In this paper, a novel wavelength tunable optical transmitter is proposed by reusing legacy low ...

C-RAN fronthaul enhancements using Software Defined Networking

  • Aravinthan G.
  • Boviz D.
  • Roullet L.

Cloud Radio Access Networks (C-RAN) offer numerous advantages both on the functional and the hardware plane. We can efficiently control the access network using Software Defined Networking, but it is not the only benefit of SDN technology. Optimization of various network features and elements can be done by plug-and-play applications ...

Where Mobile Meets Cloud - Journey to 5G with vRAN / NFV

  • Reinink K.
  • Segel J.
  • Urie A.

This chart set describes the role of virtualization and NFV in effecting the transition from VRAN 4G LTE to 5G; 5G will bring a broad range of new services at various capability, price, cost and performance points with a focus on end-to-end services and flexible personalization. New technologies such as ...

Flexible Data Plane for Zero Trust Security in Data Centers and Its Instantiation using ONOS Intent Framework

  • Chang H.
  • Lakshman T.
  • Mukherjee S.
  • Wang L.

Zero Trust security in a data center requires that every entity (VMs, hosts, users, etc.) within the data center is protected from one another through strict traffic scrutiny. Current solutions enforce this by controlling the reachability of traffic in and out of any entity. However, the security functions must be ...

Energy Consumption Aspects of Cache-Empowered Heterogeneous Networks: Optimization and Analysis

  • Conte A.
  • Perabathini B.

This paper presents an theorethical analysis of the energy consumption of caching strategies when applied to heterogeneous networks. The mathemathical analysis is based on stochastic geometry.

Heterogeneous Massive MIMO with Small Cells

  • Marzetta T.
  • Yang H.

A heterogeneous network with Massive MIMO and small cells can achieve even higher spectral and energy efficiency than a Massive MIMO alone. The performance of such heterogeneous system is examined in this paper. A few small cells are used to enhance the spectral and energy efficiency of the overall system. ...

Detecting and predicting outages in cellular networks

  • Falk E.
  • Gurbani V.
  • Kushnir D.
  • Mendiratta V.
  • Phadke C.
  • State R.

Modern cellular networks are complex systems offering a wide range of services and present challenges in detecting anomalous events when they do occur. The networks are engineered for high re- liability and, hence, the data from these networks is predominantly normal with a small proportion being anomalous. Froman operations perspective, ...

D 2.1 - Requirements and concepts for the analogue HW in 5G mobile systems

  • Ferling D.

This document is a report of the European project Flex5Gware. The contributions of Alcatel-Lucent are included in the sections 2.1.1, 2.2, 3.1, and 3.3. They are no further authors involved in this contribution. Executive summary: This document comprises an analysis of requirements and envisaged concepts for RF front-ends and antennas ...

Targets, design rules and first designs for the 5G access network

  • Mayer H.

The slide set gives an overview on high level targets, design rules and first solution for the 5G access network. For presentation in VDE ( German electrical engineering association)

UNIVERSELF - The end of needy networks

  • Ciavaglia L.

Self-organised. Self-managing. Self-aware. Sounds a lot like you? Maybe so, but with the help of EU-funded research, it may also increasingly describe telecom networks. The autonomic systems of the future won’t need us to keep them on track. They will spot and even anticipate glitches and sort them out faster ...

A framework for component certification in autonomic systems

  • Ciavaglia L.
  • Sander Spek
  • Vânia Gonçalves

While theory on software certification exists (e.g., see [1] for an overview), little of it has been applied to autonomic systems in the context of Network Management Systems. In this paper, a framework will be provided for component certification for autonomous networks. It has been applied in the UniverSelf Project, ...

Approximate Mean Waiting Times in Transient GI/G/1 Queues

  • Jagerman D.

This paper presents an approximation method for obtaining the probability the server is busy and the mean waiting time as seen by the nth arriving customer for the GI/G/1 queueing system. Thus, transient behavior is the key issue of the method. The approximation consists of a simultaneous pair of recursion ...

Dirty Paper COding Using Trellis-Codes Modulation

  • Balachandran K.
  • Kang J.
  • Karakayali K.
  • Rege K.

Abstract- Although the information theoretic result referred to as “dirty paper coding” [1] has been known for quite a while, it has not led to schemes that look attractive enough for real-life communication systems. In a companion paper [2], we presented the concept of sum codes and showed how they ...

Enhanced THz generation for wireless communications using short optical pulses

  • Achouche M.
  • Caillaud C.
  • Moeller L.
  • Shen A.

We measure the duty cycle impact of pulsed signals at 1.5 µm wavelength used for optical THz generation. Our results suggest pulse coding for wireless transmitters can maximize emitted THz power.

Decentralized adaptive range expansion in heterogeneous WCDMA networks

  • Baker M.
  • Jun Yang
  • Kuzminskiy A.
  • Rao A.
  • Shin Horng Wong

A decentralized adaptive range expansion for small cells deployed in the macro cell coverage area is proposed and analyzed in WCDMA heterogeneous networks. The algorithm is based on a direct traffic balancing between macro and small cells assuming that the macro cell periodically informs all other cells in its coverage ...

Image authenticity implementing Principal Component Analysis (PCA)

  • Schmeelk J.
  • Schmeelk S.

The paper addresses the application of finding key features within an image utilizing the process termed the Principal Components Analysis (PCA). Understanding this technique is critical for researchers within biometric fields and the larger cyber security field. Research, found in ASEE 2011 Conference Proceedings, titled “Edge Detectors in Engineering and ...