27,766 research outputs found

    Rate aware network codes for coordinated multi base-station networks

    Full text link

    Rate Aware Network Codes For Coordinated Multi Base-Station Networks.

    Get PDF

    EVEREST IST - 2002 - 00185 : D23 : final report

    Get PDF
    Deliverable pĂşblic del projecte europeu EVERESTThis deliverable constitutes the final report of the project IST-2002-001858 EVEREST. After its successful completion, the project presents this document that firstly summarizes the context, goal and the approach objective of the project. Then it presents a concise summary of the major goals and results, as well as highlights the most valuable lessons derived form the project work. A list of deliverables and publications is included in the annex.Postprint (published version

    Fronthaul-Constrained Cloud Radio Access Networks: Insights and Challenges

    Full text link
    As a promising paradigm for fifth generation (5G) wireless communication systems, cloud radio access networks (C-RANs) have been shown to reduce both capital and operating expenditures, as well as to provide high spectral efficiency (SE) and energy efficiency (EE). The fronthaul in such networks, defined as the transmission link between a baseband unit (BBU) and a remote radio head (RRH), requires high capacity, but is often constrained. This article comprehensively surveys recent advances in fronthaul-constrained C-RANs, including system architectures and key techniques. In particular, key techniques for alleviating the impact of constrained fronthaul on SE/EE and quality of service for users, including compression and quantization, large-scale coordinated processing and clustering, and resource allocation optimization, are discussed. Open issues in terms of software-defined networking, network function virtualization, and partial centralization are also identified.Comment: 5 Figures, accepted by IEEE Wireless Communications. arXiv admin note: text overlap with arXiv:1407.3855 by other author

    A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

    Get PDF
    Physical layer security which safeguards data confidentiality based on the information-theoretic approaches has received significant research interest recently. The key idea behind physical layer security is to utilize the intrinsic randomness of the transmission channel to guarantee the security in physical layer. The evolution towards 5G wireless communications poses new challenges for physical layer security research. This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc. Technical challenges which remain unresolved at the time of writing are summarized and the future trends of physical layer security in 5G and beyond are discussed.Comment: To appear in IEEE Journal on Selected Areas in Communication

    A Tutorial on Clique Problems in Communications and Signal Processing

    Full text link
    Since its first use by Euler on the problem of the seven bridges of K\"onigsberg, graph theory has shown excellent abilities in solving and unveiling the properties of multiple discrete optimization problems. The study of the structure of some integer programs reveals equivalence with graph theory problems making a large body of the literature readily available for solving and characterizing the complexity of these problems. This tutorial presents a framework for utilizing a particular graph theory problem, known as the clique problem, for solving communications and signal processing problems. In particular, the paper aims to illustrate the structural properties of integer programs that can be formulated as clique problems through multiple examples in communications and signal processing. To that end, the first part of the tutorial provides various optimal and heuristic solutions for the maximum clique, maximum weight clique, and kk-clique problems. The tutorial, further, illustrates the use of the clique formulation through numerous contemporary examples in communications and signal processing, mainly in maximum access for non-orthogonal multiple access networks, throughput maximization using index and instantly decodable network coding, collision-free radio frequency identification networks, and resource allocation in cloud-radio access networks. Finally, the tutorial sheds light on the recent advances of such applications, and provides technical insights on ways of dealing with mixed discrete-continuous optimization problems

    WIMAX Basics from PHY Layer to Scheduling and Multicasting Approaches

    Get PDF
    WiMAX (Worldwide Interoperability for Microwave Access) is an emerging broadband wireless technology for providing Last mile solutions for supporting higher bandwidth and multiple service classes with various quality of service requirement. The unique architecture of the WiMAX MAC and PHY layers that uses OFDMA to allocate multiple channels with different modulation schema and multiple time slots for each channel allows better adaptation of heterogeneous user’s requirements. The main architecture in WiMAX uses PMP (Point to Multipoint), Mesh mode or the new MMR (Mobile Multi hop Mode) deployments where scheduling and multicasting have different approaches. In PMP SS (Subscriber Station) connects directly to BS (Base Station) in a single hop route so channel conditions adaptations and supporting QoS for classes of services is the key points in scheduling, admission control or multicasting, while in Mesh networks SS connects to other SS Stations or to the BS in a multi hop routes, the MMR mode extends the PMP mode in which the SS connects to either a relay station (RS) or to Bs. Both MMR and Mesh uses centralized or distributed scheduling with multicasting schemas based on scheduling trees for routing. In this paper a broad study is conducted About WiMAX technology PMP and Mesh deployments from main physical layers features with differentiation of MAC layer features to scheduling and multicasting approaches in both modes of operations
    • …
    corecore