The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In traditional physical interference model for Wireless Mesh Networks (WMNs) or wireless networks, a message transmitted by a node v to the intended node w within v′ transmission range can be successfully received at w if only if in this step w is listening and the interference power received at w due to simultaneous transmissions from other nodes within w′ interference range is less than the predefined...
Among the high-radix and low-diameter networks, fat-tree topology is commonly used in HPC and datacenter systems. Resource and job management is critically important to mitigate application interference in order to achieve high system performance and utilization. Preliminary studies have shown the effect of job placement on parallel scientific applications performance. In this work we study interference...
HPC systems have shifted to burst buffer storage and high radix interconnect topologies in order to meet the challenges of large-scale, data-intensive scientific computing. Both of these technologies have been studied in detail independently, but the interaction between them is not well understood. I/O traffic and communication traffic from concurrently scheduled applications may interfere with each...
This paper presents the design foundations of an agile resource management (RM) framework for the fifth generation (5G) radio access network (RAN) by describing essential building blocks (BBs). Overall, the presented RM framework provides holistic RM solutions that consider and exploit the novel aspects of 5G systems, such as, diverse service requirements, co-existence of multiple air interface (AI)...
This paper discusses the coordinated utilization of unlicensed spectrum as key enabler for the fifth generation (5G) ultra-dense networks (UDNs) as a means of enhancing spectral re-use by allocating “on-demand” unlicensed radio resources, particularly when licensed spectrum is highly loaded. Furthermore, proposed licensed-assisted access (LAA) approach is applied to 5G dynamic radio topologies, such...
In dense wireless deployments, such as Enterprise WLANs (EWLANs) and home WLANs, interference may occur because of neighbouring WLANs sharing the same unlicensed spectrum. Mechanisms to centrally manage WLAN deployments cannot effectively mitigate the interference caused by hidden terminals (HTs) in WLANs that belong to different organisations. Furthermore, the impact of interference is amplified...
Coflow scheduling without prior knowledge has been proposed recently. However, the previous solution, Aalo, has two problems: it does not explicitly control the flow rate; it assumes the network is ideally non-blocking (with perfect traffic balancing and no oversubscription). In this paper, we show the performance loss caused by the above two problems. We propose EAalo to cope with the problems. It...
This paper addresses the spatial-average analysis of uplink signal to interference ratio (SIR) and throughput in massive MIMO networks with maximum ratio combining (MRC). The analysis incorporates the effects of fractional power control (FPC) and other cells interference (ICI) due to estimation error in channel state information (CSI). Based on an asymptotic approach, tractable expressions are presented...
This paper proposes a novel, iterative, distributed Medium Access Control (MAC) for Multi-Transmit-Receive (MTR) Wireless Mesh Networks (WMNs). The MAC called PCP-TDMA aims to construct the shortest possible schedule that allows nodes to transmit to or receive from all their neighbors simultaneously over the same frequency. Compared to the state-of-the-art, namely a centralized algorithm called ALGO-2,...
The standardization for the fifth generation (5G) of mobile and wireless networks is at its early phase and has recently completed the first study item in Release 14. Nevertheless, there is a consensus that 5G will address the diverse service requirements of high-variety use cases. The network shall cope with such variation effectively and cost-efficiently even though the requirements can change over...
This work1 analyzes the Generalized Degrees-of-Freedom (GDoF) of the 2-User Multiple-Input Single-Output (MISO) Broadcast Channel (BC) in the so-called Distributed CSIT regime, with application to decentralized wireless networks. This regime differs from the classical limited CSIT one in that the CSIT is not just noisy but also imperfectly shared across the transmitters (TXs). Hence, each TX precodes...
This work explores cache-aided interference management in the absence of channel state information at the transmitters (CSIT), focusing on the setting with K transmitter/receiver pairs endowed with caches, where each receiver k is connected to transmitter k via a direct link with normalized capacity 1, and to any other transmitter via a cross link with normalized capacity t ≤ 1. In this setting, we...
To address demanding requirements in terms of expected throughput, latency and scalability, 5G networks will offer high capacity to support huge volumes of traffic generated by heterogeneous services. Dense deployment of small cells can provide a valid solution but are prone to high levels of interference especially at the cell-edge. However, to reduce inter-cell interference and improve cell-edge...
Fifth generation (5G) wireless networks will target at energy and spectrum efficient solutions to cope with the increasing demands in capacity and energy efficiency. To achieve this joint goal, dense networks of small cells (SCs) are expected to overlay the existing macro cells. In parallel, for the SC connection to the core network, a promising solution lies in a mesh network of high capacity millimeter...
In this work, we focus on the partially connected interference network with confidential messages, and study the secure degrees of freedom with no channel state information at the transmitters (CSIT). Prior works on fully connected interference networks with full CSIT have shown that the secure degrees of freedom scales linearly with the number of users. With no CSIT, however, the secure degrees of...
Safety and security in marine environments is an emerging application area of low-power wireless sensor networks. Yet, these environments pose big challenges to network reliability. The IEEE802.15.4-TSCH protocol has been extensively regarded as a reliable low-power wireless sensor network solution. It requires, though, an external scheduling mechanism in place to allocate connections to specific...
On most supercomputers, except some torus network based systems, resource managers allocate nodes to jobs without considering the sharing of network resources by different jobs. Such network-oblivious resource allocations result in link sharing among multiple jobs that can cause significant performance variability and performance degradation for individual jobs. In this paper, we explore low-diameter...
Due to the irregular topology of ultra dense cellular network (UDN), base station (BS)-centric methods are usually with low spectrum efficiency and not flexible for quality-of-service (QoS) guaranteeing. This paper investigates the QoS-aware interference coordination in UDN from a user-centric way (UCQA-IC). Targeting at enhancing the spectrum efficiency and user experience with controlled inter-cell-interference...
With the explosive growth of mobile traffic demand, device-to-device (D2D) communication offers a promising approach to reduce cellular congestion by offloading users' traffic to D2D network. In this paper, we consider a relay- assisted D2D communication in underlay cellular networks, where D2D users access a proportion of the spectrum occupied by cellular users. This poses two fundamental issues...
Wireless sensor networks (WSNs) are widely used nowadays in various domains. In general, the applications in which the WSN is deployed need that this network presents a minimal degree of reliability, effectiveness and robustness. However, the specificity of the nodes deployed in this type of networks makes them prone to failures. In this paper, we discuss the recovery from simultaneous failures for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.