Loading...
Search for: downlink
0.006 seconds
Total 24 records

    Performance analysis of heterogeneous cellular caching networks with overlapping small cells

    , Article IEEE Transactions on Vehicular Technology ; 2021 ; 00189545 (ISSN) Rezaei, F ; Hossein Khalaj, B ; Xiao, M ; Skoglund, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Caching at network edges has attracted more and more research interests recently for the purpose of alleviating the network traffic pressure especially in backhaul links and improving user experience. We study Heterogeneous Cellular Caching Networks (HCCNs) consisting of macro cells in which N small cell base stations (SBSs) equipped with cache memory operate in conjunction with the macro cell base station (MBS). We provide closed-form expressions of the MBS and SBSs utilization factors and average user-experienced-delay in HCCNs with overlapping coverage regions, considering general traffic models for the request arrivals based on the Independent Reference Model (IRM) and renewal traffic... 

    Performance comparison of coherent and non-coherent multicarrier frequency-hopping code division multiple-access systems

    , Article 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2004, Barcelona, 5 September 2004 through 8 September 2004 ; Volume 1 , 2004 , Pages 165-169 Yazdi, Z. Z ; Nasiri Kenari, M ; Sharif University of Technology
    2004
    Abstract
    In this paper, we evaluate and compare the multiuser performance of the multicarrier frequency-hopping (MCFH) CDMA system using coherent and non-coherent detections in AWGN and slowly frequency-selective Rayleigh fading channels in a downlink application. For fair comparison, we use BFSK modulation for both cases. Our numerical results indicate that in both AWGN and fading channels, the coherent detection sub-stantially outperforms the non-coherent detection. Furthermore, it has been realized that the performance enhancement due to the diversity order is only observable for coherent detection  

    Cooperative relay cognitive interference channel

    , Article Proceedings 2010 IEEE International Conference on Information Theory and Information Security, ICITIS 2010, 17 December 2010 through 19 December 2010, Beijing ; 2010 , Pages 1064-1069 ; 9781424469406 (ISBN) Kazemi, M ; Aref, M. R ; Ahmadian Attari, M ; Sharif University of Technology
    2010
    Abstract
    The cooperative relay cognitive interference channel (RCIC) is a four-node network with two source nodes (primary source and cognitive source) and two destination nodes, in which sources try to communicate at certain rates with their corresponding destinations simultaneously through a common medium and each destination can act as a relay to assist the other one. For the partially cooperative RCIC (PC-RCIC), in which only one of the destinations (corresponding to the cognitive source) acts as a relay, we derive an achievable rate region based on using rate splitting and superposition coding at the cognitive source, and using decode-and-forward scheme at the relay. For the degraded PC-RCIC, we... 

    A novel rate-adaptation algorithm for multiple access OFDM systems

    , Article 2004 IEEE 15th International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC 2004, Barcelona, 5 September 2004 through 8 September 2004 ; Volume 4 , 2004 , Pages 2509-2513 Bakhtiari, E ; Khalaj, B. H ; Sharif University of Technology
    2004
    Abstract
    In this paper, a new scheme for adaptive subcarrier, bit and power allocation for downlink transmission of multiuser orthogonal frequency division multiplexing (OFDM) systems is presented. An adaptive algorithm is introduced to maximize the total data rate in a frequency selective channel, while satisfying requirements on total transmit power, minimum data rate of each user and desired BER to offer various quality of service (QoS) levels for different users. The performance and complexity of the proposed scheme is also compared with similar methods and other OFDM-based multiple access methods. Simulation results show that the proposed algorithm leads to higher performance in comparison with... 

    Cooperative communication with power allocation in downlink CDMA networks

    , Article ATC 2009 - Proceedings of the 2009 International Conference on Advanced Technologies for Communications, 12 October 2009 through 14 October 2009, Hai Phong ; 2009 , Pages 284-288 ; 9781424451395 (ISBN) Abdizadeh, M ; Rad, H. J ; Jafarnia, A ; Sharif University of Technology
    Abstract
    In this paper, we study the downlink of cooperative Direct-Sequence Code Division Multiple Access (DS-CDMA), where a set of Mobile Terminals (MT) are cooperating with the purpose of improving their downlink communications reliability with the Base Station (BS). In order to achieve the spatial diversity, a new cooperation scenario is proposed. Afterward, in addition to multiuser precoding, Maximum Ratio Combining (MRC) according to the Maximum Signal to Noise Ratio (MSNR) criterion at the destination is investigated. Then, the optimal transmission power control strategy under a fixed total power constraint is illustrated and analyzed. Compared with equal transmission power assignment where BS... 

    A traffic-aware scheduling algorithm for IEEE 802.16 mesh mode

    , Article Scientia Iranica ; Vol. 21, issue. 3 , 2014 , pp. 803-814 ; ISSN: 1026-3098 Dabiran, F ; Rabiee, H. R ; Salehi, M ; Amidian, A. A ; Sharif University of Technology
    Abstract
    Since there is no difference etween uplink and downlink subframes in the IEEE 802.16 mesh mode; both downlink and uplink traffics are transmitted within a single time frame. Hence, in most scheduling methods, only one scheduling algorithm is used for both uplink and downlink traffic. However, because of the different characteristics of uplink and downlink traffic, different scheduling methods should be used for each of the traffic types. In this paper, we focus on the mesh centralized scheduling of downlink flow in the data subframe. After comprehensive analysis of the characteristics of downlink traffic, we propose a new algorithm, called Traffic-Aware Scheduling (TAS). In this algorithm,... 

    A scalable framework for wireless distributed computing

    , Article IEEE/ACM Transactions on Networking ; Volume 25, Issue 5 , 2017 , Pages 2643-2654 ; 10636692 (ISSN) Li, S ; Yu, Q ; Maddah Ali, M. A ; Avestimehr, A. S ; Sharif University of Technology
    Abstract
    We consider a wireless distributed computing system, in which multiple mobile users, connected wirelessly through an access point, collaborate to perform a computation task. In particular, users communicate with each other via the access point to exchange their locally computed intermediate computation results, which is known as data shuffling. We propose a scalable framework for this system, in which the required communication bandwidth for data shuffling does not increase with the number of users in the network. The key idea is to utilize a particular repetitive pattern of placing the data set (thus a particular repetitive pattern of intermediate computations), in order to provide the... 

    Physical-Layer schemes for wireless coded caching

    , Article IEEE Transactions on Information Theory ; Volume 65, Issue 5 , 2019 , Pages 2792-2807 ; 00189448 (ISSN) Shariatpanahi, S. P ; Caire, G ; Hossein Khalaj, B ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    We investigate the potentials of applying the coded caching paradigm in wireless networks. In order to do this, we investigate physical layer schemes for downlink transmission from a multiantenna transmitter to several cache-enabled users. As the baseline scheme, we consider employing coded caching on the top of max-min fair multicasting, which is shown to be far from optimal at high-SNR values. Our first proposed scheme, which is near-optimal in terms of DoF, is the natural extension of multiserver coded caching to Gaussian channels. As we demonstrate, its finite SNR performance is not satisfactory, and thus we propose a new scheme in which the linear combination of messages is implemented... 

    Asynchronous downlink massive MIMO networks: A stochastic geometry approach

    , Article IEEE Transactions on Wireless Communications ; Volume 19, Issue 1 , 2020 , Pages 579-594 Sadeghabadi, E ; Azimi Abarghouyi, S. M ; Makki, B ; Nasiri Kenari, M ; Svensson, T ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Massive multiple-input multiple-output (M-MIMO) is recognized as a promising technology for the next generation of wireless networks because of its potential to increase the spectral efficiency. In initial studies of M-MIMO, the system has been considered to be perfectly synchronized throughout the entire cells. However, perfect synchronization may be hard to attain in practice. Therefore, we study a M-MIMO system whose cells are not synchronous to each other, while transmissions in a cell are still synchronous. We analyze an asynchronous downlink M-MIMO system in terms of the coverage probability and the ergodic rate by means of the stochastic geometry tool. For comparison, we also obtain... 

    Performance analysis of heterogeneous cellular caching networks with overlapping small cells

    , Article IEEE Transactions on Vehicular Technology ; Volume 71, Issue 2 , 2022 , Pages 1941-1951 ; 00189545 (ISSN) Rezaei, F ; Khalaj, B. H ; Xiao, M ; Skoglund, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2022
    Abstract
    Caching at network edges has attracted more and more research interests recently for the purpose of alleviating the network traffic pressure especially in backhaul links and improving user experience. We study Heterogeneous Cellular Caching Networks (HCCNs) consisting of macro cells in which $N$ small cell base stations (SBSs) equipped with cache memory operate in conjunction with the macro cell base station (MBS). We provide closed-form expressions of the MBS and SBSs utilization factors and average user-experienced-delay in HCCNs with overlapping coverage regions, considering general traffic models for the request arrivals based on the Independent Reference Model (IRM) and renewal traffic... 

    Multiuser power allocation in downlink of cooperative CDMA networks

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 13 September 2009 through 16 September 2009 ; 2009 ; 9781424451234 (ISBN) Abdizadeh, M. T ; Jafarnia, A ; Sharif University of Technology
    Abstract
    In this paper, we study the downlink of cooperative Direct-Sequence Code Division Multiple Access (DS-CDMA) systems, where a set of Mobile Terminals (MT) cooperate with the purpose of improving their downlink communications reliability with the Base Station (BS). For combating Multiple-Access Interference (MAI) as well as transferring complexity and spatial processing from the mobile terminals to the transmitter of BS, multiuser transmitter precoding is considered. In addition to multiuser precoding based on Minimum Mean-Square Error (MMSE) criterion for mitigating MAI, the proper transmission power control strategy under a fixed total power constraint is proposed and analyzed. Compared with... 

    Saturation throughput analysis of a cognitive IEEE 802.11-based WLAN overlaid on an IEEE 802.16e WiMAX

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC, 9 September 2012 through 12 September 2012 ; September , 2012 , Pages 1515-1520 ; 9781467325691 (ISBN) Rahimzadeh, P ; Moradian, M ; Ashtiani, F ; Sharif University of Technology
    2012
    Abstract
    In this paper, we focus on a cognitive network scenario, comprised of a WLAN overlaid on a network with time-scheduled primary users. WiMAX is an example of such primary networks. For time-scheduled primary users simple On-Off traffic model with exponential durations is not valid anymore. In this scenario, the cognitive nodes (CNs) hear downlink map (DL-MAP) and thus, know the frequency and time locations of all allocated slots at each frame. Then, cognitive nodes contend with each other in order to transmit their fixed size packets based on IEEE 802.11 MAC protocol. Since the number of empty slots at each frame is variable each packet transmission in cognitive network prolongs a random... 

    A game-theoretic approach for joint channel and power allocation in downlink of cellular cognitive radio networks

    , Article IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC ; 2012 , Pages 1198-1202 ; 9781467325691 (ISBN) Omidvar, N ; Khalaj, B. H ; Sharif University of Technology
    2012
    Abstract
    In this paper, we consider a cellular cognitive radio network that uses opportunistic spectrum access for its transmission in the downlink direction from base stations toward cognitive radio users. Since the spectrum is licensed to a primary network, proper resource management should be employed in the secondary network to protect primary users against excessive interference while providing acceptable utilization for secondary users. We use game theory to propose a distributed method for joint frequency and power allocation in the downlink of cognitive radio networks. Earlier works in this area were based on centralized optimization-based approaches, whereas our proposed method solves the... 

    Throughput analysis of a cognitive multi-hop IEEE 802.11-based WLAN overlaid on a cellular network

    , Article 2011 International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2011, 15 September 2011 through 17 September 2011, Split, Hvar, Dubrovnik ; 2011 , Pages 307-311 ; 9789532900262 (ISBN) Soleimani, H ; Ashtiani, F ; Sharif University of Technology
    2011
    Abstract
    In this paper, we focus on a cognitive network scenario, comprised of a multi-hop IEEE 802.11-based WLAN overlaid on a cellular network. In this scenario, the wireless nodes in a WLAN, i.e., cognitive nodes, use the downlink frequency channels of the cellular network opportunistically, such that at each packet transmission all idle channels have been exploited. In order to evaluate the capability of the considered cognitive network scenario, we propose an open queueing network model such that different packet transmission phases are mapped onto different queueing nodes. We also map different types of collisions, i.e., collision on control signals as well as collision on data transmission due... 

    Analysis of the downlink saturation throughput of an asymmetric IEEE 802.11n-based WLAN

    , Article 2016 IEEE International Conference on Communications, ICC 2016, 22 May 2016 through 27 May 2016 ; 2016 ; 9781479966646 (ISBN) Soleymani, M ; Maham, B ; Ashtiani, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Frame aggregation (FA) mechanisms improve the throughput of WLANs. In this paper, the effect of the FA mechanism on the throughput of wireless local area networks (WLANs) has been investigated. To this end, we propose an analytical model in order to analyze an IEEE 802.11n network comprised of an access point (AP) and several conventional nodes (CNs), all in the coverage area of each other. With respect to the heavier download traffic compared to the upload one, in our scenario, only the AP uses an FA mechanism and the other nodes use the basic IEEE 802.11 standard. In our proposed analytical model, the maximum downlink (DL) throughput is derived. Regarding the asymmetry among nodes, our... 

    Downlink resource allocation for autonomous infrastructure-based multihop cellular networks

    , Article Eurasip Journal on Advances in Signal Processing ; Volume 2009 , 2009 ; 16876172 (ISSN) Shabany, M ; Sousa, E. S ; Sharif University of Technology
    2009
    Abstract
    Considering a multihop cellular system with one relay per sector, an effective modeling for the joint base-station/relay assignment, rate allocation, and routing scheme is proposed and formulated under a single problem for the downlink. This problem is then formulated as a multidimensional multichoice knapsack problem (MMKP) to maximize the total achieved throughput in the network. The well-known MMKP algorithm based on Lagrange multipliers is modified, which results in a near-optimal solution with a linear complexity. The notion of the infeasibility factor is also introduced to adjust the transmit power of base stations and relays adaptively. To reduce the complexity, and in order to... 

    Energy efficient secure miso non-orthogonal multiple access transmission

    , Article 2018 IEEE Globecom Workshops, GC Wkshps 2018, 9 December 2018 through 13 December 2018 ; 2019 ; 9781538649206 (ISBN) Jahanbazi, S ; Mirmohseni, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this paper, we consider a multiple-input single-output (MISO) non-orthogonal multiple access (NOMA) system in the presence of an external single-antenna eavesdropper. We study secure downlink transmission strategies. The challenge is that the multiple antenna configurations make the successive interference cancellation (SIC) condition, which is necessary for applying NOMA schemes, much complex. We formulate the transmission power minimization problem under the quality of service (QoS), SIC and secrecy constraints. In particular, the transmission power minimization problems are formulated under both perfect channel state information (CSI) and the bounded CSI error models. These problems... 

    Improving tradeoff among downlink rates of service providers in a VWN by using noma

    , Article IEEE Communications Letters ; Volume 23, Issue 1 , 2019 , Pages 156-159 ; 10897798 (ISSN) Robat Mili, M ; Mokhtari, F ; Ashtiani, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this letter, we improve the tradeoff among the downlink (DL) rates of service providers (SPs), provided by a mobile virtual network operator (MVNO) using non-orthogonal multiple access (NOMA) technique. In this respect, NOMA provides a suitable opportunity for the MVNO to share resources among SPs more efficiently. Regarding interaction among the DL rates provided for SPs we formulate our resource allocation problem as a multiobjective optimization problem (MOOP) while taking into account user fairness. By using the weighted Tchebycheff technique, we are able to solve the formulated MOOP by considering different tradeoffs among DL rates of different SPs. Our numerical results show that by... 

    Improving tradeoff among downlink rates of service providers in a vwn by using noma

    , Article IEEE Communications Letters ; Volume 23, Issue 1 , 2019 , Pages 156-159 ; 10897798 (ISSN) Robat Mili, M ; Mokhtari, F ; Ashtiani, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In this letter, we improve the tradeoff among the downlink (DL) rates of service providers (SPs), provided by a mobile virtual network operator (MVNO) using non-orthogonal multiple access (NOMA) technique. In this respect, NOMA provides a suitable opportunity for the MVNO to share resources among SPs more efficiently. Regarding interaction among the DL rates provided for SPs we formulate our resource allocation problem as a multiobjective optimization problem (MOOP) while taking into account user fairness. By using the weighted Tchebycheff technique, we are able to solve the formulated MOOP by considering different tradeoffs among DL rates of different SPs. Our numerical results show that by... 

    On the physical layer security of the cooperative rate-splitting-aided downlink in UAV networks

    , Article IEEE Transactions on Information Forensics and Security ; Volume 16 , 2021 , Pages 5018-5033 ; 15566013 (ISSN) Bastami, H ; Letafati, M ; Moradikia, M ; Abdelhadi, A ; Behroozi, H ; Hanzo, L ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2021
    Abstract
    Unmanned Aerial Vehicles (UAVs) have found compelling applications in intelligent logistics, search and rescue as well as in air-borne Base Station (BS). However, their communications are prone to both channel errors and eavesdropping. Hence, we investigate the max-min secrecy fairness of UAV-aided cellular networks, in which Cooperative Rate-Splitting (CRS) aided downlink transmissions are employed by each multi-antenna UAV Base Station (UAV-BS) to safeguard the downlink of a two-user Multi-Input Single-Output (MISO) system against an external multi-antenna Eavesdropper ( Eve ). Realistically, only Imperfect Channel State Information (ICSI) is assumed to be available at the transmitter....