A Helmy, A Nayak - IEEE Transactions on Green …, 2020 - ieeexplore.ieee.org
The increasing numbers of broadband users and the corresponding rapid expansion of access networks have been putting more pressure on improving their energy efficiency to …
A Helmy, A Nayak - Journal of Optical Communications and …, 2018 - opg.optica.org
The huge bandwidth capacities and low costs of passive optical networks (PONs) combined with their high data rates have made them strong candidates for wireless backhauls. Many …
In this paper we introduce “On-The-Fly Computing”, our vision of future IT services that will be provided by assembling modular software components available on world-wide markets …
AH Helmy, A Nayak - Journal of Lightwave Technology, 2018 - ieeexplore.ieee.org
Integrating fog computing with optical access networks is believed to form a highly capable fronthaul that will live up to the various requirements and challenges of tomorrow's access …
J Gupta, R Bansal, SK Dey, A Adhya - Optical Fiber Technology, 2024 - Elsevier
In this paper, we propose two novel architectures for the short-reach optical access network (SR-OAN) and long-reach optical access network (LR-OAN) to provide high bandwidth and …
Several dynamic bandwidth allocation (DBA) algorithms have been proposed for long-reach passive optical networks (LR-PONs). The gains in the current protocols, however, are …
A Helmy, A Nayak - IEEE Communications Magazine, 2020 - ieeexplore.ieee.org
The surging numbers of wireless devices and the accompanying exponential growth of user traffic have led edge and fog computing to become essential components in future access …
A Helmy, A Nayak - IEEE INFOCOM 2020-IEEE Conference on …, 2020 - ieeexplore.ieee.org
Access networks are continuously going through many reformations to make them better suited for various demanding applications and meet new challenging requirements. On one …
In this paper, we explore a low-cost and quality-of-service (QoS)-aware long-reach optical backhaul for the wireless and fiber-to-the-x (FTTx) networks. We exploit the reserved and …