Towards Smart and Reconfigurable Environment: Intelligent Reflecting Surface Aided Wireless Network

May 3, 2019

Abstract—Intelligent reflecting surface (IRS) is a new and revolutionizing technology that is able to significantly improve the performance of wireless communication networks, by smartly reconfiguring the wireless propagation environment with the use of massive low-cost passive reflecting elements integrated on a planar surface. Specifically, different elements of an IRS can independently reflect the incident signal by controlling its amplitude and/or phase and thereby collaboratively achieve fine-grained three-dimensional (3D) passive beamforming for directional signal enhancement or nulling.

Spotlight

Brain-Friendly

The Birkenbihl Approach (BBA) means, learning as the brain loves to learn. Our brain - look to the minds of children - how they like to discover and to understand how things work. It uses neuro mechanisms like abstracting rules (grammar) and background listening (to build synapses for spelling).

OTHER WHITEPAPERS
news image

Emerging 5G Use Cases and Effective Test Strategies

whitePaper | July 30, 2021

As 5G continues to evolve, so do the plethora of new use cases that unveil additional dimensions of capability in terms of higher bandwidth, lower latency, and efficient scalability. While these create new opportunities and innovations, the way design and manufacturing engineers verify their products and test procedures must also keep pace with the new challenges these capabilities bring to an already complex 5G ecosystem.

Read More
news image

VMware SD-WAN Edge platform specifications

whitePaper | August 8, 2023

VMware SD-WAN™, a fundamental component of VMware SASE™ (Secure Access Service Edge), offers converged cloud networking and security services to achieve flexibility, agility, and scale for enterprises of all sizes. VMware SD-WAN is built on software-defined networking principles to address end-to-end automation, application continuity, branch transformation, and security from the edge to the data center and the cloud

Read More
news image

How To Achieve Secured Wired and Wireless Networks

whitePaper | May 1, 2022

The access layer offers the broadest attack surface in an enterprise’s network. It supports all network connectivity (via both wired Ethernet switches and wireless access points) for employees, contractors, and guests—as well as Internet-ofThings (IoT) devices. With ever-increasing numbers of devices connecting to networks each day, ensuring access layer security becomes a critical need. And with remote working becoming a new standard during the COVID-19 pandemic (and even beyond), proper security to mitigate access layer attacks has never been more important.

Read More
news image

5G Analytics: Addressing the Data Explosion

whitePaper | May 5, 2022

U.S. operators will spend more than $250 billion to deploy 5G wireless networks from 2020 to 2025. The recent C-band (5G spectrum) auction where four operators accounted for $79 billion of the $81 billion raised increased 5G costs by an additional 40%. The top U.S. operators (Verizon, T-Mobile, and AT&T) will complete the majority of their 5G deployments over the next five years. As they continue to expand their 5G coverage and capacity, a key concern is how to recoup their 5G investments while minimizing deployment costs.

Read More
news image

Versa SD-WAN Solution Use Case for Satellite ISPs

whitePaper | July 5, 2022

Satellite networks offer their customers several advantages over other types of connectivity. They are easily deployed, reliable, and allow a wide degree of mobility, making them a perfect fit for Disaster Recovery Plans (DRP). They are an essential asset in places where other connectivity methods are not available, such as oil rigs, vessels, or even planes. However, they have several characteristics that make them harder to manage when compared to other kinds of networks. This document will discuss those challenges and explore how the Versa Operating System (VOS™) can help you extract better performance out of your Satellite links.

Read More
news image

Threat detection and response in cloud environments

whitePaper | December 20, 2022

Cloud environments change fundamental assumptions in how to perform threat detection and response. The highly dynamic inventory of cloud workloads means systems come and go in seconds. When system configuration errors are introduced during a build, they can be exacerbated and amplified when automation replicates the errors across many workloads. Shared responsibility with the cloud service provider (CSP) creates potential threat detection gaps in the attack lifecycle.

Read More

Spotlight

Brain-Friendly

The Birkenbihl Approach (BBA) means, learning as the brain loves to learn. Our brain - look to the minds of children - how they like to discover and to understand how things work. It uses neuro mechanisms like abstracting rules (grammar) and background listening (to build synapses for spelling).

Events