scispace - formally typeset
Search or ask a question
Author

Xing Shao

Bio: Xing Shao is an academic researcher from Arizona State University. The author has contributed to research in topics: Backhaul (telecommunications) & Network management. The author has an hindex of 3, co-authored 4 publications receiving 248 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: In this article, the authors provide an up-to-date comprehensive survey of the IEEE TSN and IETF DetNet standards and related research studies and identify the pitfalls and limitations of the existing standards and research studies.
Abstract: Many network applications, eg, industrial control, demand ultra-low latency (ULL) However, traditional packet networks can only reduce the end-to-end latencies to the order of tens of milliseconds The IEEE 8021 time sensitive networking (TSN) standard and related research studies have sought to provide link layer support for ULL networking, while the emerging IETF deterministic networking (DetNet) standards seek to provide the complementary network layer ULL support This paper provides an up-to-date comprehensive survey of the IEEE TSN and IETF DetNet standards and the related research studies The survey of these standards and research studies is organized according to the main categories of flow concept, flow synchronization, flow management, flow control, and flow integrity ULL networking mechanisms play a critical role in the emerging fifth generation (5G) network access chain from wireless devices via access, backhaul, and core networks We survey the studies that specifically target the support of ULL in 5G networks, with the main categories of fronthaul, backhaul, and network management Throughout, we identify the pitfalls and limitations of the existing standards and research studies This survey can thus serve as a basis for the development of standards enhancements and future ULL research studies that address the identified pitfalls and limitations

316 citations

Journal ArticleDOI
TL;DR: An up-to-date comprehensive survey of the IEEE TSN and IETF DetNet standards and the related research studies and the main categories of fronthaul, backhaul, and network management are surveyed.
Abstract: Many network applications, e.g., industrial control, demand Ultra-Low Latency (ULL). However, traditional packet networks can only reduce the end-to-end latencies to the order of tens of milliseconds. The IEEE 802.1 Time Sensitive Networking (TSN) standard and related research studies have sought to provide link layer support for ULL networking, while the emerging IETF Deterministic Networking (DetNet) standards seek to provide the complementary network layer ULL support. This article provides an up-to-date comprehensive survey of the IEEE TSN and IETF DetNet standards and the related research studies. The survey of these standards and research studies is organized according to the main categories of flow concept, flow synchronization, flow management, flow control, and flow integrity. ULL networking mechanisms play a critical role in the emerging fifth generation (5G) network access chain from wireless devices via access, backhaul, and core networks. We survey the studies that specifically target the support of ULL in 5G networks, with the main categories of fronthaul, backhaul, and network management. Throughout, we identify the pitfalls and limitations of the existing standards and research studies. This survey can thus serve as a basis for the development of standards enhancements and future ULL research studies that address the identified pitfalls and limitations.

123 citations

Journal ArticleDOI
TL;DR: Evaluated mean and maximum packet delays and packet losses of the TAS for a typical industrial control ring network for random (sporadic) and for periodic traffic indicate that TAS with proper configurations, e.g., accurate and precise gating schedules, generally achieves the specified latency bounds for both sporadic and periodic traffic.
Abstract: The IEEE 802.1 time sensitive networking working group has recently standardized the time aware shaper (TAS). The TAS provides deterministic latency guarantees but requires tight time synchronization in all network switches. This paper thoroughly evaluates the mean and maximum packet delays and packet losses of the TAS for a typical industrial control ring network for random (sporadic) and for periodic traffic. We propose and evaluate adaptive bandwidth sharing and adaptive slotted window mechanisms to make TAS adaptive to traffic fluctuations. This paper further evaluates the asynchronous traffic shaper (ATS), which has been proposed to provide low latency network service without the need for time synchronization in network nodes. Our evaluations indicate that TAS with proper configurations, e.g., accurate and precise gating schedules, generally achieves the specified latency bounds for both sporadic and periodic traffic. In contrast, ATS performs relatively well for sporadic traffic; but struggles for moderate to high loads of periodic traffic.

65 citations

Posted Content
20 Mar 2018
TL;DR: This survey will identify the pitfalls and limitations of existing TSN standards and serve as a basis for the development of TSN enhancements to address scenarios and problems that TSN currently cannot address in an adequate manner.
Abstract: Many network applications, e.g., industrial control, demand Ultra-Low Latency (ULL). However, traditional packet networks can only reduce the end-to-end latencies to the order of tens of milliseconds. Audio Video Bridging (AVB) standards and IEEE 802.1 Time Sensitive Networking (TSN) standards and related research studies have sought to provide network support for ULL applications. This article provides a comprehensive survey of the existing state-of-the-art techniques for enabling ULL communication across multiple network segments, such as access, backhaul, and core network segments. The purpose of the survey is to provide: i) introduction and tutorial content to understand the fundamentals of ULL communication, ii) identification and classification of the existing state-of-the-art ULL mechanisms, iii) identify the potential pitfalls and challenges, and iv) identify and present future research directions for ULL communication. In particular, we will identify the pitfalls and limitations of existing TSN standards. This survey can then serve as a basis for the development of TSN enhancements to address scenarios and problems that TSN currently cannot address in an adequate manner.

13 citations

Journal ArticleDOI
TL;DR: In this paper , the authors proposed an improved artificial bee colony algorithm to schedule the path planning of multiple mobile chargers, which can reduce the moving path length, total energy consumption and the number of starved nodes.
Abstract: With the development of wireless charging technology, the network lifetime of wireless sensor networks has the potential to be significantly extended. Although recent works have explored the use of mobile chargers to charge sensor nodes omnidirectionally, research on directional charging of mobile chargers is lacking. Considering the high efficiency of directional charging, this paper studies mobile charger scheduling using directional charging to achieve node energy replenishment. Initially, charging anchor points and subsets with the highest utility in the network are chosen, enabling a one-to-many directional energy supply. Subsequently, the improved artificial bee colony algorithm is employed to schedule the path planning of multiple mobile chargers. During the charging process, real-time request nodes may be inserted in the planned route, provided that charging time and battery capacity requirements are met. Simulation results demonstrate that the proposed algorithm has advantages over other methods, significantly reducing the moving path length, total energy consumption, and the number of starved nodes.

Cited by
More filters
Journal ArticleDOI
TL;DR: A unique taxonomy is provided, which sheds the light on IoT vulnerabilities, their attack vectors, impacts on numerous security objectives, attacks which exploit such vulnerabilities, corresponding remediation methodologies and currently offered operational cyber security capabilities to infer and monitor such weaknesses.
Abstract: The security issue impacting the Internet-of-Things (IoT) paradigm has recently attracted significant attention from the research community. To this end, several surveys were put forward addressing various IoT-centric topics, including intrusion detection systems, threat modeling, and emerging technologies. In contrast, in this paper, we exclusively focus on the ever-evolving IoT vulnerabilities. In this context, we initially provide a comprehensive classification of state-of-the-art surveys, which address various dimensions of the IoT paradigm. This aims at facilitating IoT research endeavors by amalgamating, comparing, and contrasting dispersed research contributions. Subsequently, we provide a unique taxonomy, which sheds the light on IoT vulnerabilities, their attack vectors, impacts on numerous security objectives, attacks which exploit such vulnerabilities, corresponding remediation methodologies and currently offered operational cyber security capabilities to infer and monitor such weaknesses. This aims at providing the reader with a multidimensional research perspective related to IoT vulnerabilities, including their technical details and consequences, which is postulated to be leveraged for remediation objectives. Additionally, motivated by the lack of empirical (and malicious) data related to the IoT paradigm, this paper also presents a first look on Internet-scale IoT exploitations by drawing upon more than 1.2 GB of macroscopic, passive measurements’ data. This aims at practically highlighting the severity of the IoT problem, while providing operational situational awareness capabilities, which undoubtedly would aid in the mitigation task, at large. Insightful findings, inferences and outcomes in addition to open challenges and research problems are also disclosed in this paper, which we hope would pave the way for future research endeavors addressing theoretical and empirical aspects related to the imperative topic of IoT security.

451 citations

Journal ArticleDOI
TL;DR: In this paper, the authors explore the emerging opportunities brought by 6G technologies in IoT networks and applications, by conducting a holistic survey on the convergence of 6G and IoT, and highlight interesting research challenges and point out potential directions to spur further research in this promising area.
Abstract: The sixth generation (6G) wireless communication networks are envisioned to revolutionize customer services and applications via the Internet of Things (IoT) towards a future of fully intelligent and autonomous systems. In this article, we explore the emerging opportunities brought by 6G technologies in IoT networks and applications, by conducting a holistic survey on the convergence of 6G and IoT. We first shed light on some of the most fundamental 6G technologies that are expected to empower future IoT networks, including edge intelligence, reconfigurable intelligent surfaces, space-air-ground-underwater communications, Terahertz communications, massive ultra-reliable and low-latency communications, and blockchain. Particularly, compared to the other related survey papers, we provide an in-depth discussion of the roles of 6G in a wide range of prospective IoT applications via five key domains, namely Healthcare Internet of Things, Vehicular Internet of Things and Autonomous Driving, Unmanned Aerial Vehicles, Satellite Internet of Things, and Industrial Internet of Things. Finally, we highlight interesting research challenges and point out potential directions to spur further research in this promising area.

305 citations

Journal ArticleDOI
TL;DR: This paper presents for the first time a comprehensive overview systematizing the different work directions for both research and industry, while providing a detailed description of each functional split option and an assessment of the advantages and disadvantages.
Abstract: Pacing the way toward 5G has lead researchers and industry in the direction of centralized processing known from Cloud-Radio Access Networks (C-RAN). In C-RAN research, a variety of different functional splits is presented by different names and focusing on different directions. The functional split determines how many base station functions to leave locally, close to the user, with the benefit of relaxing fronthaul network bitrate and delay requirements, and how many functions to centralize with the possibility of achieving greater processing benefits. This paper presents for the first time a comprehensive overview systematizing the different work directions for both research and industry, while providing a detailed description of each functional split option and an assessment of the advantages and disadvantages. This paper gives an overview of where the most effort has been directed in terms of functional splits, and where there is room for further studies. The standardization currently taking place is also considered and mapped into the research directions. It is investigated how the fronthaul network will be affected by the choice of functional split, both in terms of bitrates and latency, and as the different functional splits provide different advantages and disadvantages, the option of flexible functional splits is also looked into.

294 citations

Posted Content
TL;DR: This survey provides a holistic overview of MEC technology and its potential use cases and applications, and outlines up-to-date researches on the integration of M EC with the new technologies that will be deployed in 5G and beyond.
Abstract: Driven by the emergence of new compute-intensive applications and the vision of the Internet of Things (IoT), it is foreseen that the emerging 5G network will face an unprecedented increase in traffic volume and computation demands. However, end users mostly have limited storage capacities and finite processing capabilities, thus how to run compute-intensive applications on resource-constrained users has recently become a natural concern. Mobile edge computing (MEC), a key technology in the emerging fifth generation (5G) network, can optimize mobile resources by hosting compute-intensive applications, process large data before sending to the cloud, provide the cloud computing capabilities within the radio access network (RAN) in close proximity to mobile users, and offer context-aware services with the help of RAN information. Therefore, MEC enables a wide variety of applications, where the real-time response is strictly required, e.g., driverless vehicles, augmented reality, robotics, and immerse media. Indeed, the paradigm shift from 4G to 5G could become a reality with the advent of new technological concepts. The successful realization of MEC in the 5G network is still in its infancy and demands for constant efforts from both academic and industry communities. In this survey, we first provide a holistic overview of MEC technology and its potential use cases and applications. Then, we outline up-to-date researches on the integration of MEC with the new technologies that will be deployed in 5G and beyond. We also summarize testbeds and experimental evaluations, and open source activities, for edge computing. We further summarize lessons learned from state-of-the-art research works as well as discuss challenges and potential future directions for MEC research.

279 citations

Journal ArticleDOI
15 May 2019
TL;DR: This paper provides an account of the state of the art of classical fieldbuses, real-time Ethernet networks, and industrial wireless networks, along with their most relevant features, applications, and performance figures, and introduces the complex standardization framework.
Abstract: Industrial communication systems represent one of the most important innovations of the last decades in the context of factory and process automation systems. They are networks specifically designed to cope with the tight requirements of these challenging application fields such as real time, determinism, and reliability. Moreover, industrial networks are often deployed in environments characterized by strong electromagnetic interference, mechanical stress, critical temperature, and humidity. Over the last three decades, different classes of industrial networks have been developed according to changing requirements and available communication and information technologies. In this paper, we first provide an account of the state of the art, reviewing classical fieldbuses, real-time Ethernet networks, and industrial wireless networks, along with their most relevant features, applications, and performance figures. We introduce the complex standardization framework and analyze the market status and assumptions for future development. In the second part, we address the future perspectives focusing on new technologies, standards, and fields of application. In particular, we consider the time-sensitive networking (TSN) family of standards, Industrial Internet-of-Things (IIoT) systems, high-performance wireless LANs, industrial applications of cellular networks, and Ethernet networks for automotive communication.

227 citations