scispace - formally typeset
Search or ask a question

Showing papers in "arXiv: Networking and Internet Architecture in 2021"


Posted Content
TL;DR: In this paper, the authors provide a comprehensive survey on existing and emerging communication solutions for serving IoT applications in the context of cellular, wide-area, as well as non-terrestrial networks.
Abstract: The next wave of wireless technologies is proliferating in connecting things among themselves as well as to humans. In the era of the Internet of things (IoT), billions of sensors, machines, vehicles, drones, and robots will be connected, making the world around us smarter. The IoT will encompass devices that must wirelessly communicate a diverse set of data gathered from the environment for myriad new applications. The ultimate goal is to extract insights from this data and develop solutions that improve quality of life and generate new revenue. Providing large-scale, long-lasting, reliable, and near real-time connectivity is the major challenge in enabling a smart connected world. This paper provides a comprehensive survey on existing and emerging communication solutions for serving IoT applications in the context of cellular, wide-area, as well as non-terrestrial networks. Specifically, wireless technology enhancements for providing IoT access in fifth-generation (5G) and beyond cellular networks, and communication networks over the unlicensed spectrum are presented. Aligned with the main key performance indicators of 5G and beyond 5G networks, we investigate solutions and standards that enable energy efficiency, reliability, low latency, and scalability (connection density) of current and future IoT networks. The solutions include grant-free access and channel coding for short-packet communications, non-orthogonal multiple access, and on-device intelligence. Further, a vision of new paradigm shifts in communication networks in the 2030s is provided, and the integration of the associated new technologies like artificial intelligence, non-terrestrial networks, and new spectra is elaborated. Finally, future research directions toward beyond 5G IoT networks are pointed out.

69 citations


Posted Content
TL;DR: In this paper, the authors present the key design requirements for enabling 6G through the use of a digital twin, and the architectural components and trends such as edge-based twins, cloud-based-twins, and edge-cloud-based twin are presented.
Abstract: Internet of Everything (IoE) applications such as haptics, human-computer interaction, and extended reality, using the sixth-generation (6G) of wireless systems have diverse requirements in terms of latency, reliability, data rate, and user-defined performance metrics. Therefore, enabling IoE applications over 6G requires a new framework that can be used to manage, operate, and optimize the 6G wireless system and its underlying IoE services. Such a new framework for 6G can be based on digital twins. Digital twins use a virtual representation of the 6G physical system along with the associated algorithms (e.g., machine learning, optimization), communication technologies (e.g., millimeter-wave and terahertz communication), computing systems (e.g., edge computing and cloud computing), as well as privacy and security-related technologists (e.g., blockchain). First, we present the key design requirements for enabling 6G through the use of a digital twin. Next, the architectural components and trends such as edge-based twins, cloud-based-twins, and edge-cloud-based twins are presented. Furthermore, we provide a comparative description of various twins. Finally, we outline and recommend guidelines for several future research directions.

64 citations


Journal ArticleDOI
TL;DR: In this article, the authors summarized the most important aspects of NR-V2X, which is standardized by 3GPP, focusing on sidelink communication, and the main part of this work belongs to the 3-GPP Rel-16.
Abstract: The 5G mobile network brings several new features that can be applied to existing and new applications. High reliability, low latency, and high data rate are some of the features which fulfill the requirements of vehicular networks. Vehicular networks aim to provide safety for road users and several additional advantages such as enhanced traffic efficiency and in-vehicle infotainment services. This paper summarizes the most important aspects of NR-V2X, which is standardized by 3GPP, focusing on sidelink communication. The main part of this work belongs to the 3GPP Rel-16, which is the first 3GPP release for NR-V2X, and the work/study items of the future Rel-17

62 citations


Book ChapterDOI
TL;DR: The how edge and fog computing are poised to bring about a turnaround in several industrial applications through a use-case approach is highlighted and some research directions that should be followed are suggested to solve the current issues and challenges faced by these paradigms in IIoT.
Abstract: With rapid technological advancements within the domain of Internet of Things (IoT), strong trends have emerged which indicate rapid growth in the number of smart devices connected to IoT networks and this growth cannot be supported by traditional cloud computing platforms. In response to the high volume of data being transferred over these networks, the edge and fog computing paradigms have emerged. These paradigms are extremely viable frameworks that shift computational and storage resources from the centralized cloud servers to distributed LAN resources and powerful embedded devices at the edge of the network. These computing paradigms, therefore, have the potential to support massive IoT networks of the future and have fueled the advancement of IoT systems within industrial settings, leading to the creation of the Industrial Internet of Things (IIoT). IIoT is revolutionizing industrial processes in a variety of domains. In this chapter, we elaborate on the impact and viability of edge and fog computing paradigms in IIoT through a use-case approach. Finally, we conclude with the future research directions like security and privacy for edge and fog computing in IIoT, relevance of Blockchain for IIoT, programmability and task partitioning, virtualization, etc.

61 citations


Journal ArticleDOI
TL;DR: In this article, a joint optimization of transmission time and bandwidth allocation, power control, and UAV placement is proposed to maximize the UAV transmit power efficiency, via a joint optimisation of transmission times, bandwidth allocation and power control.
Abstract: Federated learning (FL), invented by Google in 2016, has become a hot research trend. However, enabling FL in wireless networks has to overcome the limited battery challenge of mobile users. In this regard, we propose to apply unmanned aerial vehicle (UAV)-empowered wireless power transfer to enable sustainable FL-based wireless networks. The objective is to maximize the UAV transmit power efficiency, via a joint optimization of transmission time and bandwidth allocation, power control, and the UAV placement. Directly solving the formulated problem is challenging, due to the coupling of variables. Hence, we leverage the decomposition technique and a successive convex approximation approach to develop an efficient algorithm, namely UAV for sustainable FL (UAV-SFL). Finally, simulations illustrate the potential of our proposed UAV-SFL approach in providing a sustainable solution for FL-based wireless networks, and in reducing the UAV transmit power by 32.95%, 63.18%, and 78.81% compared with the benchmarks.

59 citations


Posted Content
TL;DR: A recent survey of graph-based deep learning methods for communication networks is presented in this article. But the focus of this survey is not on the application of deep learning in communication networks.
Abstract: Communication networks are important infrastructures in contemporary society. There are still many challenges that are not fully solved and new solutions are proposed continuously in this active research area. In recent years, to model the network topology, graph-based deep learning has achieved state-of-the-art performance in a series of problems in communication networks. In this survey, we review the rapidly growing body of research using different graph-based deep learning models, e.g. graph convolutional and graph attention networks, in various problems from different communication networks, e.g. wireless networks, wired networks, and software-defined networks. We also present a well-organized list of the problem and solution for each study and identify future research directions. To the best of our knowledge, this paper is the first survey that focuses on the application of graph-based deep learning methods in communication networks. To track the follow-up research, a public GitHub repository is created, where the relevant papers will be updated continuously.

50 citations


Posted Content
TL;DR: In this paper, a review of AI-enabled routing protocols designed primarily for aerial networks, with an emphasis on accommodating highly-dynamic network topology, is presented, including topology-predictive and self-adaptive learning-based routing algorithms.
Abstract: Unmanned Aerial Vehicles (UAVs), as a recently emerging technology, enabled a new breed of unprecedented applications in different domains. This technology's ongoing trend is departing from large remotely-controlled drones to networks of small autonomous drones to collectively complete intricate tasks time and cost-effectively. An important challenge is developing efficient sensing, communication, and control algorithms that can accommodate the requirements of highly dynamic UAV networks with heterogeneous mobility levels. Recently, the use of Artificial Intelligence (AI) in learning-based networking has gained momentum to harness the learning power of cognizant nodes to make more intelligent networking decisions. An important example of this trend is developing learning-powered routing protocols, where machine learning methods are used to model and predict topology evolution, channel status, traffic mobility, and environmental factors for enhanced routing. This paper reviews AI-enabled routing protocols designed primarily for aerial networks, with an emphasis on accommodating highly-dynamic network topology. To this end, we review the basics of UAV technology, different approaches to swarm formation, and commonly-used mobility models, along with their impact on networking paradigms. We proceed with reviewing conventional and AI-enabled routing protocols, including topology-predictive and self-adaptive learning-based routing algorithms. We also discuss tools, simulation environments, remote experimentation platforms, and public datasets that can be used for developing and testing AI-enabled networking protocols for UAV networks. We conclude by presenting future trends, and the remaining challenges in AI-based UAV Networking, for different aspects of routing, connectivity, topology control, security and privacy, energy efficiency, and spectrum sharing.

46 citations


Book ChapterDOI
TL;DR: An overview of use cases and a primer on satellite communications are provided to identify key technical challenges faced by 5G NR evolution for satellite communications and give some preliminary ideas for how to overcome them.
Abstract: The 3rd Generation Partnership Project (3GPP) completed the first global fifth-generation (5G) system standard in its Release 15, paving the way for making 5G a commercial reality. So, what is next in 5G system evolution to further expand the 3GPP ecosystem? Enabling 5G system to support satellite communications is one direction under exploration in 3GPP. There has been a resurgence of interest in providing connectivity from space, stimulated by technology advancement and demand for ubiquitous connectivity services. The ongoing evolution of 5G standards provides a unique opportunity to revisit satellite communications. In this chapter, we focus on the 5G radio access network known as the new radio (NR) and study how to adapt the NR air interface for satellite links. We first provide an overview of use cases and a primer on satellite communications. We then identify key technical challenges faced by NR evolution for satellite communications and propose solutions to overcome them.

41 citations


Journal ArticleDOI
TL;DR: In this paper, an end-to-end Deep Reinforcement Learning (DRL) approach was proposed to select the best edge server for offloading and allocate the optimal computational resource such that the expected long-term utility is maximized.
Abstract: Internet of Things (IoT) is considered as the enabling platform for a variety of promising applications, such as smart transportation and smart city, where massive devices are interconnected for data collection and processing. These IoT applications pose a high demand on storage and computing capacity, while the IoT devices are usually resource-constrained. As a potential solution, mobile edge computing (MEC) deploys cloud resources in the proximity of IoT devices so that their requests can be better served locally. In this work, we investigate computation offloading in a dynamic MEC system with multiple edge servers, where computational tasks with various requirements are dynamically generated by IoT devices and offloaded to MEC servers in a time-varying operating environment (e.g., channel condition changes over time). The objective of this work is to maximize the completed tasks before their respective deadlines and minimize energy consumption. To this end, we propose an end-to-end Deep Reinforcement Learning (DRL) approach to select the best edge server for offloading and allocate the optimal computational resource such that the expected long-term utility is maximized. The simulation results are provided to demonstrate that the proposed approach outperforms the existing methods.

38 citations


Posted Content
TL;DR: In this paper, the authors present a roadmap to make RIS industrially feasible by analyzing the challenges to commercialize RIS and how RIS can be standardized. And they also provide some light on RIS from an industrial viewpoint and provide a clear roadmap.
Abstract: With both the standardization and commercialization completed in an unforeseen pace for the 5th generation (5G) wireless network, researchers, engineers and executives from the academia and the industry have turned their sights on candidate technologies to support the next generation wireless networks. Reconfigurable intelligent surfaces (RIS), sometimes referred to as intelligent reflecting surfaces (IRS), have been identified to be potential components of the future wireless networks because they can reconfigure the propagation environment for wireless signals with low-cost passive devices. In doing so, the coverage of a cell can be expected to increase significantly as well as the overall throughput of the network. RIS has not only become an attractive research area but also triggered a couple of projects to develop appropriate solutions to enable the set-up of hardware demonstrations and prototypes. In parallel, technical discussions and activities towards standardization already took off in some regions. Promoting RIS to be integrated into future commercial networks and become a commercial success requires significant standardization work taken place both at regional level standards developing organizations (SDO) and international SDOs such as the 3rd Generation Partnership Project (3GPP). While many research papers study how RIS can be used and optimized, few effort is devoted to analyzing the challenges to commercialize RIS and how RIS can be standardized. This paper intends to shed some light on RIS from an industrial viewpoint and provide a clear roadmap to make RIS industrially feasible.

37 citations


Posted Content
TL;DR: In this article, the authors provide a thorough overview on integrating federated learning (FL) with industrial IoT in terms of privacy, resource and data management, and discuss the potential of using machine learning, deep learning and blockchain techniques for FL in secure industrial IoT.
Abstract: Industrial Internet of Things (IIoT) lays a new paradigm for the concept of Industry 4.0 and paves an insight for new industrial era. Nowadays smart machines and smart factories use machine learning/deep learning based models for incurring intelligence. However, storing and communicating the data to the cloud and end device leads to issues in preserving privacy. In order to address this issue, federated learning (FL) technology is implemented in IIoT by the researchers nowadays to provide safe, accurate, robust and unbiased models. Integrating FL in IIoT ensures that no local sensitive data is exchanged, as the distribution of learning models over the edge devices has become more common with FL. Therefore, only the encrypted notifications and parameters are communicated to the central server. In this paper, we provide a thorough overview on integrating FL with IIoT in terms of privacy, resource and data management. The survey starts by articulating IIoT characteristics and fundamentals of distributive and FL. The motivation behind integrating IIoT and FL for achieving data privacy preservation and on-device learning are summarized. Then we discuss the potential of using machine learning, deep learning and blockchain techniques for FL in secure IIoT. Further we analyze and summarize the ways to handle the heterogeneous and huge data. Comprehensive background on data and resource management are then presented, followed by applications of IIoT with FL in healthcare and automobile industry. Finally, we shed light on challenges, some possible solutions and potential directions for future research.

Journal ArticleDOI
TL;DR: In this paper, the authors survey the state-of-the-art research in utilizing machine learning techniques in improving the performance of wireless networks and identify challenges and open issues to provide a roadmap for the researchers.
Abstract: A plethora of demanding services and use cases mandate a revolutionary shift in the management of future wireless network resources. Indeed, when tight quality of service demands of applications are combined with increased complexity of the network, legacy network management routines will become unfeasible in 6G. Artificial Intelligence (AI) is emerging as a fundamental enabler to orchestrate the network resources from bottom to top. AI-enabled radio access and AI-enabled core will open up new opportunities for automated configuration of 6G. On the other hand, there are many challenges in AI-enabled networks that need to be addressed. Long convergence time, memory complexity, and complex behaviour of machine learning algorithms under uncertainty as well as highly dynamic channel, traffic and mobility conditions of the network contribute to the challenges. In this paper, we survey the state-of-art research in utilizing machine learning techniques in improving the performance of wireless networks. In addition, we identify challenges and open issues to provide a roadmap for the researchers.

Posted Content
TL;DR: In this paper, the authors present the main considerations for green Internet of Vehicles (IoV) from five different scenarios, including communication, computation, traffic, electric vehicles (EVs), and energy harvesting management.
Abstract: As one of the most promising applications in future Internet of Things, Internet of Vehicles (IoV) has been acknowledged as a fundamental technology for developing the Intelligent Transportation Systems in smart cities. With the emergence of the sixth generation (6G) communications technologies, massive network infrastructures will be densely deployed and the number of network nodes will increase exponentially, leading to extremely high energy consumption. There has been an upsurge of interest to develop the green IoV towards sustainable vehicular communication and networking in the 6G era. In this paper, we present the main considerations for green IoV from five different scenarios, including the communication, computation, traffic, Electric Vehicles (EVs), and energy harvesting management. The literatures relevant to each of the scenarios are compared from the perspective of energy optimization (e.g., with respect to resource allocation, workload scheduling, routing design, traffic control, charging management, energy harvesting and sharing, etc.) and the related factors affecting energy efficiency (e.g., resource limitation, channel state, network topology, traffic condition, etc.). In addition, we introduce the potential challenges and the emerging technologies in 6G for developing green IoV systems. Finally, we discuss the research trends in designing energy-efficient IoV systems.

Journal ArticleDOI
Shunpu Tang1, Wenqi Zhou1, Lunyuan Chen1, Lijia Lai1, Junjuan Xia1, Liseng Fan1 
TL;DR: In this paper, a federated edge learning (FEEL) framework was proposed to optimize the UAV-enabled Internet of things (IoT) for B5G/6G networks, from a deep reinforcement learning (DRL) approach.
Abstract: In this paper, we study how to optimize the federated edge learning (FEEL) in UAV-enabled Internet of things (IoT) for B5G/6G networks, from a deep reinforcement learning (DRL) approach. The federated learning is an effective framework to train a shared model between decentralized edge devices or servers without exchanging raw data, which can help protect data privacy. In UAV-enabled IoT networks, latency and energy consumption are two important metrics limiting the performance of FEEL. Although most of existing works have studied how to reduce the latency and improve the energy efficiency, few works have investigated the impact of limited batteries at the devices on the FEEL. Motivated by this, we study the battery-constrained FEEL, where the UAVs can adjust their operating CPU-frequency to prolong the battery life and avoid withdrawing from federated learning training untimely. We optimize the system by jointly allocating the computational resource and wireless bandwidth in time-varying environments. To solve this optimization problem, we employ a deep deterministic policy gradient (DDPG) based strategy, where a linear combination of latency and energy consumption is used to evaluate the system cost. Simulation results are finally demonstrated to show that the proposed strategy outperforms the conventional ones. In particular, it enables all the devices to complete all rounds of FEEL with limited batteries and meanwhile reduce the system cost effectively.

Journal ArticleDOI
TL;DR: In this article, the authors propose a framework for efficient dispatching of stateless tasks to in-network executors so as to minimize the response times while exhibiting short and long-term fairness, also leveraging information from a virtualized network infrastructure when available.
Abstract: Serverless computing is becoming widely adopted among cloud providers, thus making increasingly popular the Function-as-a-Service (FaaS) programming model, where the developers realize services by packaging sequences of stateless function calls. The current technologies are very well suited to data centers, but cannot provide equally good performance in decentralized environments, such as edge computing systems, which are expected to be typical for Internet of Things (IoT) applications. In this paper, we fill this gap by proposing a framework for efficient dispatching of stateless tasks to in-network executors so as to minimize the response times while exhibiting short- and long-term fairness, also leveraging information from a virtualized network infrastructure when available. Our solution is shown to be simple enough to be installed on devices with limited computational capabilities, such as IoT gateways, especially when using a hierarchical forwarding extension. We evaluate the proposed platform by means of extensive emulation experiments with a prototype implementation in realistic conditions. The results show that it is able to smoothly adapt to the mobility of clients and to the variations of their service request patterns, while coping promptly with network congestion.

Posted Content
TL;DR: In this article, a comprehensive survey of the evolution of non-terrestrial networks (NTNs) highlighting its relevance to 5G networks and how it will play a pivotal role in the development of 6G and beyond wireless networks is presented.
Abstract: Non-terrestrial networks (NTNs) traditionally had certain limited applications. However, the recent technological advancements opened up myriad applications of NTNs for 5G and beyond networks, especially when integrated into terrestrial networks (TNs). This article comprehensively surveys the evolution of NTNs highlighting its relevance to 5G networks and essentially, how it will play a pivotal role in the development of 6G and beyond wireless networks. The survey discusses important features of NTNs integration into TNs by delving into the new range of services and use cases, various architectures, and new approaches being adopted to develop a new wireless ecosystem. Our survey includes the major progresses and outcomes from academic research as well as industrial efforts. We first start with introducing the relevant 5G use cases and general integration challenges such as handover and deployment difficulties. Then, we review the NTNs operations in mmWave and their potential for the internet of things (IoT). Further, we discuss the significance of mobile edge computing (MEC) and machine learning (ML) in NTNs by reviewing the relevant research works. Furthermore, we also discuss the corresponding higher layer advancements and relevant field trials/prototyping at both academic and industrial levels. Finally, we identify and review 6G and beyond application scenarios, novel architectures, technological enablers, and higher layer aspects pertinent to NTNs integration.

Posted Content
TL;DR: In this article, the authors provide an overview of state of the art in LEO satellite access, including the evolution of low Earth orbit satellite constellations and capabilities, critical technical challenges and solutions, standardization aspects from 5G evolution to 6G, and business considerations.
Abstract: Offering space-based Internet services with mega-constellations of low Earth orbit (LEO) satellites is a promising solution to connecting the unconnected. It can complement the coverage of terrestrial networks to help bridge the digital divide. However, there are challenges from operational obstacles to technical hurdles facing the development of LEO satellite access. This article provides an overview of state of the art in LEO satellite access, including the evolution of LEO satellite constellations and capabilities, critical technical challenges and solutions, standardization aspects from 5G evolution to 6G, and business considerations. We also identify several areas for future exploration to realize a tight integration of LEO satellite access with terrestrial networks in 6G.

ReportDOI
TL;DR: In this article, the authors focus on the network and computing aspects of the NVIDIA BlueField-2 SmartNIC when used in an Ethernet environment, and show that while the Bluefield-2 provides a flexible means of processing data at the network's edge, great care must be taken to not overwhelm the hardware.
Abstract: High-performance computing (HPC) researchers have long envisioned scenarios where application workflows could be improved through the use of programmable processing elements embedded in the network fabric. Recently, vendors have introduced programmable Smart Network Interface Cards (SmartNICs) that enable computations to be offloaded to the edge of the network. There is great interest in both the HPC and high-performance data analytics communities in understanding the roles these devices may play in the data paths of upcoming systems. This paper focuses on characterizing both the networking and computing aspects of NVIDIA's new BlueField-2 SmartNIC when used in an Ethernet environment. For the networking evaluation we conducted multiple transfer experiments between processors located at the host, the SmartNIC, and a remote host. These tests illuminate how much processing headroom is available on the SmartNIC during transfers. For the computing evaluation we used the stress-ng benchmark to compare the BlueField-2 to other servers and place realistic bounds on the types of offload operations that are appropriate for the hardware. Our findings from this work indicate that while the BlueField-2 provides a flexible means of processing data at the network's edge, great care must be taken to not overwhelm the hardware. While the host can easily saturate the network link, the SmartNIC's embedded processors may not have enough computing resources to sustain more than half the expected bandwidth when using kernel-space packet processing. From a computational perspective, encryption operations, memory operations under contention, and on-card IPC operations on the SmartNIC perform significantly better than the general-purpose servers used for comparisons in our experiments. Therefore, applications that mainly focus on these operations may be good candidates for offloading to the SmartNIC.

Proceedings ArticleDOI
TL;DR: Lucid as mentioned in this paper is a language for data plane applications with interleaved packet-handling and control logic, which makes it easy to write sophisticated data-plane applications with Interleaved Packet Handling and Control Logic.
Abstract: Programmable switch hardware makes it possible to move fine-grained control logic inside the network data plane, improving performance for a wide range of applications. However, applications with integrated control are inherently hard to write in existing data-plane programming languages such as P4. This paper presents Lucid, a language that raises the level of abstraction for putting control functionality in the data plane. Lucid introduces abstractions that make it easy to write sophisticated data-plane applications with interleaved packet-handling and control logic, specialized type and syntax systems that prevent programmer bugs related to data-plane state, and an open-sourced compiler that translates Lucid programs into P4 optimized for the Intel Tofino. These features make Lucid general and easy to use, as we demonstrate by writing a suite of ten different data-plane applications in Lucid. Working prototypes take well under an hour to write, even for a programmer without prior Tofino experience, have around 10x fewer lines of code compared to P4, and compile efficiently to real hardware. In a stateful firewall written in Lucid, we find that moving control from a switch's CPU to its data-plane processor using Lucid reduces the latency of performance-sensitive operations by over 300X.

Posted Content
TL;DR: In this article, an artificial intelligence (AI)-native network slicing architecture for 6G networks is proposed to facilitate intelligent network management and support emerging AI services, where AI solutions are investigated for the entire lifecycle of network slicing, i.e., AI for slicing.
Abstract: With the global roll-out of the fifth generation (5G) networks, it is necessary to look beyond 5G and envision the sixth generation (6G) networks. The 6G networks are expected to have space-air-ground integrated networking, advanced network virtualization, and ubiquitous intelligence. This article proposes an artificial intelligence (AI)-native network slicing architecture for 6G networks to facilitate intelligent network management and support emerging AI services. AI is built in the proposed network slicing architecture to enable the synergy of AI and network slicing. AI solutions are investigated for the entire lifecycle of network slicing to facilitate intelligent network management, i.e., AI for slicing. Furthermore, network slicing approaches are discussed to support emerging AI services by constructing slice instances and performing efficient resource management, i.e., slicing for AI. Finally, a case study is presented, followed by a discussion of open research issues that are essential for AI-native network slicing in 6G.

Posted Content
TL;DR: This paper proposes a new problem of handoff prediction between 4G and 5G, which is important for low-latency applications like self-driving strategy in realistic 5G scenarios and develops classification and regression based prediction models, which achieve more than 80% accuracy in predicting 4G & 5G handoffs in a recent 5G dataset.
Abstract: Mobile apps are increasingly relying on high-throughput and low-latency content delivery, while the available bandwidth on wireless access links is inherently time-varying. The handoffs between base stations and access modes due to user mobility present additional challenges to deliver a high level of user Quality-of-Experience (QoE). The ability to predict the available bandwidth and the upcoming handoffs will give applications valuable leeway to make proactive adjustments to avoid significant QoE degradation. In this paper, we explore the possibility and accuracy of realtime mobile bandwidth and handoff predictions in 4G/LTE and 5G networks. Towards this goal, we collect long consecutive traces with rich bandwidth, channel, and context information from public transportation systems. We develop Recurrent Neural Network models to mine the temporal patterns of bandwidth evolution in fixed-route mobility scenarios. Our models consistently outperform the conventional univariate and multivariate bandwidth prediction models. For 4G \& 5G co-existing networks, we propose a new problem of handoff prediction between 4G and 5G, which is important for low-latency applications like self-driving strategy in realistic 5G scenarios. We develop classification and regression based prediction models, which achieve more than 80\% accuracy in predicting 4G and 5G handoffs in a recent 5G dataset.

Journal ArticleDOI
TL;DR: In this paper, a joint optimization problem in the MEC-assisted V2I networks and a multi-objective optimization scheme to solve the problem through adjusting the minimum contention window under the IEEE 802.11 DCF mode according to the velocities of vehicles.
Abstract: Platooning strategy is an important part of autonomous driving technology. Due to the limited resource of autonomous vehicles in platoons, mobile edge computing (MEC) is usually used to assist vehicles in platoons to obtain useful information, increasing its safety. Specifically, vehicles usually adopt the IEEE 802.11 distributed coordination function (DCF) mechanism to transmit large amount of data to the base station (BS) through vehicle-to-infrastructure (V2I) communications, where the useful information can be extracted by the edge server connected to the BS and then sent back to the vehicles to make correct decisions in time. However, vehicles may be moving on different lanes with different velocities, which incurs the unfair access due to the characteristics of platoons, i.e., vehicles on different lanes transmit different amount of data to the BS when they pass through the coverage of the BS, which also results in the different amount of useful information received by various vehicles. Moreover, age of information (AoI) is an important performance metric to measure the freshness of the data. Large average age of data implies not receiving the useful information in time. It is necessary to design an access scheme to jointly optimize the fairness and data freshness. In this paper, we formulate a joint optimization problem in the MEC-assisted V2I networks and present a multi-objective optimization scheme to solve the problem through adjusting the minimum contention window under the IEEE 802.11 DCF mode according to the velocities of vehicles. The effectiveness of the scheme has been demonstrated by simulation.

Posted Content
TL;DR: The IEEE 802.11bf Task Group (TGbf) as mentioned in this paper is defining the appropriate modifications to existing Wi-Fi standards to enhance sensing capabilities through IEEE802.11-compliant waveforms.
Abstract: Wi-Fi is among the most successful wireless technologies ever invented. As Wi-Fi becomes more and more present in public and private spaces, it becomes natural to leverage its ubiquitousness to implement groundbreaking wireless sensing applications such as human presence detection, activity recognition, and object tracking, just to name a few. This paper reports ongoing efforts by the IEEE 802.11bf Task Group (TGbf), which is defining the appropriate modifications to existing Wi-Fi standards to enhance sensing capabilities through 802.11-compliant waveforms. We summarize objectives and timeline of TGbf, and discuss some of the most interesting proposed technical features discussed so far. We also introduce a roadmap of research challenges pertaining to Wi-Fi sensing and its integration with future Wi-Fi technologies and emerging spectrum bands, hoping to elicit further activities by both the research community and TGbf.

Journal ArticleDOI
TL;DR: In this paper, a deep Q-network (DQN) is conceived for capturing the relationship between the optimal routing decision and the local geographic information observed by the forwarding node, and the DQN is trained in an offline manner based on historical flight data and then stored by each airplane for assisting their routing decisions during flight.
Abstract: Data packet routing in aeronautical ad-hoc networks (AANETs) is challenging due to their high-dynamic topology. In this paper, we invoke deep reinforcement learning for routing in AANETs aiming at minimizing the end-to-end (E2E) delay. Specifically, a deep Q-network (DQN) is conceived for capturing the relationship between the optimal routing decision and the local geographic information observed by the forwarding node. The DQN is trained in an offline manner based on historical flight data and then stored by each airplane for assisting their routing decisions during flight. To boost the learning efficiency and the online adaptability of the proposed DQN-routing, we further exploit the knowledge concerning the system's dynamics by using a deep value network (DVN) conceived with a feedback mechanism. Our simulation results show that both DQN-routing and DVN-routing achieve lower E2E delay than the benchmark protocol, and DVN-routing performs similarly to the optimal routing that relies on perfect global information.

Journal ArticleDOI
TL;DR: In this paper, the authors proposed an approach based on multi-connectivity in 5G networks to tackle this problem and their proposed approach is resilient against failures due to software bugs, misconfiguration, overloading, hardware faults, cyber attacks, power outage, and natural/manmade disaster.
Abstract: Network slicing (NS) and multi-access edge computing (MEC) are new paradigms which play key roles in 5G and beyond networks. NS allows network operators (NOs) to divide the available network resources into multiple logical NSs for providing dedicated virtual networks tailored to the specific service/business requirements. MEC enables NOs to provide diverse ultra-low latency services for supporting the needs of different industry verticals by moving computing facilities to the network edge. NS can be constructed by instantiating a set of virtual network functions (VNFs) on top of MEC cloud servers for provisioning diverse latency-sensitive communication services (e.g., autonomous driving and augmented reality) on demand at a lesser cost and time. However, VNFs, MEC cloud servers, and communication links are subject to failures due to software bugs, misconfiguration, overloading, hardware faults, cyber attacks, power outage, and natural/man-made disaster. Failure of a critical network component disrupts services abruptly and leads to users' dissatisfaction, which may result in revenue loss for the NOs. In this paper, we present a novel approach based on multi-connectivity in 5G networks to tackle this problem and our proposed approach is resilient against i) failure of VNFs, ii) failure of local servers within MEC, iii) failure of communication links, and iv) failure of an entire MEC cloud facility in regional level. To this end, we formulate the problem as a binary integer programming (BIP) model in order to optimally deploy NSs with the minimum cost, and prove it is NP-hard. To overcome time complexity, we propose an efficient genetic algorithm based heuristic to obtain near-optimal solution in polynomial time. By extensive simulations, we show that our proposed approach not only reduces resource wastage, but also improves throughput while providing high resiliency against failures.

Posted Content
TL;DR: In this article, a decentralized deep reinforcement learning (DRL) framework was proposed to formulate the power allocation optimization problem in the MIMO-NOMA VEC, where the local observations were selected as the state.
Abstract: Vehicular edge computing (VEC) is envisioned as a promising approach to process the explosive computation tasks of vehicular user (VU). In the VEC system, each VU allocates power to process partial tasks through offloading and the remaining tasks through local execution. During the offloading, each VU adopts the multi-input multi-out and non-orthogonal multiple access (MIMO-NOMA) channel to improve the channel spectrum efficiency and capacity. However, the channel condition is uncertain due to the channel interference among VUs caused by the MIMO-NOMA channel and the time-varying path-loss caused by the mobility of each VU. In addition, the task arrival of each VU is stochastic in the real world. The stochastic task arrival and uncertain channel condition affect greatly on the power consumption and latency of tasks for each VU. It is critical to design an optimal power allocation scheme considering the stochastic task arrival and channel variation to optimize the long-term reward including the power consumption and latency in the MIMO-NOMA VEC. Different from the traditional centralized deep reinforcement learning (DRL)-based scheme, this paper constructs a decentralized DRL framework to formulate the power allocation optimization problem, where the local observations are selected as the state. The deep deterministic policy gradient (DDPG) algorithm is adopted to learn the optimal power allocation scheme based on the decentralized DRL framework. Simulation results demonstrate that our proposed power allocation scheme outperforms the existing schemes.

Journal ArticleDOI
TL;DR: In this article, a threshold-based volumetric DDoS detection can be performed directly in programmable switches to skim only potentially hazardous traffic, to be analyzed in depth at the controller.
Abstract: Volumetric distributed Denial-of-Service (DDoS) attacks have become one of the most significant threats to modern telecommunication networks. However, most existing defense systems require that detection software operates from a centralized monitoring collector, leading to increased traffic load and delayed response. The recent advent of Data Plane Programmability (DPP) enables an alternative solution: threshold-based volumetric DDoS detection can be performed directly in programmable switches to skim only potentially hazardous traffic, to be analyzed in depth at the controller. In this paper, we first introduce the BACON data structure based on sketches, to estimate per-destination flow cardinality, and theoretically analyze it. Then we employ it in a simple in-network DDoS victim identification strategy, INDDoS, to detect the destination IPs for which the number of incoming connections exceeds a pre-defined threshold. We describe its hardware implementation on a Tofino-based programmable switch using the domain-specific P4 language, proving that some limitations imposed by real hardware to safeguard processing speed can be overcome to implement relatively complex packet manipulations. Finally, we present some experimental performance measurements, showing that our programmable switch is able to keep processing packets at line-rate while performing volumetric DDoS detection, and also achieves a high F1 score on DDoS victim identification.

Posted Content
TL;DR: Colosseum as discussed by the authors is an open-access and publicly-available large-scale wireless testbed for experimental research via virtualized and softwarized waveforms and protocol stacks on a fully programmable, "white-box" platform.
Abstract: Colosseum is an open-access and publicly-available large-scale wireless testbed for experimental research via virtualized and softwarized waveforms and protocol stacks on a fully programmable, "white-box" platform. Through 256 state-of-the-art Software-defined Radios and a Massive Channel Emulator core, Colosseum can model virtually any scenario, enabling the design, development and testing of solutions at scale in a variety of deployments and channel conditions. These Colosseum radio-frequency scenarios are reproduced through high-fidelity FPGA-based emulation with finite-impulse response filters. Filters model the taps of desired wireless channels and apply them to the signals generated by the radio nodes, faithfully mimicking the conditions of real-world wireless environments. In this paper we describe the architecture of Colosseum and its experimentation and emulation capabilities. We then demonstrate the effectiveness of Colosseum for experimental research at scale through exemplary use cases including prevailing wireless technologies (e.g., cellular and Wi-Fi) in spectrum sharing and unmanned aerial vehicle scenarios. A roadmap for Colosseum future updates concludes the paper.

Posted Content
TL;DR: In this article, a new network intrusion detection system (NIDS) based on Graph Neural Networks (GNNs) is proposed, which can capture both the edge features of a graph as well as the topological information for network anomaly detection in IoT networks.
Abstract: This paper presents a new Network Intrusion Detection System (NIDS) based on Graph Neural Networks (GNNs). GNNs are a relatively new sub-field of deep neural networks, which can leverage the inherent structure of graph-based data. Training and evaluation data for NIDSs are typically represented as flow records, which can naturally be represented in a graph format. This establishes the potential and motivation for exploring GNNs for network intrusion detection, which is the focus of this paper. Current studies on machine learning-based NIDSs only consider the network flows independently rather than taking their interconnected patterns into consideration. This is the key limitation in the detection of sophisticated IoT network attacks such as DDoS and distributed port scan attacks launched by IoT devices. In this paper, we propose \mbox{E-GraphSAGE}, a GNN approach that overcomes this limitation and allows capturing both the edge features of a graph as well as the topological information for network anomaly detection in IoT networks. To the best of our knowledge, our approach is the first successful, practical, and extensively evaluated approach of applying Graph Neural Networks on the problem of network intrusion detection for IoT using flow-based data. Our extensive experimental evaluation on four recent NIDS benchmark datasets shows that our approach outperforms the state-of-the-art in terms of key classification metrics, which demonstrates the potential of GNNs in network intrusion detection, and provides motivation for further research.

Journal ArticleDOI
TL;DR: In this article, the authors proposed a fast uplink grant (FUG) allocation based on support vector machine (SVM) for massive machine type communication (mMTC) applications.
Abstract: The current random access (RA) allocation techniques suffer from congestion and high signaling overhead while serving massive machine type communication (mMTC) applications. To this end, 3GPP introduced the need to use fast uplink grant (FUG) allocation in order to reduce latency and increase reliability for smart internet-of-things (IoT) applications with strict QoS constraints. We propose a novel FUG allocation based on support vector machine (SVM), First, MTC devices are prioritized using SVM classifier. Second, LSTM architecture is used for traffic prediction and correction techniques to overcome prediction errors. Both results are used to achieve an efficient resource scheduler in terms of the average latency and total throughput. A Coupled Markov Modulated Poisson Process (CMMPP) traffic model with mixed alarm and regular traffic is applied to compare the proposed FUG allocation to other existing allocation techniques. In addition, an extended traffic model based CMMPP is used to evaluate the proposed algorithm in a more dense network. We test the proposed scheme using real-time measurement data collected from the Numenta Anomaly Benchmark (NAB) database. Our simulation results show the proposed model outperforms the existing RA allocation schemes by achieving the highest throughput and the lowest access delay of the order of 1 ms by achieving prediction accuracy of 98 $\%$ when serving the target massive and critical MTC applications with a limited number of resources.