-
Computer networks have become a critical infrastructure. In fact, networks
should not only meet strict requirements in terms of correctness, availability,
and performance, but they should also be very flexible and support fast
updates, e.g., due to policy changes, increasing traffic, or failures. This
paper presents a structured survey of mechanism and protocols to update
computer networks in a fast and consistent manner. In particular, we identify
and discuss the different desirable consistency properties that should be
provided throughout a network update, the algorithmic techniques which are
needed to meet these consistency properties, and the implications on the speed
and costs at which updates can be performed. We also explain the relationship
between consistent network update problems and classic algorithmic optimization
ones. While our survey is mainly motivated by the advent of Software-Defined
Networks (SDNs) and their primary need for correct and efficient update
techniques, the fundamental underlying problems are not new, and we provide a
historical perspective of the subject as well.
-
Underwater acoustic sensor networks (UASNs) are often used for environmental
and industrial sensing in undersea/ocean space, therefore, these networks are
also named underwater wireless sensor networks (UWSNs). Underwater sensor
networks are different from other sensor networks due to the acoustic channel
used in their physical layer, thus we should discuss about the specific
features of these underwater networks such as acoustic channel modeling and
protocol design for different layers of open system interconnection (OSI)
model. Each node of these networks as a sensor needs to exchange data with
other nodes; however, complexity of the acoustic channel makes some challenges
in practice, especially when we are designing the network protocols. Therefore
based on the mentioned cases, we are going to review general issues of the
design of a UASN in this paper. In this regard, we firstly describe the network
architecture for a typical 3D UASN, then we review the characteristics of the
acoustic channel and the corresponding challenges of it and finally, we discuss
about the different layers e.g. MAC protocols, routing protocols, and signal
processing for the application layer of UASNs.
-
In recent years several multipath data transport mechanisms, such as MPTCP
and XMP, have been introduced to effectively exploit the path diversity of data
center networks (DCNs). However, these multipath schemes have not been widely
deployed in DCNs. We argue that two key factors among others impeded their
adoption: TCP incast and minimum window syndrome. First, these mechanisms are
ill-suited for workloads with a many-to-one communication pattern, commonly
found in DCNs, causing frequent TCP incast collapses. Second, the syndrome we
discover for the first time, results in 2-5 times lower throughput for
single-path flows than multipath flows, thus severely violating network
fairness.
To effectively tackle these problems, we propose AMP: an adaptive multipath
congestion control mechanism that quickly detects the onset of these problems
and transforms its multipath flow into a single-path flow. Once these problems
disappear, AMP safely reverses this transformation and continues its data
transmission via multiple paths. Our evaluation results under a diverse set of
scenarios in a fat-tree topology with realistic workloads demonstrate that AMP
is robust to the TCP incast problem and improves network fairness between
multipath and single-path flows significantly with little performance loss.
-
Future wireless systems are expected to provide a wide range of services to
more and more users. Advanced scheduling strategies thus arise not only to
perform efficient radio resource management, but also to provide fairness among
the users. On the other hand, the users' perceived quality, i.e., Quality of
Experience (QoE), is becoming one of the main drivers within the schedulers
design. In this context, this paper starts by providing a comprehension of what
is QoE and an overview of the evolution of wireless scheduling techniques.
Afterwards, a survey on the most recent QoE-based scheduling strategies for
wireless systems is presented, highlighting the application/service of the
different approaches reported in the literature, as well as the parameters that
were taken into account for QoE optimization. Therefore, this paper aims at
helping readers interested in learning the basic concepts of QoE-oriented
wireless resources scheduling, as well as getting in touch with its current
research frontier.
-
One of the fundamental problems in the realm of peer-to-peer systems is that
of determining their service capacities. In this paper, we focus on P2P
scalability issues and propose models to compute the achievable throughput
under distinct policies for selecting both peers and blocks. From these models,
we obtain novel insights on the behavior of P2P swarming systems that motivate
new mechanisms for publishers and peers to improve the overall performance. In
particular, we obtain operational regions for swarm system. In addition, we
show that system capacity significantly increases if publishers adopt the most
deprived peer selection and peers reduce their service rates when they have all
the file blocks but one.
-
This paper studies the need for individualizing vehicular communications in
order to improve collision warning systems for an N-lane highway scenario. By
relating the traffic-based and communications studies, we aim at reducing
highway traffic accidents. To the best of our knowledge, this is the first
paper that shows how to customize vehicular communications to driver's
characteristics and traffic information. We propose to develop VANET protocols
that selectively identify crash relevant information and customize the
communications of that information based on each driver's assigned safety
score. In this paper, first, we derive the packet success probability by
accounting for multi-user interference, path loss, and fading. Then, by Monte
carlo simulations, we demonstrate how appropriate channel access probabilities
that satisfy the delay requirements of the safety application result in
noticeable performance enhancement.
-
Every year, many people are killed and injured in highway traffic accidents.
In order to reduce such casualties, collisions warning systems has been studied
extensively. These systems are built by taking the driver reaction times into
account. However, most of the existing literature focuses on characterizing how
driver reaction times vary across an entire population. Therefore, many of the
warnings that are given turn out to be false alarms. A false alarm occurs
whenever a warning is sent, but it is not needed. This would nagate any safety
benefit of the system, and could even reduce the overall safety if warnings
become a distraction. In this paper, we propose our solution to address the
described problem; First, we briefly describe our method for estimating the
distribution of brake response times for a particular driver using data from a
Vehicular Ad-Hoc Network (VANET) system. Then, we investigate how brake
response times of individual drivers can be used in collision warning
algorithms to reduce false alarm rates while still maintaining a high level of
safety. This will yield a system that is overall more reliable and trustworthy
for drivers, which could lead to wider adoption and applicability for V2V/V2I
communication systems. Moreover, we show how false alarm rate varies with
respect to probability of accident. Our simulation results show that by
individualizing collision warnings the number of false alarms can be reduced
more than $50\%$. Then, we conclude safety applications could potentially take
full advantage of being customized to an individual's characteristics.
-
Game Theory (GT) has been used with significant success to formulate, and
either design or optimize, the operation of many representative communications
and networking scenarios. The games in these scenarios involve, as usual,
diverse players with conflicting goals. This paper primarily surveys the
literature that has applied theoretical games to wireless networks, emphasizing
use cases of upcoming Multi-Access Edge Computing (MEC). MEC is relatively new
and offers cloud services at the network periphery, aiming to reduce service
latency backhaul load, and enhance relevant operational aspects such as Quality
of Experience or security. Our presentation of GT is focused on the major
challenges imposed by MEC services over the wireless resources. The survey is
divided into classical and evolutionary games. Then, our discussion proceeds to
more specific aspects which have a considerable impact on the game usefulness,
namely: rational vs. evolving strategies, cooperation among players, available
game information, the way the game is played (single turn, repeated), the game
model evaluation, and how the model results can be applied for both optimizing
resource-constrained resources and balancing diverse trade-offs in real edge
networking scenarios. Finally, we reflect on lessons learned, highlighting
future trends and research directions for applying theoretical model games in
upcoming MEC services, considering both network design issues and usage
scenarios.
-
We propose a method for downlink coordinated multipoint (DL CoMP) in
heterogeneous fifth generation New Radio (NR) networks. The primary
contribution of our paper is an algorithm to enhance the trigger of DL CoMP
using online machine learning. We use support vector machine (SVM) classifiers
to enhance the user downlink throughput in a realistic frequency division
duplex network environment. Our simulation results show improvement in both the
macro and pico base station downlink throughputs due to the informed triggering
of the multiple radio streams as learned by the SVM classifier.
-
How to implement an impeccable space system-of-systems (SoS) internetworking
architecture has been a significant issue in system engineering for years.
Reliable data transmission is considered one of the most important technologies
of space SoS internetworking systems. Due to the high bit error rate (BER),
long time delay and asymmetrical channel in the space communication
environment, the congestion control mechanism of classic transport control
protocols (TCP) shows unsatisfying performances. With the help of existing TCP
modifications, this paper contributes an aggressive congestion control
mechanism. The proposed mechanism is characterized with a fast start procedure,
as well as the feedback information to analyze network traffic and with a link
terminating processing mechanism, which can help to reveal the real reason of
packet loss, and maintain the size of congestion window at a high level.
Simulation results are shown in the end to verify the proposed scheme.
-
Device-to-Device (D2D) communication is offering smart phone users a choice
to share files with each other without communicating with the cellular network.
In this paper, we discuss the behaviors of two characters in the D2D data
transaction model from an economic point of view: the data buyers who wish to
buy a certain quantity of data, as well as the data sellers who wish to sell
data through the D2D network. The optimal price and purchasing strategies are
analyzed and deduced based on game theory.
-
How to enhance the communication efficiency and quality on vehicular networks
is one critical important issue. While with the larger and larger scale of
vehicular networks in dense cities, the real-world datasets show that the
vehicular networks essentially belong to the complex network model. Meanwhile,
the extensive research on complex networks has shown that the complex network
theory can both provide an accurate network illustration model and further make
great contributions to the network design, optimization and management. In this
paper, we start with analyzing characteristics of a taxi GPS dataset and then
establishing the vehicular-to-infrastructure, vehicle-to-vehicle and the hybrid
communication model, respectively. Moreover, we propose a clustering algorithm
for station selection, a traffic allocation optimization model and an
information source selection model based on the communication performances and
complex network theory.
-
We investigate cross-layer optimization to route information across
distributed wireless body-to-body networks, based on real-life experimental
measurements. At the network layer, the best possible route is selected
according to channel state information (e.g., expected transmission count, hop
count) from the physical layer. Two types of dynamic routing are applied:
shortest path routing (SPR), and cooperative multi-path routing (CMR)
associated with selection combining. An open-access experimental dataset
incorporating `everyday' mixed-activities is used for analyzing and comparing
the cross-layer optimization with different wireless sensor network protocols
(i.e., ORPL, LOADng). Negligible packet error rate is achieved by applying CMR
and SPR techniques with reasonably sensitive receivers. Moreover, at 10% outage
probability, CMR gains up to 8, 7, and 6 dB improvements over ORPL, SPR, and
LOADng, respectively. We show that CMR achieves the highest throughput
(packets/s) while providing acceptable amount of average end-to-end delay (47.5
ms), at -100 dBm receive sensitivity. The use of alternate paths in CMR reduces
retransmissions and increases packet success rate, which significantly reduces
the maximum amount of end-to-end delay and energy consumption for CMR with
respect to other protocols. It is also shown that the combined channel gains
across SPR and CMR are gamma and Rician distributed, correspondingly.
-
Indoor localization has recently witnessed an increase in interest, due to
the potential wide range of services it can provide by leveraging Internet of
Things (IoT), and ubiquitous connectivity. Different techniques, wireless
technologies and mechanisms have been proposed in the literature to provide
indoor localization services in order to improve the services provided to the
users. However, there is a lack of an up-to-date survey paper that incorporates
some of the recently proposed accurate and reliable localization systems. In
this paper, we aim to provide a detailed survey of different indoor
localization techniques such as Angle of Arrival (AoA), Time of Flight (ToF),
Return Time of Flight (RTOF), Received Signal Strength (RSS); based on
technologies such as WiFi, Radio Frequency Identification Device (RFID), Ultra
Wideband (UWB), Bluetooth and systems that have been proposed in the
literature. The paper primarily discusses localization and positioning of human
users and their devices. We highlight the strengths of the existing systems
proposed in the literature. In contrast with the existing surveys, we also
evaluate different systems from the perspective of energy efficiency,
availability, cost, reception range, latency, scalability and tracking
accuracy. Rather than comparing the technologies or techniques, we compare the
localization systems and summarize their working principle. We also discuss
remaining challenges to accurate indoor localization.
-
We propose an algorithm to automate fault management in an outdoor cellular
network using deep reinforcement learning (RL) against wireless impairments.
This algorithm enables the cellular network cluster to self-heal by allowing RL
to learn how to improve the downlink signal to interference plus noise ratio
through exploration and exploitation of various alarm corrective actions. The
main contributions of this paper are to 1) introduce a deep RL-based fault
handling algorithm which self-organizing networks can implement in a polynomial
runtime and 2) show that this fault management method can improve the radio
link performance in a realistic network setup. Simulation results show that our
proposed algorithm learns an action sequence to clear alarms and improve the
performance in the cellular cluster better than existing algorithms, even
against the randomness of the network fault occurrences and user movements.
-
Many use cases of unmanned aerial vehicles (UAVs) require beyond visual
line-of-sight (LOS) communications. Mobile networks offer wide area, high
speed, and secure wireless connectivity, which can enhance control and safety
of UAV operations and enable beyond visual LOS use cases. In this article, we
share some of our experience in Long-Term Evolution (LTE) connectivity for low
altitude small UAVs. We first identify the typical airborne connectivity
requirements and characteristics, highlight the different propagation
conditions for UAVs and mobiles on the ground with measurement and ray tracing
results, and present simulation results to shed light on the feasibility of
providing LTE connectivity for UAVs. We also present several ideas on potential
enhancements for improving LTE connectivity performance and identify fruitful
avenues for future research.
-
We study an open discrete-time queueing network that models the collection of
data in a multi-hop sensor network. We assume data is generated at the sensor
nodes as a discrete-time Bernoulli process. All nodes in the network maintain a
queue and relay data, which is to be finally collected by a designated sink. We
prove that the resulting multi-dimensional Markov chain representing the queue
size of nodes has two behavior regimes depending on the value of the rate of
data generation. In particular, we show that there is a non-trivial critical
value of data rate below which the chain is ergodic and converges to a
stationary distribution and above which it is non-ergodic, i.e., the queues at
the nodes grow in an unbounded manner. We show that the rate of convergence to
stationarity is geometric in the sub-critical regime. We also show the
connections of this process to a class of Laplacian systems of equations whose
solutions include the important problem of finding the effective resistance
between two nodes, a subroutine that has been widely used to develop efficient
algorithms for a number of computational problems. Hence our work provides the
theoretical basis for a new class of distributed algorithms for these problems.
-
We consider a communication channel in which the only possible communication
mode is transmitting beeps, which reach all the nodes instantaneously. Nodes
are anonymous, in that they do not have any individual identifiers. The
algorithmic goal is to randomly assign names to the nodes in such a manner that
the names make a contiguous segment of positive integers starting from $1$. We
give a Las Vegas naming algorithm for the case when the number of nodes $n$ is
known, and a Monte Carlo algorithm for the case when the number of nodes $n$ is
not known. The algorithms are provably optimal with respect to the expected
time $O(n\log n)$, the number of used random bits $O(n\log n)$, and the
probability of error.
-
Motivated by recent concerns that queuing delays in the Internet are on the
rise, we conduct a performance evaluation of Compound TCP (C-TCP) in two
topologies: a single bottleneck and a multi-bottleneck topology, under
different traffic scenarios. The first topology consists of a single bottleneck
router, and the second consists of two distinct sets of TCP flows, regulated by
two edge routers, feeding into a common core router. We focus on some dynamical
and statistical properties of the underlying system. From a dynamical
perspective, we develop fluid models in a regime wherein the number of flows is
large, bandwidth-delay product is high, buffers are dimensioned small
(independent of the bandwidth-delay product) and routers deploy a Drop-Tail
queue policy. A detailed local stability analysis for these models yields the
following key insight: smaller buffers favour stability. Additionally, we
highlight that larger buffers, in addition to increasing latency, are prone to
inducing limit cycles in the system dynamics, via a Hopf bifurcation. These
limit cycles in turn cause synchronisation among the TCP flows, and also result
in a loss of link utilisation. For the topologies considered, we also
empirically analyse some statistical properties of the bottleneck queues. These
statistical analyses serve to validate an important modelling assumption: that
in the regime considered, each bottleneck queue may be approximated as either
an $M/M/1/B$ or an $M/D/1/B$ queue. This immediately makes the modelling
perspective attractive and the analysis tractable. Finally, we show that
smaller buffers, in addition to ensuring stability and low latency, would also
yield fairly good system performance, in terms of throughput and flow
completion times.
-
The Internet of Mobile Things encompasses stream data being generated by
sensors, network communications that pull and push these data streams, as well
as running processing and analytics that can effectively leverage actionable
information for transportation planning, management, and business advantage.
Edge computing emerges as a new paradigm that decentralizes the communication,
computation, control and storage resources from the cloud to the edge of the
network. This paper proposes an edge computing platform where mobile edge nodes
are physical devices deployed on a transit bus where descriptive analytics is
used to uncover meaningful patterns from real-time transit data streams. An
application experiment is used to evaluate the advantages and disadvantages of
our proposed platform to support descriptive analytics at a mobile edge node
and generate actionable information to transit managers.
-
Small-cell architecture is widely adopted by cellular network operators to
increase network capacity. By reducing the size of cells, operators can pack
more (low-power) base stations in an area to better serve the growing demands,
without causing extra interference. However, this approach suffers from low
spectrum temporal efficiency. When a cell becomes smaller and covers fewer
users, its total traffic fluctuates significantly due to insufficient traffic
aggregation and exhibiting a large "peak-to-mean" ratio. As operators
customarily provision spectrum for peak traffic, large traffic temporal
fluctuation inevitably leads to low spectrum temporal efficiency. In this
paper, we advocate device-to-device (D2D) load-balancing as a useful mechanism
to address the fundamental drawback of small-cell architecture. The idea is to
shift traffic from a congested cell to its adjacent under-utilized cells by
leveraging inter-cell D2D communication, so that the traffic can be served
without using extra spectrum, effectively improving the spectrum temporal
efficiency. We provide theoretical modeling and analysis to characterize the
benefit of D2D load balancing, in terms of total spectrum requirements of all
individual cells. We also derive the corresponding cost, in terms of incurred
D2D traffic overhead. We carry out empirical evaluations based on real-world 4G
data traces to gauge the benefit and cost of D2D load balancing under practical
settings. The results show that D2D load balancing can reduce the spectrum
requirement by 25% as compared to the standard scenario without D2D load
balancing, at the expense of negligible 0.7% D2D traffic overhead.
-
Modern embedded and cyber-physical systems are ubiquitous. A large number of
critical cyber-physical systems have real-time requirements (e.g., avionics,
automobiles, power grids, manufacturing systems, industrial control systems,
etc.). Recent developments and new functionality requires real-time embedded
devices to be connected to the Internet. This gives rise to the real-time
Internet-of-things (RT-IoT) that promises a better user experience through
stronger connectivity and efficient use of next-generation embedded devices.
However RT- IoT are also increasingly becoming targets for cyber-attacks which
is exacerbated by this increased connectivity. This paper gives an introduction
to RT-IoT systems, an outlook of current approaches and possible research
challenges towards secure RT- IoT frameworks.
-
This paper investigates the problem of distributed medium access control in a
time slotted wireless multiple access network with an unknown finite number of
homogeneous users. Assume that each user has a single transmission option. In
each time slot, a user chooses either to idle or to transmit a packet. Under a
general channel model, a distributed medium access control framework is
proposed to adapt transmission probabilities of all users to a value that
maximizes an arbitrarily chosen symmetric network utility. Probability target
of each user in the proposed algorithm is calculated based upon a channel
contention measure, which is defined as the success probability of a virtual
packet. It is shown that the proposed algorithm falls into the classical
stochastic approximation framework with guaranteed convergence when the
contention measure can be directly obtained from the receiver. On the other
hand, when the contention measure is not directly available, computer
simulations show that a revised medium access control algorithm can still help
the system to converge to the same designed equilibrium.
-
To understand the spatial deployment of base stations (BSs) is the first step
to analyze the performance of cellular networks and further design efficient
networking protocols. Poisson point process (PPP), which has been widely
adopted to characterize the deployment of BSs and established the reputation to
give tractable results in the stochastic geometry analyses, usually assumes a
static BS deployment density in homogeneous PPP (HPPP) models or delicately
designed location-dependent density functions in in-homogeneous PPP (IPPP)
models. However, the simultaneous existence of attractiveness and repulsiveness
among BSs practically deployed in a large-scale area defies such an assumption,
and the $\alpha$-stable distribution, one kind of heavy-tailed distributions,
has recently demonstrated superior accuracy to statistically model the varying
BS density in different areas. In this paper, we start with these new findings
and investigate the intrinsic feature (i.e., the spatial self-similarity)
embedded in the BSs. Afterwards, we refer to a generalized PPP setup with
$\alpha$-stable distributed density and theoretically derive the related
coverage probability. In particular, we give an upper bound of the derived
coverage probability for high signal-to-interference-plus-noise ratio (SINR)
thresholds and show the monotonically decreasing property of this bound with
respect to the variance of BS density. Besides, we prove that our model could
reduce to the single-tier HPPP for some special cases, and demonstrate the
superior accuracy of the $\alpha$-stable model to approach the real
environment.
-
The wireless backhaul network provides an attractive solution for the urban
deployment of fifth generation (5G) wireless networks that enables future ultra
dense small cell networks to meet the ever-increasing user demands. Optimal
deployment and management of 5G wireless backhaul networks is an interesting
and challenging issue. In this paper we propose the optimal gateways deployment
and wireless backhaul route schemes to maximize the cost efficiency of 5G
wireless backhaul networks. In generally, the changes of gateways deployment
and wireless backhaul route are presented in different time scales.
Specifically, the number and locations of gateways are optimized in the long
time scale of 5G wireless backhaul networks. The wireless backhaul routings are
optimized in the short time scale of 5G wireless backhaul networks considering
the time-variant over wireless channels. Numerical results show the gateways
and wireless backhaul route optimization significantly increases the cost
efficiency of 5G wireless backhaul networks. Moreover, the cost efficiency of
proposed optimization algorithm is better than that of conventional and most
widely used shortest path (SP) and Bellman-Ford (BF) algorithms in 5G wireless
backhaul networks.