• ### Survey of Consistent Software-Defined Network Updates(1609.02305)

March 26, 2019 cs.DC, cs.NI, cs.DS
Computer networks have become a critical infrastructure. In fact, networks should not only meet strict requirements in terms of correctness, availability, and performance, but they should also be very flexible and support fast updates, e.g., due to policy changes, increasing traffic, or failures. This paper presents a structured survey of mechanism and protocols to update computer networks in a fast and consistent manner. In particular, we identify and discuss the different desirable consistency properties that should be provided throughout a network update, the algorithmic techniques which are needed to meet these consistency properties, and the implications on the speed and costs at which updates can be performed. We also explain the relationship between consistent network update problems and classic algorithmic optimization ones. While our survey is mainly motivated by the advent of Software-Defined Networks (SDNs) and their primary need for correct and efficient update techniques, the fundamental underlying problems are not new, and we provide a historical perspective of the subject as well.
• ### A Survey on Underwater Acoustic Sensor Networks: Perspectives on Protocol Design for Signaling, MAC and Routing(1703.08353)

March 25, 2019 cs.NI
Underwater acoustic sensor networks (UASNs) are often used for environmental and industrial sensing in undersea/ocean space, therefore, these networks are also named underwater wireless sensor networks (UWSNs). Underwater sensor networks are different from other sensor networks due to the acoustic channel used in their physical layer, thus we should discuss about the specific features of these underwater networks such as acoustic channel modeling and protocol design for different layers of open system interconnection (OSI) model. Each node of these networks as a sensor needs to exchange data with other nodes; however, complexity of the acoustic channel makes some challenges in practice, especially when we are designing the network protocols. Therefore based on the mentioned cases, we are going to review general issues of the design of a UASN in this paper. In this regard, we firstly describe the network architecture for a typical 3D UASN, then we review the characteristics of the acoustic channel and the corresponding challenges of it and finally, we discuss about the different layers e.g. MAC protocols, routing protocols, and signal processing for the application layer of UASNs.
• ### AMP: A Better Multipath TCP for Data Center Networks(1707.00322)

March 17, 2019 cs.NI
In recent years several multipath data transport mechanisms, such as MPTCP and XMP, have been introduced to effectively exploit the path diversity of data center networks (DCNs). However, these multipath schemes have not been widely deployed in DCNs. We argue that two key factors among others impeded their adoption: TCP incast and minimum window syndrome. First, these mechanisms are ill-suited for workloads with a many-to-one communication pattern, commonly found in DCNs, causing frequent TCP incast collapses. Second, the syndrome we discover for the first time, results in 2-5 times lower throughput for single-path flows than multipath flows, thus severely violating network fairness. To effectively tackle these problems, we propose AMP: an adaptive multipath congestion control mechanism that quickly detects the onset of these problems and transforms its multipath flow into a single-path flow. Once these problems disappear, AMP safely reverses this transformation and continues its data transmission via multiple paths. Our evaluation results under a diverse set of scenarios in a fat-tree topology with realistic workloads demonstrate that AMP is robust to the TCP incast problem and improves network fairness between multipath and single-path flows significantly with little performance loss.
• ### A Survey on QoE-oriented Wireless Resources Scheduling(1705.07839)

March 14, 2020 cs.NI, cs.MM
Future wireless systems are expected to provide a wide range of services to more and more users. Advanced scheduling strategies thus arise not only to perform efficient radio resource management, but also to provide fairness among the users. On the other hand, the users' perceived quality, i.e., Quality of Experience (QoE), is becoming one of the main drivers within the schedulers design. In this context, this paper starts by providing a comprehension of what is QoE and an overview of the evolution of wireless scheduling techniques. Afterwards, a survey on the most recent QoE-based scheduling strategies for wireless systems is presented, highlighting the application/service of the different approaches reported in the literature, as well as the parameters that were taken into account for QoE optimization. Therefore, this paper aims at helping readers interested in learning the basic concepts of QoE-oriented wireless resources scheduling, as well as getting in touch with its current research frontier.
• ### On The Scalability of P2P Swarming Systems(1405.6228)

March 4, 2019 cs.NI
One of the fundamental problems in the realm of peer-to-peer systems is that of determining their service capacities. In this paper, we focus on P2P scalability issues and propose models to compute the achievable throughput under distinct policies for selecting both peers and blocks. From these models, we obtain novel insights on the behavior of P2P swarming systems that motivate new mechanisms for publishers and peers to improve the overall performance. In particular, we obtain operational regions for swarm system. In addition, we show that system capacity significantly increases if publishers adopt the most deprived peer selection and peers reduce their service rates when they have all the file blocks but one.
• ### Driver-Based Adaptation of Vehicular Ad Hoc Networks for Design of Active Safety Systems(1502.00997)

March 2, 2019 cs.IT, math.IT, cs.NI, cs.SY
This paper studies the need for individualizing vehicular communications in order to improve collision warning systems for an N-lane highway scenario. By relating the traffic-based and communications studies, we aim at reducing highway traffic accidents. To the best of our knowledge, this is the first paper that shows how to customize vehicular communications to driver's characteristics and traffic information. We propose to develop VANET protocols that selectively identify crash relevant information and customize the communications of that information based on each driver's assigned safety score. In this paper, first, we derive the packet success probability by accounting for multi-user interference, path loss, and fading. Then, by Monte carlo simulations, we demonstrate how appropriate channel access probabilities that satisfy the delay requirements of the safety application result in noticeable performance enhancement.
• ### Tuning Collision Warning Algorithms to Individual Drivers for Design of Active Safety Systems(1402.0932)

March 2, 2019 cs.NI
Every year, many people are killed and injured in highway traffic accidents. In order to reduce such casualties, collisions warning systems has been studied extensively. These systems are built by taking the driver reaction times into account. However, most of the existing literature focuses on characterizing how driver reaction times vary across an entire population. Therefore, many of the warnings that are given turn out to be false alarms. A false alarm occurs whenever a warning is sent, but it is not needed. This would nagate any safety benefit of the system, and could even reduce the overall safety if warnings become a distraction. In this paper, we propose our solution to address the described problem; First, we briefly describe our method for estimating the distribution of brake response times for a particular driver using data from a Vehicular Ad-Hoc Network (VANET) system. Then, we investigate how brake response times of individual drivers can be used in collision warning algorithms to reduce false alarm rates while still maintaining a high level of safety. This will yield a system that is overall more reliable and trustworthy for drivers, which could lead to wider adoption and applicability for V2V/V2I communication systems. Moreover, we show how false alarm rate varies with respect to probability of accident. Our simulation results show that by individualizing collision warnings the number of false alarms can be reduced more than $50\%$. Then, we conclude safety applications could potentially take full advantage of being customized to an individual's characteristics.
• ### Game Theory for Multi-Access Edge Computing: Survey, Use Cases, and Future Trends(1704.00323)

Feb. 24, 2019 cs.NI, cs.GT
Game Theory (GT) has been used with significant success to formulate, and either design or optimize, the operation of many representative communications and networking scenarios. The games in these scenarios involve, as usual, diverse players with conflicting goals. This paper primarily surveys the literature that has applied theoretical games to wireless networks, emphasizing use cases of upcoming Multi-Access Edge Computing (MEC). MEC is relatively new and offers cloud services at the network periphery, aiming to reduce service latency backhaul load, and enhance relevant operational aspects such as Quality of Experience or security. Our presentation of GT is focused on the major challenges imposed by MEC services over the wireless resources. The survey is divided into classical and evolutionary games. Then, our discussion proceeds to more specific aspects which have a considerable impact on the game usefulness, namely: rational vs. evolving strategies, cooperation among players, available game information, the way the game is played (single turn, repeated), the game model evaluation, and how the model results can be applied for both optimizing resource-constrained resources and balancing diverse trade-offs in real edge networking scenarios. Finally, we reflect on lessons learned, highlighting future trends and research directions for applying theoretical model games in upcoming MEC services, considering both network design issues and usage scenarios.
• ### Machine Learning in Downlink Coordinated Multipoint in Heterogeneous Networks(1608.08306)

Feb. 1, 2019 cs.NI, stat.ML
We propose a method for downlink coordinated multipoint (DL CoMP) in heterogeneous fifth generation New Radio (NR) networks. The primary contribution of our paper is an algorithm to enhance the trigger of DL CoMP using online machine learning. We use support vector machine (SVM) classifiers to enhance the user downlink throughput in a realistic frequency division duplex network environment. Our simulation results show improvement in both the macro and pico base station downlink throughputs due to the informed triggering of the multiple radio streams as learned by the SVM classifier.
• ### Aggressive Congestion Control Mechanism for Space Systems(1701.00234)

Jan. 23, 2019 cs.NI
How to implement an impeccable space system-of-systems (SoS) internetworking architecture has been a significant issue in system engineering for years. Reliable data transmission is considered one of the most important technologies of space SoS internetworking systems. Due to the high bit error rate (BER), long time delay and asymmetrical channel in the space communication environment, the congestion control mechanism of classic transport control protocols (TCP) shows unsatisfying performances. With the help of existing TCP modifications, this paper contributes an aggressive congestion control mechanism. The proposed mechanism is characterized with a fast start procedure, as well as the feedback information to analyze network traffic and with a link terminating processing mechanism, which can help to reveal the real reason of packet loss, and maintain the size of congestion window at a high level. Simulation results are shown in the end to verify the proposed scheme.
• ### Mobile Data Transactions in Device-to-Device Communication Networks: Pricing and Auction(1701.00237)

Jan. 23, 2019 cs.NI, cs.GT
Device-to-Device (D2D) communication is offering smart phone users a choice to share files with each other without communicating with the cellular network. In this paper, we discuss the behaviors of two characters in the D2D data transaction model from an economic point of view: the data buyers who wish to buy a certain quantity of data, as well as the data sellers who wish to sell data through the D2D network. The optimal price and purchasing strategies are analyzed and deduced based on game theory.
• ### Complex Network Theoretical Analysis on Information Dissemination over Vehicular Networks(1701.00240)

Jan. 23, 2019 cs.IT, math.IT, cs.NI
How to enhance the communication efficiency and quality on vehicular networks is one critical important issue. While with the larger and larger scale of vehicular networks in dense cities, the real-world datasets show that the vehicular networks essentially belong to the complex network model. Meanwhile, the extensive research on complex networks has shown that the complex network theory can both provide an accurate network illustration model and further make great contributions to the network design, optimization and management. In this paper, we start with analyzing characteristics of a taxi GPS dataset and then establishing the vehicular-to-infrastructure, vehicle-to-vehicle and the hybrid communication model, respectively. Moreover, we propose a clustering algorithm for station selection, a traffic allocation optimization model and an information source selection model based on the communication performances and complex network theory.
• ### Experimentally-based Cross-layer Optimization for Distributed Wireless Body-to-body Networks(1701.08605)

Jan. 19, 2019 cs.NI
We investigate cross-layer optimization to route information across distributed wireless body-to-body networks, based on real-life experimental measurements. At the network layer, the best possible route is selected according to channel state information (e.g., expected transmission count, hop count) from the physical layer. Two types of dynamic routing are applied: shortest path routing (SPR), and cooperative multi-path routing (CMR) associated with selection combining. An open-access experimental dataset incorporating `everyday' mixed-activities is used for analyzing and comparing the cross-layer optimization with different wireless sensor network protocols (i.e., ORPL, LOADng). Negligible packet error rate is achieved by applying CMR and SPR techniques with reasonably sensitive receivers. Moreover, at 10% outage probability, CMR gains up to 8, 7, and 6 dB improvements over ORPL, SPR, and LOADng, respectively. We show that CMR achieves the highest throughput (packets/s) while providing acceptable amount of average end-to-end delay (47.5 ms), at -100 dBm receive sensitivity. The use of alternate paths in CMR reduces retransmissions and increases packet success rate, which significantly reduces the maximum amount of end-to-end delay and energy consumption for CMR with respect to other protocols. It is also shown that the combined channel gains across SPR and CMR are gamma and Rician distributed, correspondingly.
• ### A Survey of Indoor Localization Systems and Technologies(1709.01015)

Jan. 16, 2019 cs.NI
Indoor localization has recently witnessed an increase in interest, due to the potential wide range of services it can provide by leveraging Internet of Things (IoT), and ubiquitous connectivity. Different techniques, wireless technologies and mechanisms have been proposed in the literature to provide indoor localization services in order to improve the services provided to the users. However, there is a lack of an up-to-date survey paper that incorporates some of the recently proposed accurate and reliable localization systems. In this paper, we aim to provide a detailed survey of different indoor localization techniques such as Angle of Arrival (AoA), Time of Flight (ToF), Return Time of Flight (RTOF), Received Signal Strength (RSS); based on technologies such as WiFi, Radio Frequency Identification Device (RFID), Ultra Wideband (UWB), Bluetooth and systems that have been proposed in the literature. The paper primarily discusses localization and positioning of human users and their devices. We highlight the strengths of the existing systems proposed in the literature. In contrast with the existing surveys, we also evaluate different systems from the perspective of energy efficiency, availability, cost, reception range, latency, scalability and tracking accuracy. Rather than comparing the technologies or techniques, we compare the localization systems and summarize their working principle. We also discuss remaining challenges to accurate indoor localization.
• ### Deep Q-Learning for Self-Organizing Networks Fault Management and Radio Performance Improvement(1707.02329)

Jan. 10, 2019 cs.NI, stat.ML
We propose an algorithm to automate fault management in an outdoor cellular network using deep reinforcement learning (RL) against wireless impairments. This algorithm enables the cellular network cluster to self-heal by allowing RL to learn how to improve the downlink signal to interference plus noise ratio through exploration and exploitation of various alarm corrective actions. The main contributions of this paper are to 1) introduce a deep RL-based fault handling algorithm which self-organizing networks can implement in a polynomial runtime and 2) show that this fault management method can improve the radio link performance in a realistic network setup. Simulation results show that our proposed algorithm learns an action sequence to clear alarms and improve the performance in the cellular cluster better than existing algorithms, even against the randomness of the network fault occurrences and user movements.
• ### The Sky Is Not the Limit: LTE for Unmanned Aerial Vehicles(1707.07534)

Jan. 10, 2019 cs.NI
Many use cases of unmanned aerial vehicles (UAVs) require beyond visual line-of-sight (LOS) communications. Mobile networks offer wide area, high speed, and secure wireless connectivity, which can enhance control and safety of UAV operations and enable beyond visual LOS use cases. In this article, we share some of our experience in Long-Term Evolution (LTE) connectivity for low altitude small UAVs. We first identify the typical airborne connectivity requirements and characteristics, highlight the different propagation conditions for UAVs and mobiles on the ground with measurement and ray tracing results, and present simulation results to shed light on the feasibility of providing LTE connectivity for UAVs. We also present several ideas on potential enhancements for improving LTE connectivity performance and identify fruitful avenues for future research.
• ### A Stochastic Process on a Network with Connections to Laplacian Systems of Equations(1701.05296)

July 25, 2019 cs.NI
We study an open discrete-time queueing network that models the collection of data in a multi-hop sensor network. We assume data is generated at the sensor nodes as a discrete-time Bernoulli process. All nodes in the network maintain a queue and relay data, which is to be finally collected by a designated sink. We prove that the resulting multi-dimensional Markov chain representing the queue size of nodes has two behavior regimes depending on the value of the rate of data generation. In particular, we show that there is a non-trivial critical value of data rate below which the chain is ergodic and converges to a stationary distribution and above which it is non-ergodic, i.e., the queues at the nodes grow in an unbounded manner. We show that the rate of convergence to stationarity is geometric in the sub-critical regime. We also show the connections of this process to a class of Laplacian systems of equations whose solutions include the important problem of finding the effective resistance between two nodes, a subroutine that has been widely used to develop efficient algorithms for a number of computational problems. Hence our work provides the theoretical basis for a new class of distributed algorithms for these problems.
• ### Naming a Channel with Beeps(1608.04174)

Dec. 28, 2018 cs.DC, cs.NI
We consider a communication channel in which the only possible communication mode is transmitting beeps, which reach all the nodes instantaneously. Nodes are anonymous, in that they do not have any individual identifiers. The algorithmic goal is to randomly assign names to the nodes in such a manner that the names make a contiguous segment of positive integers starting from $1$. We give a Las Vegas naming algorithm for the case when the number of nodes $n$ is known, and a Monte Carlo algorithm for the case when the number of nodes $n$ is not known. The algorithms are provably optimal with respect to the expected time $O(n\log n)$, the number of used random bits $O(n\log n)$, and the probability of error.
• ### Right buffer sizing matters: some dynamical and statistical studies on Compound TCP(1604.05516)

Dec. 24, 2018 cs.NI, cs.PF, cs.SY
Motivated by recent concerns that queuing delays in the Internet are on the rise, we conduct a performance evaluation of Compound TCP (C-TCP) in two topologies: a single bottleneck and a multi-bottleneck topology, under different traffic scenarios. The first topology consists of a single bottleneck router, and the second consists of two distinct sets of TCP flows, regulated by two edge routers, feeding into a common core router. We focus on some dynamical and statistical properties of the underlying system. From a dynamical perspective, we develop fluid models in a regime wherein the number of flows is large, bandwidth-delay product is high, buffers are dimensioned small (independent of the bandwidth-delay product) and routers deploy a Drop-Tail queue policy. A detailed local stability analysis for these models yields the following key insight: smaller buffers favour stability. Additionally, we highlight that larger buffers, in addition to increasing latency, are prone to inducing limit cycles in the system dynamics, via a Hopf bifurcation. These limit cycles in turn cause synchronisation among the TCP flows, and also result in a loss of link utilisation. For the topologies considered, we also empirically analyse some statistical properties of the bottleneck queues. These statistical analyses serve to validate an important modelling assumption: that in the regime considered, each bottleneck queue may be approximated as either an $M/M/1/B$ or an $M/D/1/B$ queue. This immediately makes the modelling perspective attractive and the analysis tractable. Finally, we show that smaller buffers, in addition to ensuring stability and low latency, would also yield fairly good system performance, in terms of throughput and flow completion times.
• ### Developing an edge computing platform for real-time descriptive analytics(1705.08449)

Dec. 17, 2018 cs.DC, cs.NI, cs.CY
The Internet of Mobile Things encompasses stream data being generated by sensors, network communications that pull and push these data streams, as well as running processing and analytics that can effectively leverage actionable information for transportation planning, management, and business advantage. Edge computing emerges as a new paradigm that decentralizes the communication, computation, control and storage resources from the cloud to the edge of the network. This paper proposes an edge computing platform where mobile edge nodes are physical devices deployed on a transit bus where descriptive analytics is used to uncover meaningful patterns from real-time transit data streams. An application experiment is used to evaluate the advantages and disadvantages of our proposed platform to support descriptive analytics at a mobile edge node and generate actionable information to transit managers.
• ### Device-to-Device Load Balancing for Cellular Networks(1710.02636)

Dec. 12, 2018 cs.NI
• ### Securing Real-Time Internet-of-Things(1705.08489)

Dec. 10, 2018 cs.CR, cs.NI
Modern embedded and cyber-physical systems are ubiquitous. A large number of critical cyber-physical systems have real-time requirements (e.g., avionics, automobiles, power grids, manufacturing systems, industrial control systems, etc.). Recent developments and new functionality requires real-time embedded devices to be connected to the Internet. This gives rise to the real-time Internet-of-things (RT-IoT) that promises a better user experience through stronger connectivity and efficient use of next-generation embedded devices. However RT- IoT are also increasingly becoming targets for cyber-attacks which is exacerbated by this increased connectivity. This paper gives an introduction to RT-IoT systems, an outlook of current approaches and possible research challenges towards secure RT- IoT frameworks.
• ### Distributed Multiple Access with A General Link Layer Channel(1710.01751)

Nov. 27, 2018 cs.IT, math.IT, cs.NI
This paper investigates the problem of distributed medium access control in a time slotted wireless multiple access network with an unknown finite number of homogeneous users. Assume that each user has a single transmission option. In each time slot, a user chooses either to idle or to transmit a packet. Under a general channel model, a distributed medium access control framework is proposed to adapt transmission probabilities of all users to a value that maximizes an arbitrarily chosen symmetric network utility. Probability target of each user in the proposed algorithm is calculated based upon a channel contention measure, which is defined as the success probability of a virtual packet. It is shown that the proposed algorithm falls into the classical stochastic approximation framework with guaranteed convergence when the contention measure can be directly obtained from the receiver. On the other hand, when the contention measure is not directly available, computer simulations show that a revised medium access control algorithm can still help the system to converge to the same designed equilibrium.
• ### The Stochastic Geometry Analyses of Cellular Networks with {\alpha}-Stable Self-Similarity(1709.05733)

Nov. 19, 2018 cs.IT, math.IT, cs.NI
To understand the spatial deployment of base stations (BSs) is the first step to analyze the performance of cellular networks and further design efficient networking protocols. Poisson point process (PPP), which has been widely adopted to characterize the deployment of BSs and established the reputation to give tractable results in the stochastic geometry analyses, usually assumes a static BS deployment density in homogeneous PPP (HPPP) models or delicately designed location-dependent density functions in in-homogeneous PPP (IPPP) models. However, the simultaneous existence of attractiveness and repulsiveness among BSs practically deployed in a large-scale area defies such an assumption, and the $\alpha$-stable distribution, one kind of heavy-tailed distributions, has recently demonstrated superior accuracy to statistically model the varying BS density in different areas. In this paper, we start with these new findings and investigate the intrinsic feature (i.e., the spatial self-similarity) embedded in the BSs. Afterwards, we refer to a generalized PPP setup with $\alpha$-stable distributed density and theoretically derive the related coverage probability. In particular, we give an upper bound of the derived coverage probability for high signal-to-interference-plus-noise ratio (SINR) thresholds and show the monotonically decreasing property of this bound with respect to the variance of BS density. Besides, we prove that our model could reduce to the single-tier HPPP for some special cases, and demonstrate the superior accuracy of the $\alpha$-stable model to approach the real environment.
• ### Cost Efficiency Optimization of 5G Wireless Backhaul Networks(1612.04531)

Nov. 19, 2018 cs.NI
The wireless backhaul network provides an attractive solution for the urban deployment of fifth generation (5G) wireless networks that enables future ultra dense small cell networks to meet the ever-increasing user demands. Optimal deployment and management of 5G wireless backhaul networks is an interesting and challenging issue. In this paper we propose the optimal gateways deployment and wireless backhaul route schemes to maximize the cost efficiency of 5G wireless backhaul networks. In generally, the changes of gateways deployment and wireless backhaul route are presented in different time scales. Specifically, the number and locations of gateways are optimized in the long time scale of 5G wireless backhaul networks. The wireless backhaul routings are optimized in the short time scale of 5G wireless backhaul networks considering the time-variant over wireless channels. Numerical results show the gateways and wireless backhaul route optimization significantly increases the cost efficiency of 5G wireless backhaul networks. Moreover, the cost efficiency of proposed optimization algorithm is better than that of conventional and most widely used shortest path (SP) and Bellman-Ford (BF) algorithms in 5G wireless backhaul networks.