首页 > 最新文献

IEEE Networking Letters最新文献

英文 中文
An eBPF-Based Trace-Driven Emulation Method for Satellite Networks 基于 eBPF 的卫星网络轨迹驱动仿真方法
Pub Date : 2024-10-03 DOI: 10.1109/LNET.2024.3472034
Weibiao Tian;Ye Li;Jinwei Zhao;Sheng Wu;Jianping Pan
System-level performance evaluation over satellite networks often requires a simulated or emulated environment for reproducibility and low cost. However, the existing tools may not meet the needs for scenarios such as the low-earth orbit (LEO) satellite networks. To address the problem, this letter proposes and implements a trace-driven emulation method based on Linux’s eBPF technology. Building a Starlink traces collection system, we demonstrate that the method can effectively and efficiently emulate the connection conditions, and therefore provides a means for evaluating applications on local hosts.
卫星网络的系统级性能评估通常需要模拟或仿真环境,以实现可重复性和低成本。然而,现有工具可能无法满足低地轨道(LEO)卫星网络等场景的需求。为解决这一问题,本文基于 Linux 的 eBPF 技术,提出并实现了一种跟踪驱动的仿真方法。通过建立 Starlink 跟踪收集系统,我们证明了该方法可以有效地模拟连接条件,从而为评估本地主机上的应用程序提供了一种方法。
{"title":"An eBPF-Based Trace-Driven Emulation Method for Satellite Networks","authors":"Weibiao Tian;Ye Li;Jinwei Zhao;Sheng Wu;Jianping Pan","doi":"10.1109/LNET.2024.3472034","DOIUrl":"https://doi.org/10.1109/LNET.2024.3472034","url":null,"abstract":"System-level performance evaluation over satellite networks often requires a simulated or emulated environment for reproducibility and low cost. However, the existing tools may not meet the needs for scenarios such as the low-earth orbit (LEO) satellite networks. To address the problem, this letter proposes and implements a trace-driven emulation method based on Linux’s eBPF technology. Building a Starlink traces collection system, we demonstrate that the method can effectively and efficiently emulate the connection conditions, and therefore provides a means for evaluating applications on local hosts.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 3","pages":"188-192"},"PeriodicalIF":0.0,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142517934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bayesian Optimization Framework for Channel Simulation-Based Base Station Placement and Transmission Power Design
Pub Date : 2024-09-27 DOI: 10.1109/LNET.2024.3469175
Koya Sato;Katsuya Suto
This letter proposes an adaptive experimental design framework for a channel-simulation-based base station (BS) design that supports the joint optimization of transmission power and placement. We consider a system in which multiple transmitters provide wireless services over a shared frequency band. Our objective is to maximize the average throughput within an area of interest. System operators can design the system configurations prior to deployment by iterating them through channel simulations and updating the parameters. However, accurate channel simulations are computationally expensive; therefore, it is preferable to configure the system using a limited number of simulation iterations. We develop a solver for the problem based on Bayesian optimization (BO), a black-box optimization method. The numerical results demonstrate that our proposed framework can achieve 18-22% higher throughput performance than conventional placement and power optimization strategies.
{"title":"Bayesian Optimization Framework for Channel Simulation-Based Base Station Placement and Transmission Power Design","authors":"Koya Sato;Katsuya Suto","doi":"10.1109/LNET.2024.3469175","DOIUrl":"https://doi.org/10.1109/LNET.2024.3469175","url":null,"abstract":"This letter proposes an adaptive experimental design framework for a channel-simulation-based base station (BS) design that supports the joint optimization of transmission power and placement. We consider a system in which multiple transmitters provide wireless services over a shared frequency band. Our objective is to maximize the average throughput within an area of interest. System operators can design the system configurations prior to deployment by iterating them through channel simulations and updating the parameters. However, accurate channel simulations are computationally expensive; therefore, it is preferable to configure the system using a limited number of simulation iterations. We develop a solver for the problem based on Bayesian optimization (BO), a black-box optimization method. The numerical results demonstrate that our proposed framework can achieve 18-22% higher throughput performance than conventional placement and power optimization strategies.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 4","pages":"217-221"},"PeriodicalIF":0.0,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10697138","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143388621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Throughput and Delay Performance of Slotted Aloha in SmartBANs Under Saturation Conditions 饱和状态下智能局域网中插槽式 Aloha 的吞吐量和延迟性能
Pub Date : 2024-09-24 DOI: 10.1109/LNET.2024.3467031
Anastasios C. Politis;Constantinos S. Hilas
This letter evaluates the performance of the slotted Aloha protocol defined by the European Telecommunication Standard Institute (ETSI) SmartBAN specification, under saturation conditions. For this purpose, we develop a two-dimensional discrete time Markov chain (DTMC) to model the operational details of the protocol and assess its performance in terms of saturation throughput and average end-to-end delay. The accuracy of the proposed model is validated by means of simulation which reveals a very good match among theoretical and simulation results. The model can be used for protocol performance prediction and optimization purposes.
这封信评估了欧洲电信标准协会(ETSI)SmartBAN 规范所定义的 Aloha 协议在饱和条件下的性能。为此,我们开发了一个二维离散时间马尔可夫链(DTMC)来模拟协议的操作细节,并从饱和吞吐量和平均端到端延迟的角度评估其性能。我们通过仿真验证了所建模型的准确性,发现理论结果与仿真结果非常吻合。该模型可用于协议性能预测和优化。
{"title":"Throughput and Delay Performance of Slotted Aloha in SmartBANs Under Saturation Conditions","authors":"Anastasios C. Politis;Constantinos S. Hilas","doi":"10.1109/LNET.2024.3467031","DOIUrl":"https://doi.org/10.1109/LNET.2024.3467031","url":null,"abstract":"This letter evaluates the performance of the slotted Aloha protocol defined by the European Telecommunication Standard Institute (ETSI) SmartBAN specification, under saturation conditions. For this purpose, we develop a two-dimensional discrete time Markov chain (DTMC) to model the operational details of the protocol and assess its performance in terms of saturation throughput and average end-to-end delay. The accuracy of the proposed model is validated by means of simulation which reveals a very good match among theoretical and simulation results. The model can be used for protocol performance prediction and optimization purposes.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 3","pages":"168-172"},"PeriodicalIF":0.0,"publicationDate":"2024-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142517770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Applying Federated Learning to Distributed Intrusion Detection Systems Through Explainable AI 通过可解释人工智能对分布式入侵检测系统应用联盟学习的评估
Pub Date : 2024-09-23 DOI: 10.1109/LNET.2024.3465516
Ayaka Oki;Yukio Ogawa;Kaoru Ota;Mianxiong Dong
We apply federated learning (FL) to a distributed intrusion detection system (IDS), in which we deploy numerous detection servers on the edge of a network. FL can mitigate the impact of decreased training data in each server and exhibit almost the same detection rate as that of the non-distributed IDS for all attack classes. We verify the effect of FL using explainable artificial intelligence (XAI); this effect is demonstrated by the distance between the feature set of each attack class in the distributed IDS and that in the non-distributed IDS. The distance increases for independent learning and decreases for FL.
我们将联合学习(FL)应用于分布式入侵检测系统(IDS),在该系统中,我们在网络边缘部署了许多检测服务器。联合学习可以减轻每个服务器中训练数据减少的影响,并在所有攻击类别中表现出与非分布式 IDS 几乎相同的检测率。我们使用可解释人工智能(XAI)验证了 FL 的效果;分布式 IDS 中每个攻击类别的特征集与非分布式 IDS 中的特征集之间的距离证明了这种效果。在独立学习的情况下,距离会增大,而在 FL 的情况下,距离会减小。
{"title":"Evaluation of Applying Federated Learning to Distributed Intrusion Detection Systems Through Explainable AI","authors":"Ayaka Oki;Yukio Ogawa;Kaoru Ota;Mianxiong Dong","doi":"10.1109/LNET.2024.3465516","DOIUrl":"https://doi.org/10.1109/LNET.2024.3465516","url":null,"abstract":"We apply federated learning (FL) to a distributed intrusion detection system (IDS), in which we deploy numerous detection servers on the edge of a network. FL can mitigate the impact of decreased training data in each server and exhibit almost the same detection rate as that of the non-distributed IDS for all attack classes. We verify the effect of FL using explainable artificial intelligence (XAI); this effect is demonstrated by the distance between the feature set of each attack class in the distributed IDS and that in the non-distributed IDS. The distance increases for independent learning and decreases for FL.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 3","pages":"198-202"},"PeriodicalIF":0.0,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142518019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel Aging-Aware LSTM-Based Channel Prediction for Satellite Communications 基于信道老化感知 LSTM 的卫星通信信道预测
Pub Date : 2024-08-14 DOI: 10.1109/LNET.2024.3444495
Omid Abbasi;Georges Kaddoum
Satellite communication systems encounter channel aging issues due to the substantial distance that separates users and satellites. In such systems, the estimated channel state at a given time slot reflects the channel state from several time slots in the past. This letter proposes a long short-term memory (LSTM)-based architecture for channel prediction to mitigate the channel aging problem. The proposed scheme predicts the next time slot’s channel based on a block of estimated channel state information (CSI) from previous time slots. We consider the effect of channel aging in the training phase so that channel prediction in the testing phase is performed based on available data. We demonstrated through simulation experiments on new radio non-terrestrial network tapped delay line (NR NTN TDL) channel models, that our proposed scheme can effectively mitigate channel aging, and that it performs better than outdated channels. The proposed scheme improves the reliability and efficiency of satellite communication systems with long propagation delays.
由于用户和卫星之间相距甚远,卫星通信系统会遇到信道老化问题。在此类系统中,特定时隙的估计信道状态反映了过去几个时隙的信道状态。本文提出了一种基于长短期记忆(LSTM)的信道预测架构,以缓解信道老化问题。所提方案根据前一时隙的估计信道状态信息(CSI)块预测下一时隙的信道。我们考虑了训练阶段信道老化的影响,因此测试阶段的信道预测是基于可用数据进行的。我们通过在新型无线电非地面网络分接延迟线(NR NTN TDL)信道模型上进行仿真实验证明,我们提出的方案能有效缓解信道老化,其性能优于过时的信道。所提出的方案提高了具有长传播延迟的卫星通信系统的可靠性和效率。
{"title":"Channel Aging-Aware LSTM-Based Channel Prediction for Satellite Communications","authors":"Omid Abbasi;Georges Kaddoum","doi":"10.1109/LNET.2024.3444495","DOIUrl":"https://doi.org/10.1109/LNET.2024.3444495","url":null,"abstract":"Satellite communication systems encounter channel aging issues due to the substantial distance that separates users and satellites. In such systems, the estimated channel state at a given time slot reflects the channel state from several time slots in the past. This letter proposes a long short-term memory (LSTM)-based architecture for channel prediction to mitigate the channel aging problem. The proposed scheme predicts the next time slot’s channel based on a block of estimated channel state information (CSI) from previous time slots. We consider the effect of channel aging in the training phase so that channel prediction in the testing phase is performed based on available data. We demonstrated through simulation experiments on new radio non-terrestrial network tapped delay line (NR NTN TDL) channel models, that our proposed scheme can effectively mitigate channel aging, and that it performs better than outdated channels. The proposed scheme improves the reliability and efficiency of satellite communication systems with long propagation delays.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 3","pages":"183-187"},"PeriodicalIF":0.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142517984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance Machine Learning Robustness 引入自适应连续对抗训练 (ACAT) 增强机器学习的鲁棒性
Pub Date : 2024-08-13 DOI: 10.1109/LNET.2024.3442833
Mohamed elShehaby;Aditya Kotha;Ashraf Matrawy
Adversarial training enhances the robustness of Machine Learning (ML) models against adversarial attacks. However, obtaining labeled training and adversarial training data in network/cybersecurity domains is challenging and costly. Therefore, this letter introduces Adaptive Continuous Adversarial Training (ACAT), a novel method that integrates adversarial training samples into the model during continuous learning sessions using real-world detected adversarial data. Experimental results with a SPAM detection dataset demonstrate that ACAT reduces the time required for adversarial sample detection compared to traditional processes (up to 4 times faster when dealing with 10,000 samples). Moreover, the accuracy of the under-attack ML-based SPAM filter increased from 69% to over 88% after just three retraining sessions.
对抗性训练可增强机器学习(ML)模型在对抗性攻击面前的鲁棒性。然而,在网络/网络安全领域中获取标注训练和对抗训练数据具有挑战性且成本高昂。因此,这封信介绍了自适应连续对抗训练(ACAT),这是一种新方法,它在连续学习过程中利用真实世界检测到的对抗数据将对抗训练样本集成到模型中。使用 SPAM 检测数据集的实验结果表明,与传统方法相比,ACAT 缩短了对抗样本检测所需的时间(在处理 10,000 个样本时,快达 4 倍)。此外,仅经过三次再训练,基于欠攻击 ML 的 SPAM 过滤器的准确率就从 69% 提高到了 88% 以上。
{"title":"Introducing Adaptive Continuous Adversarial Training (ACAT) to Enhance Machine Learning Robustness","authors":"Mohamed elShehaby;Aditya Kotha;Ashraf Matrawy","doi":"10.1109/LNET.2024.3442833","DOIUrl":"https://doi.org/10.1109/LNET.2024.3442833","url":null,"abstract":"Adversarial training enhances the robustness of Machine Learning (ML) models against adversarial attacks. However, obtaining labeled training and adversarial training data in network/cybersecurity domains is challenging and costly. Therefore, this letter introduces Adaptive Continuous Adversarial Training (ACAT), a novel method that integrates adversarial training samples into the model during continuous learning sessions using real-world detected adversarial data. Experimental results with a SPAM detection dataset demonstrate that ACAT reduces the time required for adversarial sample detection compared to traditional processes (up to 4 times faster when dealing with 10,000 samples). Moreover, the accuracy of the under-attack ML-based SPAM filter increased from 69% to over 88% after just three retraining sessions.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 3","pages":"208-212"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142518018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Packet Sequence Permutation-Aware Approach to Robust Network Traffic Classification 稳健网络流量分类的数据包序列突变感知方法
Pub Date : 2024-07-30 DOI: 10.1109/LNET.2024.3435723
Yanzhuo Jiang;Xueman Wang;Yingxu Lai;Yipeng Wang
Anomalies in packet length sequences caused by network topology structure and congestion greatly impact the performance of early network traffic classification. Additionally, insufficient differentiation of packet length sequences using a small number of packets also affects the performance. In this letter, we propose SePeric, a packet sequence permutation-aware approach to robust network traffic classification. By exploring the correlations within packet length sequences and adjusting them to eliminate the effects of anomalous sequence orders, as well as extracting additional features from the byte sequence of the first packet to supplement the insufficient differentiation in packet length sequences.
网络拓扑结构和拥塞导致的数据包长度序列异常会极大地影响早期网络流量分类的性能。此外,使用少量数据包对数据包长度序列区分不足也会影响性能。在这封信中,我们提出了一种用于稳健网络流量分类的数据包序列变异感知方法 SePeric。通过探索数据包长度序列内的相关性,并对其进行调整以消除异常序列顺序的影响,以及从第一个数据包的字节序列中提取额外的特征来补充数据包长度序列区分度不足的问题。
{"title":"A Packet Sequence Permutation-Aware Approach to Robust Network Traffic Classification","authors":"Yanzhuo Jiang;Xueman Wang;Yingxu Lai;Yipeng Wang","doi":"10.1109/LNET.2024.3435723","DOIUrl":"https://doi.org/10.1109/LNET.2024.3435723","url":null,"abstract":"Anomalies in packet length sequences caused by network topology structure and congestion greatly impact the performance of early network traffic classification. Additionally, insufficient differentiation of packet length sequences using a small number of packets also affects the performance. In this letter, we propose SePeric, a packet sequence permutation-aware approach to robust network traffic classification. By exploring the correlations within packet length sequences and adjusting them to eliminate the effects of anomalous sequence orders, as well as extracting additional features from the byte sequence of the first packet to supplement the insufficient differentiation in packet length sequences.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 3","pages":"203-207"},"PeriodicalIF":0.0,"publicationDate":"2024-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142518020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Risk-Averse Outage Probability Minimization Method for RIS-Aided RSMA Systems RIS 辅助 RSMA 系统的风险规避停机概率最小化方法
Pub Date : 2024-07-18 DOI: 10.1109/LNET.2024.3430313
Yousef N. Shnaiwer;Megumi Kaneko
This letter presents a novel method for optimizing the outage performance of Reconfigurable Intelligent Surfaces (RIS)-assisted Rate-Splitting Multiple Access (RSMA) systems. The objective is to minimize the maximum outage probability for all messages to improve fairness. A new formulation based on minimizing the Entropic Value-at-Risk (EVaR) of the perceived minimum rate among all messages in the system is proposed to simplify the objective. We show that this formulation is equivalent to minimizing an upper bound on the maximum outage probability, then we transform it into a tractable smooth problem by devising a twice-differentiable approximation to it. In addition to its lower complexity, our method is shown by numerical results to outperform two benchmarks, namely, Discrete Exhaustive Search (DES) and Sequential Quadratic Programming (SQP)-based search methods.
这封信提出了一种优化可重构智能表面(RIS)辅助速率分割多路访问(RSMA)系统中断性能的新方法。目标是最小化所有信息的最大中断概率,以提高公平性。为了简化目标,我们提出了一种基于最小化系统中所有信息的感知最小速率的熵风险值(EVaR)的新方法。我们证明了这一表述等同于最大中断概率上限的最小化,然后我们通过设计二次可变近似法将其转化为一个可处理的平滑问题。除了复杂度较低之外,我们的方法还通过数值结果证明优于两个基准方法,即离散穷举搜索(DES)和基于顺序二次编程(SQP)的搜索方法。
{"title":"A Risk-Averse Outage Probability Minimization Method for RIS-Aided RSMA Systems","authors":"Yousef N. Shnaiwer;Megumi Kaneko","doi":"10.1109/LNET.2024.3430313","DOIUrl":"https://doi.org/10.1109/LNET.2024.3430313","url":null,"abstract":"This letter presents a novel method for optimizing the outage performance of Reconfigurable Intelligent Surfaces (RIS)-assisted Rate-Splitting Multiple Access (RSMA) systems. The objective is to minimize the maximum outage probability for all messages to improve fairness. A new formulation based on minimizing the Entropic Value-at-Risk (EVaR) of the perceived minimum rate among all messages in the system is proposed to simplify the objective. We show that this formulation is equivalent to minimizing an upper bound on the maximum outage probability, then we transform it into a tractable smooth problem by devising a twice-differentiable approximation to it. In addition to its lower complexity, our method is shown by numerical results to outperform two benchmarks, namely, Discrete Exhaustive Search (DES) and Sequential Quadratic Programming (SQP)-based search methods.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 3","pages":"173-178"},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142517935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Network Configuration Recommendation Using Deep Generative Graph Neural Network 使用深度生成图神经网络推荐移动网络配置
Pub Date : 2024-07-03 DOI: 10.1109/LNET.2024.3422482
Shirwan Piroti;Ashima Chawla;Tahar Zanouda
There are vast number of configurable parameters in a Radio Access Telecom Network. A significant amount of these parameters is configured by Radio Node or cell based on their deployment setting. Traditional methods rely on domain knowledge for individual parameter configuration, often leading to sub-optimal results. To improve this, a framework using a Deep Generative Graph Neural Network (GNN) is proposed. It encodes the network into a graph, extracts subgraphs for each RAN node, and employs a Siamese GNN (S-GNN) to learn embeddings. The framework recommends configuration parameters for a multitude of parameters and detects misconfigurations, handling both network expansion and existing cell reconfiguration. Tested on real-world data, the model surpasses baselines, demonstrating accuracy, generalizability, and robustness against concept drift.
无线接入电信网络中有大量可配置参数。其中大量参数由无线节点或小区根据其部署设置进行配置。传统方法依赖领域知识进行单个参数配置,往往会导致次优结果。为了改善这种情况,我们提出了一个使用深度生成图神经网络(GNN)的框架。它将网络编码成图,为每个 RAN 节点提取子图,并采用连体 GNN(S-GNN)来学习嵌入。该框架为众多参数推荐配置参数,并检测错误配置,同时处理网络扩展和现有小区的重新配置。该模型在真实世界数据上进行了测试,其准确性、通用性和对概念漂移的稳健性均超过了基准。
{"title":"Mobile Network Configuration Recommendation Using Deep Generative Graph Neural Network","authors":"Shirwan Piroti;Ashima Chawla;Tahar Zanouda","doi":"10.1109/LNET.2024.3422482","DOIUrl":"https://doi.org/10.1109/LNET.2024.3422482","url":null,"abstract":"There are vast number of configurable parameters in a Radio Access Telecom Network. A significant amount of these parameters is configured by Radio Node or cell based on their deployment setting. Traditional methods rely on domain knowledge for individual parameter configuration, often leading to sub-optimal results. To improve this, a framework using a Deep Generative Graph Neural Network (GNN) is proposed. It encodes the network into a graph, extracts subgraphs for each RAN node, and employs a Siamese GNN (S-GNN) to learn embeddings. The framework recommends configuration parameters for a multitude of parameters and detects misconfigurations, handling both network expansion and existing cell reconfiguration. Tested on real-world data, the model surpasses baselines, demonstrating accuracy, generalizability, and robustness against concept drift.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 3","pages":"179-182"},"PeriodicalIF":0.0,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142518017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Online Slice Admission Control Scheme in Next Generation Networks 下一代网络中的高效在线分片接入控制方案
Pub Date : 2024-06-19 DOI: 10.1109/LNET.2024.3416555
Solomon Orduen Yese;Sara Berri;Arsenia Chorti
This letter proposes a slice admission control scheme to maximize profit and resource utilization. It considers an online scenario where the infrastructure provider (InP) does not have full knowledge of future requests and requests can renege after their waiting time is exceeded. Moreover, it employs a dynamic priority and a capacity sharing mechanism to buy back idle resources from already accepted slices. The performance evaluation demonstrates that the proposed algorithm yields about 26%, 7%, and 7.3% higher profit, acceptance rate and resource utilization gains over the state of the art schemes, respectively.
本文提出了一种分片接入控制方案,以实现利润和资源利用率的最大化。该方案考虑了一种在线情况,即基础设施提供商(InP)并不完全了解未来的请求,请求在超过等待时间后可能会反悔。此外,它还采用了动态优先级和容量共享机制,从已接受的分片中买回闲置资源。性能评估表明,与最先进的方案相比,所提出的算法在利润、接受率和资源利用率方面分别提高了约 26%、7% 和 7.3%。
{"title":"Efficient Online Slice Admission Control Scheme in Next Generation Networks","authors":"Solomon Orduen Yese;Sara Berri;Arsenia Chorti","doi":"10.1109/LNET.2024.3416555","DOIUrl":"https://doi.org/10.1109/LNET.2024.3416555","url":null,"abstract":"This letter proposes a slice admission control scheme to maximize profit and resource utilization. It considers an online scenario where the infrastructure provider (InP) does not have full knowledge of future requests and requests can renege after their waiting time is exceeded. Moreover, it employs a dynamic priority and a capacity sharing mechanism to buy back idle resources from already accepted slices. The performance evaluation demonstrates that the proposed algorithm yields about 26%, 7%, and 7.3% higher profit, acceptance rate and resource utilization gains over the state of the art schemes, respectively.","PeriodicalId":100628,"journal":{"name":"IEEE Networking Letters","volume":"6 3","pages":"163-167"},"PeriodicalIF":0.0,"publicationDate":"2024-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142517865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IEEE Networking Letters
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1