首页 > 最新文献

ICC 2020 - 2020 IEEE International Conference on Communications (ICC)最新文献

英文 中文
Be Scalable and Rescue My Slices During Reconfiguration 在重新配置期间可伸缩并挽救我的切片
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148871
Adrien Gausseran, F. Giroire, B. Jaumard, J. Moulierac
Modern 5G networks promise more bandwidth, less delay, and more flexibility for an ever increasing number of users and applications, with Software Defined Networking, Network Function Virtualization, and Network Slicing as key enablers. Within that context, efficiently provisioning network and cloud resources of a wide variety of applications with dynamic users’ demands is a real challenge. In this work, we consider the problem of network slice reconfiguration. Reconfiguring from time to time network slices allows to reduce the network operational costs and to increase the number of slices that can be managed within the network. However, it impacts users’ Quality of Service during the reconfiguration step. To solve this issue, we study solutions implementing a make-before-break scheme. We propose new models and scalable algorithms (relying on column generation techniques) that solve large data instances in few seconds.
现代5G网络承诺为越来越多的用户和应用程序提供更多的带宽、更少的延迟和更大的灵活性,软件定义网络、网络功能虚拟化和网络切片是关键的推动因素。在这种情况下,根据动态用户的需求有效地为各种应用程序提供网络和云资源是一项真正的挑战。在这项工作中,我们考虑了网络片重构问题。不时地重新配置网络片可以降低网络运营成本,并增加网络中可管理的片的数量。但是,在重新配置步骤中,它会影响用户的服务质量。为了解决这个问题,我们研究了实现先make后break方案的解决方案。我们提出了新的模型和可扩展算法(依赖于列生成技术),可以在几秒钟内解决大型数据实例。
{"title":"Be Scalable and Rescue My Slices During Reconfiguration","authors":"Adrien Gausseran, F. Giroire, B. Jaumard, J. Moulierac","doi":"10.1109/ICC40277.2020.9148871","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148871","url":null,"abstract":"Modern 5G networks promise more bandwidth, less delay, and more flexibility for an ever increasing number of users and applications, with Software Defined Networking, Network Function Virtualization, and Network Slicing as key enablers. Within that context, efficiently provisioning network and cloud resources of a wide variety of applications with dynamic users’ demands is a real challenge. In this work, we consider the problem of network slice reconfiguration. Reconfiguring from time to time network slices allows to reduce the network operational costs and to increase the number of slices that can be managed within the network. However, it impacts users’ Quality of Service during the reconfiguration step. To solve this issue, we study solutions implementing a make-before-break scheme. We propose new models and scalable algorithms (relying on column generation techniques) that solve large data instances in few seconds.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116011966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Network-Level System Performance Prediction Using Deep Neural Networks with Cross-Layer Information 基于跨层信息的深度神经网络的网络级系统性能预测
Pub Date : 2020-06-01 DOI: 10.1109/icc40277.2020.9149189
Qi Cao, Siliang Zeng, Man-On Pun, Yi Chen
How to predict the wireless network level performance such as the network capacity, the average user data rate, and the 5%-tile user data rate is a million-dollar question. In the literature, some pioneering works have been proposed by exploiting either the information theoretic techniques on the physical layer (PHY) information or the Markov chain techniques on the multiple access control (MAC) layer information. However, since these mathematical model-driven approaches usually focus on a small part of the network structure, they cannot characterize the whole network performance. In this paper, we propose to utilize a data-driven machine learning approach to tackle this problem. More specifically, both PHY and MAC information is fed into a deep neural network (DNN) specifically designed for network-level performance prediction. Simulation results show that the network level performance can be accurately predicted at the cost of higher computational complexity.
如何预测无线网络级别的性能,如网络容量、平均用户数据速率和5%的用户数据速率,是一个非常重要的问题。在文献中,利用物理层(PHY)信息的信息理论技术或多址访问控制(MAC)层信息的马尔可夫链技术提出了一些开创性的工作。然而,由于这些数学模型驱动的方法通常只关注网络结构的一小部分,因此它们无法表征整个网络的性能。在本文中,我们建议利用数据驱动的机器学习方法来解决这个问题。更具体地说,PHY和MAC信息都被馈送到专门为网络级性能预测设计的深度神经网络(DNN)中。仿真结果表明,以较高的计算复杂度为代价,可以准确地预测网络级性能。
{"title":"Network-Level System Performance Prediction Using Deep Neural Networks with Cross-Layer Information","authors":"Qi Cao, Siliang Zeng, Man-On Pun, Yi Chen","doi":"10.1109/icc40277.2020.9149189","DOIUrl":"https://doi.org/10.1109/icc40277.2020.9149189","url":null,"abstract":"How to predict the wireless network level performance such as the network capacity, the average user data rate, and the 5%-tile user data rate is a million-dollar question. In the literature, some pioneering works have been proposed by exploiting either the information theoretic techniques on the physical layer (PHY) information or the Markov chain techniques on the multiple access control (MAC) layer information. However, since these mathematical model-driven approaches usually focus on a small part of the network structure, they cannot characterize the whole network performance. In this paper, we propose to utilize a data-driven machine learning approach to tackle this problem. More specifically, both PHY and MAC information is fed into a deep neural network (DNN) specifically designed for network-level performance prediction. Simulation results show that the network level performance can be accurately predicted at the cost of higher computational complexity.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122393496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Sub-THz Wideband System Employing 1-bit Quantization and Temporal Oversampling 采用1位量化和时间过采样的亚太赫兹宽带系统
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148753
Peter Neuhaus, Meik Dörpinghaus, H. Halbauer, Stefan Wesemann, Martin Schlüter, Florian Gast, G. Fettweis
Wireless communications systems beyond 5G are foreseen to utilize the large available bandwidths above 100 GHz. However, the power consumption of analog-to-digital converters (ADCs) for such systems is expected to be prohibitively high, because it grows quadratically with the sampling rate for high amplitude resolutions. Shifting the resolution from the amplitude to the time domain, i.e., by reducing the amplitude resolution and by employing temporal oversampling w.r.t. the Nyquist rate, is expected to be more energy efficient. To this end, we propose a novel low-cost sub-terahertz system employing zero crossing modulation (ZXM) transmit signals in combination with 1-bit quantization and temporal oversampling at the receiver. We derive and evaluate new finite-state machines for efficient de-/modulation of ZXM transmit signals, i.e., for efficient bit sequence to symbol sequence de-/mapping. Furthermore, the coded performance of the system is evaluated for a wideband line-of-sight channel.
预计5G以上的无线通信系统将利用100ghz以上的大量可用带宽。然而,用于此类系统的模数转换器(adc)的功耗预计会非常高,因为它随着高幅度分辨率的采样率呈二次增长。将分辨率从幅度域转移到时间域,即通过降低幅度分辨率和采用时间过采样w.r.t.奈奎斯特速率,预计将更加节能。为此,我们提出了一种新型的低成本亚太赫兹系统,该系统采用零交叉调制(ZXM)传输信号,结合接收器的1位量化和时间过采样。我们推导并评估了新的有限状态机,用于ZXM发射信号的有效解/调制,即有效的位序列到符号序列的解/映射。此外,还对该系统在宽带视距信道下的编码性能进行了评估。
{"title":"Sub-THz Wideband System Employing 1-bit Quantization and Temporal Oversampling","authors":"Peter Neuhaus, Meik Dörpinghaus, H. Halbauer, Stefan Wesemann, Martin Schlüter, Florian Gast, G. Fettweis","doi":"10.1109/ICC40277.2020.9148753","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148753","url":null,"abstract":"Wireless communications systems beyond 5G are foreseen to utilize the large available bandwidths above 100 GHz. However, the power consumption of analog-to-digital converters (ADCs) for such systems is expected to be prohibitively high, because it grows quadratically with the sampling rate for high amplitude resolutions. Shifting the resolution from the amplitude to the time domain, i.e., by reducing the amplitude resolution and by employing temporal oversampling w.r.t. the Nyquist rate, is expected to be more energy efficient. To this end, we propose a novel low-cost sub-terahertz system employing zero crossing modulation (ZXM) transmit signals in combination with 1-bit quantization and temporal oversampling at the receiver. We derive and evaluate new finite-state machines for efficient de-/modulation of ZXM transmit signals, i.e., for efficient bit sequence to symbol sequence de-/mapping. Furthermore, the coded performance of the system is evaluated for a wideband line-of-sight channel.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122833059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Power Minimizing BBU-RRH Group Based Mapping in C-RAN with Constrained Devices 带约束器件的C-RAN中基于BBU-RRH组的功率最小化映射
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9149214
F. Marzouk, Tafseer Akhtar, I. Politis, J. Barraca, A. Radwan
C-RAN presents an advanced mobile networking architecture that promises to tackle various challenging aspects of 5G such as increasing energy efficiency and providing high capacity. Indeed, C-RAN paves the way toward better energy efficiency by centralizing the baseband processing at cloud computing based servers (BBU pool). In this paper, we propose an RRH group based mapping (RGBM) that aims to minimize the power consumption at the BBU pool, while considering users’ QoS and BBU capacity constraints. To achieve this, the proposed scheme uses two key steps: i) the formation of RRH groups aimed at improving the QoS of weak users, ii) the formation of RRH cluster to be mapped for minimal number of BBUs requirement. The proposed scheme uses an efficient greedy heuristic to solve the optimization problem. The performance of the proposed approach was evaluated using simulations, which indicate a significant gain in terms of BBU minimization, power reduction and energy efficiency, while preserving QoS constraints, against well studied legacy solutions.
C-RAN提供了一种先进的移动网络架构,有望解决5G的各种挑战,如提高能效和提供高容量。事实上,C-RAN通过将基带处理集中在基于云计算的服务器(BBU池)上,为实现更高的能源效率铺平了道路。在本文中,我们提出了一种基于RRH组的映射(RGBM),旨在最大限度地减少BBU池的功耗,同时考虑用户的QoS和BBU容量约束。为了实现这一目标,该方案采用了两个关键步骤:1)形成RRH组,旨在提高弱用户的QoS; 2)形成RRH集群,以映射最少数量的BBUs需求。该方案采用一种高效的贪心启发式算法来解决优化问题。通过模拟对所提出方法的性能进行了评估,结果表明,与经过充分研究的传统解决方案相比,该方法在BBU最小化、功耗降低和能源效率方面具有显著的增益,同时保留了QoS约束。
{"title":"Power Minimizing BBU-RRH Group Based Mapping in C-RAN with Constrained Devices","authors":"F. Marzouk, Tafseer Akhtar, I. Politis, J. Barraca, A. Radwan","doi":"10.1109/ICC40277.2020.9149214","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9149214","url":null,"abstract":"C-RAN presents an advanced mobile networking architecture that promises to tackle various challenging aspects of 5G such as increasing energy efficiency and providing high capacity. Indeed, C-RAN paves the way toward better energy efficiency by centralizing the baseband processing at cloud computing based servers (BBU pool). In this paper, we propose an RRH group based mapping (RGBM) that aims to minimize the power consumption at the BBU pool, while considering users’ QoS and BBU capacity constraints. To achieve this, the proposed scheme uses two key steps: i) the formation of RRH groups aimed at improving the QoS of weak users, ii) the formation of RRH cluster to be mapped for minimal number of BBUs requirement. The proposed scheme uses an efficient greedy heuristic to solve the optimization problem. The performance of the proposed approach was evaluated using simulations, which indicate a significant gain in terms of BBU minimization, power reduction and energy efficiency, while preserving QoS constraints, against well studied legacy solutions.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122475767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Quadratic Programming Decoder for Binary LDPC Codes via ADMM Technique with Linear Complexity 线性复杂度的ADMM二次规划LDPC二进制码解码器
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9149405
Jing Bai, Yongchao Wang
In this paper, we develop an efficient quadratic programming (QP) decoding algorithm via the alternating direction method of multipliers (ADMM) technique for binary low density parity check (LDPC) codes. Its main content is as follows: first, through transforming the three-variables parity check equation to its equivalent expression, we relax the maximum likelihood decoding problem to a quadratic program. Second, the ADMM technique is exploited to design the solving algorithm of the resulting QP decoding model. Compared with the existing ADMM-based mathematical programming (MP) decoding algorithms, our proposed algorithm eliminates complex Euclidean projection onto the check polytope. Third, we prove that the proposed algorithm satisfies the favorable property of all-zeros assumption. Moreover, by exploiting the inside structure of the QP model, we show that the decoding complexity of our proposed algorithm in each iteration is linear in terms of LDPC code length. Simulation results demonstrate that the proposed QP decoder attains better error-correction performance than the sum-product BP decoder and costs the least amount of decoding time amongst the state-of-the-art ADMM-based MP decoding algorithms.
本文利用乘法器交替方向法(ADMM)技术,开发了一种高效的二次规划(QP)解码算法,用于二进制低密度奇偶校验(LDPC)码。其主要内容如下:首先,通过将三变量奇偶校验方程转化为等价表达式,将极大似然解码问题简化为一个二次规划。其次,利用ADMM技术设计得到的QP解码模型的求解算法。与现有的基于admm的数学规划(MP)译码算法相比,该算法消除了校验多面体上的复杂欧几里得投影。第三,证明了所提算法满足全零假设的有利性质。此外,通过利用QP模型的内部结构,我们证明了我们提出的算法在每次迭代中的解码复杂度在LDPC码长度方面是线性的。仿真结果表明,所提出的QP解码器比和积BP解码器具有更好的纠错性能,并且在目前最先进的基于admm的MP解码算法中花费的解码时间最少。
{"title":"Quadratic Programming Decoder for Binary LDPC Codes via ADMM Technique with Linear Complexity","authors":"Jing Bai, Yongchao Wang","doi":"10.1109/ICC40277.2020.9149405","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9149405","url":null,"abstract":"In this paper, we develop an efficient quadratic programming (QP) decoding algorithm via the alternating direction method of multipliers (ADMM) technique for binary low density parity check (LDPC) codes. Its main content is as follows: first, through transforming the three-variables parity check equation to its equivalent expression, we relax the maximum likelihood decoding problem to a quadratic program. Second, the ADMM technique is exploited to design the solving algorithm of the resulting QP decoding model. Compared with the existing ADMM-based mathematical programming (MP) decoding algorithms, our proposed algorithm eliminates complex Euclidean projection onto the check polytope. Third, we prove that the proposed algorithm satisfies the favorable property of all-zeros assumption. Moreover, by exploiting the inside structure of the QP model, we show that the decoding complexity of our proposed algorithm in each iteration is linear in terms of LDPC code length. Simulation results demonstrate that the proposed QP decoder attains better error-correction performance than the sum-product BP decoder and costs the least amount of decoding time amongst the state-of-the-art ADMM-based MP decoding algorithms.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122897115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Verifiable Edge Computing for Indoor Positioning 室内定位的可验证边缘计算
Pub Date : 2020-06-01 DOI: 10.1109/icc40277.2020.9148819
Shushu Liu, Zheng Yan
Edge computing has been widely adopted in many systems, thanks for its advantages to offer low latency and alleviate heavy request loads from end users. Its integration with indoor positioning is one of promising research topics. Different from a traditional positioning system where a user normally query remotely deployed positioning services provided by a Location Information Service Provider (LIS), LIS will outsource its service to an edge device, and the user can obtain the service by directly accessing the edge device in an edge computing-based system. Though the benefits from edge computing, there is still some open issues for service outsourcing. One of them is how to ensure that the outsourced service is executed honestly by the edge device. However, the current literature has not yet seriously studied this issue with a feasible solution. In this paper, we design a verification scheme to solve this open problem for indoor positioning based on edge computing. By injecting some specially designed dataset into a trained machine learning based positioning model, the functionality of outsourced model on edge devices can be verified through this dataset with regard to its prediction accuracy from outsourced model. The verification is successful only when the prediction accuracy can pass a threshold. In experiments, we provide extensive empirical evidence using state-of-the-art positioning models based on real-world datasets to prove the effectiveness of our proposed scheme and meanwhile investigate the effects caused by different factors.
边缘计算在许多系统中被广泛采用,这得益于它提供低延迟和减轻最终用户的繁重请求负载的优势。它与室内定位的结合是一个很有前途的研究课题。与传统定位系统中用户通常查询由位置信息服务提供商(Location Information Service Provider, LIS)提供的远程部署定位服务不同,LIS将其服务外包给边缘设备,用户在基于边缘计算的系统中直接访问边缘设备即可获得服务。尽管边缘计算带来了好处,但服务外包仍然存在一些悬而未决的问题。其中之一是如何确保外包服务由边缘设备诚实地执行。然而,目前的文献尚未认真研究这一问题并提出可行的解决方案。本文设计了一种基于边缘计算的室内定位验证方案来解决这一开放性问题。通过将一些专门设计的数据集注入训练好的基于机器学习的定位模型中,可以通过该数据集验证外包模型在边缘设备上的功能,以及外包模型的预测精度。只有当预测精度达到一定的阈值时,验证才会成功。在实验中,我们使用基于真实数据集的最先进的定位模型提供了广泛的经验证据,以证明我们提出的方案的有效性,同时研究了不同因素造成的影响。
{"title":"Verifiable Edge Computing for Indoor Positioning","authors":"Shushu Liu, Zheng Yan","doi":"10.1109/icc40277.2020.9148819","DOIUrl":"https://doi.org/10.1109/icc40277.2020.9148819","url":null,"abstract":"Edge computing has been widely adopted in many systems, thanks for its advantages to offer low latency and alleviate heavy request loads from end users. Its integration with indoor positioning is one of promising research topics. Different from a traditional positioning system where a user normally query remotely deployed positioning services provided by a Location Information Service Provider (LIS), LIS will outsource its service to an edge device, and the user can obtain the service by directly accessing the edge device in an edge computing-based system. Though the benefits from edge computing, there is still some open issues for service outsourcing. One of them is how to ensure that the outsourced service is executed honestly by the edge device. However, the current literature has not yet seriously studied this issue with a feasible solution. In this paper, we design a verification scheme to solve this open problem for indoor positioning based on edge computing. By injecting some specially designed dataset into a trained machine learning based positioning model, the functionality of outsourced model on edge devices can be verified through this dataset with regard to its prediction accuracy from outsourced model. The verification is successful only when the prediction accuracy can pass a threshold. In experiments, we provide extensive empirical evidence using state-of-the-art positioning models based on real-world datasets to prove the effectiveness of our proposed scheme and meanwhile investigate the effects caused by different factors.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122111654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Timemaps for Improving Performance of LoRaWAN 改进LoRaWAN性能的时间表
Pub Date : 2020-06-01 DOI: 10.1109/icc40277.2020.9148701
Thanh-Hai To, A. Duda
In this paper, we propose Timemaps, a new scheduling scheme to improve the performance of LoRaWAN. The idea is to build a temporal map of all transmissions of IoT devices by a Gateway to schedule transmissions and avoid collisions. A device when performing a Join operation includes its traffic description in the request. Based on the traffic descriptions from all devices, the Gateway constructs a schedule for channel access that avoids collisions. The Gateway includes in the Join accept the information on the temporal position of the device transmission in the schedule, the Spreading Factor (SF) to use based on measured Signal to Noise Ratio (SNR) at the Gateway, and the channel to use. We evaluate our proposal with the NS-3 simulator in both cases of perfect clocks and clocks with a drift as well as for homogeneous and inhomogeneous node density. The simulation takes into account quasi-orthogonality and the capture effect. The results show that Timemaps benefits from remarkably higher PDR and a considerably lower collision ratio compared to LoRaWAN along with slightly increased energy consumption.
为了提高LoRaWAN的性能,我们提出了一种新的调度方案Timemaps。这个想法是通过网关建立物联网设备所有传输的时间图,以安排传输并避免冲突。设备在执行连接操作时,在请求中包含其流量描述。网关根据来自所有设备的流量描述,构建一个避免冲突的通道访问调度。网关在Join中包括接收有关设备传输在调度中的时间位置的信息,根据网关处测量的信噪比(SNR)使用的扩展因子(SF)以及要使用的信道。我们用NS-3模拟器在完美时钟和带有漂移的时钟以及均匀和非均匀节点密度的情况下评估了我们的建议。仿真考虑了准正交性和捕获效应。结果表明,与LoRaWAN相比,Timemaps受益于显著更高的PDR和相当低的碰撞率,同时能耗略有增加。
{"title":"Timemaps for Improving Performance of LoRaWAN","authors":"Thanh-Hai To, A. Duda","doi":"10.1109/icc40277.2020.9148701","DOIUrl":"https://doi.org/10.1109/icc40277.2020.9148701","url":null,"abstract":"In this paper, we propose Timemaps, a new scheduling scheme to improve the performance of LoRaWAN. The idea is to build a temporal map of all transmissions of IoT devices by a Gateway to schedule transmissions and avoid collisions. A device when performing a Join operation includes its traffic description in the request. Based on the traffic descriptions from all devices, the Gateway constructs a schedule for channel access that avoids collisions. The Gateway includes in the Join accept the information on the temporal position of the device transmission in the schedule, the Spreading Factor (SF) to use based on measured Signal to Noise Ratio (SNR) at the Gateway, and the channel to use. We evaluate our proposal with the NS-3 simulator in both cases of perfect clocks and clocks with a drift as well as for homogeneous and inhomogeneous node density. The simulation takes into account quasi-orthogonality and the capture effect. The results show that Timemaps benefits from remarkably higher PDR and a considerably lower collision ratio compared to LoRaWAN along with slightly increased energy consumption.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117103997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Clustering Scheme for Heterogeneous Vehicular Networks 一种新的异构车辆网络聚类方案
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9149404
A. Jalooli, Kuilin Zhang, Min Song, Wenye Wang
Effective clustering is vital to mitigate routing scalability and reliability issues in heterogeneous vehicular networks. In this paper, we propose an adaptive clustering scheme to maximize the cluster stability in vehicular networks. The scheme uses the predicted driving behavior of vehicles over a time horizon to maximize the clusters’ lifetime. To this end, we first define the stability degree of vehicles by exploiting the unique aspects of vehicular environments. We then formulate the clustering problem as an optimization problem, which is used within a rolling horizon framework in the cluster formation process. Our scheme is based on a heterogeneous vehicular network architecture, which allows the coexistence of dedicated short-range communication and cellular network for vehicular communications. The simulation results demonstrate that our scheme significantly outperforms alternative clustering algorithms in terms of the overall clusters’ lifetime under different traffic conditions. Our scheme can also be utilized to provide a well-grounded comprehension of the optimally of the existing and future distributed clustering algorithms.
有效的集群对于缓解异构车辆网络中的路由可扩展性和可靠性问题至关重要。在本文中,我们提出了一种自适应聚类方案,以最大限度地提高车辆网络的聚类稳定性。该方案使用预测的车辆在一段时间内的驾驶行为来最大化集群的使用寿命。为此,我们首先通过利用车辆环境的独特方面来定义车辆的稳定性。然后,我们将聚类问题表述为一个优化问题,在聚类形成过程中使用滚动水平框架。我们的方案是基于一种异构的车载网络架构,它允许专用的短距离通信和蜂窝网络共存于车载通信。仿真结果表明,在不同的流量条件下,我们的方案在整体簇寿命方面明显优于其他聚类算法。我们的方案还可以用于提供对现有和未来分布式聚类算法的最佳理解。
{"title":"A Novel Clustering Scheme for Heterogeneous Vehicular Networks","authors":"A. Jalooli, Kuilin Zhang, Min Song, Wenye Wang","doi":"10.1109/ICC40277.2020.9149404","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9149404","url":null,"abstract":"Effective clustering is vital to mitigate routing scalability and reliability issues in heterogeneous vehicular networks. In this paper, we propose an adaptive clustering scheme to maximize the cluster stability in vehicular networks. The scheme uses the predicted driving behavior of vehicles over a time horizon to maximize the clusters’ lifetime. To this end, we first define the stability degree of vehicles by exploiting the unique aspects of vehicular environments. We then formulate the clustering problem as an optimization problem, which is used within a rolling horizon framework in the cluster formation process. Our scheme is based on a heterogeneous vehicular network architecture, which allows the coexistence of dedicated short-range communication and cellular network for vehicular communications. The simulation results demonstrate that our scheme significantly outperforms alternative clustering algorithms in terms of the overall clusters’ lifetime under different traffic conditions. Our scheme can also be utilized to provide a well-grounded comprehension of the optimally of the existing and future distributed clustering algorithms.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129690271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Adaptive Hybrid Beamforming Scheme for Time-Varying Wideband Massive MIMO Channels 时变宽带海量MIMO信道的自适应混合波束形成方案
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9148971
Anil Kurt, G. M. Guvensen
In this paper, adaptive hybrid beamforming methods are proposed for millimeter-wave range massive MIMO systems considering single carrier wideband transmission in uplink data mode. A statistical analog beamformer is adaptively constructed in slow-time, while the channel is time-varying and erroneously estimated. Proposed recursive filtering approach is shown to bring a remarkable robustness against estimation errors. Then, analytical modifications are applied on an analog beamformer design method and approximated expressions are obtained for channel covariance matrices that decouple angular spread and center angle of multipath components. Resultant adaptive construction methods use only the estimated power levels on angular patches and they are shown to be very efficient such that they reduce computational complexity significantly while the performance remains almost the same.
本文针对毫米波范围的大规模MIMO系统,在上行数据模式下考虑单载波宽带传输,提出了自适应混合波束形成方法。在信道时变且估计错误的情况下,在慢时自适应构造统计模拟波束形成器。所提出的递归滤波方法对估计误差具有显著的鲁棒性。然后,对一种模拟波束形成器设计方法进行了解析修正,得到了解耦多径分量角扩展和圆心角的信道协方差矩阵的近似表达式。由此产生的自适应构造方法仅使用角斑块上的估计功率水平,并且它们被证明是非常有效的,因此它们在性能几乎保持不变的情况下显着降低了计算复杂性。
{"title":"An Adaptive Hybrid Beamforming Scheme for Time-Varying Wideband Massive MIMO Channels","authors":"Anil Kurt, G. M. Guvensen","doi":"10.1109/ICC40277.2020.9148971","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9148971","url":null,"abstract":"In this paper, adaptive hybrid beamforming methods are proposed for millimeter-wave range massive MIMO systems considering single carrier wideband transmission in uplink data mode. A statistical analog beamformer is adaptively constructed in slow-time, while the channel is time-varying and erroneously estimated. Proposed recursive filtering approach is shown to bring a remarkable robustness against estimation errors. Then, analytical modifications are applied on an analog beamformer design method and approximated expressions are obtained for channel covariance matrices that decouple angular spread and center angle of multipath components. Resultant adaptive construction methods use only the estimated power levels on angular patches and they are shown to be very efficient such that they reduce computational complexity significantly while the performance remains almost the same.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"1992 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128613042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TPDD: A Two-Phase DDoS Detection System in Software-Defined Networking TPDD:软件定义网络中的两阶段DDoS检测系统
Pub Date : 2020-06-01 DOI: 10.1109/ICC40277.2020.9149276
Yi Shen, Chunming Wu, Dezhang Kong, Mingliang Yang
Distributed Denial of Service (DDoS) attack is one of the most severe threats to the current network security. As a new network architecture, Software-Defined Networking (SDN) draws notable attention from both industry and academia. The characteristics of SDN such as centralized management and flow-based traffic monitoring make it an ideal platform to defend against DDoS attacks. When designing a network intrusion detection system (NIDS) in SDN, how to obtain fine-grained flow information with minimal overhead to the SDN architecture is a problem to be solved. In this paper, we propose TPDD, a two-phase DDoS detection system to detect DDoS attacks in SDN. In the first phase, we utilize the characteristics of SDN to collect coarse-grained flow information from the core switches and locate the potential victim. Then we monitor the edge switches located close to the potential victim to obtain finer-grained traffic information in the second phase. The collection method of each phase fully considers the impact on the bandwidth between the controller and switches. Without modifying the existing flow rules, the collection module can obtain sufficient information about traffic. By using entropy-based and machine learning-based methods, the detection module can effectively detect anomalies and identify whether the potential victim marked in the first phase is the target of attacks. Experimental results show that TPDD can effectively detect DDoS attacks with little overhead.
分布式拒绝服务(DDoS)攻击是当前网络安全面临的最严重威胁之一。软件定义网络(SDN)作为一种新型的网络架构,受到了业界和学术界的广泛关注。SDN集中管理、流量监控等特点使其成为防范DDoS攻击的理想平台。在设计SDN网络入侵检测系统(NIDS)时,如何以最小的SDN架构开销获取细粒度的流量信息是一个需要解决的问题。本文提出了一种两阶段DDoS检测系统TPDD来检测SDN中的DDoS攻击。在第一阶段,我们利用SDN的特性从核心交换机收集粗粒度的流量信息并定位潜在的受害者。然后,我们在第二阶段监控靠近潜在受害者的边缘交换机,以获得更细粒度的流量信息。各相位的采集方法充分考虑了对控制器与交换机之间带宽的影响。在不修改现有流规则的情况下,采集模块可以获得足够的流量信息。检测模块通过基于熵和基于机器学习的方法,有效检测异常,识别第一阶段标记的潜在受害者是否为攻击目标。实验结果表明,TPDD能够有效检测DDoS攻击,开销很小。
{"title":"TPDD: A Two-Phase DDoS Detection System in Software-Defined Networking","authors":"Yi Shen, Chunming Wu, Dezhang Kong, Mingliang Yang","doi":"10.1109/ICC40277.2020.9149276","DOIUrl":"https://doi.org/10.1109/ICC40277.2020.9149276","url":null,"abstract":"Distributed Denial of Service (DDoS) attack is one of the most severe threats to the current network security. As a new network architecture, Software-Defined Networking (SDN) draws notable attention from both industry and academia. The characteristics of SDN such as centralized management and flow-based traffic monitoring make it an ideal platform to defend against DDoS attacks. When designing a network intrusion detection system (NIDS) in SDN, how to obtain fine-grained flow information with minimal overhead to the SDN architecture is a problem to be solved. In this paper, we propose TPDD, a two-phase DDoS detection system to detect DDoS attacks in SDN. In the first phase, we utilize the characteristics of SDN to collect coarse-grained flow information from the core switches and locate the potential victim. Then we monitor the edge switches located close to the potential victim to obtain finer-grained traffic information in the second phase. The collection method of each phase fully considers the impact on the bandwidth between the controller and switches. Without modifying the existing flow rules, the collection module can obtain sufficient information about traffic. By using entropy-based and machine learning-based methods, the detection module can effectively detect anomalies and identify whether the potential victim marked in the first phase is the target of attacks. Experimental results show that TPDD can effectively detect DDoS attacks with little overhead.","PeriodicalId":106560,"journal":{"name":"ICC 2020 - 2020 IEEE International Conference on Communications (ICC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129086074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
ICC 2020 - 2020 IEEE International Conference on Communications (ICC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1