Pub Date : 2021-09-20DOI: 10.1109/BalkanCom53780.2021.9593185
Osama M. Bushnaq, I. Zhilin, Giulia De Masi, E. Natalizio, I. Akyildiz
Large-scale underwater wireless communications networks are gaining interest as they represent a key enabling factor for applications spanning over several domains, such as environmental, commercial and civilian applications. To enable a cost-effective underwater (UW) network deployment and management, multiple applications with different service-level-agreement (SLA) requirements can be served using the same network infrastructure, enabling globally optimized resource management. Since different SLA requirements might belong to different stakeholders, the underwater acoustic communication systems (UACS) must support functional isolation of services. Therefore, network slicing is essential for such networks. In this paper, a novel optimization framework is introduced for automatic network slicing (ANS) of resources for UACS that enables dynamic resource allocation based on the SLAs. It achieves globally optimized solutions, enhances quality of service (QoS), simplifies network operation, and reduces deployment costs. Such paradigm is also compatible with 5G/6G networks. The proposed automatic slicing framework takes into account the challenging underwater acoustic channel characteristics to provide a heuristic sub-optimal routing and resource allocation solution based on the SLA given/required by the stakeholders/applications. Insightful numerical analysis is provided to verify the suggested model and evaluate its flexibility and efficiency.
{"title":"Automatic Network Slicing for Resource Allocation in Underwater Acoustic Communication Systems","authors":"Osama M. Bushnaq, I. Zhilin, Giulia De Masi, E. Natalizio, I. Akyildiz","doi":"10.1109/BalkanCom53780.2021.9593185","DOIUrl":"https://doi.org/10.1109/BalkanCom53780.2021.9593185","url":null,"abstract":"Large-scale underwater wireless communications networks are gaining interest as they represent a key enabling factor for applications spanning over several domains, such as environmental, commercial and civilian applications. To enable a cost-effective underwater (UW) network deployment and management, multiple applications with different service-level-agreement (SLA) requirements can be served using the same network infrastructure, enabling globally optimized resource management. Since different SLA requirements might belong to different stakeholders, the underwater acoustic communication systems (UACS) must support functional isolation of services. Therefore, network slicing is essential for such networks. In this paper, a novel optimization framework is introduced for automatic network slicing (ANS) of resources for UACS that enables dynamic resource allocation based on the SLAs. It achieves globally optimized solutions, enhances quality of service (QoS), simplifies network operation, and reduces deployment costs. Such paradigm is also compatible with 5G/6G networks. The proposed automatic slicing framework takes into account the challenging underwater acoustic channel characteristics to provide a heuristic sub-optimal routing and resource allocation solution based on the SLA given/required by the stakeholders/applications. Insightful numerical analysis is provided to verify the suggested model and evaluate its flexibility and efficiency.","PeriodicalId":115090,"journal":{"name":"2021 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-20DOI: 10.1109/BalkanCom53780.2021.9593164
A. Tonello, N. A. Letizia, M. De Piante
In wireline communication networks, a line impedance entanglement exists since changes of the line impedance at one network port cause a change of the line impedance at the other port. This physical phenomenon can be constructively exploited to realize a form of digital modulation that is referred to as impedance modulation (IM). IM is an alternative method to more conventional voltage modulation (VM). In this paper, the impedance entanglement is studied and learned through a supervised machine learning (ML) approach which enables the implementation of a ML based receiver. Numerical results are obtained in a data set of measured power line communication channels, which is among the most challenging environments for such a modulation approach. The resulting system can have practical implementation, for instance in a smart building automation network where monitoring-control of sensors and devices enables the efficient energy management. Comparisons with the optimal maximum-likelihood (MaxL) receiver that perfectly knows the impedance entanglement transfer function are made. It is found that the ML based receiver performs close to the optimal genie receiver.
{"title":"Learning the Impedance Entanglement for Wireline Data Communication","authors":"A. Tonello, N. A. Letizia, M. De Piante","doi":"10.1109/BalkanCom53780.2021.9593164","DOIUrl":"https://doi.org/10.1109/BalkanCom53780.2021.9593164","url":null,"abstract":"In wireline communication networks, a line impedance entanglement exists since changes of the line impedance at one network port cause a change of the line impedance at the other port. This physical phenomenon can be constructively exploited to realize a form of digital modulation that is referred to as impedance modulation (IM). IM is an alternative method to more conventional voltage modulation (VM). In this paper, the impedance entanglement is studied and learned through a supervised machine learning (ML) approach which enables the implementation of a ML based receiver. Numerical results are obtained in a data set of measured power line communication channels, which is among the most challenging environments for such a modulation approach. The resulting system can have practical implementation, for instance in a smart building automation network where monitoring-control of sensors and devices enables the efficient energy management. Comparisons with the optimal maximum-likelihood (MaxL) receiver that perfectly knows the impedance entanglement transfer function are made. It is found that the ML based receiver performs close to the optimal genie receiver.","PeriodicalId":115090,"journal":{"name":"2021 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128124297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-20DOI: 10.1109/balkancom53780.2021.9593208
Eugene Chai, M. Poletti, N. Mandayam, S. Rangan, Seong H. Kim
{"title":"Detailed Technical Program","authors":"Eugene Chai, M. Poletti, N. Mandayam, S. Rangan, Seong H. Kim","doi":"10.1109/balkancom53780.2021.9593208","DOIUrl":"https://doi.org/10.1109/balkancom53780.2021.9593208","url":null,"abstract":"","PeriodicalId":115090,"journal":{"name":"2021 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115851703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-20DOI: 10.1109/BalkanCom53780.2021.9593153
Marija Poposka, Z. Hadzi-Velkov
Mobile edge computing (MEC) has recently emerged as a new communications/computing concept that is able to tackle the limited computing capabilities of practical IoT devices. It is characterized by “outsourcing” the computation functions from the user device to the network edge, usually to the base station. In this way, computation-intensive and time-sensitive computations for some applications can be realized by MEC servers that have practically unlimited computing resources. This paper provides a broad outlook on the MEC concept and technology, including architecture and applicable communication/computation model for its design and analysis. We also study the promising idea for the merger between MEC and the wireless power transfer (WPT), which further strengthens the MEC concept due to the feasibility of end devices with perpetual power supply. For a simple WPT-assisted MEC network, we propose a resource allocation scheme that guarantees fairness among the energy harvesting users. The resulting computation rates make the proposed scheme attractive for practical purposes.
{"title":"Edge Computing: System Overview and Fusion with Wireless Power Transfer","authors":"Marija Poposka, Z. Hadzi-Velkov","doi":"10.1109/BalkanCom53780.2021.9593153","DOIUrl":"https://doi.org/10.1109/BalkanCom53780.2021.9593153","url":null,"abstract":"Mobile edge computing (MEC) has recently emerged as a new communications/computing concept that is able to tackle the limited computing capabilities of practical IoT devices. It is characterized by “outsourcing” the computation functions from the user device to the network edge, usually to the base station. In this way, computation-intensive and time-sensitive computations for some applications can be realized by MEC servers that have practically unlimited computing resources. This paper provides a broad outlook on the MEC concept and technology, including architecture and applicable communication/computation model for its design and analysis. We also study the promising idea for the merger between MEC and the wireless power transfer (WPT), which further strengthens the MEC concept due to the feasibility of end devices with perpetual power supply. For a simple WPT-assisted MEC network, we propose a resource allocation scheme that guarantees fairness among the energy harvesting users. The resulting computation rates make the proposed scheme attractive for practical purposes.","PeriodicalId":115090,"journal":{"name":"2021 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115812496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-20DOI: 10.1109/balkancom53780.2021.9593209
{"title":"[BalkanCom 2021 Front cover]","authors":"","doi":"10.1109/balkancom53780.2021.9593209","DOIUrl":"https://doi.org/10.1109/balkancom53780.2021.9593209","url":null,"abstract":"","PeriodicalId":115090,"journal":{"name":"2021 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114956640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-20DOI: 10.1109/BalkanCom53780.2021.9593262
S. Ali, Č. Stefanović
In this paper, we study the performance of a first responders health monitoring system, where the timeliness update is of crucial importance. The source generates sensory observations of first responders health in the form of packets, which are then served by an M/D/1 queue over an erasure channel. The system efficiency is investigated in terms of the value-of-information (VoI) and the age-of-information (AoI). We consider different queuing disciplines and traffic intensities. The general conclusion is that, in the considered model, the Last-Come, First-Serve queue with preemption maximizes VoI and minimizes AoI.
{"title":"A Study on Value-of-Information and Age-of-Information in a First Responders Health Monitoring System","authors":"S. Ali, Č. Stefanović","doi":"10.1109/BalkanCom53780.2021.9593262","DOIUrl":"https://doi.org/10.1109/BalkanCom53780.2021.9593262","url":null,"abstract":"In this paper, we study the performance of a first responders health monitoring system, where the timeliness update is of crucial importance. The source generates sensory observations of first responders health in the form of packets, which are then served by an M/D/1 queue over an erasure channel. The system efficiency is investigated in terms of the value-of-information (VoI) and the age-of-information (AoI). We consider different queuing disciplines and traffic intensities. The general conclusion is that, in the considered model, the Last-Come, First-Serve queue with preemption maximizes VoI and minimizes AoI.","PeriodicalId":115090,"journal":{"name":"2021 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129146263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-20DOI: 10.1109/BalkanCom53780.2021.9593134
Vasileios Dragonas, Georgios Tsoumanis, K. Oikonomou
Entering the age of the Internet of Things, millions of devices with different requirements and diverse characteristics will soon be interconnected. This interconnection, depending on the scenario, can be achieved either through the cloud or by implementing an ad hoc network. Frequent topology changes and energy consumption issues create the need for researching new MAC Policies that are better suited to tackle the aforementioned problems.In this paper a TDMA Medium Access Control Policy for wireless ad hoc networks is proposed which is unaware of the underlying topology. The proposed policy is based on an already existing topology-independent policy which utilizes the non-assigned TDMA slots by means of transmitting during them probabilistically. The policy suggested here tries to improve by identifying transmissions that have a high chance of creating collisions. Experimental results show that the proposed policy achieves better performance in terms of system throughput and at the same time achieves fewer total transmissions, thus contributing in energy conservation.
{"title":"A Refined Topology-Independent Probabilistic TDMA MAC Policy for Ad Hoc Networks","authors":"Vasileios Dragonas, Georgios Tsoumanis, K. Oikonomou","doi":"10.1109/BalkanCom53780.2021.9593134","DOIUrl":"https://doi.org/10.1109/BalkanCom53780.2021.9593134","url":null,"abstract":"Entering the age of the Internet of Things, millions of devices with different requirements and diverse characteristics will soon be interconnected. This interconnection, depending on the scenario, can be achieved either through the cloud or by implementing an ad hoc network. Frequent topology changes and energy consumption issues create the need for researching new MAC Policies that are better suited to tackle the aforementioned problems.In this paper a TDMA Medium Access Control Policy for wireless ad hoc networks is proposed which is unaware of the underlying topology. The proposed policy is based on an already existing topology-independent policy which utilizes the non-assigned TDMA slots by means of transmitting during them probabilistically. The policy suggested here tries to improve by identifying transmissions that have a high chance of creating collisions. Experimental results show that the proposed policy achieves better performance in terms of system throughput and at the same time achieves fewer total transmissions, thus contributing in energy conservation.","PeriodicalId":115090,"journal":{"name":"2021 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123774959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-20DOI: 10.1109/BalkanCom53780.2021.9593161
Mert Pekey, Yiğit Deniz Çelebi, C. Anıl, A. Levi
The spread of smart home technologies not only brings convenience but also creates various security and privacy concerns among users. Electricity consumption data collected by smart meters is one of the sources of these concerns. The electricity consumption of the appliances working at home made it possible to have information about the private life of the household. This study is aimed to reveal a classification model by using the electricity consumption data obtained as a result of the study conducted in Ireland and the results of the survey study conducted with the households. While the first method in the study aims to access information about private life directly with electricity consumption data, the second method uses the predictions of one private information to improve the results of the prediction of another related information. As a result, it has been concluded that electricity consumption data can be used in the process of obtaining information about private life, and that the use of relationship between two information leads to an improvement in model performance. This study shows one of the obstacles that may occur in the spread of smart houses and has prepared the environment for studies that can be done on the subject of solution.
{"title":"Private Information Inference of Households from Electricity Consumption Data","authors":"Mert Pekey, Yiğit Deniz Çelebi, C. Anıl, A. Levi","doi":"10.1109/BalkanCom53780.2021.9593161","DOIUrl":"https://doi.org/10.1109/BalkanCom53780.2021.9593161","url":null,"abstract":"The spread of smart home technologies not only brings convenience but also creates various security and privacy concerns among users. Electricity consumption data collected by smart meters is one of the sources of these concerns. The electricity consumption of the appliances working at home made it possible to have information about the private life of the household. This study is aimed to reveal a classification model by using the electricity consumption data obtained as a result of the study conducted in Ireland and the results of the survey study conducted with the households. While the first method in the study aims to access information about private life directly with electricity consumption data, the second method uses the predictions of one private information to improve the results of the prediction of another related information. As a result, it has been concluded that electricity consumption data can be used in the process of obtaining information about private life, and that the use of relationship between two information leads to an improvement in model performance. This study shows one of the obstacles that may occur in the spread of smart houses and has prepared the environment for studies that can be done on the subject of solution.","PeriodicalId":115090,"journal":{"name":"2021 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122638698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-20DOI: 10.1109/BalkanCom53780.2021.9593260
Fatih Yürekli, Tolga Girici
Due to their flexible deployment and line-of-sight channel conditions, drone base stations is a promising technology. Recent developments in Massive MIMO tranmission with millimeter-wave beamforming also enables high data rates and enables simultaneous transmission to multiple ground users. In this work we consider the problem of deployment (i.e. positioning) of drone base stations and analog MIMO beamforming that maximizes SINR. Simulation results reveal that careful K-Means clustering of ground users, together with DFT-based beamforming provides a promising performance.
{"title":"Optimal Precoding and Deployment of Millimeter-Wave Drone Base Stations","authors":"Fatih Yürekli, Tolga Girici","doi":"10.1109/BalkanCom53780.2021.9593260","DOIUrl":"https://doi.org/10.1109/BalkanCom53780.2021.9593260","url":null,"abstract":"Due to their flexible deployment and line-of-sight channel conditions, drone base stations is a promising technology. Recent developments in Massive MIMO tranmission with millimeter-wave beamforming also enables high data rates and enables simultaneous transmission to multiple ground users. In this work we consider the problem of deployment (i.e. positioning) of drone base stations and analog MIMO beamforming that maximizes SINR. Simulation results reveal that careful K-Means clustering of ground users, together with DFT-based beamforming provides a promising performance.","PeriodicalId":115090,"journal":{"name":"2021 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114252368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-20DOI: 10.1109/BalkanCom53780.2021.9593243
Konstantinos Skiadopoulos, Athanasios Tsipis, K. Oikonomou
Several critical operations depend on various types of information dissemination in the Internet of Things (IoT) networks. To avoid costly flooding-based solutions in these typically large-scale network environments, it is frequently sufficient enough to involve only a proper subset of the nodes (or backbone network), ensuring that every other node will be at most d hops away from a node belonging to the specific subset, i.e., a connected dominating set (CDS). In many cases, the outputted CDS size is upper bounded by a specific physical requirement or constraints relating to the limited available processing and memory capacities of the IoT nodes. Thus, a budget parameter k is frequently introduced as an upper bound for the number of nodes comprising the CDS, leading to the creation of a Budget Connected Dominating Set (BCDS). In this work, a novel distributed algorithm for constructing a BCDS is proposed based on information available d hops away from the network nodes, assuming an upper budget k limit regarding its final size. An additional upper bound parameter relating to the number of sent messages for each node, i.e., the stop, is also for the first time utilized. It is shown using simulation results that when stop is employed, a BCDS with increased coverage (i.e., the fraction of nodes at most d hops away from the BCDS nodes) is constructed under the proposed algorithm.
{"title":"Constructing Budget Connected Dominating Sets in Large-Scale IoT Network Environments","authors":"Konstantinos Skiadopoulos, Athanasios Tsipis, K. Oikonomou","doi":"10.1109/BalkanCom53780.2021.9593243","DOIUrl":"https://doi.org/10.1109/BalkanCom53780.2021.9593243","url":null,"abstract":"Several critical operations depend on various types of information dissemination in the Internet of Things (IoT) networks. To avoid costly flooding-based solutions in these typically large-scale network environments, it is frequently sufficient enough to involve only a proper subset of the nodes (or backbone network), ensuring that every other node will be at most d hops away from a node belonging to the specific subset, i.e., a connected dominating set (CDS). In many cases, the outputted CDS size is upper bounded by a specific physical requirement or constraints relating to the limited available processing and memory capacities of the IoT nodes. Thus, a budget parameter k is frequently introduced as an upper bound for the number of nodes comprising the CDS, leading to the creation of a Budget Connected Dominating Set (BCDS). In this work, a novel distributed algorithm for constructing a BCDS is proposed based on information available d hops away from the network nodes, assuming an upper budget k limit regarding its final size. An additional upper bound parameter relating to the number of sent messages for each node, i.e., the stop, is also for the first time utilized. It is shown using simulation results that when stop is employed, a BCDS with increased coverage (i.e., the fraction of nodes at most d hops away from the BCDS nodes) is constructed under the proposed algorithm.","PeriodicalId":115090,"journal":{"name":"2021 International Balkan Conference on Communications and Networking (BalkanCom)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122609637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}