首页 > 最新文献

2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)最新文献

英文 中文
Siren: A platform for deploying virtual network services in the cloud to Fog continuum Siren:用于在云中部署虚拟网络服务到雾连续体的平台
Pub Date : 2018-05-31 DOI: 10.1109/WCNCW.2018.8368994
L. Fawcett, M. Broadbent, N. Race
The burden put on network infrastructures is changing. The increasing number of connected devices, along with growing demand, are creating an unsustainable future for the Internet. The recently introduced concept of Fog computing predicts a future Internet where general compute power is ubiquitous, extending the Cloud right the way to the network edge. In turn, this acts as a catalyst for Network Functions Virtualisation (NFV), increasing the potential infrastructure locations for deploying new services, specifically ones that can cater to the demands of the changing Internet. However, current realisations of NFV typically host network functions in homogeneous, centralised servers in Cloud infrastructures. This is in contrast to the Fog where environments are both distributed and heterogeneous, thus current management and orchestration platforms suffer from suboptimal service deployment. With the use of a multiple use cases, and a novel auctioning orchestration method, this paper presents Siren, which is an orchestrator for network functions in the Cloud to Fog continuum.
网络基础设施的负担正在发生变化。越来越多的连接设备,以及不断增长的需求,正在为互联网创造一个不可持续的未来。最近引入的雾计算概念预测了未来的互联网,其中通用计算能力无处不在,将云扩展到网络边缘。反过来,这作为网络功能虚拟化(NFV)的催化剂,增加了部署新服务的潜在基础设施位置,特别是那些可以满足不断变化的互联网需求的基础设施位置。然而,目前NFV的实现通常将网络功能托管在云基础设施中的同构、集中式服务器上。这与雾环境形成了对比,雾环境既是分布式的又是异构的,因此当前的管理和编排平台遭受了次优服务部署的困扰。本文利用多用例和一种新的拍卖编排方法,提出了一种用于云到雾连续体中网络功能的编排器Siren。
{"title":"Siren: A platform for deploying virtual network services in the cloud to Fog continuum","authors":"L. Fawcett, M. Broadbent, N. Race","doi":"10.1109/WCNCW.2018.8368994","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8368994","url":null,"abstract":"The burden put on network infrastructures is changing. The increasing number of connected devices, along with growing demand, are creating an unsustainable future for the Internet. The recently introduced concept of Fog computing predicts a future Internet where general compute power is ubiquitous, extending the Cloud right the way to the network edge. In turn, this acts as a catalyst for Network Functions Virtualisation (NFV), increasing the potential infrastructure locations for deploying new services, specifically ones that can cater to the demands of the changing Internet. However, current realisations of NFV typically host network functions in homogeneous, centralised servers in Cloud infrastructures. This is in contrast to the Fog where environments are both distributed and heterogeneous, thus current management and orchestration platforms suffer from suboptimal service deployment. With the use of a multiple use cases, and a novel auctioning orchestration method, this paper presents Siren, which is an orchestrator for network functions in the Cloud to Fog continuum.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116107659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Good neighbor distributed beam scheduling in coexisting multi-RAT networks 共存多rat网络中的好邻居分布式波束调度
Pub Date : 2018-04-26 DOI: 10.1109/WCNCW.2018.8368979
A. M. Kuzminskiy, P. Xiao, R. Tafazolli
Spectrum sharing and employing highly directional antennas in the mm-wave bands are considered among the key enablers for 5G networks. Conventional interference avoidance techniques like listen-before-talk (LBT) may not be efficient for such coexisting networks. In this paper, we address a coexistence mechanism by means of distributed beam scheduling with minimum cooperation between spectrum sharing subsystems without any direct data exchange between them. We extend a “Good Neighbor” (GN) principle initially developed for decentralized spectrum allocation to the distributed beam scheduling problem. To do that, we introduce relative performance targets, develop a GN beam scheduling algorithm, and demonstrate its efficiency in terms of performance/complexity trade off compared to that of the conventional selfish (SLF) and recently proposed distributed learning scheduling (DLS) solutions by means of simulations in highly directional antenna mm-wave scenarios.
频谱共享和在毫米波频段使用高定向天线被认为是5G网络的关键推动因素。传统的干扰避免技术,如先听后说(LBT)可能对这种共存的网络并不有效。本文提出了一种分布式波束调度的共存机制,使频谱共享子系统之间的协作最小化,而不需要直接的数据交换。我们将最初用于分散频谱分配的“好邻居”(GN)原则扩展到分布式波束调度问题。为了做到这一点,我们引入了相对的性能目标,开发了一种GN波束调度算法,并通过在高定向天线毫米波场景下的模拟,与传统的自私(SLF)和最近提出的分布式学习调度(DLS)解决方案相比,展示了其在性能/复杂性权衡方面的效率。
{"title":"Good neighbor distributed beam scheduling in coexisting multi-RAT networks","authors":"A. M. Kuzminskiy, P. Xiao, R. Tafazolli","doi":"10.1109/WCNCW.2018.8368979","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8368979","url":null,"abstract":"Spectrum sharing and employing highly directional antennas in the mm-wave bands are considered among the key enablers for 5G networks. Conventional interference avoidance techniques like listen-before-talk (LBT) may not be efficient for such coexisting networks. In this paper, we address a coexistence mechanism by means of distributed beam scheduling with minimum cooperation between spectrum sharing subsystems without any direct data exchange between them. We extend a “Good Neighbor” (GN) principle initially developed for decentralized spectrum allocation to the distributed beam scheduling problem. To do that, we introduce relative performance targets, develop a GN beam scheduling algorithm, and demonstrate its efficiency in terms of performance/complexity trade off compared to that of the conventional selfish (SLF) and recently proposed distributed learning scheduling (DLS) solutions by means of simulations in highly directional antenna mm-wave scenarios.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116132427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A machine learning-based approach for virtual network function modeling 基于机器学习的虚拟网络功能建模方法
Pub Date : 2018-04-15 DOI: 10.1109/WCNCW.2018.8369019
Albert Mestres, E. Alarcón, A. Cabellos-Aparicio
Recent trends in networking are proposing the use of Machine Learning (ML) techniques for the control and operation of the network. The application of ML to networking brings several use-cases as well as challenges. The objective of this paper is to explore the feasibility of applying different models and ML techniques to model complex networks elements, such as Virtual Network Functions (VNFs). In particular, we focus on the characterization of the CPU consumption of the VNF as a function of the characteristics of the input traffic. The traffic is represented by a set of features describing characteristics from the transport layer to the application layer in small time batches. The CPU consumption is observed from the hypervisor and corresponds to the average CPU consumption when the traffic batch is processed. We experimentally demonstrate that we can learn the behavior of different VNF in order to model its CPU consumption. We conclude that the behavior of different VNF can be modeled using ML techniques.
网络的最新趋势是建议使用机器学习(ML)技术来控制和操作网络。机器学习在网络中的应用带来了一些用例和挑战。本文的目的是探讨应用不同模型和ML技术对复杂网络元素(如虚拟网络功能(VNFs))建模的可行性。特别是,我们将重点放在VNF的CPU消耗作为输入流量特征的函数的特征上。流量由一组特征表示,这些特征以小的时间批量描述从传输层到应用层的特征。CPU消耗是从管理程序中观察到的,它对应于处理流量批处理时的平均CPU消耗。我们通过实验证明,我们可以学习不同VNF的行为,以便对其CPU消耗进行建模。我们得出结论,不同VNF的行为可以使用ML技术建模。
{"title":"A machine learning-based approach for virtual network function modeling","authors":"Albert Mestres, E. Alarcón, A. Cabellos-Aparicio","doi":"10.1109/WCNCW.2018.8369019","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8369019","url":null,"abstract":"Recent trends in networking are proposing the use of Machine Learning (ML) techniques for the control and operation of the network. The application of ML to networking brings several use-cases as well as challenges. The objective of this paper is to explore the feasibility of applying different models and ML techniques to model complex networks elements, such as Virtual Network Functions (VNFs). In particular, we focus on the characterization of the CPU consumption of the VNF as a function of the characteristics of the input traffic. The traffic is represented by a set of features describing characteristics from the transport layer to the application layer in small time batches. The CPU consumption is observed from the hypervisor and corresponds to the average CPU consumption when the traffic batch is processed. We experimentally demonstrate that we can learn the behavior of different VNF in order to model its CPU consumption. We conclude that the behavior of different VNF can be modeled using ML techniques.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"740 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116088124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Energy efficient human activity recognition using wearable sensors 使用可穿戴传感器的节能人类活动识别
Pub Date : 2018-04-15 DOI: 10.1109/WCNCW.2018.8368980
Genming Ding, Jun Tian, Jinsong Wu, Qian Zhao, Lili Xie
Computational and power efficiency is one of the crucial enabling factors to wearable device based human activity recognition (HAR) system. However, limited research efforts in literature have been available toward reducing theses costs without loss of accuracy. In this paper, we propose an improved random forest (RF) based HAR system for elderly-care. The system extracts three kinds of pairwise correlation features in hybrid sliding windows, and uses location information to enhance the recognition performance. A mutual information based feature selection is adopted to optimize the recognition of confused local set of activities. A new random feature selection strategy for each node in RF enables the proposed system to reduce the number of trees while maintaining the recognition accuracy. Numerical experiments show that the proposed method can predict 10 types of activities with 93.01% accuracy and 74.9% reduction of energy consumption. Furthermore, the fall detection accuracy in this proposed system can reach up to 99%.
计算效率和功耗效率是实现可穿戴设备人体活动识别(HAR)系统的关键因素之一。然而,文献中有限的研究努力已经可以在不损失准确性的情况下降低这些成本。本文提出了一种改进的基于随机森林(RF)的养老HAR系统。该系统在混合滑动窗口中提取三种成对相关特征,并利用位置信息提高识别性能。采用一种基于互信息的特征选择方法来优化对混乱局部活动集的识别。采用随机特征选择策略,在保证识别精度的同时减少了树的数量。数值实验表明,该方法预测10种活动的准确率为93.01%,能耗降低74.9%。此外,该系统的跌落检测精度可达99%。
{"title":"Energy efficient human activity recognition using wearable sensors","authors":"Genming Ding, Jun Tian, Jinsong Wu, Qian Zhao, Lili Xie","doi":"10.1109/WCNCW.2018.8368980","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8368980","url":null,"abstract":"Computational and power efficiency is one of the crucial enabling factors to wearable device based human activity recognition (HAR) system. However, limited research efforts in literature have been available toward reducing theses costs without loss of accuracy. In this paper, we propose an improved random forest (RF) based HAR system for elderly-care. The system extracts three kinds of pairwise correlation features in hybrid sliding windows, and uses location information to enhance the recognition performance. A mutual information based feature selection is adopted to optimize the recognition of confused local set of activities. A new random feature selection strategy for each node in RF enables the proposed system to reduce the number of trees while maintaining the recognition accuracy. Numerical experiments show that the proposed method can predict 10 types of activities with 93.01% accuracy and 74.9% reduction of energy consumption. Furthermore, the fall detection accuracy in this proposed system can reach up to 99%.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116599514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Impact of SON function combinations on the KPI behaviour in realistic mobile network scenarios 实际移动网络场景中SON功能组合对KPI行为的影响
Pub Date : 2018-04-15 DOI: 10.1109/WCNCW.2018.8368974
S. Hahn, M. Schweins, T. Kürner
Self-Organising Network (SON) functions cover a plethora of use cases, each addressing a different (self-optimisation) task reducing the manual work of the Mobile Network Operator (MNO). A combined SON operation, with numerous SON functions running in parallel, might lead to an undesired network performance due to unforeseen coherencies of parameter changes. In order to gain a greater understanding of the interworking of SON functions, well-known SON use cases are tested with different combinations in a realistic multi-layer, multi-RAT scenario. Results show that a substantial impact on the network performance can be observed for different SON function combinations. Furthermore, the effects also differ if multiple context classes of cells (i.e. different sizes, locations, mobility types) are considered.
自组织网络(SON)功能涵盖了大量的用例,每个用例都解决不同的(自我优化)任务,减少了移动网络运营商(MNO)的手工工作。一个组合的SON操作,如果多个SON函数并行运行,可能会由于参数变化的不可预见的一致性而导致不期望的网络性能。为了更好地理解SON功能的相互作用,我们在一个现实的多层、多rat场景中对著名的SON用例进行了不同组合的测试。结果表明,可以观察到不同的SON函数组合对网络性能的实质性影响。此外,如果考虑多个上下文类型的细胞(即不同的大小,位置,移动类型),效果也会有所不同。
{"title":"Impact of SON function combinations on the KPI behaviour in realistic mobile network scenarios","authors":"S. Hahn, M. Schweins, T. Kürner","doi":"10.1109/WCNCW.2018.8368974","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8368974","url":null,"abstract":"Self-Organising Network (SON) functions cover a plethora of use cases, each addressing a different (self-optimisation) task reducing the manual work of the Mobile Network Operator (MNO). A combined SON operation, with numerous SON functions running in parallel, might lead to an undesired network performance due to unforeseen coherencies of parameter changes. In order to gain a greater understanding of the interworking of SON functions, well-known SON use cases are tested with different combinations in a realistic multi-layer, multi-RAT scenario. Results show that a substantial impact on the network performance can be observed for different SON function combinations. Furthermore, the effects also differ if multiple context classes of cells (i.e. different sizes, locations, mobility types) are considered.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130520359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Polar code construction using the information bottleneck method 利用信息瓶颈法构造极坐标代码
Pub Date : 2018-04-15 DOI: 10.1109/WCNCW.2018.8368978
Maximilian Stark, Syed Aizaz Ali Shah, G. Bauch
The provably capacity-achieving error-correction capability of polar codes prospered huge interest in academia and industry. The explicit structure of polar codes leads to a different notion of code construction which refers to the assignment of information bits to certain positions in that structure instead of the design of the structure itself. State-of-the-art construction methods either rely on approximations or are computationally demanding to achieve an optimum assignment of the information bits. In this paper, we propose a novel construction technique which leverages the information bottleneck method to combine information-optimum construction and less complex, tractable processing of the required joint distributions. Furthermore, we consider the effect of a low-resolution channel quantizer explicitly in the code design which ensures applicability of the constructed code also in practically relevant settings.
极性码的可证明的可实现的纠错能力引起了学术界和工业界的极大兴趣。极性码的明确结构导致了一种不同的码结构概念,它指的是将信息位分配到该结构中的特定位置,而不是结构本身的设计。最先进的构造方法要么依赖于近似值,要么在计算上要求达到信息位的最佳分配。在本文中,我们提出了一种新的构造技术,该技术利用信息瓶颈方法将信息优化构造与所需联合分布的不复杂,易于处理的处理相结合。此外,我们在代码设计中明确考虑了低分辨率信道量化器的影响,以确保所构建的代码在实际相关设置中的适用性。
{"title":"Polar code construction using the information bottleneck method","authors":"Maximilian Stark, Syed Aizaz Ali Shah, G. Bauch","doi":"10.1109/WCNCW.2018.8368978","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8368978","url":null,"abstract":"The provably capacity-achieving error-correction capability of polar codes prospered huge interest in academia and industry. The explicit structure of polar codes leads to a different notion of code construction which refers to the assignment of information bits to certain positions in that structure instead of the design of the structure itself. State-of-the-art construction methods either rely on approximations or are computationally demanding to achieve an optimum assignment of the information bits. In this paper, we propose a novel construction technique which leverages the information bottleneck method to combine information-optimum construction and less complex, tractable processing of the required joint distributions. Furthermore, we consider the effect of a low-resolution channel quantizer explicitly in the code design which ensures applicability of the constructed code also in practically relevant settings.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124525822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Enabling the first step for IoT health systems using Antidote and IEEE 11073 使用Antidote和IEEE 11073实现物联网医疗系统的第一步
Pub Date : 2018-04-15 DOI: 10.1109/WCNCW.2018.8369020
Danilo F. S. Santos, Mateus A. M. Lima, J. L. Nascimento, A. Perkusich, H. Almeida
The increasing cost of healthcare, the desire of keeping a high-quality life in face of chronic conditions, and the increasing availability of personal health devices (PHDs) are the ingredients of “IoT health” vision. In parallel, a growing number of consumer electronic (CE) devices like TVs, refrigerators or media players are becoming capable of taking the role of “health hub”, that is, a data collector for the sensor PHDs. Many PHDs (and the respective collectors) follow a standard protocol stack for health devices: IEEE 11073-20601. This paper presents Antidote: a portable, open-source implementation of the IEEE 11073-20601 stack, which further promotes this standard and increases its availability to the developer community. One of the main contributions of Antidote is how it exports health data using a DataList XML or JSON format, which helps its integration by developers in different platforms. Finally, it is presented our experience using Antidote on different scenarios, such as on mobile platforms and IoT networks.
医疗保健成本的不断增加,慢性病患者对保持高质量生活的渴望,以及个人健康设备(博士)的日益普及,都是“物联网健康”愿景的组成部分。与此同时,越来越多的消费电子(CE)设备,如电视、冰箱或媒体播放器,正变得能够扮演“健康中心”的角色,即传感器博士的数据收集器。许多博士(以及各自的收集器)遵循健康设备的标准协议栈:IEEE 11073-20601。本文介绍了解毒剂:IEEE 11073-20601栈的一个可移植的开源实现,它进一步促进了该标准并增加了其对开发人员社区的可用性。Antidote的主要贡献之一是它使用DataList XML或JSON格式导出健康数据,这有助于开发人员在不同平台上进行集成。最后,介绍了我们在移动平台和物联网网络等不同场景下使用Antidote的经验。
{"title":"Enabling the first step for IoT health systems using Antidote and IEEE 11073","authors":"Danilo F. S. Santos, Mateus A. M. Lima, J. L. Nascimento, A. Perkusich, H. Almeida","doi":"10.1109/WCNCW.2018.8369020","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8369020","url":null,"abstract":"The increasing cost of healthcare, the desire of keeping a high-quality life in face of chronic conditions, and the increasing availability of personal health devices (PHDs) are the ingredients of “IoT health” vision. In parallel, a growing number of consumer electronic (CE) devices like TVs, refrigerators or media players are becoming capable of taking the role of “health hub”, that is, a data collector for the sensor PHDs. Many PHDs (and the respective collectors) follow a standard protocol stack for health devices: IEEE 11073-20601. This paper presents Antidote: a portable, open-source implementation of the IEEE 11073-20601 stack, which further promotes this standard and increases its availability to the developer community. One of the main contributions of Antidote is how it exports health data using a DataList XML or JSON format, which helps its integration by developers in different platforms. Finally, it is presented our experience using Antidote on different scenarios, such as on mobile platforms and IoT networks.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125696734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The path towards resource elasticity for 5G network architecture 5G网络架构资源弹性之路
Pub Date : 2018-04-15 DOI: 10.1109/WCNCW.2018.8369027
David Manuel Gutiérrez Estévez, M. Gramaglia, A. Domenico, N. Pietro, Sina Khatibi, Kunjan Shah, D. Tsolkas, P. Arnold, P. Serrano
Vertical markets and industries are addressing a large diversity of heterogeneous services, use cases, and applications in 5G. It is currently common understanding that for networks to be able to satisfy those needs, a flexible, adaptable, and programmable architecture based on network slicing is required. Moreover, a softwarization and cloudification of the communications networks is already happening, where network functions (NFs) are transformed from monolithic pieces of equipment to programs running over a shared pool of computational and communication resources. However, this novel architecture paradigm requires new solutions to exploit its inherent flexibility. In this paper, we introduce the concept of resource elasticity as a key means to make an efficient use of the computational resources in 5G systems. Besides establishing a definition as well as a set of requirements and key performance indicators (KPIs), we propose mechanisms for the exploitation of elasticity in three different dimensions, namely computational elasticity in the design and scaling of NFs, orchestration-driven elasticity by flexible placement of NFs, and slice-aware elasticity via cross-slice resource provisioning mechanisms. Finally, we provide a succinct analysis of the architectural components that need to be enhanced to incorporate elasticity principles.
垂直市场和行业正在解决5G中各种各样的异构服务、用例和应用。目前人们普遍认为,为了使网络能够满足这些需求,需要一种基于网络切片的灵活、可适应和可编程的体系结构。此外,通信网络的软件化和云化已经在发生,网络功能(NFs)从单片设备转变为运行在共享计算和通信资源池上的程序。然而,这种新颖的架构范式需要新的解决方案来利用其固有的灵活性。在本文中,我们引入了资源弹性的概念,作为5G系统中有效利用计算资源的关键手段。除了建立定义以及一组需求和关键性能指标(kpi)外,我们还提出了在三个不同维度上利用弹性的机制,即NFs设计和扩展中的计算弹性,NFs灵活放置的编排驱动弹性,以及通过跨片资源供应机制的片感知弹性。最后,我们简要分析了需要增强以结合弹性原则的体系结构组件。
{"title":"The path towards resource elasticity for 5G network architecture","authors":"David Manuel Gutiérrez Estévez, M. Gramaglia, A. Domenico, N. Pietro, Sina Khatibi, Kunjan Shah, D. Tsolkas, P. Arnold, P. Serrano","doi":"10.1109/WCNCW.2018.8369027","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8369027","url":null,"abstract":"Vertical markets and industries are addressing a large diversity of heterogeneous services, use cases, and applications in 5G. It is currently common understanding that for networks to be able to satisfy those needs, a flexible, adaptable, and programmable architecture based on network slicing is required. Moreover, a softwarization and cloudification of the communications networks is already happening, where network functions (NFs) are transformed from monolithic pieces of equipment to programs running over a shared pool of computational and communication resources. However, this novel architecture paradigm requires new solutions to exploit its inherent flexibility. In this paper, we introduce the concept of resource elasticity as a key means to make an efficient use of the computational resources in 5G systems. Besides establishing a definition as well as a set of requirements and key performance indicators (KPIs), we propose mechanisms for the exploitation of elasticity in three different dimensions, namely computational elasticity in the design and scaling of NFs, orchestration-driven elasticity by flexible placement of NFs, and slice-aware elasticity via cross-slice resource provisioning mechanisms. Finally, we provide a succinct analysis of the architectural components that need to be enhanced to incorporate elasticity principles.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"365 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134288791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Cluster-based D2D architecture for safety services in vehicular ad hoc networks 基于集群的车辆自组织网络安全服务D2D架构
Pub Date : 2018-04-15 DOI: 10.1109/WCNCW.2018.8368992
S. Gupta, J. Khan, D. T. Ngo
With the expected introduction of autonomous vehicles in the next decade, it will be imperative for road traffic authorities to develop strategies to manage the co-existence of autonomous and legacy vehicles. In this scenario, the exchange of safety messages among vehicles in a timely manner will be critical for future advanced road traffic management systems. Most of the work in the area of vehicular ad hoc network (VANET) has concentrated on the IEEE 802.11p and the DSRC standards. With the emergence of the advanced LTE-based cellular network standard, researchers are now concentrating on the LTE-based VANET architecture. However, due to the use of the centralized architecture, an LTE-based system may require significant network resources to support vehicle-to-vehicle (V2V) communications. In this paper, we propose a new vehicle discovery technique and a LTE cluster-based device-to-device (D2D) architecture to achieve high packet delivery ratio for the safety services in a vehicular network. The performance of the proposed network architecture is analyzed by an OMNET++ based simulation model. Simulations results shows that the proposed algorithm reduces the end-to-end delay and signalling overhead as well as improve the data packet delivery ratio (DPDR) compared to the existing 3GPP ProSe technique for vehicular safety applications.
随着未来10年自动驾驶汽车的出现,道路交通当局必须制定战略,管理自动驾驶汽车和传统汽车的共存。在这种情况下,车辆之间及时交换安全信息对未来先进的道路交通管理系统至关重要。车辆自组织网络(VANET)领域的大部分工作都集中在IEEE 802.11p和DSRC标准上。随着基于lte的先进蜂窝网络标准的出现,研究人员正在关注基于lte的VANET体系结构。然而,由于使用集中式架构,基于lte的系统可能需要大量的网络资源来支持车对车(V2V)通信。在本文中,我们提出了一种新的车辆发现技术和基于LTE集群的设备对设备(D2D)架构,以实现车辆网络中安全服务的高分组传输率。利用基于omnet++的仿真模型对所提出的网络结构进行了性能分析。仿真结果表明,与现有的3GPP散文技术相比,该算法降低了端到端延迟和信令开销,提高了数据包传输率(DPDR),适用于车辆安全应用。
{"title":"Cluster-based D2D architecture for safety services in vehicular ad hoc networks","authors":"S. Gupta, J. Khan, D. T. Ngo","doi":"10.1109/WCNCW.2018.8368992","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8368992","url":null,"abstract":"With the expected introduction of autonomous vehicles in the next decade, it will be imperative for road traffic authorities to develop strategies to manage the co-existence of autonomous and legacy vehicles. In this scenario, the exchange of safety messages among vehicles in a timely manner will be critical for future advanced road traffic management systems. Most of the work in the area of vehicular ad hoc network (VANET) has concentrated on the IEEE 802.11p and the DSRC standards. With the emergence of the advanced LTE-based cellular network standard, researchers are now concentrating on the LTE-based VANET architecture. However, due to the use of the centralized architecture, an LTE-based system may require significant network resources to support vehicle-to-vehicle (V2V) communications. In this paper, we propose a new vehicle discovery technique and a LTE cluster-based device-to-device (D2D) architecture to achieve high packet delivery ratio for the safety services in a vehicular network. The performance of the proposed network architecture is analyzed by an OMNET++ based simulation model. Simulations results shows that the proposed algorithm reduces the end-to-end delay and signalling overhead as well as improve the data packet delivery ratio (DPDR) compared to the existing 3GPP ProSe technique for vehicular safety applications.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124223488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Deployment algorithm for minimum unmanned aerial vehicles towards optimal coverage and interconnections 面向最优覆盖和互联的最小无人机部署算法
Pub Date : 2018-04-15 DOI: 10.1109/WCNCW.2018.8369021
Haijun Wang, Haitao Zhao, Li Zhou, Dongtang Ma, Jibo Wei
Unmanned aerial vehicles (UAVs) are playing an important role in serving ground users as base stations (BSs) during temporary events, or after terrestrial BSs fail. UAV deployment is a fundamental and vital problem which directly affects the coverage capacity and user experience. Especially, while deploying a UAV backbone network, the cost and the quality of service (QoS) of the ground users as well as the connectivity among UAVs need to be considered jointly. In this paper, the deployment problem is modeled as minimizing the amount of deployed UAVs while guaranteeing the coverage capacity and connectivity among UAVs. Further, a novel UAV deployment scheme is proposed where a heuristic algorithm is adopted to delete locations from the initially defined candidate UAV locations iteratively, and UAVs are deployed at the remaining locations finally. The simulation results show that our UAV deployment scheme can achieve minimum deployed UAVs while ensuring QoS requirements and a robust network among UAVs.
在临时事件或地面基站故障后,无人机在为地面用户提供基站服务方面发挥着重要作用。无人机部署是直接影响网络覆盖能力和用户体验的基础和关键问题。特别是在部署无人机骨干网时,需要综合考虑地面用户的成本和服务质量,以及无人机之间的连通性。本文将部署问题建模为在保证无人机之间的覆盖能力和连通性的同时,最小化部署的无人机数量。在此基础上,提出了一种新的无人机部署方案,该方案采用启发式算法从初始定义的候选无人机位置中迭代删除位置,最后在剩余位置部署无人机。仿真结果表明,该方案能够在保证QoS要求和鲁棒性的前提下实现最少的无人机部署。
{"title":"Deployment algorithm for minimum unmanned aerial vehicles towards optimal coverage and interconnections","authors":"Haijun Wang, Haitao Zhao, Li Zhou, Dongtang Ma, Jibo Wei","doi":"10.1109/WCNCW.2018.8369021","DOIUrl":"https://doi.org/10.1109/WCNCW.2018.8369021","url":null,"abstract":"Unmanned aerial vehicles (UAVs) are playing an important role in serving ground users as base stations (BSs) during temporary events, or after terrestrial BSs fail. UAV deployment is a fundamental and vital problem which directly affects the coverage capacity and user experience. Especially, while deploying a UAV backbone network, the cost and the quality of service (QoS) of the ground users as well as the connectivity among UAVs need to be considered jointly. In this paper, the deployment problem is modeled as minimizing the amount of deployed UAVs while guaranteeing the coverage capacity and connectivity among UAVs. Further, a novel UAV deployment scheme is proposed where a heuristic algorithm is adopted to delete locations from the initially defined candidate UAV locations iteratively, and UAVs are deployed at the remaining locations finally. The simulation results show that our UAV deployment scheme can achieve minimum deployed UAVs while ensuring QoS requirements and a robust network among UAVs.","PeriodicalId":122391,"journal":{"name":"2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124511909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 IEEE Wireless Communications and Networking Conference Workshops (WCNCW)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1