首页 > 最新文献

2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)最新文献

英文 中文
Device-to-device caching for video content delivery 用于视频内容传送的设备到设备缓存
Pub Date : 2017-06-01 DOI: 10.1109/BlackSeaCom.2017.8277718
Koray Necip Aytac, Tolga Girici, M. Yuksel, A. Telli, Ilter Koksal
In this study, we construct a detailed simulation model in order to quantify the benefits of device-to-device (D2D) caching for video content delivery. Simulation model involves caches at the evolved packet core, radio access network (RAN) and end user devices. We compare the bandwidth cost savings for different caching strategies at the EPC, RAN and devices and find the best joint strategy.
在本研究中,我们构建了一个详细的仿真模型,以量化设备到设备(D2D)缓存对视频内容传输的好处。仿真模型涉及演进分组核心、无线接入网络(RAN)和终端用户设备的缓存。我们比较了EPC、RAN和设备上不同缓存策略所节省的带宽成本,并找到了最佳的联合策略。
{"title":"Device-to-device caching for video content delivery","authors":"Koray Necip Aytac, Tolga Girici, M. Yuksel, A. Telli, Ilter Koksal","doi":"10.1109/BlackSeaCom.2017.8277718","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277718","url":null,"abstract":"In this study, we construct a detailed simulation model in order to quantify the benefits of device-to-device (D2D) caching for video content delivery. Simulation model involves caches at the evolved packet core, radio access network (RAN) and end user devices. We compare the bandwidth cost savings for different caching strategies at the EPC, RAN and devices and find the best joint strategy.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123620498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modeling of SIP retransmission traffic under lossy network conditions 有损网络条件下SIP重传流量的建模
Pub Date : 2017-06-01 DOI: 10.1109/BlackSeaCom.2017.8277683
Demir Y. Yavas, Ibrahim Hökelek, Bilge Günsel
In this paper, we present a discrete-time fluid-flow model to characterize the behavior of an overloaded Session Initiation Protocol (SIP) server under the lossy network conditions. The model considers both redundant retransmissions due to excessive queuing delays in an overloaded server and non-redundant retransmissions due to message loss in the network and calculates the number of failed call attempts and the average response delay from sending INVITE request until receiving a 100-Trying response. The accuracy of the model is verified with the simulations. The experiments show that losses in the network reduce the amount of the offered traffic to the SIP server and decreases the severity of the overload situation.
本文提出了一个离散时间流-流模型来描述在有损网络条件下过载会话发起协议(SIP)服务器的行为。该模型考虑了由于过载服务器中过多的排队延迟而导致的冗余重传和由于网络中消息丢失而导致的非冗余重传,并计算了失败的呼叫尝试次数和从发送INVITE请求到接收100次尝试响应的平均响应延迟。通过仿真验证了模型的准确性。实验表明,网络损耗减少了提供给SIP服务器的流量,降低了过载情况的严重程度。
{"title":"Modeling of SIP retransmission traffic under lossy network conditions","authors":"Demir Y. Yavas, Ibrahim Hökelek, Bilge Günsel","doi":"10.1109/BlackSeaCom.2017.8277683","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277683","url":null,"abstract":"In this paper, we present a discrete-time fluid-flow model to characterize the behavior of an overloaded Session Initiation Protocol (SIP) server under the lossy network conditions. The model considers both redundant retransmissions due to excessive queuing delays in an overloaded server and non-redundant retransmissions due to message loss in the network and calculates the number of failed call attempts and the average response delay from sending INVITE request until receiving a 100-Trying response. The accuracy of the model is verified with the simulations. The experiments show that losses in the network reduce the amount of the offered traffic to the SIP server and decreases the severity of the overload situation.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130207098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the performance of distributed space-time coding with selection relaying and beamforming for two-path successive relay network 双径连续中继网络中带选择中继和波束形成的分布式空时编码性能研究
Pub Date : 2017-06-01 DOI: 10.1109/BlackSeaCom.2017.8277696
Mahsa Shirzadian Gilan, A. Olfat
Two-path successive relaying is used as a method of transmission for recovering the bandwidth loss of conventional relay networks. In this paper, a new beamforming method is employed alongside the proposed distributed space-time coding (DSTC) transmission scheme in a two-path successive relay network which enjoys SNR-based selection relaying protocol. A closed-form expression for the end-to-end bit error rate (BER) of the system is derived. Regardless of the fading in inter-relay channel, the proposed scheme ensures that full rate and full diversity can be attained in the presence of decoding errors at the relay nodes. Simulation results, show a significant power saving about 2.5 dB at BER (10−4) in comparison to other conventional methods.
采用双路连续中继作为一种传输方法来恢复传统中继网络的带宽损失。在采用基于信噪比的选择中继协议的双径连续中继网络中,将一种新的波束形成方法与所提出的分布式空时编码(DSTC)传输方案相结合。导出了系统端到端误码率(BER)的封闭表达式。该方案不考虑中继间信道的衰落,在中继节点存在译码错误的情况下保证了全速率和全分集的实现。仿真结果表明,与其他传统方法相比,该方法在误码率(10−4)下显著节能约2.5 dB。
{"title":"On the performance of distributed space-time coding with selection relaying and beamforming for two-path successive relay network","authors":"Mahsa Shirzadian Gilan, A. Olfat","doi":"10.1109/BlackSeaCom.2017.8277696","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277696","url":null,"abstract":"Two-path successive relaying is used as a method of transmission for recovering the bandwidth loss of conventional relay networks. In this paper, a new beamforming method is employed alongside the proposed distributed space-time coding (DSTC) transmission scheme in a two-path successive relay network which enjoys SNR-based selection relaying protocol. A closed-form expression for the end-to-end bit error rate (BER) of the system is derived. Regardless of the fading in inter-relay channel, the proposed scheme ensures that full rate and full diversity can be attained in the presence of decoding errors at the relay nodes. Simulation results, show a significant power saving about 2.5 dB at BER (10−4) in comparison to other conventional methods.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130668460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Big data security: Requirements, challenges and preservation of private data inside mobile operators 大数据安全:移动运营商内部私有数据的需求、挑战和保存
Pub Date : 2017-06-01 DOI: 10.1109/BlackSeaCom.2017.8277711
Cem Dincer, E. Zeydan
Today's mobile operators (MOs) are experiencing tremendous amount of data usage of their subscribers. This results in data tsunami arriving from various sources inside MOs' network infrastructures. On the other hand, handling this data increase in an elegant manner will be utmost importance for designing the next generation cellular 5G network infrastructure. In this evolving 5G architecture, there will also be many vertical market players from different domains (e.g. car manufacturers, retailers, banks, transportation providers) as well as third party players (e.g. application developers) that will be interacting with MO's subscribers private data through many innovative big data applications. These big data applications can provide additional value added services to MOs. On the other hand, ensuring the security of these applications utilizing big data will be another dimension that needs to be provisioned carefully. In this paper, we study the various security requirements and challenges of running big data application services by MOs themselves. Based on the system architecture that is studied, we have also run extensive vulnerability tests against one example of big data application deployed inside MO's premises. Our results indicate key security findings and map some of the missing requirements into the considered big data application scenario.
今天的移动运营商(mo)正在经历其用户的大量数据使用。这将导致来自mo网络基础设施内部各种来源的数据海啸。另一方面,以优雅的方式处理这些数据增长对于设计下一代蜂窝5G网络基础设施至关重要。在这个不断发展的5G架构中,还将有许多来自不同领域的垂直市场参与者(例如汽车制造商、零售商、银行、运输提供商)以及第三方参与者(例如应用程序开发人员),他们将通过许多创新的大数据应用程序与MO的用户私有数据进行交互。这些大数据应用可以为mo提供额外的增值服务。另一方面,确保这些利用大数据的应用程序的安全性将是需要仔细准备的另一个方面。在本文中,我们研究了mo自身运行大数据应用服务的各种安全需求和挑战。基于所研究的系统架构,我们还针对MO内部部署的一个大数据应用程序示例进行了广泛的漏洞测试。我们的研究结果指出了关键的安全发现,并将一些缺失的需求映射到考虑的大数据应用场景中。
{"title":"Big data security: Requirements, challenges and preservation of private data inside mobile operators","authors":"Cem Dincer, E. Zeydan","doi":"10.1109/BlackSeaCom.2017.8277711","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277711","url":null,"abstract":"Today's mobile operators (MOs) are experiencing tremendous amount of data usage of their subscribers. This results in data tsunami arriving from various sources inside MOs' network infrastructures. On the other hand, handling this data increase in an elegant manner will be utmost importance for designing the next generation cellular 5G network infrastructure. In this evolving 5G architecture, there will also be many vertical market players from different domains (e.g. car manufacturers, retailers, banks, transportation providers) as well as third party players (e.g. application developers) that will be interacting with MO's subscribers private data through many innovative big data applications. These big data applications can provide additional value added services to MOs. On the other hand, ensuring the security of these applications utilizing big data will be another dimension that needs to be provisioned carefully. In this paper, we study the various security requirements and challenges of running big data application services by MOs themselves. Based on the system architecture that is studied, we have also run extensive vulnerability tests against one example of big data application deployed inside MO's premises. Our results indicate key security findings and map some of the missing requirements into the considered big data application scenario.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128855600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Outage performance of dual hop full-duplex relaying with Alamouti/MRC over Rayleigh fading channels 瑞利衰落信道上Alamouti/MRC双跳全双工中继的中断性能
Pub Date : 2017-06-01 DOI: 10.1109/BlackSeaCom.2017.8277672
Mesut Toka, O. Kucur
In this study, we present a full-duplex (FD) transmission scheme based on conventional Alamouti coding technique and investigate end-to-end (e2e) outage probability (OP) performance over independent identically distributed Rayleigh fading channels in dual-hop relay networks. We assume that direct link is not available due to channel impairments, so that the communication between the source and destination is maintained only via a single relay. In the network, the relay is equipped with one receive and one transmit antennas, and adopts amplify-and-forward (AF) and decode-and-forward (DF) protocols. While Alamouti code is used at the transmitter side, maximal-ratio combining (MRC) technique is employed at the destination in order to provide higher diversity order. OP expressions are derived in single integral and closed forms for AF and DF protocols, respectively. In addition, in order to provide insight into OP, asymptotic OP expressions are also derived. The analytical derivations are verified by the Monte Carlo simulations. Results show that e2e performance of the system is improved at low signal-to-noise ratio (SNR) region by increasing the number of antennas at the destination and DF provides approximately 2 dB SNR gain as compared to AF.
在本研究中,我们提出了一种基于传统Alamouti编码技术的全双工(FD)传输方案,并研究了双跳中继网络中独立同分布瑞利衰落信道的端到端(e2e)中断概率(OP)性能。我们假设由于信道受损,直接链路不可用,因此源和目标之间的通信仅通过单个中继维持。在网络中,中继配备一个接收天线和一个发射天线,采用放大转发(AF)和解码转发(DF)协议。在发送端采用阿拉穆蒂码,在目的端采用最大比组合(MRC)技术,以提供更高的分集顺序。对于AF和DF协议,OP表达式分别以单积分和封闭形式导出。此外,为了深入了解OP,还推导了渐近OP表达式。通过蒙特卡罗仿真验证了解析推导的正确性。结果表明,在低信噪比(SNR)区域,通过增加目标天线的数量,系统的端到端性能得到了改善,与AF相比,DF提供了约2db的信噪比增益。
{"title":"Outage performance of dual hop full-duplex relaying with Alamouti/MRC over Rayleigh fading channels","authors":"Mesut Toka, O. Kucur","doi":"10.1109/BlackSeaCom.2017.8277672","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277672","url":null,"abstract":"In this study, we present a full-duplex (FD) transmission scheme based on conventional Alamouti coding technique and investigate end-to-end (e2e) outage probability (OP) performance over independent identically distributed Rayleigh fading channels in dual-hop relay networks. We assume that direct link is not available due to channel impairments, so that the communication between the source and destination is maintained only via a single relay. In the network, the relay is equipped with one receive and one transmit antennas, and adopts amplify-and-forward (AF) and decode-and-forward (DF) protocols. While Alamouti code is used at the transmitter side, maximal-ratio combining (MRC) technique is employed at the destination in order to provide higher diversity order. OP expressions are derived in single integral and closed forms for AF and DF protocols, respectively. In addition, in order to provide insight into OP, asymptotic OP expressions are also derived. The analytical derivations are verified by the Monte Carlo simulations. Results show that e2e performance of the system is improved at low signal-to-noise ratio (SNR) region by increasing the number of antennas at the destination and DF provides approximately 2 dB SNR gain as compared to AF.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122595337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extracting user profiles from mobile data 从移动数据中提取用户配置文件
Pub Date : 2017-06-01 DOI: 10.1109/BlackSeaCom.2017.8277701
H. Yalcin
As smartphones have been increasingly adopted by mobile phone users, the applications market for mobile operating systems also developed into a giant market for advertising business. Smartphone companies allow third parties to develop apps to provide different services to users and third party app developers publish these applications in app markets relevant to the mobile operating system. Users download from a range of app categories including games, productivity, education, social networking, etc. Processing smartphone data is very appealing, since app usage on a mobile phone indicates important clues about the lifestyle and interests of the user. Although processing the data collected from smartphones is very attractive, usually the data is not available to the research community. Usually governmental organizations impose regulations on the telecommunications companies as far as the disclosure of the data collected by these companies. The data to be serviced publicly has to be organized such that it is anonymized and the identity of the customers cannot be tracked. In this paper, we propose a probabilistic model to predict the user profile of a customer, namely gender and age, based on usage behaviors of mobile applications, phone brand and model. The probabilistic model infers these demographics from the statistical characteristics profiled from a huge pool of information hidden in a dataset provided by TalkingData company. Building the probabilistic model on this dataset is a more practicable user profiling method, since it can be used to deliver personalized services without posing privacy risks to the users and it eliminates the necessity for continuously tracking users' online activities or smartphone usage and maintaining historical records. Our experimental results indicate that promising information can be tracked down through the proposed approach, especially information about user tendencies which are of crucial importance to the targeted advertisement.
随着智能手机被越来越多的手机用户所采用,移动操作系统的应用市场也发展成为一个巨大的广告业务市场。智能手机公司允许第三方开发应用程序,为用户提供不同的服务,第三方应用程序开发商在与移动操作系统相关的应用程序市场上发布这些应用程序。用户下载的应用类别包括游戏、生产力、教育、社交网络等。处理智能手机数据非常有吸引力,因为手机上的应用程序使用情况可以提供有关用户生活方式和兴趣的重要线索。虽然处理从智能手机收集的数据非常有吸引力,但通常这些数据对研究界来说是不可用的。通常,政府组织对电信公司就披露这些公司收集的数据施加规定。要公开提供服务的数据必须经过组织,使其匿名化,并且无法跟踪客户的身份。在本文中,我们提出了一个概率模型来预测客户的用户特征,即性别和年龄,基于移动应用程序的使用行为,手机品牌和型号。概率模型从TalkingData公司提供的数据集中隐藏的大量信息的统计特征中推断出这些人口统计特征。在此数据集上构建概率模型是一种更实用的用户分析方法,因为它可以用于提供个性化服务而不会给用户带来隐私风险,并且它消除了持续跟踪用户在线活动或智能手机使用和维护历史记录的必要性。实验结果表明,通过该方法可以追踪到有价值的信息,特别是对定向广告至关重要的用户倾向信息。
{"title":"Extracting user profiles from mobile data","authors":"H. Yalcin","doi":"10.1109/BlackSeaCom.2017.8277701","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277701","url":null,"abstract":"As smartphones have been increasingly adopted by mobile phone users, the applications market for mobile operating systems also developed into a giant market for advertising business. Smartphone companies allow third parties to develop apps to provide different services to users and third party app developers publish these applications in app markets relevant to the mobile operating system. Users download from a range of app categories including games, productivity, education, social networking, etc. Processing smartphone data is very appealing, since app usage on a mobile phone indicates important clues about the lifestyle and interests of the user. Although processing the data collected from smartphones is very attractive, usually the data is not available to the research community. Usually governmental organizations impose regulations on the telecommunications companies as far as the disclosure of the data collected by these companies. The data to be serviced publicly has to be organized such that it is anonymized and the identity of the customers cannot be tracked. In this paper, we propose a probabilistic model to predict the user profile of a customer, namely gender and age, based on usage behaviors of mobile applications, phone brand and model. The probabilistic model infers these demographics from the statistical characteristics profiled from a huge pool of information hidden in a dataset provided by TalkingData company. Building the probabilistic model on this dataset is a more practicable user profiling method, since it can be used to deliver personalized services without posing privacy risks to the users and it eliminates the necessity for continuously tracking users' online activities or smartphone usage and maintaining historical records. Our experimental results indicate that promising information can be tracked down through the proposed approach, especially information about user tendencies which are of crucial importance to the targeted advertisement.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134296683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Policy broker-centric traffic classifier architecture for deep packet inspection systems with route asymmetry 路由不对称深度包检测系统中以策略代理为中心的流量分类器体系结构
Pub Date : 2017-06-01 DOI: 10.1109/BlackSeaCom.2017.8277681
Mehmet Akif Yazici, Kasim Oztoprak
If the packets of a flow are carried on separate physical paths for forward and reverse directions, the flow is said to be asymmetrically routed. Routing asymmetry causes problems regarding flow identification, traffic shaping, policy enforcement, quota management etc. in DPI systems. Clustering and state sharing are the two existing methods to overcome routing asymmetry. State sharing works only for stateful traffic flows whereas clustering leads to large traffic overhead. A hybrid scheme, the “Hybrid Asymmetric Traffic Classifier” (HATC) has recently been proposed to merge the better aspects of clustering and state sharing. HATC can handle both stateful and stateless flows with reduced overhead compared to clustering. In this study, we propose a novel flow identification method, the “Policy Broker-centric Traffic Classifier” (PBTC), which employs policy broker devices that undertake policy and charging rules functions in the provider's network. The performance of the proposed method is compared against that of HATC under two real traffic traces and several simulated scenarios to demonstrate that PBTC outperforms HATC.
如果一个流的数据包在不同的物理路径上进行正向和反向传输,则称该流为不对称路由。路由不对称导致DPI系统在流量识别、流量整形、策略执行、配额管理等方面出现问题。聚类和状态共享是现有的两种克服路由不对称的方法。状态共享只适用于有状态的流量,而集群会导致较大的流量开销。最近提出了一种混合方案,即“混合非对称流量分类器”(HATC),它融合了聚类和状态共享的优点。与集群相比,HATC可以处理有状态流和无状态流,并且开销更小。在本研究中,我们提出了一种新的流量识别方法,即“以策略代理为中心的流量分类器”(PBTC),该方法使用策略代理设备在提供商的网络中承担策略和收费规则功能。在两条真实流量路径和几种模拟场景下,将PBTC与HATC的性能进行了比较,证明了PBTC优于HATC。
{"title":"Policy broker-centric traffic classifier architecture for deep packet inspection systems with route asymmetry","authors":"Mehmet Akif Yazici, Kasim Oztoprak","doi":"10.1109/BlackSeaCom.2017.8277681","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277681","url":null,"abstract":"If the packets of a flow are carried on separate physical paths for forward and reverse directions, the flow is said to be asymmetrically routed. Routing asymmetry causes problems regarding flow identification, traffic shaping, policy enforcement, quota management etc. in DPI systems. Clustering and state sharing are the two existing methods to overcome routing asymmetry. State sharing works only for stateful traffic flows whereas clustering leads to large traffic overhead. A hybrid scheme, the “Hybrid Asymmetric Traffic Classifier” (HATC) has recently been proposed to merge the better aspects of clustering and state sharing. HATC can handle both stateful and stateless flows with reduced overhead compared to clustering. In this study, we propose a novel flow identification method, the “Policy Broker-centric Traffic Classifier” (PBTC), which employs policy broker devices that undertake policy and charging rules functions in the provider's network. The performance of the proposed method is compared against that of HATC under two real traffic traces and several simulated scenarios to demonstrate that PBTC outperforms HATC.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129127655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient method for channel state information feedback in the relay X-channel 一种有效的中继x通道状态信息反馈方法
Pub Date : 2017-06-01 DOI: 10.1109/BlackSeaCom.2017.8277697
M. Rezaee, B. Maham
The two-user relay-assisted X channel is considered when no channel state information (CSI) is available at the transmitter side. It is known that with a 2M-antenna relay and M-antenna users a DoF of is achieved in this channel if CSI is available at the relay. This is equal to the maximum achievable DoF in the ordinary X-channel (with no relay) with perfect CSI at the transmitters. An efficient CSI feedback method is proposed which reduces the amount of feedback necessary for the relay in order to maintain the maximum DoF. In addition, a quantization method is proposed for the case of limited feedback. The proposed method outperforms the conventional methods in terms of the number of feedback bits. Simulation results show performance improvement in the finite-SNR regime.
当发送端没有可用的信道状态信息(CSI)时,考虑双用户中继辅助X信道。众所周知,对于2m天线中继和m天线用户,如果中继处有CSI,则在该信道中可以实现DoF。这等于在普通x通道(无继电器)的最大可实现的DoF与完美的CSI在发射机。提出了一种有效的CSI反馈方法,减少了继电器保持最大自由度所需的反馈量。此外,针对有限反馈的情况,提出了一种量化方法。该方法在反馈比特数方面优于传统方法。仿真结果表明,在有限信噪比条件下,性能得到了改善。
{"title":"An efficient method for channel state information feedback in the relay X-channel","authors":"M. Rezaee, B. Maham","doi":"10.1109/BlackSeaCom.2017.8277697","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277697","url":null,"abstract":"The two-user relay-assisted X channel is considered when no channel state information (CSI) is available at the transmitter side. It is known that with a 2M-antenna relay and M-antenna users a DoF of is achieved in this channel if CSI is available at the relay. This is equal to the maximum achievable DoF in the ordinary X-channel (with no relay) with perfect CSI at the transmitters. An efficient CSI feedback method is proposed which reduces the amount of feedback necessary for the relay in order to maintain the maximum DoF. In addition, a quantization method is proposed for the case of limited feedback. The proposed method outperforms the conventional methods in terms of the number of feedback bits. Simulation results show performance improvement in the finite-SNR regime.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121091374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable low latency communications in LTE networks LTE网络中可靠的低延迟通信
Pub Date : 2017-06-01 DOI: 10.1109/BlackSeaCom.2017.8277706
E. Khorov, A. Krasilov, A. Malyshev
A hot topic recently attracted much interest in 3GPP community is ultra reliable low latency communications. While specific protocols for such type of communications are under development, in this paper we evaluate how well we can meet strict quality of service requirements in the current LTE/LTE-Advanced networks. Specifically, we design a new two-step radio resource management algorithm for reliable low latency communications. At the first step, the algorithm forms a high-priority group of users which can be reliably served within the given delay budget. At the second step, the algorithm solves a linear optimization problem and allocates resource blocks to meet quality of service requirements at least for the users from the high-priority group. With simulations, we show that the proposed algorithm outperforms existing ones in terms of goodput, PLR and the number of satisfied users.
最近在3GPP社区引起极大兴趣的一个热门话题是超可靠的低延迟通信。虽然此类通信的具体协议正在开发中,但在本文中,我们评估了我们在多大程度上能够满足当前LTE/LTE- advanced网络中严格的服务质量要求。具体而言,我们设计了一种新的两步无线电资源管理算法,用于可靠的低延迟通信。首先,该算法在给定的延迟预算范围内形成一个高优先级的用户群,这些用户群可以被可靠地服务。第二步,算法求解一个线性优化问题,分配资源块至少满足高优先级组用户的服务质量要求。通过仿真,我们表明所提出的算法在goodput, PLR和满意用户数量方面优于现有算法。
{"title":"Reliable low latency communications in LTE networks","authors":"E. Khorov, A. Krasilov, A. Malyshev","doi":"10.1109/BlackSeaCom.2017.8277706","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277706","url":null,"abstract":"A hot topic recently attracted much interest in 3GPP community is ultra reliable low latency communications. While specific protocols for such type of communications are under development, in this paper we evaluate how well we can meet strict quality of service requirements in the current LTE/LTE-Advanced networks. Specifically, we design a new two-step radio resource management algorithm for reliable low latency communications. At the first step, the algorithm forms a high-priority group of users which can be reliably served within the given delay budget. At the second step, the algorithm solves a linear optimization problem and allocates resource blocks to meet quality of service requirements at least for the users from the high-priority group. With simulations, we show that the proposed algorithm outperforms existing ones in terms of goodput, PLR and the number of satisfied users.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123466168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Improving distributed maximum weighted matchings for communication networks 改进通信网络的分布式最大加权匹配
Pub Date : 2017-06-01 DOI: 10.1109/BlackSeaCom.2017.8277709
C. Ileri, O. Dagdeviren
Matching problem has been attracting a growing attention in network design, especially in wireless communication networks. Although there is an exact polynomial-time sequential algorithm for the weighted version of the problem, all the related distributed algorithms are approximation algorithms. In this paper we present a distributed heuristic which improves the weight of a given matching in time proportional to the number of nodes. Our algorithm assumes the asynchronous communication model in which the message size is limited to O (log n) bits. To the best of our knowledge, it is the first distributed weighted matching algorithm which benefits from augmentation of alternating paths having size larger than 3 and uses small messages. We also provide results of our simulations on random geometric graphs. Computational results show that our algorithm improves the approximated solutions of other weighted matching algorithms roughly by 1–3% and closes the gap between the approximation ratio and the optimum solution by 9–26%.
在网络设计中,特别是在无线通信网络中,匹配问题越来越受到重视。虽然对于该问题的加权版本存在精确的多项式时间序列算法,但所有相关的分布式算法都是近似算法。本文提出了一种分布式启发式算法,该算法在时间上与节点数成正比地提高给定匹配的权重。我们的算法假设异步通信模型,其中消息大小限制为O (log n)位。据我们所知,它是第一个分布式加权匹配算法,它受益于大小大于3的交替路径的增强,并使用小消息。我们还提供了随机几何图形的模拟结果。计算结果表明,该算法的近似解比其他加权匹配算法的近似解提高了1-3%,逼近比与最优解的差距缩小了9-26%。
{"title":"Improving distributed maximum weighted matchings for communication networks","authors":"C. Ileri, O. Dagdeviren","doi":"10.1109/BlackSeaCom.2017.8277709","DOIUrl":"https://doi.org/10.1109/BlackSeaCom.2017.8277709","url":null,"abstract":"Matching problem has been attracting a growing attention in network design, especially in wireless communication networks. Although there is an exact polynomial-time sequential algorithm for the weighted version of the problem, all the related distributed algorithms are approximation algorithms. In this paper we present a distributed heuristic which improves the weight of a given matching in time proportional to the number of nodes. Our algorithm assumes the asynchronous communication model in which the message size is limited to O (log n) bits. To the best of our knowledge, it is the first distributed weighted matching algorithm which benefits from augmentation of alternating paths having size larger than 3 and uses small messages. We also provide results of our simulations on random geometric graphs. Computational results show that our algorithm improves the approximated solutions of other weighted matching algorithms roughly by 1–3% and closes the gap between the approximation ratio and the optimum solution by 9–26%.","PeriodicalId":126747,"journal":{"name":"2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)","volume":"650 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122700770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 IEEE International Black Sea Conference on Communications and Networking (BlackSeaCom)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1