Pub Date : 2018-09-01DOI: 10.1109/CAMAD.2018.8514979
Natale Patriciello, S. Lagén, L. Giupponi, Biljana Bojović
In this paper, we use a New Radio (NR) simulator, based on ns-3, to assess the impact of 5G NR numerologies on the end-to-end (E2E) latencies in a realistic and complex scenario, including TCP and UDP flows. As expected, we found that TCP goodput increases with the numerology, since a larger numerology allows reducing the round-trip-time. However, although counter-intuitive, simulation results exhibit that the E2E latency of uplink (UL) UDP flows may not be reduced with the numerology. In fact, it depends on two key factors and their relationship: the processing delays (fixed or numerologydependent) and the inter-packet arrival time, which depends on the UDP flow rate and the packet size. We demonstrate how, in some cases, the latency is worsened by an increasing signaling exchange that grows with the numerology. In particular, this is due to a handshake mechanism in UL (scheduling request and UL grant) that is performed each time a data packet encounters empty RLC buffers. For some combination of flow rate, packet size, and processing delays that are not numerology dependent, increasing the numerology may not reduce the E2E delay. Therefore, we conclude that the selection of the numerology in an NR system should be carefully made by taking into account the traffic patterns and the processing delays.
{"title":"5G New Radio Numerologies and their Impact on the End-To-End Latency","authors":"Natale Patriciello, S. Lagén, L. Giupponi, Biljana Bojović","doi":"10.1109/CAMAD.2018.8514979","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514979","url":null,"abstract":"In this paper, we use a New Radio (NR) simulator, based on ns-3, to assess the impact of 5G NR numerologies on the end-to-end (E2E) latencies in a realistic and complex scenario, including TCP and UDP flows. As expected, we found that TCP goodput increases with the numerology, since a larger numerology allows reducing the round-trip-time. However, although counter-intuitive, simulation results exhibit that the E2E latency of uplink (UL) UDP flows may not be reduced with the numerology. In fact, it depends on two key factors and their relationship: the processing delays (fixed or numerologydependent) and the inter-packet arrival time, which depends on the UDP flow rate and the packet size. We demonstrate how, in some cases, the latency is worsened by an increasing signaling exchange that grows with the numerology. In particular, this is due to a handshake mechanism in UL (scheduling request and UL grant) that is performed each time a data packet encounters empty RLC buffers. For some combination of flow rate, packet size, and processing delays that are not numerology dependent, increasing the numerology may not reduce the E2E delay. Therefore, we conclude that the selection of the numerology in an NR system should be carefully made by taking into account the traffic patterns and the processing delays.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128404915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/CAMAD.2018.8514971
Yandong Liu, M. Dong, K. Ota, Jianhua Li, Jun Wu
Distributed Denial-of-Service (DDoS) flooding attack has remained as one of the most destructive attacks for more than two decades. Although great efforts have been made to design the defense mechanism, it is still difficult to mitigate these attacks in real time smartly and effectively for the reason that attack traffic may mix with benign traffic. Software-Defined Networks (SDN) decouples control and data plane in the network. Its centralized control paradigm and global view of the network bring some new chances to enhance the defense ability against network attacks. In this paper, we propose a deep reinforcement learning based framework, which can smartly learn the optimal mitigation policies under different attack scenarios and mitigate the DDoS flooding attack in real time. This framework is an effective system to defend against a wide range of DDoS flooding attacks such as TCP SYN, UDP, and ICMP flooding. It can intelligently learn the patterns of attack traffic and throttle the attack traffic, while the traffic of benign users is forwarded normally. We compare our proposed framework with a baseline along with a popular state-of-the-art router throttling method. The experimental results show that our approach can outperform both of them in five attacking scenarios with different attack dynamics significantly.
{"title":"Deep Reinforcement Learning based Smart Mitigation of DDoS Flooding in Software-Defined Networks","authors":"Yandong Liu, M. Dong, K. Ota, Jianhua Li, Jun Wu","doi":"10.1109/CAMAD.2018.8514971","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514971","url":null,"abstract":"Distributed Denial-of-Service (DDoS) flooding attack has remained as one of the most destructive attacks for more than two decades. Although great efforts have been made to design the defense mechanism, it is still difficult to mitigate these attacks in real time smartly and effectively for the reason that attack traffic may mix with benign traffic. Software-Defined Networks (SDN) decouples control and data plane in the network. Its centralized control paradigm and global view of the network bring some new chances to enhance the defense ability against network attacks. In this paper, we propose a deep reinforcement learning based framework, which can smartly learn the optimal mitigation policies under different attack scenarios and mitigate the DDoS flooding attack in real time. This framework is an effective system to defend against a wide range of DDoS flooding attacks such as TCP SYN, UDP, and ICMP flooding. It can intelligently learn the patterns of attack traffic and throttle the attack traffic, while the traffic of benign users is forwarded normally. We compare our proposed framework with a baseline along with a popular state-of-the-art router throttling method. The experimental results show that our approach can outperform both of them in five attacking scenarios with different attack dynamics significantly.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133282353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/CAMAD.2018.8514954
S. Alexaki, G. Alexandris, Vasilis Katos, N. Petroulakis
Circular, data-driven healthcare is increasingly being considered as an effective model to provide efficient, cost-effective and sustainable healthcare services in the future. Central to this model is the service-dominant “building-block”-type provision of care services to patients, paired with the collaboration of healthcare providers through a common infrastructure. This combination enables the forming of a decentralized, holistic care cycle. Sharing of patient medical informationis pivotal towards reaching this goal; however, preserving medical record integrity and privacy, while at the same time allowing provider interoperability are often conflicting requirements. Blockchains and Smart Contracts can provide the underlying technology to support the decentralized care cycle by addressing patient privacy and medical record integrity, while simultaneously offering efficient interoperability between providers. To demonstrate how this could be achieved, a conceptual medical record access and sharing mechanism is presented which is suitable for a system operating within a regulated healthcare jurisdiction.
{"title":"Blockchain-based Electronic Patient Records for Regulated Circular Healthcare Jurisdictions","authors":"S. Alexaki, G. Alexandris, Vasilis Katos, N. Petroulakis","doi":"10.1109/CAMAD.2018.8514954","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514954","url":null,"abstract":"Circular, data-driven healthcare is increasingly being considered as an effective model to provide efficient, cost-effective and sustainable healthcare services in the future. Central to this model is the service-dominant “building-block”-type provision of care services to patients, paired with the collaboration of healthcare providers through a common infrastructure. This combination enables the forming of a decentralized, holistic care cycle. Sharing of patient medical informationis pivotal towards reaching this goal; however, preserving medical record integrity and privacy, while at the same time allowing provider interoperability are often conflicting requirements. Blockchains and Smart Contracts can provide the underlying technology to support the decentralized care cycle by addressing patient privacy and medical record integrity, while simultaneously offering efficient interoperability between providers. To demonstrate how this could be achieved, a conceptual medical record access and sharing mechanism is presented which is suitable for a system operating within a regulated healthcare jurisdiction.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133550385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/CAMAD.2018.8514939
Eleftherios Sigioltzakis, I. Politis
The fifth generation of mobile networks is rapidly gaining momentum as the new paradigm of broadband communications. Mature pilots are already being implemented and tested across Europe. The plethora of applications and services supported by such novel networking architectures are characterized by high reliability, ultra-low delay and high throughput across heterogeneous access technologies and diverse user equipment. In this context, emergency services and emergency service operators are required to adapt rapidly by firstly adopting IP based architectures and secondly incorporate cloud-based and edge-based computing prototypes. This paper focuses on SIP based emergency architectures that are capable of exchanging added value services and data over legacy All-IP infrastructures. Moreover, the proposed emergency services architecture is studied as a multi-edge computing scenario and several useful observation are made for its applicability in today’s emergency services. The performance evaluation is based on a set of key performance indicators, which reveal that next generation SIPbased emergency services architectures could be easily be adopted and integrated into the legacy systems.
{"title":"On the performance of SIP-based next generation emergency services","authors":"Eleftherios Sigioltzakis, I. Politis","doi":"10.1109/CAMAD.2018.8514939","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514939","url":null,"abstract":"The fifth generation of mobile networks is rapidly gaining momentum as the new paradigm of broadband communications. Mature pilots are already being implemented and tested across Europe. The plethora of applications and services supported by such novel networking architectures are characterized by high reliability, ultra-low delay and high throughput across heterogeneous access technologies and diverse user equipment. In this context, emergency services and emergency service operators are required to adapt rapidly by firstly adopting IP based architectures and secondly incorporate cloud-based and edge-based computing prototypes. This paper focuses on SIP based emergency architectures that are capable of exchanging added value services and data over legacy All-IP infrastructures. Moreover, the proposed emergency services architecture is studied as a multi-edge computing scenario and several useful observation are made for its applicability in today’s emergency services. The performance evaluation is based on a set of key performance indicators, which reveal that next generation SIPbased emergency services architectures could be easily be adopted and integrated into the legacy systems.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126018074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/CAMAD.2018.8514992
Bolin Chen, Zheng Chen, N. Pappas, D. Yuan, Jie Zhang
Unlicensed spectrum utilization in LTE networks has been under extensive discussions and standardization attempts for its potential to handle the rapidly increasing data traffic. Various technologies for the utilization of unlicensed spectrum in LTE networks have emerged recently, and each of them has their potentials in certain aspects and critical issues to be solved. In this article, we provide a survey on the potential enabling solutions for the unlicensed spectrum utilization in LTE networks, including the direct usage of LTE infrastructures and protocols in unlicensed spectrum and LTE-WLAN integration. We highlight the differences between different LTE technologies in unlicensed spectrum and open up potential research directions related to the usage of unlicensed bands in cellular networks
{"title":"Bringing LTE to Unlicensed Spectrum: Technical Solutions and Deployment Considerations","authors":"Bolin Chen, Zheng Chen, N. Pappas, D. Yuan, Jie Zhang","doi":"10.1109/CAMAD.2018.8514992","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514992","url":null,"abstract":"Unlicensed spectrum utilization in LTE networks has been under extensive discussions and standardization attempts for its potential to handle the rapidly increasing data traffic. Various technologies for the utilization of unlicensed spectrum in LTE networks have emerged recently, and each of them has their potentials in certain aspects and critical issues to be solved. In this article, we provide a survey on the potential enabling solutions for the unlicensed spectrum utilization in LTE networks, including the direct usage of LTE infrastructures and protocols in unlicensed spectrum and LTE-WLAN integration. We highlight the differences between different LTE technologies in unlicensed spectrum and open up potential research directions related to the usage of unlicensed bands in cellular networks","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115703614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/CAMAD.2018.8514994
Jiliang Zhang, Yang Wang, Liqin Ding, Xiaoli Chu, Jie Zhang
In a Multi-User Multiple-Input Multiple-Output (MU-MIMO) system, the throughput depends on both the eigenvalues and the eigenspace alignment of the desired and the interference wireless channels. In this paper, a channel measurement campaign under a typical indoor environment is carried out, where five possible scenarios are taken into account. On the basis of measurement, fundamental trends about the ultimate performance of the MU-MIMO system is highlighted. Measurement results indicate that whether the desired transmitter and the interference transmitter are located in same cavity (e.g., room or corridor) impacts on the throughput of MU-MIMO transmission significantly due to common scatterers.
{"title":"Indoor Multiple-User MIMO Channel Measurement and Characterization","authors":"Jiliang Zhang, Yang Wang, Liqin Ding, Xiaoli Chu, Jie Zhang","doi":"10.1109/CAMAD.2018.8514994","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514994","url":null,"abstract":"In a Multi-User Multiple-Input Multiple-Output (MU-MIMO) system, the throughput depends on both the eigenvalues and the eigenspace alignment of the desired and the interference wireless channels. In this paper, a channel measurement campaign under a typical indoor environment is carried out, where five possible scenarios are taken into account. On the basis of measurement, fundamental trends about the ultimate performance of the MU-MIMO system is highlighted. Measurement results indicate that whether the desired transmitter and the interference transmitter are located in same cavity (e.g., room or corridor) impacts on the throughput of MU-MIMO transmission significantly due to common scatterers.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123307948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/CAMAD.2018.8514987
K. Irie, Hideaki Goto
The Next Generation Hotspot (NGH), based on the Hotspot 2.0 specification, is being introduced as a new conceptual standard that brings higher security and usability to Public Wireless LAN. There has been a movement in recent years for connecting some Roaming Consortia (RC) by NGH to develop a Large-Scale Wireless LAN roaming system. However, a routing problem has been identified in the identity federation system when an RC consisting of multiple operators is being connected. A typical example is eduroam, the roaming system for research and education institutions, having thousands of different realms. It is hard for wireless Service Providers (SPs) to find which RC the authentication requests should be sent to. To deal with this problem, this paper develops a Hub Proxy with learning-based automatic RC discovery and routing. The effectiveness of the system has been confirmed through some experiments using a virtual inter-roaming federation network.
{"title":"Automatic Roaming Consortium Discovery and Routing for Large-Scale Wireless LAN Roaming Systems","authors":"K. Irie, Hideaki Goto","doi":"10.1109/CAMAD.2018.8514987","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514987","url":null,"abstract":"The Next Generation Hotspot (NGH), based on the Hotspot 2.0 specification, is being introduced as a new conceptual standard that brings higher security and usability to Public Wireless LAN. There has been a movement in recent years for connecting some Roaming Consortia (RC) by NGH to develop a Large-Scale Wireless LAN roaming system. However, a routing problem has been identified in the identity federation system when an RC consisting of multiple operators is being connected. A typical example is eduroam, the roaming system for research and education institutions, having thousands of different realms. It is hard for wireless Service Providers (SPs) to find which RC the authentication requests should be sent to. To deal with this problem, this paper develops a Hub Proxy with learning-based automatic RC discovery and routing. The effectiveness of the system has been confirmed through some experiments using a virtual inter-roaming federation network.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"507 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123422854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-09-01DOI: 10.1109/CAMAD.2018.8514982
Zhuobiao Qiao, M. Dong, K. Ota, Jun Wu
Deep Neural Networks (DNNs) are hierarchical nonlinear architectures that have been widely used in artificial intelligence applications. However, these models are vulnerable to adversarial perturbations which add changes slightly and are crafted explicitly to fool the model. Such attacks will cause the neural network to completely change its classification of data. Although various defense strategies have been proposed, existing defense methods have two limitations. First, the discovery success rate is not very high. Second, existing methods depend on the output of a particular layer in a specific learning structure. In this paper, we propose a powerful method for adversarial samples using Large Margin Cosine Estimate(LMCE). By iteratively calculating the large-margin cosine uncertainty estimates between the model predictions, the results can be regarded as a novel measurement of model uncertainty estimation and is available to detect adversarial samples by training using a simple machine learning algorithm. Comparing it with the way in which adversar- ial samples are generated, it is confirmed that this measurement can better distinguish hostile disturbances. We modeled deep neural network attacks and established defense mechanisms against various types of adversarial attacks. Classifier gets better performance than the baseline model. The approach is validated on a series of standard datasets including MNIST and CIFAR −10, outperforming previous ensemble method with strong statistical significance. Experiments indicate that our approach generalizes better across different architectures and attacks.
{"title":"Toward Intelligent Detection Modelling for Adversarial Samples in Convolutional Neural Networks","authors":"Zhuobiao Qiao, M. Dong, K. Ota, Jun Wu","doi":"10.1109/CAMAD.2018.8514982","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514982","url":null,"abstract":"Deep Neural Networks (DNNs) are hierarchical nonlinear architectures that have been widely used in artificial intelligence applications. However, these models are vulnerable to adversarial perturbations which add changes slightly and are crafted explicitly to fool the model. Such attacks will cause the neural network to completely change its classification of data. Although various defense strategies have been proposed, existing defense methods have two limitations. First, the discovery success rate is not very high. Second, existing methods depend on the output of a particular layer in a specific learning structure. In this paper, we propose a powerful method for adversarial samples using Large Margin Cosine Estimate(LMCE). By iteratively calculating the large-margin cosine uncertainty estimates between the model predictions, the results can be regarded as a novel measurement of model uncertainty estimation and is available to detect adversarial samples by training using a simple machine learning algorithm. Comparing it with the way in which adversar- ial samples are generated, it is confirmed that this measurement can better distinguish hostile disturbances. We modeled deep neural network attacks and established defense mechanisms against various types of adversarial attacks. Classifier gets better performance than the baseline model. The approach is validated on a series of standard datasets including MNIST and CIFAR −10, outperforming previous ensemble method with strong statistical significance. Experiments indicate that our approach generalizes better across different architectures and attacks.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133170409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/CAMAD.2018.8514996
Michele Polese, M. Giordani, A. Roy, Sanjay Goyal, D. Castor, M. Zorzi
Recently, the millimeter wave (mmWave) bands have been investigated as a means to support the foreseen extreme data rate demands of next-generation cellular networks (5G). However, in order to overcome the severe isotropic path loss and the harsh propagation experienced at such high frequencies, a dense base station deployment is required, which may be infeasible because of the unavailability of fiber drops to provide wired backhauling. To address this challenge, the 3GPP is investigating the concept of Integrated Access and Backhaul (IAB), i.e., the possibility of providing wireless backhaul to the mobile terminals. In this paper, we (i) extend the capabilities of the existing mmWave module for ns-3 to support advanced IAB functionalities, and (ii) evaluate the end-to-end performance of the IAB architecture through system-level full-stack simulations in terms of experienced throughput and communication latency. We finally provide guidelines on how to design optimal wireless backhaul solutions in the presence of resource-constrained and traffic-congested mmWave scenarios.
{"title":"End-to-End Simulation of Integrated Access and Backhaul at mmWaves","authors":"Michele Polese, M. Giordani, A. Roy, Sanjay Goyal, D. Castor, M. Zorzi","doi":"10.1109/CAMAD.2018.8514996","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514996","url":null,"abstract":"Recently, the millimeter wave (mmWave) bands have been investigated as a means to support the foreseen extreme data rate demands of next-generation cellular networks (5G). However, in order to overcome the severe isotropic path loss and the harsh propagation experienced at such high frequencies, a dense base station deployment is required, which may be infeasible because of the unavailability of fiber drops to provide wired backhauling. To address this challenge, the 3GPP is investigating the concept of Integrated Access and Backhaul (IAB), i.e., the possibility of providing wireless backhaul to the mobile terminals. In this paper, we (i) extend the capabilities of the existing mmWave module for ns-3 to support advanced IAB functionalities, and (ii) evaluate the end-to-end performance of the IAB architecture through system-level full-stack simulations in terms of experienced throughput and communication latency. We finally provide guidelines on how to design optimal wireless backhaul solutions in the presence of resource-constrained and traffic-congested mmWave scenarios.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132788165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-16DOI: 10.1109/CAMAD.2018.8514986
C. Liaskos, A. Tsioliaridou, S. Ioannidis
The present study proposes the use of intelligent metasurfaces in the design of products, as enforcers of circular economy principles. Intelligent metasurfaces can tune their physical properties (electromagnetic, acoustic, mechanical) by receiving software commands. When incorporated within products and spaces they can mitigate the resource waste caused by inefficient, partially optimized designs and security concerns. Thus, circular economy and fast-paced product design become compatible. The study begins by considering electromagnetic metamaterials, and proposes a complete methodology for their deployment. Finally, it is shown that the same principles can be extended to the control of mechanical properties of objects, exemplary enabling the micro-management of vibrations and heat, with unprecedented circular economy potential.
{"title":"Towards a Circular Economy via Intelligent Metamaterials","authors":"C. Liaskos, A. Tsioliaridou, S. Ioannidis","doi":"10.1109/CAMAD.2018.8514986","DOIUrl":"https://doi.org/10.1109/CAMAD.2018.8514986","url":null,"abstract":"The present study proposes the use of intelligent metasurfaces in the design of products, as enforcers of circular economy principles. Intelligent metasurfaces can tune their physical properties (electromagnetic, acoustic, mechanical) by receiving software commands. When incorporated within products and spaces they can mitigate the resource waste caused by inefficient, partially optimized designs and security concerns. Thus, circular economy and fast-paced product design become compatible. The study begins by considering electromagnetic metamaterials, and proposes a complete methodology for their deployment. Finally, it is shown that the same principles can be extended to the control of mechanical properties of objects, exemplary enabling the micro-management of vibrations and heat, with unprecedented circular economy potential.","PeriodicalId":173858,"journal":{"name":"2018 IEEE 23rd International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128361067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}