首页 > 最新文献

2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)最新文献

英文 中文
Cooperative relay beamforming for control channel jamming in vehicular networks 车载网络中控制信道干扰的协同中继波束形成
Pengwenlong Gu, Cunqing Hua, R. Khatoun, Yue Wu, A. Serhrouchni
Radio Frequency (RF) jamming attacks constitute a major threat to the availability of control channel communications in the vehicular networks. In particular, the victim vehicles may fail to receive the safety related messages from the Road Side Unit (RSU) due to persistent jamming attacks, which can possibly cause tremendous economic loss and claim human lives. In this paper, we propose a cooperative anti-jamming beamforming scheme for the control channel jamming problem in vehicular networks, which takes advantage of the multi-antenna and spatial diversity provided by the RSU and relay vehicles to improve the transmission reliability of the victim vehicles. The anti-jamming beamformer design problem is formulated as a Mixed-integer Nonlinear Programming (MINLP) problem, which is intractable in general. We address this challenging problem by reformulating it as a sequence of convex sub-problems using the semi-definite relaxation (SDR) and convex-concave procedure (CCP) methods. Simulation results are provided to investigate the convergence of the proposed scheme, and significant performance gain can be observed comparing with other benchmark schemes.
射频(RF)干扰攻击对车载网络控制信道通信的可用性构成了主要威胁。特别是,受害车辆可能会因持续的干扰攻击而无法接收到路侧部队(RSU)发出的安全相关信息,这可能会造成巨大的经济损失和人员伤亡。针对车载网络中控制信道干扰问题,提出了一种协同抗干扰波束形成方案,利用RSU和中继车辆提供的多天线和空间分集,提高受扰车辆的传输可靠性。抗干扰波束形成器的设计问题是一个复杂的混合整数非线性规划问题。我们利用半定松弛(SDR)和凸凹过程(CCP)方法将其重新表述为一系列凸子问题来解决这个具有挑战性的问题。仿真结果验证了该方案的收敛性,与其他基准方案相比,可以观察到显著的性能增益。
{"title":"Cooperative relay beamforming for control channel jamming in vehicular networks","authors":"Pengwenlong Gu, Cunqing Hua, R. Khatoun, Yue Wu, A. Serhrouchni","doi":"10.23919/WIOPT.2018.8362860","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362860","url":null,"abstract":"Radio Frequency (RF) jamming attacks constitute a major threat to the availability of control channel communications in the vehicular networks. In particular, the victim vehicles may fail to receive the safety related messages from the Road Side Unit (RSU) due to persistent jamming attacks, which can possibly cause tremendous economic loss and claim human lives. In this paper, we propose a cooperative anti-jamming beamforming scheme for the control channel jamming problem in vehicular networks, which takes advantage of the multi-antenna and spatial diversity provided by the RSU and relay vehicles to improve the transmission reliability of the victim vehicles. The anti-jamming beamformer design problem is formulated as a Mixed-integer Nonlinear Programming (MINLP) problem, which is intractable in general. We address this challenging problem by reformulating it as a sequence of convex sub-problems using the semi-definite relaxation (SDR) and convex-concave procedure (CCP) methods. Simulation results are provided to investigate the convergence of the proposed scheme, and significant performance gain can be observed comparing with other benchmark schemes.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Stability properties of delay tolerant networks with buffered relay nodes 具有缓冲中继节点的容延迟网络的稳定性
V. Sukumaran, C. Singh
We study stability properties of single-source single-destination delay tolerant networks with random packet arrivals and buffered relay nodes, using source spray and wait routing. We derive the stability threshold, the supremum of arrival rates for which the source queue is stable, as a function of the buffer space at the relays. In particular, we show that the stability threshold only doubles as the relays' buffer size increases from one to infinity for a network without packet delivery feedback. For the system without packet delivery feedback, we propose lower bounds for the average queueing delay and average delivery delay for packets and compare with simulations. We also obtain the stability threshold numerically for a network with instantaneous packet delivery feedback.
研究了具有随机分组到达和缓冲中继节点的单源单目的地容忍延迟网络的稳定性,采用源喷淋和等待路由。我们导出了稳定阈值,即源队列稳定时到达率的最大值,作为中继缓冲区空间的函数。特别是,我们表明,稳定性阈值只会随着中继缓冲区大小从1增加到无穷大而增加一倍,对于没有数据包传递反馈的网络。对于没有分组发送反馈的系统,我们提出了分组平均排队延迟和分组平均发送延迟的下界,并与仿真进行了比较。对于具有瞬时报文传递反馈的网络,我们也给出了稳定阈值的数值计算。
{"title":"Stability properties of delay tolerant networks with buffered relay nodes","authors":"V. Sukumaran, C. Singh","doi":"10.23919/WIOPT.2018.8362889","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362889","url":null,"abstract":"We study stability properties of single-source single-destination delay tolerant networks with random packet arrivals and buffered relay nodes, using source spray and wait routing. We derive the stability threshold, the supremum of arrival rates for which the source queue is stable, as a function of the buffer space at the relays. In particular, we show that the stability threshold only doubles as the relays' buffer size increases from one to infinity for a network without packet delivery feedback. For the system without packet delivery feedback, we propose lower bounds for the average queueing delay and average delivery delay for packets and compare with simulations. We also obtain the stability threshold numerically for a network with instantaneous packet delivery feedback.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127303273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SVC-based caching and transmission strategy in wireless device-to-device networks 无线设备对设备网络中基于svc的缓存和传输策略
Cheng Zhan, Guo Yao
To address the explosively growing demand for mobile traffic, wireless device-to-device (D2D) networks have been introduced, where caching at user devices can be exploited to alleviate the burden on base stations. In this paper, we consider joint caching and transmission of scalable video coding (SVC) streaming over wireless D2D networks. We formulate a joint caching and transmission problem using integer linear programming to minimize the average download time for user, and prove that finding the optimal solution is NP-hard. A heuristic solution is proposed based on a two-phase sub-optimization problem focusing on caching and transmission decisions, which is solved by using relaxed linear programming. Simulation results show that the proposed scheme can significantly reduce the average download time in comparison with existing caching strategies.
为了满足对移动通信爆炸性增长的需求,已经引入了无线设备到设备(D2D)网络,可以利用用户设备上的缓存来减轻基站的负担。在本文中,我们考虑了无线D2D网络上可扩展视频编码(SVC)流的联合缓存和传输。为了最小化用户的平均下载时间,我们用整数线性规划的方法构造了一个联合缓存和传输问题,并证明了找到最优解是np困难的。提出了一种以缓存和传输决策为重点的两阶段子优化问题的启发式求解方法,并利用松弛线性规划方法求解该问题。仿真结果表明,与现有的缓存策略相比,该方案可以显著缩短平均下载时间。
{"title":"SVC-based caching and transmission strategy in wireless device-to-device networks","authors":"Cheng Zhan, Guo Yao","doi":"10.23919/WIOPT.2018.8362868","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362868","url":null,"abstract":"To address the explosively growing demand for mobile traffic, wireless device-to-device (D2D) networks have been introduced, where caching at user devices can be exploited to alleviate the burden on base stations. In this paper, we consider joint caching and transmission of scalable video coding (SVC) streaming over wireless D2D networks. We formulate a joint caching and transmission problem using integer linear programming to minimize the average download time for user, and prove that finding the optimal solution is NP-hard. A heuristic solution is proposed based on a two-phase sub-optimization problem focusing on caching and transmission decisions, which is solved by using relaxed linear programming. Simulation results show that the proposed scheme can significantly reduce the average download time in comparison with existing caching strategies.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126462771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Mean-field limit of the fixed-reward incentive mechanism in delay tolerant networks 延迟容忍网络中固定奖励激励机制的平均域极限
T. Nguyen, O. Brun, B. Prabhu
We investigate the asymptotic performance of a reward incentive Delay Tolerant Network based on mean field limit. We consider a two-hop network with one source and one destination and N relays. The source is backlogged and sends messages to the destination by forwarding to the relays it meets. For each message, there is a promised reward for the first one who successfully transmits it to the destination. It was shown in a previous work, the optimal policy for the relays is of thresholds type (a relay will accept a message until certain time and drop it after a second threshold). When the second threshold in infinite, we give the mean-field ODE and show that all the messages have the same probability of success. When the second threshold is finite we only give an ODE approximation since the dynamics are not Markovian.
研究了基于平均域极限的奖励激励延迟容忍网络的渐近性能。我们考虑一个有一个源一个目的和N个中继的两跳网络。源被积压,通过转发到它遇到的中继将消息发送到目的。对于每条消息,第一个成功将其传输到目的地的人将获得承诺的奖励。如前所述,继电器的最佳策略是阈值类型(继电器将在一定时间内接受消息,并在第二个阈值后丢弃消息)。当第二个阈值为无穷大时,我们给出了平均域ODE,并证明了所有消息都具有相同的成功概率。当第二个阈值是有限时,我们只给出ODE近似,因为动力学不是马尔可夫的。
{"title":"Mean-field limit of the fixed-reward incentive mechanism in delay tolerant networks","authors":"T. Nguyen, O. Brun, B. Prabhu","doi":"10.23919/WIOPT.2018.8362810","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362810","url":null,"abstract":"We investigate the asymptotic performance of a reward incentive Delay Tolerant Network based on mean field limit. We consider a two-hop network with one source and one destination and N relays. The source is backlogged and sends messages to the destination by forwarding to the relays it meets. For each message, there is a promised reward for the first one who successfully transmits it to the destination. It was shown in a previous work, the optimal policy for the relays is of thresholds type (a relay will accept a message until certain time and drop it after a second threshold). When the second threshold in infinite, we give the mean-field ODE and show that all the messages have the same probability of success. When the second threshold is finite we only give an ODE approximation since the dynamics are not Markovian.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Privacy-preserving ride clustering for customized-bus sharing: A fog-assisted approach 定制公交共享的隐私保护乘车集群:一种雾辅助方法
Yuanyuan He, Jianbing Ni, Ben Niu, Fenghua Li, Xuemin Shen
Customized-bus Sharing Service (CSS) enables a centralized server to schedule comfortable bus trips for users by ride clustering based on the individual requirements. It has been increasingly popular in crowded metropolises, bringing a lot of convenience and reducing trip costs to users. Ride clustering is essential for the server to determine the stops of a customized bus, but it also leads to the exposure of users' current locations and spatio-temporal patterns. Although privacy-preserving ride clustering can generate optimal bus routes, it depends on frequent interactions between users and the server, so all the users should be always online. In this paper, we propose a privacy-preserving ride clustering scheme for CSS to support off-line users, in which fog computing is introduced to assist the server in generating bus route without the exposure of users' travel plans. Fog servers are able to perform ride clustering interacting with the server, after receiving the preferred pick-up and drop-off positions from users. Thus, the users are unnecessary to be always online. In addition, the Paillier cryptosystem and randomization technique are leveraged to protect the user's privacy without sacrificing the clustering quality. Finally, the proposed privacy-preserving ride clustering scheme is demonstrated to have the advantage of low computational and communication overhead with high security guarantees.
定制公交共享服务(CSS)是一种集中式服务器,根据用户的个人需求,通过乘车集群的方式,为用户安排舒适的公交行程。它在拥挤的大都市中越来越受欢迎,给用户带来了很多便利,降低了出行成本。乘车集群对于服务器确定定制巴士的站点至关重要,但它也会暴露用户当前的位置和时空模式。尽管隐私保护乘车集群可以生成最优公交路线,但它依赖于用户与服务器之间的频繁交互,因此所有用户都应该始终在线。在本文中,我们提出了一种用于支持离线用户的CSS的隐私保护乘车集群方案,该方案引入雾计算,在不暴露用户出行计划的情况下协助服务器生成公交路线。雾服务器能够在接收到用户的首选上车和下车位置后,与服务器进行乘车集群交互。因此,用户不需要一直在线。此外,利用Paillier密码系统和随机化技术在不牺牲聚类质量的前提下保护用户隐私。最后,本文提出的保隐私乘车聚类方案具有计算和通信开销低、安全性高的优点。
{"title":"Privacy-preserving ride clustering for customized-bus sharing: A fog-assisted approach","authors":"Yuanyuan He, Jianbing Ni, Ben Niu, Fenghua Li, Xuemin Shen","doi":"10.23919/WIOPT.2018.8362850","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362850","url":null,"abstract":"Customized-bus Sharing Service (CSS) enables a centralized server to schedule comfortable bus trips for users by ride clustering based on the individual requirements. It has been increasingly popular in crowded metropolises, bringing a lot of convenience and reducing trip costs to users. Ride clustering is essential for the server to determine the stops of a customized bus, but it also leads to the exposure of users' current locations and spatio-temporal patterns. Although privacy-preserving ride clustering can generate optimal bus routes, it depends on frequent interactions between users and the server, so all the users should be always online. In this paper, we propose a privacy-preserving ride clustering scheme for CSS to support off-line users, in which fog computing is introduced to assist the server in generating bus route without the exposure of users' travel plans. Fog servers are able to perform ride clustering interacting with the server, after receiving the preferred pick-up and drop-off positions from users. Thus, the users are unnecessary to be always online. In addition, the Paillier cryptosystem and randomization technique are leveraged to protect the user's privacy without sacrificing the clustering quality. Finally, the proposed privacy-preserving ride clustering scheme is demonstrated to have the advantage of low computational and communication overhead with high security guarantees.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131024091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Enhance the edge with beamforming: Performance analysis of beamforming-enabled WLAN 用波束形成增强边缘:波束形成的WLAN性能分析
Wen Wu, Qinghua Shen, Khalid Aldubaikhy, Nan Cheng, Ning Zhang, Xuemin Shen
The ultra-dense edge networks with mmWave and beamforming are envisioned as a potential solution to satisfy the high rate and capacity requirements in 5G networks. In IEEE 802.11 ad, which is the first beamforming-enabled WLAN standard, all stations (STs) contend for beamforming (BF) training opportunities in associated beamforming training (A-BFT) slots. However, due to limited number of A-BFT slots, BF training suffers from a severe collision issue, especially in dense networks, which results in a low channel utilization in the A-BFT stage. To achieve the maximum channel utilization, it is of significance to allocate A-BFT slots efficiently. Therefore, in this paper, we propose an analytical model to analyze IEEE 802.11 ad medium access control (MAC) protocol in BF training stage. In particular, we analyze the successful transmission probability and channel utilization of IEEE 802.11 ad MAC protocol in the dense network. Based on theoretical analysis, we provide the optimal number of A-BFT slots. In addition, theoretical analysis indicates that the maximum channel utilization in the A-BFT stage is barely e−1 which is the same as that of slotted ALOHA protocol. Simulation results are provided to validate the accuracy of the analytical model and theoretical analysis.
具有毫米波和波束成形的超密集边缘网络被设想为满足5G网络高速率和高容量需求的潜在解决方案。在第一个支持波束形成的WLAN标准IEEE 802.11 ad中,所有站(st)都在相关波束形成训练(A-BFT)槽中争夺波束形成(BF)训练机会。然而,由于a - bft槽数有限,BF训练存在严重的碰撞问题,特别是在密集网络中,导致a - bft阶段的信道利用率很低。为了实现最大的信道利用率,有效地分配A-BFT时隙具有重要意义。因此,本文提出了一种分析模型来分析IEEE 802.11和MAC协议在BF训练阶段的性能。重点分析了IEEE 802.11 ad MAC协议在密集网络中的成功传输概率和信道利用率。在理论分析的基础上,给出了最优的A-BFT槽数。此外,理论分析表明,A-BFT阶段的最大信道利用率仅为e−1,与有槽ALOHA协议相同。仿真结果验证了分析模型和理论分析的准确性。
{"title":"Enhance the edge with beamforming: Performance analysis of beamforming-enabled WLAN","authors":"Wen Wu, Qinghua Shen, Khalid Aldubaikhy, Nan Cheng, Ning Zhang, Xuemin Shen","doi":"10.23919/WIOPT.2018.8362872","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362872","url":null,"abstract":"The ultra-dense edge networks with mmWave and beamforming are envisioned as a potential solution to satisfy the high rate and capacity requirements in 5G networks. In IEEE 802.11 ad, which is the first beamforming-enabled WLAN standard, all stations (STs) contend for beamforming (BF) training opportunities in associated beamforming training (A-BFT) slots. However, due to limited number of A-BFT slots, BF training suffers from a severe collision issue, especially in dense networks, which results in a low channel utilization in the A-BFT stage. To achieve the maximum channel utilization, it is of significance to allocate A-BFT slots efficiently. Therefore, in this paper, we propose an analytical model to analyze IEEE 802.11 ad medium access control (MAC) protocol in BF training stage. In particular, we analyze the successful transmission probability and channel utilization of IEEE 802.11 ad MAC protocol in the dense network. Based on theoretical analysis, we provide the optimal number of A-BFT slots. In addition, theoretical analysis indicates that the maximum channel utilization in the A-BFT stage is barely e−1 which is the same as that of slotted ALOHA protocol. Simulation results are provided to validate the accuracy of the analytical model and theoretical analysis.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130875064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A D2D offloading approach to efficient mobile edge resource pooling 一种高效移动边缘资源池的D2D卸载方法
Junkai Liu, Ke Luo, Zhi Zhou, Xu Chen
The explosion of resource-hungry mobile applications has posed great challenges on the underlying mobile devices which typically have limited computation resource. In response, device-to-device (D2D) computation offloading is envisioned as a promising approach to the problem by gearing resource-rich devices and resource-poor devices. Towards real-time and efficient computation offloading, in this paper, we proposed a novel edge resource pooling framework called ERP, in which a massive crowd of devices at the network edge exploit D2D collaboration for pooling and sharing computation resource with each other. Specifically, we first formulate the utility maximization problem under both computation and communication constraints as a mixed-integer linear programming (MILP), which is further proven to be NP-hard. To address this challenge, we propose a centralized greedy heuristic based on the classical maximum network flow problem, which schedules the task offloading in a cost-efficient manner. Rigorous theoretical analysis and extensive evaluations demonstrate the effectiveness of the heuristic to some extent.
资源密集型移动应用程序的爆炸式增长对底层计算资源有限的移动设备提出了巨大的挑战。作为回应,设备到设备(D2D)计算卸载被设想为一种很有前途的方法,通过将资源丰富的设备和资源贫乏的设备结合起来来解决这个问题。为了实现实时高效的计算卸载,本文提出了一种新的边缘资源池框架ERP,在该框架中,网络边缘的大量设备利用D2D协作来池化和共享计算资源。具体而言,我们首先将计算和通信约束下的效用最大化问题表述为混合整数线性规划(MILP),并进一步证明了其np困难性。为了解决这一挑战,我们提出了一种基于经典最大网络流问题的集中式贪婪启发式算法,该算法以一种经济有效的方式调度任务卸载。严谨的理论分析和广泛的评价在一定程度上证明了启发式的有效性。
{"title":"A D2D offloading approach to efficient mobile edge resource pooling","authors":"Junkai Liu, Ke Luo, Zhi Zhou, Xu Chen","doi":"10.23919/WIOPT.2018.8362882","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362882","url":null,"abstract":"The explosion of resource-hungry mobile applications has posed great challenges on the underlying mobile devices which typically have limited computation resource. In response, device-to-device (D2D) computation offloading is envisioned as a promising approach to the problem by gearing resource-rich devices and resource-poor devices. Towards real-time and efficient computation offloading, in this paper, we proposed a novel edge resource pooling framework called ERP, in which a massive crowd of devices at the network edge exploit D2D collaboration for pooling and sharing computation resource with each other. Specifically, we first formulate the utility maximization problem under both computation and communication constraints as a mixed-integer linear programming (MILP), which is further proven to be NP-hard. To address this challenge, we propose a centralized greedy heuristic based on the classical maximum network flow problem, which schedules the task offloading in a cost-efficient manner. Rigorous theoretical analysis and extensive evaluations demonstrate the effectiveness of the heuristic to some extent.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115627098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
On the conditional entropy of wireless networks 无线网络的条件熵
J. Coon, Mihai-Alin Badiu, Deniz Gündüz
The characterization of topological uncertainty in wireless networks using the formalism of graph entropy has received interest in the spatial networks community. In this paper, we develop lower bounds on the entropy of a wireless network by conditioning on potential network observables. Two approaches are considered: 1) conditioning on subgraphs, and 2) conditioning on node positions. The first approach is shown to yield a relatively tight bound on the network entropy. The second yields a loose bound, in general, but it provides insight into the dependence between node positions (modelled using a homogenous binomial point process in this work) and the network topology.
利用图熵的形式描述无线网络拓扑不确定性已经引起了空间网络界的兴趣。在本文中,我们通过对网络的潜在观测值进行调节,得到了无线网络熵的下界。考虑了两种方法:1)子图的条件反射和2)节点位置的条件反射。第一种方法在网络熵上产生了一个相对紧密的边界。一般来说,第二种方法产生一个松散的边界,但它提供了对节点位置(在本工作中使用齐次二项式点过程建模)与网络拓扑之间依赖关系的洞察。
{"title":"On the conditional entropy of wireless networks","authors":"J. Coon, Mihai-Alin Badiu, Deniz Gündüz","doi":"10.23919/WIOPT.2018.8362874","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362874","url":null,"abstract":"The characterization of topological uncertainty in wireless networks using the formalism of graph entropy has received interest in the spatial networks community. In this paper, we develop lower bounds on the entropy of a wireless network by conditioning on potential network observables. Two approaches are considered: 1) conditioning on subgraphs, and 2) conditioning on node positions. The first approach is shown to yield a relatively tight bound on the network entropy. The second yields a loose bound, in general, but it provides insight into the dependence between node positions (modelled using a homogenous binomial point process in this work) and the network topology.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123027131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Effects of storage heterogeneity in distributed cache systems 分布式缓存系统中存储异构的影响
Kota Srinivas Reddy, Sharayu Moharir, N. Karamchandani
In this work, we focus on distributed cache systems with non-uniform storage capacity across caches. We compare the performance of our system with the performance of a system with the same cumulative storage distributed evenly across the caches. We characterize the extent to which the performance of the distributed cache system deteriorates due to storage heterogeneity. The key takeaway from this work is that the effects of heterogeneity in the storage capabilities depend heavily on the popularity profile of the contents being cached and delivered. We analytically show that compared to the case where contents popularity is comparable across contents, lopsided popularity profiles are more tolerant to heterogeneity in storage capabilities. We validate our theoretical results via simulations.
在这项工作中,我们将重点关注具有非均匀存储容量的分布式缓存系统。我们将系统的性能与均匀分布在缓存上的相同累积存储的系统的性能进行比较。我们描述了由于存储异构而导致分布式缓存系统性能恶化的程度。从这项工作中得出的关键结论是,存储功能的异构性的影响在很大程度上取决于缓存和交付的内容的流行程度。我们通过分析表明,与内容流行度跨内容可比较的情况相比,不平衡的流行度配置文件更能容忍存储能力的异质性。我们通过模拟验证了我们的理论结果。
{"title":"Effects of storage heterogeneity in distributed cache systems","authors":"Kota Srinivas Reddy, Sharayu Moharir, N. Karamchandani","doi":"10.23919/WIOPT.2018.8362849","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362849","url":null,"abstract":"In this work, we focus on distributed cache systems with non-uniform storage capacity across caches. We compare the performance of our system with the performance of a system with the same cumulative storage distributed evenly across the caches. We characterize the extent to which the performance of the distributed cache system deteriorates due to storage heterogeneity. The key takeaway from this work is that the effects of heterogeneity in the storage capabilities depend heavily on the popularity profile of the contents being cached and delivered. We analytically show that compared to the case where contents popularity is comparable across contents, lopsided popularity profiles are more tolerant to heterogeneity in storage capabilities. We validate our theoretical results via simulations.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124044575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multi-cell coordination in K-tier heterogeneous downlink cellular networks: Dynamic clustering and feedback allocation k层异构下行蜂窝网络中的多蜂窝协调:动态聚类和反馈分配
Jeonghun Park, N. Lee, R. Heath
We characterize the ergodic spectral efficiency of a cooperative type of K-tier heterogeneous networks (HetNets) with limited feedback. Specifically, a base station (BS) coordination set is formed by using dynamic clustering across the tiers, wherein the intra-cluster interference is mitigated by using multi-cell zero-forcing based on limited feedback. Modeling the network based on stochastic geometry, we derive analytical expressions for the ergodic spectral efficiency as a function of the system parameters. Leveraging the obtained expression, we formulate a feedback allocation problem and obtain a solution to improve the ergodic spectral efficiency. Simulations show the spectral efficiency improvement by using the proposed feedback allocation. One major finding in the obtained solution is that allocating more feedback to stronger intra-cluster BSs is efficient.
我们描述了具有有限反馈的合作型k层异构网络(HetNets)的遍历频谱效率。具体而言,通过跨层动态聚类形成基站(BS)协调集,其中通过基于有限反馈的多小区零强迫来减轻簇内干扰。基于随机几何对网络进行建模,推导出遍历谱效率作为系统参数函数的解析表达式。利用得到的表达式,我们提出了一个反馈分配问题,并得到了提高遍历频谱效率的解决方案。仿真结果表明,采用反馈分配方法可以提高频谱效率。得到的解决方案中的一个主要发现是,将更多的反馈分配给更强的集群内BSs是有效的。
{"title":"Multi-cell coordination in K-tier heterogeneous downlink cellular networks: Dynamic clustering and feedback allocation","authors":"Jeonghun Park, N. Lee, R. Heath","doi":"10.23919/WIOPT.2018.8362870","DOIUrl":"https://doi.org/10.23919/WIOPT.2018.8362870","url":null,"abstract":"We characterize the ergodic spectral efficiency of a cooperative type of K-tier heterogeneous networks (HetNets) with limited feedback. Specifically, a base station (BS) coordination set is formed by using dynamic clustering across the tiers, wherein the intra-cluster interference is mitigated by using multi-cell zero-forcing based on limited feedback. Modeling the network based on stochastic geometry, we derive analytical expressions for the ergodic spectral efficiency as a function of the system parameters. Leveraging the obtained expression, we formulate a feedback allocation problem and obtain a solution to improve the ergodic spectral efficiency. Simulations show the spectral efficiency improvement by using the proposed feedback allocation. One major finding in the obtained solution is that allocating more feedback to stronger intra-cluster BSs is efficient.","PeriodicalId":231395,"journal":{"name":"2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126545844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2018 16th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1