首页 > 最新文献

ITU Journal on Future and Evolving Technologies最新文献

英文 中文
Fabrication and optimization of bi-quad antenna and energy-efficient balanced RF power amplifier for 5G-LTE multi-carrier applications 面向5G-LTE多载波应用的双四天线和节能平衡射频功率放大器的制造与优化
Pub Date : 2022-12-15 DOI: 10.52953/wcqw1171
Isaac Kuma Yeboah, Richard Brace, Kwabena Agyapong-Kondua, Matthew Asiedu, Henrritta Kuma Yeboah
Wireless technology is presently one of the most actively researched fields of digital communication systems. Wireless communication technologies are insufficient without an understanding of antenna design and operation. A wide range of radio frequency equipment, including microwave antennas, microwave ovens, cordless telephones, and medical devices, utilize the 2.4 GHz band. In this article, a parabolic mesh dish was used to build and improve a bi-quad antenna with a central working frequency of 2.445 GHz. The bi-quad antenna was put in a parabolic mesh dish to optimize wave propagation. The findings show that the antenna obtained a signal strength range of 70% to 80%, increasing the directivity of WLAN coverage. The bi-quad antenna feed was placed in the center of a mesh dish, which assists in focusing radio waves onto the antenna. The bi-quad antenna outperformed the omnidirectional antenna, which had a signal strength of 56%. The results of each antenna test were separately simulated in MATLAB. The combined impact of bi-quad and parabolic was then duplicated using mathematical models, resulting in a unique waveform propagation pattern known as para-quad, which improved performance. A balanced RF power amplifier was conceived and built in this study. A 2.620 - 2.690GHz frequency range on a large signal Si-LDMOS transistor model achieves 53% PAE, 41dBm power output, and 14 dB gain at the P1dB saturation point.
无线技术是目前数字通信系统中研究最为活跃的领域之一。如果不了解天线的设计和操作,无线通信技术是不够的。广泛的射频设备,包括微波天线、微波炉、无绳电话和医疗设备,都使用2.4 GHz频段。本文采用抛物面网状天线对中心工作频率为2.445 GHz的双四面天线进行了构建和改进。将双四面天线置于抛物面网状天线盘中,以优化波的传播。结果表明,该天线获得了70% ~ 80%的信号强度范围,提高了WLAN覆盖的指向性。双四天线馈电被放置在一个网状圆盘的中心,这有助于将无线电波聚焦到天线上。双四向天线优于全向天线,其信号强度为56%。在MATLAB中分别对各天线的测试结果进行了仿真。然后使用数学模型复制双四轴和抛物线的综合影响,从而产生一种称为准四轴的独特波形传播模式,从而提高了性能。本研究构想并制作了一种平衡式射频功率放大器。在2.620 - 2.690GHz的频率范围内,大信号Si-LDMOS晶体管模型在P1dB饱和点上实现了53%的PAE, 41dBm的功率输出和14db的增益。
{"title":"Fabrication and optimization of bi-quad antenna and energy-efficient balanced RF power amplifier for 5G-LTE multi-carrier applications","authors":"Isaac Kuma Yeboah, Richard Brace, Kwabena Agyapong-Kondua, Matthew Asiedu, Henrritta Kuma Yeboah","doi":"10.52953/wcqw1171","DOIUrl":"https://doi.org/10.52953/wcqw1171","url":null,"abstract":"Wireless technology is presently one of the most actively researched fields of digital communication systems. Wireless communication technologies are insufficient without an understanding of antenna design and operation. A wide range of radio frequency equipment, including microwave antennas, microwave ovens, cordless telephones, and medical devices, utilize the 2.4 GHz band. In this article, a parabolic mesh dish was used to build and improve a bi-quad antenna with a central working frequency of 2.445 GHz. The bi-quad antenna was put in a parabolic mesh dish to optimize wave propagation. The findings show that the antenna obtained a signal strength range of 70% to 80%, increasing the directivity of WLAN coverage. The bi-quad antenna feed was placed in the center of a mesh dish, which assists in focusing radio waves onto the antenna. The bi-quad antenna outperformed the omnidirectional antenna, which had a signal strength of 56%. The results of each antenna test were separately simulated in MATLAB. The combined impact of bi-quad and parabolic was then duplicated using mathematical models, resulting in a unique waveform propagation pattern known as para-quad, which improved performance. A balanced RF power amplifier was conceived and built in this study. A 2.620 - 2.690GHz frequency range on a large signal Si-LDMOS transistor model achieves 53% PAE, 41dBm power output, and 14 dB gain at the P1dB saturation point.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129555866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deployment of the Fed4FIRE+ testbed for forensics visualization purposes 部署用于取证可视化目的的Fed4FIRE+测试平台
Pub Date : 2022-12-09 DOI: 10.52953/imxx4520
Leonidas Kallipolitis, Panagiotis Katrakazas, Ilias Spais
A security incident or rule violation can be detected and documented using forensic analysis, which is made easier by preconfigured views that are enhanced with crucial data. In this paper, we present an advanced visualization mechanism for digital forensics that increases the situational awareness of a security expert by analysing and presenting security events, alarms and critical performance indicators. Using testbeds made available by Fed4FIRE+, we demonstrate an experimentation setup that simulates genuine client settings, including their varying needs and differences in size and requirements. These tests allowed for the parameterization of the variables, which led to rapid and well-documented results that could only be reached by trial and error with potential financial repercussions.
可以使用取证分析检测和记录安全事件或规则违反,通过使用关键数据增强的预配置视图可以简化这一过程。在本文中,我们提出了一种先进的数字取证可视化机制,通过分析和呈现安全事件、警报和关键性能指标,提高安全专家的态势感知能力。使用Fed4FIRE+提供的测试平台,我们演示了一个模拟真实客户端设置的实验设置,包括它们的不同需求以及大小和需求的差异。这些测试允许对变量进行参数化,从而导致只能通过试验和错误才能获得的快速和有充分记录的结果,并可能产生财务影响。
{"title":"Deployment of the Fed4FIRE+ testbed for forensics visualization purposes","authors":"Leonidas Kallipolitis, Panagiotis Katrakazas, Ilias Spais","doi":"10.52953/imxx4520","DOIUrl":"https://doi.org/10.52953/imxx4520","url":null,"abstract":"A security incident or rule violation can be detected and documented using forensic analysis, which is made easier by preconfigured views that are enhanced with crucial data. In this paper, we present an advanced visualization mechanism for digital forensics that increases the situational awareness of a security expert by analysing and presenting security events, alarms and critical performance indicators. Using testbeds made available by Fed4FIRE+, we demonstrate an experimentation setup that simulates genuine client settings, including their varying needs and differences in size and requirements. These tests allowed for the parameterization of the variables, which led to rapid and well-documented results that could only be reached by trial and error with potential financial repercussions.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130867147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encrypted 5G over-the-top voice traffic classification using deep learning 使用深度学习加密5G超顶级语音流量分类
Pub Date : 2022-12-09 DOI: 10.52953/eyif3681
Zhuang Qiao, Shunliang Zhang, Liuqun Zhai, Xiaohui Zhang
With the commercialization of fifth-generation (5G), the rapid popularity of mobile Over-The-Top (OTT) voice applications brings huge impacts on the traditional telecommunication voice call services. Tunnel encryption technology such as Virtual Private Networks (VPNs) allow OTT users to escape the supervision of network operators easily, which may cause potential security risks to cyberspace. To monitor harmful OTT applications in the context of 5G, it is critical to identify encrypted OTT voice traffic. However, there is no comprehensive study on typical OTT voice traffic identification. This paper mainly focuses on analyzing OTT voice traffic in the 5G network specifically. We propose employing Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs) to identify encrypted 5G OTT voice traffic, study the identification performance of used deep learning methods in three different scenarios. To verify the performance of the proposed approach, we collect 28 types of typical OTT and non-OTT voice traffic from the experimental 5G network. Experimental results prove the effectiveness and robustness of the proposed approach in encrypted 5G OTT voice traffic identification.
随着第五代(5G)技术的商业化,移动OTT (over - top)语音应用的迅速普及给传统的电信语音呼叫业务带来了巨大的冲击。vpn (Virtual Private Networks)等隧道加密技术使得OTT用户很容易逃避网络运营商的监管,这可能会给网络空间带来潜在的安全风险。为了在5G环境下监控有害的OTT应用,识别加密的OTT语音流量至关重要。然而,对于典型的OTT话音流量识别,目前还没有全面的研究。本文主要对5G网络下的OTT语音流量进行了具体的分析。我们提出使用长短期记忆(LSTM)和卷积神经网络(cnn)来识别加密的5G OTT语音流量,并研究所使用的深度学习方法在三种不同场景下的识别性能。为了验证所提出方法的性能,我们从实验5G网络中收集了28种典型的OTT和非OTT语音流量。实验结果证明了该方法在加密5G OTT话音流量识别中的有效性和鲁棒性。
{"title":"Encrypted 5G over-the-top voice traffic classification using deep learning","authors":"Zhuang Qiao, Shunliang Zhang, Liuqun Zhai, Xiaohui Zhang","doi":"10.52953/eyif3681","DOIUrl":"https://doi.org/10.52953/eyif3681","url":null,"abstract":"With the commercialization of fifth-generation (5G), the rapid popularity of mobile Over-The-Top (OTT) voice applications brings huge impacts on the traditional telecommunication voice call services. Tunnel encryption technology such as Virtual Private Networks (VPNs) allow OTT users to escape the supervision of network operators easily, which may cause potential security risks to cyberspace. To monitor harmful OTT applications in the context of 5G, it is critical to identify encrypted OTT voice traffic. However, there is no comprehensive study on typical OTT voice traffic identification. This paper mainly focuses on analyzing OTT voice traffic in the 5G network specifically. We propose employing Long Short-Term Memory (LSTM) and Convolutional Neural Networks (CNNs) to identify encrypted 5G OTT voice traffic, study the identification performance of used deep learning methods in three different scenarios. To verify the performance of the proposed approach, we collect 28 types of typical OTT and non-OTT voice traffic from the experimental 5G network. Experimental results prove the effectiveness and robustness of the proposed approach in encrypted 5G OTT voice traffic identification.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123217129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards fairness and QoE-based edge allocation for multiplayer virtual reality applications in edge computing 边缘计算中多人虚拟现实应用的公平性和基于qos的边缘分配
Pub Date : 2022-12-09 DOI: 10.52953/vavy1919
Athanasios Tsipis, Vasileios Komianos, Konstantinos Oikonomou, Ioannis Stavrakakis
Edge computing has emerged as the next big thing in distributed computing, by extending the cloud paradigm and offering efficient ways to engage with latency-intolerant applications, such as Virtual Reality (VR) multiplayer games. In edge computing, the service providers can benefit from existing cellular infrastructure to deploy services on edge servers that reside in close proximity to the users. Given the limited available budget for edge resource investment, one fundamental problem that manifests is the discovery of a prudent edge allocation strategy, that will efficiently prescribe which users are assigned to which edge servers, in order to tackle application-specific requirements, like minimizing system deployment costs. In this paper, considering the frequent interactions and view inconsistencies occurring among multiple users immersed in the same VR game, we address the problem from the users' perspective, focusing on improving their edge admission rate, resource provisioning and overall fairness, in order to subsequently maximize the average Quality of Experience (QoE). We call this the "Fairness and QoE-Based Edge Allocation" (FQEA) problem, formally formulating its properties and theoretically proving its complexity. However, discovering optimal solutions to the NP-hard FQEA in large-scale VR scenarios is challenging. Hence, we propose FQEA-H, a heuristic algorithm to generate allocation strategies in reasonable time. Comprehensive simulations, conducted on a real-world topological trace, demonstrate how FQEA-H can tackle the problem effectively, generally outperforming both the baseline and state-of-the-art alternatives.
边缘计算已经成为分布式计算的下一个热点,它扩展了云范式,并提供了有效的方法来处理延迟不容忍的应用程序,比如虚拟现实(VR)多人游戏。在边缘计算中,服务提供商可以从现有的蜂窝基础设施中获益,在靠近用户的边缘服务器上部署服务。考虑到边缘资源投资的可用预算有限,出现的一个基本问题是发现谨慎的边缘分配策略,该策略将有效地规定将哪些用户分配给哪些边缘服务器,以解决特定于应用程序的需求,例如最小化系统部署成本。考虑到沉浸在同一款VR游戏中的多个用户之间频繁的交互和视图不一致,我们从用户的角度来解决这个问题,重点关注提高他们的边缘准入率、资源供应和整体公平性,从而最大化平均体验质量(QoE)。我们将其称为“公平和基于qos的边缘分配”(FQEA)问题,从形式上阐述了其性质并从理论上证明了其复杂性。然而,在大规模VR场景中找到NP-hard FQEA的最佳解决方案是具有挑战性的。因此,我们提出了一种启发式算法FQEA-H,以在合理的时间内生成分配策略。在现实世界的拓扑轨迹上进行的综合模拟,证明了FQEA-H如何有效地解决问题,通常优于基线和最先进的替代方案。
{"title":"Towards fairness and QoE-based edge allocation for multiplayer virtual reality applications in edge computing","authors":"Athanasios Tsipis, Vasileios Komianos, Konstantinos Oikonomou, Ioannis Stavrakakis","doi":"10.52953/vavy1919","DOIUrl":"https://doi.org/10.52953/vavy1919","url":null,"abstract":"Edge computing has emerged as the next big thing in distributed computing, by extending the cloud paradigm and offering efficient ways to engage with latency-intolerant applications, such as Virtual Reality (VR) multiplayer games. In edge computing, the service providers can benefit from existing cellular infrastructure to deploy services on edge servers that reside in close proximity to the users. Given the limited available budget for edge resource investment, one fundamental problem that manifests is the discovery of a prudent edge allocation strategy, that will efficiently prescribe which users are assigned to which edge servers, in order to tackle application-specific requirements, like minimizing system deployment costs. In this paper, considering the frequent interactions and view inconsistencies occurring among multiple users immersed in the same VR game, we address the problem from the users' perspective, focusing on improving their edge admission rate, resource provisioning and overall fairness, in order to subsequently maximize the average Quality of Experience (QoE). We call this the \"Fairness and QoE-Based Edge Allocation\" (FQEA) problem, formally formulating its properties and theoretically proving its complexity. However, discovering optimal solutions to the NP-hard FQEA in large-scale VR scenarios is challenging. Hence, we propose FQEA-H, a heuristic algorithm to generate allocation strategies in reasonable time. Comprehensive simulations, conducted on a real-world topological trace, demonstrate how FQEA-H can tackle the problem effectively, generally outperforming both the baseline and state-of-the-art alternatives.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128349929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proactivity in content delivery networks resource management: The stock options case 内容交付网络资源管理中的主动性:股票期权案例
Pub Date : 2022-12-09 DOI: 10.52953/geew8451
Elias Vathias, Matthias Filippos Doukas, Panagiotis Giannopoulos, Stathes Hadjiefthymiades
This paper focuses on the management and pricing of resources in Content Delivery Networks (CDNs), which are extensively adopted nowadays as a very efficient mechanism for Internet information provision. We elaborate on a resource management model that is aligned with the concepts and mechanisms in capital markets. We use the concept of Stock Options (SOs) to address the scarcity and potential unavailability of CDN resources. Using a Predictive Reservation Scheme (PRS), network resources (traffic volume) are being monitored through kernel estimators in a given time frame. A Secondary Market (SM) significantly improves the efficiency and robustness of the PRS by allowing the fast exchange of unused resources (stocks) and SOs between the Origin Servers (OSs). This exchange can happen by allowing automatic electronic double auctions at the end of each day or at shorter time intervals. As a result, OSs may acquire resources (if needed) at standard prices, avoiding penalizing tariffs for last-minute requests. The efficiency of our prediction reservation scheme further improves.
内容交付网络作为一种非常有效的互联网信息提供机制,被广泛采用,本文重点研究了内容交付网络中资源的管理和定价。我们详细阐述了一个与资本市场的概念和机制相一致的资源管理模型。我们使用股票期权(SOs)的概念来解决CDN资源的稀缺性和潜在不可用性。使用预测性保留方案(PRS),通过内核估计器在给定的时间范围内监视网络资源(通信量)。二级市场(SM)通过允许在原始服务器(os)之间快速交换未使用的资源(库存)和SOs,显著提高了PRS的效率和鲁棒性。这种交易可以通过允许在每天结束时或在更短的时间间隔内进行自动电子双重拍卖来实现。因此,操作系统可以以标准价格获得资源(如果需要的话),避免在最后一刻的请求中收取惩罚性关税。我们的预测预约方案进一步提高了效率。
{"title":"Proactivity in content delivery networks resource management: The stock options case","authors":"Elias Vathias, Matthias Filippos Doukas, Panagiotis Giannopoulos, Stathes Hadjiefthymiades","doi":"10.52953/geew8451","DOIUrl":"https://doi.org/10.52953/geew8451","url":null,"abstract":"This paper focuses on the management and pricing of resources in Content Delivery Networks (CDNs), which are extensively adopted nowadays as a very efficient mechanism for Internet information provision. We elaborate on a resource management model that is aligned with the concepts and mechanisms in capital markets. We use the concept of Stock Options (SOs) to address the scarcity and potential unavailability of CDN resources. Using a Predictive Reservation Scheme (PRS), network resources (traffic volume) are being monitored through kernel estimators in a given time frame. A Secondary Market (SM) significantly improves the efficiency and robustness of the PRS by allowing the fast exchange of unused resources (stocks) and SOs between the Origin Servers (OSs). This exchange can happen by allowing automatic electronic double auctions at the end of each day or at shorter time intervals. As a result, OSs may acquire resources (if needed) at standard prices, avoiding penalizing tariffs for last-minute requests. The efficiency of our prediction reservation scheme further improves.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114055929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconfigurable intelligent surfaces-enabled edge computing: A location-aware task offloading framework 可重构智能曲面边缘计算:位置感知任务卸载框架
Pub Date : 2022-12-09 DOI: 10.52953/fltj9889
Md Sahabul Hossain, Nafis Irtija, Maria Diamanti, Fisayo Sangoleye, Eirini Eleni Tsiropoulou, Symeon Papavassiliou
In this paper, an energy efficient task offloading mechanism in a Multiaccess Edge Computing (MEC) environment is introduced, based on the principles of contract theory. The technology of Reconfigurable Intelligent Surfaces (RISs) is adopted and serves as the enabler for energy efficient task offloading, from the perspective of location-awareness and improved communication environment. Initially a novel positioning, navigation, and timing solution is designed, based on the RIS technology and an artificial intelligent method that selects a set of RISs to perform the multilateration technique and determine the Internet of Things (IoT) nodes' positions in an efficient and accurate manner is introduced. Being aware of the nodes' positions, a maximization problem of the nodes' sum received signal strength at the MEC server where the nodes offload their computing tasks is formulated and solved, determining each RIS element's optimal phase shifts. Capitalizing on these enhancements, a contract-theoretic task offloading mechanism is devised enabling the MEC server to incentivize the IoT nodes to offload their tasks to it for further processing in an energy efficient manner, while accounting for the improved nodes' communications and computing characteristics. The performance evaluation of the proposed framework is obtained via modeling and simulation under different operation scenarios.
在多址边缘计算(MEC)环境下,基于契约理论,提出了一种节能的任务卸载机制。采用可重构智能表面(RISs)技术,从位置感知和改善通信环境的角度实现节能任务卸载。首先,基于RIS技术,设计了一种新的定位、导航和定时解决方案,并介绍了一种人工智能方法,该方法选择一组RIS进行多层技术,以高效准确的方式确定物联网(IoT)节点的位置。在了解节点位置的情况下,制定并解决了MEC服务器上节点接收信号强度总和的最大化问题,节点在MEC服务器上卸载其计算任务,从而确定每个RIS元件的最优相移。利用这些增强功能,设计了一种契约理论任务卸载机制,使MEC服务器能够激励物联网节点将其任务卸载给它,以节能的方式进行进一步处理,同时考虑到改进节点的通信和计算特性。通过不同操作场景下的建模和仿真,得出了所提框架的性能评价。
{"title":"Reconfigurable intelligent surfaces-enabled edge computing: A location-aware task offloading framework","authors":"Md Sahabul Hossain, Nafis Irtija, Maria Diamanti, Fisayo Sangoleye, Eirini Eleni Tsiropoulou, Symeon Papavassiliou","doi":"10.52953/fltj9889","DOIUrl":"https://doi.org/10.52953/fltj9889","url":null,"abstract":"In this paper, an energy efficient task offloading mechanism in a Multiaccess Edge Computing (MEC) environment is introduced, based on the principles of contract theory. The technology of Reconfigurable Intelligent Surfaces (RISs) is adopted and serves as the enabler for energy efficient task offloading, from the perspective of location-awareness and improved communication environment. Initially a novel positioning, navigation, and timing solution is designed, based on the RIS technology and an artificial intelligent method that selects a set of RISs to perform the multilateration technique and determine the Internet of Things (IoT) nodes' positions in an efficient and accurate manner is introduced. Being aware of the nodes' positions, a maximization problem of the nodes' sum received signal strength at the MEC server where the nodes offload their computing tasks is formulated and solved, determining each RIS element's optimal phase shifts. Capitalizing on these enhancements, a contract-theoretic task offloading mechanism is devised enabling the MEC server to incentivize the IoT nodes to offload their tasks to it for further processing in an energy efficient manner, while accounting for the improved nodes' communications and computing characteristics. The performance evaluation of the proposed framework is obtained via modeling and simulation under different operation scenarios.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131926649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An information-centric networking architecture with small routing tables 具有小路由表的以信息为中心的网络体系结构
Pub Date : 2022-12-09 DOI: 10.52953/kzex3360
J. J. Aceves, Maziar Mirzazad Barijough
The basic design of the Named Data Networking (NDN) architecture is shown to incur problems, in that Interests (content requests) may go unanswered even if content is available in the network, and Pending Interest Tables (PIT) are shown to provide limited performance benefits in the presence of in- network caching. A new approach to content-centric networking is introduced that eliminates the need to maintain PITs while providing the benefits sought by NDN. Content-Centric Networking with Data Answer Routing Table (CCN-DART) replaces PITs with Data Answer Routing Tables (DARTs) to forward Interests that do not state their sources. The size of a DART is proportional to the number of routes used by Interests traversing a router, rather than the number of Interests traversing a router. It is shown that undetected Interest loops cannot occur in CCN-DART, and that Interests and responses to them are forwarded correctly independently of the state of the network. The results of simulation experiments comparing CCN-DART with NDN using the ndnSIM simulation tool show that CCN-DART attains similar or better latencies than NDN when no looping problems occur in NDN, while using a similar number of Interests and storing an order of magnitude fewer forwarding entries.
命名数据网络(NDN)体系结构的基本设计会产生问题,因为兴趣(内容请求)可能得不到回答,即使内容在网络中可用,并且待定兴趣表(PIT)在存在网络缓存的情况下提供有限的性能优势。介绍了一种以内容为中心的网络的新方法,该方法消除了维护pit的需要,同时提供了NDN所寻求的好处。使用数据回答路由表(CCN-DART)的以内容为中心的网络用数据回答路由表(dart)取代坑,以转发不说明其来源的兴趣。DART的大小与穿越路由器的兴趣所使用的路由数量成正比,而不是与穿越路由器的兴趣数量成正比。研究表明,未检测到的兴趣循环不会在CCN-DART中发生,并且兴趣和对它们的响应都是独立于网络状态正确转发的。利用ndnSIM仿真工具对CCN-DART和NDN进行了仿真实验,结果表明,在NDN中不发生循环问题的情况下,CCN-DART获得了与NDN相似或更好的延迟,同时使用了相似数量的兴趣,并且存储的转发项少了一个数量级。
{"title":"An information-centric networking architecture with small routing tables","authors":"J. J. Aceves, Maziar Mirzazad Barijough","doi":"10.52953/kzex3360","DOIUrl":"https://doi.org/10.52953/kzex3360","url":null,"abstract":"The basic design of the Named Data Networking (NDN) architecture is shown to incur problems, in that Interests (content requests) may go unanswered even if content is available in the network, and Pending Interest Tables (PIT) are shown to provide limited performance benefits in the presence of in- network caching. A new approach to content-centric networking is introduced that eliminates the need to maintain PITs while providing the benefits sought by NDN. Content-Centric Networking with Data Answer Routing Table (CCN-DART) replaces PITs with Data Answer Routing Tables (DARTs) to forward Interests that do not state their sources. The size of a DART is proportional to the number of routes used by Interests traversing a router, rather than the number of Interests traversing a router. It is shown that undetected Interest loops cannot occur in CCN-DART, and that Interests and responses to them are forwarded correctly independently of the state of the network. The results of simulation experiments comparing CCN-DART with NDN using the ndnSIM simulation tool show that CCN-DART attains similar or better latencies than NDN when no looping problems occur in NDN, while using a similar number of Interests and storing an order of magnitude fewer forwarding entries.","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132945832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
6G System architecture: A service of services vision 6G系统架构:服务愿景的服务
Pub Date : 2022-12-08 DOI: 10.52953/dgko1067
Tarik Taleb, Chafika Benza�d, Miguel Bordallo Lopez, Konstantin Mikhaylov, Sasu Tarkoma, Panos Kostakos, Nurul Huda Mahmood, Pekka Pirinen, Marja Matinmikko-Blue, Matti Latva-aho, Ari Pouttu
The architectures of mobile networks have seen an unprecedented techno-economic transformation, fusing the telcommunications world within the cloud world, adding the spices of Software Engineering to the overall system design, and ultimately yielding the concept of Telco Cloud. This has brought significant benefits in terms of reducing expenditure and operational costs, flexibility in deployment, and a faster time to market. The key enablers are network function virtualization, software-defined networking, and edge/cloud computing. Artificial intelligence is also kicking in this arena. When all these technologies are well integrated, the creation and life-cycle management of fully programmable, flexible, service-tailored, and automated end-to-end network slices/services become possible. This will support diverse 5G and beyond 5G services, spanning from tactile IoT to pervasive robotics and immersive services. This paper introduces an unprecedented and disruptive vision for 6G that shifts the perception of future mobile networks from the old-fashioned concept of "network of networks" towards a new vision of "service of services." The paper then introduces the functional model of the envisioned system architecture, along with its components. It then provides a high-level description of the logical architecture.
移动网络架构经历了前所未有的技术经济转型,将电信世界融合到云世界中,将软件工程的香料添加到整个系统设计中,最终产生了电信云的概念。这在减少支出和运营成本、部署灵活性和更快的上市时间方面带来了显著的好处。关键的推动因素是网络功能虚拟化、软件定义网络和边缘/云计算。人工智能也进入了这个领域。当所有这些技术都很好地集成在一起时,完全可编程、灵活、服务定制和自动化的端到端网络切片/服务的创建和生命周期管理就成为可能。这将支持多种5G及5G以外的服务,从触觉物联网到无处不在的机器人和沉浸式服务。本文介绍了一个前所未有的、颠覆性的6G愿景,它将对未来移动网络的看法从“网络的网络”的老式概念转变为“服务的服务”的新愿景。然后介绍了所设想的系统体系结构的功能模型及其组成部分。然后,它提供了逻辑体系结构的高级描述。
{"title":"6G System architecture: A service of services vision","authors":"Tarik Taleb, Chafika Benza�d, Miguel Bordallo Lopez, Konstantin Mikhaylov, Sasu Tarkoma, Panos Kostakos, Nurul Huda Mahmood, Pekka Pirinen, Marja Matinmikko-Blue, Matti Latva-aho, Ari Pouttu","doi":"10.52953/dgko1067","DOIUrl":"https://doi.org/10.52953/dgko1067","url":null,"abstract":"The architectures of mobile networks have seen an unprecedented techno-economic transformation, fusing the telcommunications world within the cloud world, adding the spices of Software Engineering to the overall system design, and ultimately yielding the concept of Telco Cloud. This has brought significant benefits in terms of reducing expenditure and operational costs, flexibility in deployment, and a faster time to market. The key enablers are network function virtualization, software-defined networking, and edge/cloud computing. Artificial intelligence is also kicking in this arena. When all these technologies are well integrated, the creation and life-cycle management of fully programmable, flexible, service-tailored, and automated end-to-end network slices/services become possible. This will support diverse 5G and beyond 5G services, spanning from tactile IoT to pervasive robotics and immersive services. This paper introduces an unprecedented and disruptive vision for 6G that shifts the perception of future mobile networks from the old-fashioned concept of \"network of networks\" towards a new vision of \"service of services.\" The paper then introduces the functional model of the envisioned system architecture, along with its components. It then provides a high-level description of the logical architecture.\u0000","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126931809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modular architecture providing convergent and ubiquitous intelligent connectivity for networks beyond 2030 模块化架构,为2030年后的网络提供融合和无处不在的智能连接
Pub Date : 2022-12-08 DOI: 10.52953/samo3073
Luis M. Contreras, Javier Serrano, Lefteris Mamatas, Giacomo Bernini, Paolo Monti, Mario Antunes, Udayanto Atmojo, Eli Tocker, I�aki Val, Andrea Sgambelluri, J�r�me H�rri, Antonio Lioy, Pedro Martinez-Julia, Jos� Gonz�lez, Jorge S�nchez-Garrido, Hitoshi Asaeda
The transition of the networks to support forthcoming beyond 5G (B5G) and 6G services introduces a number of important architectural challenges that force an evolution of existing operational frameworks. Current networks have introduced technical paradigms such as network virtualization, programmability and slicing, being a trend known as network softwarization. Forthcoming B5G and 6G services imposing stringent requirements will motivate a new radical change, augmenting those paradigms with the idea of smartness, pursuing an overall optimization on the usage of network and compute resources in a zero-trust environment. This paper presents a modular architecture under the concept of Convergent and UBiquitous Intelligent Connectivity (CUBIC), conceived to facilitate the aforementioned transition. CUBIC intends to investigate and innovate on the usage, combination and development of novel technologies to accompany the migration of existing networks towards Convergent and Ubiquitous Intelligent Connectivity (CUBIC) solutions, leveraging Artificial Intelligence (AI) mechanisms and Machine Learning (ML) tools in a totally secure environment.
支持即将到来的超5G (B5G)和6G服务的网络过渡带来了许多重要的架构挑战,迫使现有运营框架进行演变。当前的网络引入了网络虚拟化、可编程性和切片等技术范式,成为一种被称为网络软件化的趋势。即将到来的B5G和6G服务提出了严格的要求,将激发一场新的激进变革,用智能的理念增强这些范式,在零信任环境中追求网络和计算资源使用的整体优化。本文提出了一种基于融合和泛在智能连接(CUBIC)概念的模块化架构,旨在促进上述过渡。CUBIC打算调查和创新新技术的使用、组合和开发,以配合现有网络向融合和无处不在的智能连接(CUBIC)解决方案的迁移,在完全安全的环境中利用人工智能(AI)机制和机器学习(ML)工具。
{"title":"Modular architecture providing convergent and ubiquitous intelligent connectivity for networks beyond 2030","authors":"Luis M. Contreras, Javier Serrano, Lefteris Mamatas, Giacomo Bernini, Paolo Monti, Mario Antunes, Udayanto Atmojo, Eli Tocker, I�aki Val, Andrea Sgambelluri, J�r�me H�rri, Antonio Lioy, Pedro Martinez-Julia, Jos� Gonz�lez, Jorge S�nchez-Garrido, Hitoshi Asaeda","doi":"10.52953/samo3073","DOIUrl":"https://doi.org/10.52953/samo3073","url":null,"abstract":"The transition of the networks to support forthcoming beyond 5G (B5G) and 6G services introduces a number of important architectural challenges that force an evolution of existing operational frameworks. Current networks have introduced technical paradigms such as network virtualization, programmability and slicing, being a trend known as network softwarization. Forthcoming B5G and 6G services imposing stringent requirements will motivate a new radical change, augmenting those paradigms with the idea of smartness, pursuing an overall optimization on the usage of network and compute resources in a zero-trust environment. This paper presents a modular architecture under the concept of Convergent and UBiquitous Intelligent Connectivity (CUBIC), conceived to facilitate the aforementioned transition. CUBIC intends to investigate and innovate on the usage, combination and development of novel technologies to accompany the migration of existing networks towards Convergent and Ubiquitous Intelligent Connectivity (CUBIC) solutions, leveraging Artificial Intelligence (AI) mechanisms and Machine Learning (ML) tools in a totally secure environment.\u0000","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124440014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New networking technology in ETSI ISG NIN ETSI ISG NIN中的新网络技术
Pub Date : 2022-12-07 DOI: 10.52953/cpud9962
John S Grant
ETSI ISG Non-IP Networking (NIN) was formed to standardize Flexilink, a networking technology which does not have the problems mobile operators had identified with current technology based on Internet Protocol (IP). This paper reviews the main features of Flexilink and the advantages of the services it provides for future network applications beyond 2030. Internet Protocol is connection-less, so every packet has to carry all the information needed to route it to its destination and this information has to be processed by each router the packet passes through. However, in most cases it is used to carry a "flow" of packets for a connection-oriented protocol such as TCP or RTP. Routing in SDN applies to flows rather than individual packets, but each packet header still contains the same routing information and must be processed to identify the flow to which the packet belongs. Flexilink replaces the per-flow information in the packet header with a pointer into the routing table, which eliminates the need for software processing of packet headers and means that packet formats are not dependent on the addressing scheme used. It also provides a separate service for live media such as audio, video, and tactile that easily achieves the lowest possible latency.
ETSI ISG非IP网络(NIN)是为了标准化Flexilink而成立的,Flexilink是一种网络技术,它不存在移动运营商认为基于互联网协议(IP)的现有技术存在的问题。本文综述了Flexilink的主要特点及其为2030年后的未来网络应用提供的服务优势。互联网协议是无连接的,所以每个数据包都必须携带路由到目的地所需的所有信息,并且这些信息必须由数据包经过的每个路由器处理。然而,在大多数情况下,它被用来为面向连接的协议(如TCP或RTP)携带数据包的“流”。SDN中的路由适用于流而不是单个数据包,但每个数据包头仍然包含相同的路由信息,必须经过处理以确定数据包所属的流。Flexilink用一个指向路由表的指针取代了包头中的每流信息,这消除了对包头的软件处理的需要,并且意味着包格式不依赖于所使用的寻址方案。它还为音频、视频和触觉等实时媒体提供了单独的服务,可以轻松实现尽可能低的延迟。
{"title":"New networking technology in ETSI ISG NIN","authors":"John S Grant","doi":"10.52953/cpud9962","DOIUrl":"https://doi.org/10.52953/cpud9962","url":null,"abstract":"ETSI ISG Non-IP Networking (NIN) was formed to standardize Flexilink, a networking technology which does not have the problems mobile operators had identified with current technology based on Internet Protocol (IP). This paper reviews the main features of Flexilink and the advantages of the services it provides for future network applications beyond 2030. Internet Protocol is connection-less, so every packet has to carry all the information needed to route it to its destination and this information has to be processed by each router the packet passes through. However, in most cases it is used to carry a \"flow\" of packets for a connection-oriented protocol such as TCP or RTP. Routing in SDN applies to flows rather than individual packets, but each packet header still contains the same routing information and must be processed to identify the flow to which the packet belongs. Flexilink replaces the per-flow information in the packet header with a pointer into the routing table, which eliminates the need for software processing of packet headers and means that packet formats are not dependent on the addressing scheme used. It also provides a separate service for live media such as audio, video, and tactile that easily achieves the lowest possible latency.\u0000","PeriodicalId":274720,"journal":{"name":"ITU Journal on Future and Evolving Technologies","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128940923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ITU Journal on Future and Evolving Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1