Pub Date : 2019-09-01DOI: 10.1109/Sarnoff47838.2019.9067827
Ömer Faruk Gemici, Ibrahim Hökelek, H. A. Çırpan
With the proliferation of the delay sensitive applications and services in cellular networks, the outage probability becomes an important metric that should be minimized to support the low latency requirement of the 5G network. In this paper, the analytical model is proposed to calculate the system outage probability as a closed form expression under the Rayleigh fading channel for the NOMA downlink system. We utilize the model to obtain the optimum power allocation that minimizes the system outage probability as a closed form expression. The accuracy of the proposed analytical model and optimum power allocation is validated by the Monte Carlo simulations. The numerical results show that the outage probability depends on the power allocation and the outage probability of OMA with the fractional power allocation is lower than NOMA with the optimum power allocation. The results indicate that the trade-off between the outage and spectral efficiency in NOMA should be carefully controlled to meet higher throughput and lower latency objectives of 5G.
{"title":"NOMA Power Allocation for Minimizing System Outage under Rayleigh Fading Channel","authors":"Ömer Faruk Gemici, Ibrahim Hökelek, H. A. Çırpan","doi":"10.1109/Sarnoff47838.2019.9067827","DOIUrl":"https://doi.org/10.1109/Sarnoff47838.2019.9067827","url":null,"abstract":"With the proliferation of the delay sensitive applications and services in cellular networks, the outage probability becomes an important metric that should be minimized to support the low latency requirement of the 5G network. In this paper, the analytical model is proposed to calculate the system outage probability as a closed form expression under the Rayleigh fading channel for the NOMA downlink system. We utilize the model to obtain the optimum power allocation that minimizes the system outage probability as a closed form expression. The accuracy of the proposed analytical model and optimum power allocation is validated by the Monte Carlo simulations. The numerical results show that the outage probability depends on the power allocation and the outage probability of OMA with the fractional power allocation is lower than NOMA with the optimum power allocation. The results indicate that the trade-off between the outage and spectral efficiency in NOMA should be carefully controlled to meet higher throughput and lower latency objectives of 5G.","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134396029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/Sarnoff47838.2019.9067813
C. Sugama, V. Chandrasekar
Antenna consolidation on the topside of shipboard platforms reduces the amount of different antennas needed to perform various capabilities at different frequencies. Parabolic antenna stacking consolidates antenna capabilities and saves space on shipboard platforms. This paper presents the design and simulated radiation pattern results of a tri-band parabolic stacked antenna that reduces the number of antennas required on shipboard platforms. This tri-band parabolic stacked antenna is focused on providing a Q, X and Ka band capable solution on a single antenna pedestal.
{"title":"Innovative Approach to achieve Tri-Band Capabilities by Parabolic Antenna Stacking","authors":"C. Sugama, V. Chandrasekar","doi":"10.1109/Sarnoff47838.2019.9067813","DOIUrl":"https://doi.org/10.1109/Sarnoff47838.2019.9067813","url":null,"abstract":"Antenna consolidation on the topside of shipboard platforms reduces the amount of different antennas needed to perform various capabilities at different frequencies. Parabolic antenna stacking consolidates antenna capabilities and saves space on shipboard platforms. This paper presents the design and simulated radiation pattern results of a tri-band parabolic stacked antenna that reduces the number of antennas required on shipboard platforms. This tri-band parabolic stacked antenna is focused on providing a Q, X and Ka band capable solution on a single antenna pedestal.","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124959089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/Sarnoff47838.2019.9067822
Rajorshi Biswas, Jie Wu, Xiuqi Li
Low-Power and Lossy Network (LLN) is composed of embedded devices with limited power, memory, and processing resources. LLN has a wide variety of applications including industrial monitoring, connected home, health care, urban sensor networks and environmental monitoring. LLN uses Routing Protocol for Low-power and lossy networks (RPL) protocol. The RPL maintains directed acyclic graphs for routing packets. By exploiting some features, a Distributed Denial-of-Service (DDoS) attack can be conducted easily. DDoS attacks are very popular and well studied in the context of the Internet, but not in the context of LLNs. In this paper, we propose a powerful DDoS attack framework in LLNs. We formulate the attack as an optimization problem for selecting an optimal set of attackers and their targeted neighbors constrained by a limited link bandwidth. We propose an optimal solution by transforming the optimization problem into a max-flow problem. We provide simulations to support our model.
低功耗和有损网络(LLN)是由功耗、内存和处理资源有限的嵌入式设备组成的。LLN具有广泛的应用,包括工业监控,互联家庭,医疗保健,城市传感器网络和环境监测。LLN采用RPL (Routing Protocol for Low-power and lossy networks)协议。RPL维护路由报文的有向无环图。通过利用一些特性,可以很容易地进行分布式拒绝服务(DDoS)攻击。DDoS攻击在互联网的背景下非常流行,并且得到了很好的研究,但在lln的背景下却没有。在本文中,我们提出了一个强大的DDoS攻击框架。我们将攻击描述为一个优化问题,选择一组最优的攻击者和他们的目标邻居,受有限的链路带宽约束。通过将优化问题转化为最大流问题,提出了最优解。我们提供了仿真来支持我们的模型。
{"title":"A Capacity-Aware Distributed Denial-of-Service Attack in Low-Power and Lossy Networks","authors":"Rajorshi Biswas, Jie Wu, Xiuqi Li","doi":"10.1109/Sarnoff47838.2019.9067822","DOIUrl":"https://doi.org/10.1109/Sarnoff47838.2019.9067822","url":null,"abstract":"Low-Power and Lossy Network (LLN) is composed of embedded devices with limited power, memory, and processing resources. LLN has a wide variety of applications including industrial monitoring, connected home, health care, urban sensor networks and environmental monitoring. LLN uses Routing Protocol for Low-power and lossy networks (RPL) protocol. The RPL maintains directed acyclic graphs for routing packets. By exploiting some features, a Distributed Denial-of-Service (DDoS) attack can be conducted easily. DDoS attacks are very popular and well studied in the context of the Internet, but not in the context of LLNs. In this paper, we propose a powerful DDoS attack framework in LLNs. We formulate the attack as an optimization problem for selecting an optimal set of attackers and their targeted neighbors constrained by a limited link bandwidth. We propose an optimal solution by transforming the optimization problem into a max-flow problem. We provide simulations to support our model.","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127077720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/Sarnoff47838.2019.9067825
Maryam Jalalitabar, Yang Wang, Xiaojun Cao
To deliver an end-to-end service in the Network Function Virtualization (NFV) environment, Service Function Chain (SFC) is used to define the sequence of Virtual Network Functions (VNFs) that needs to be applied to the data stream of the service. In the literature, SFC is typically regarded as a linear topology that represents the sequence of the VNFs that a data stream is navigated through. Our recent study, however, reveals a group of real-life use cases for which a linear topology is in-sufficient to describe the complexity of the SFC: the data stream can branch out into multiple streams due to multiple reasons (e.g., load-balance the web/non-web traffic). In this paper, we study representative use cases with presence of branching, categorize traffic branching into three major categories, and introduce policies to specify the service requirement that involves traffic branching. In addition, we define the resulting problem and discuss directions for further exploration.
为了在NFV (Network Function Virtualization)环境中提供端到端业务,SFC (service Function Chain)定义了在业务的数据流中应用的VNFs (Virtual Network Functions)序列。在文献中,SFC通常被认为是一个线性拓扑,它表示数据流导航通过的vnf序列。然而,我们最近的研究揭示了一组现实生活中的用例,其中线性拓扑不足以描述SFC的复杂性:由于多种原因(例如,负载平衡web/非web流量),数据流可以分支成多个流。本文研究了存在分支的代表性用例,将流量分支分为三大类,并引入策略来指定涉及流量分支的服务需求。此外,我们定义了由此产生的问题,并讨论了进一步探索的方向。
{"title":"Branch-Awareness in Service Function Graph Design and Embedding","authors":"Maryam Jalalitabar, Yang Wang, Xiaojun Cao","doi":"10.1109/Sarnoff47838.2019.9067825","DOIUrl":"https://doi.org/10.1109/Sarnoff47838.2019.9067825","url":null,"abstract":"To deliver an end-to-end service in the Network Function Virtualization (NFV) environment, Service Function Chain (SFC) is used to define the sequence of Virtual Network Functions (VNFs) that needs to be applied to the data stream of the service. In the literature, SFC is typically regarded as a linear topology that represents the sequence of the VNFs that a data stream is navigated through. Our recent study, however, reveals a group of real-life use cases for which a linear topology is in-sufficient to describe the complexity of the SFC: the data stream can branch out into multiple streams due to multiple reasons (e.g., load-balance the web/non-web traffic). In this paper, we study representative use cases with presence of branching, categorize traffic branching into three major categories, and introduce policies to specify the service requirement that involves traffic branching. In addition, we define the resulting problem and discuss directions for further exploration.","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114629588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/Sarnoff47838.2019.9067817
William Brockelsby, Sean Dilda
Network automation promises to improve network operations by increasing efficiency and consistency but is difficult to achieve in practice due to the large variety of infrastructure devices within the network as well as vendor specific management and control interfaces. This paper explores options for the tactical deployment of network automation to provide maximum return on investment as organizations explore strategic approaches to network automation.
{"title":"Tactical Network Automation with NetZTP and One Shot","authors":"William Brockelsby, Sean Dilda","doi":"10.1109/Sarnoff47838.2019.9067817","DOIUrl":"https://doi.org/10.1109/Sarnoff47838.2019.9067817","url":null,"abstract":"Network automation promises to improve network operations by increasing efficiency and consistency but is difficult to achieve in practice due to the large variety of infrastructure devices within the network as well as vendor specific management and control interfaces. This paper explores options for the tactical deployment of network automation to provide maximum return on investment as organizations explore strategic approaches to network automation.","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":"436 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131921277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/Sarnoff47838.2019.9067824
Jiangnan Cheng, Jaehyun Hwang, A. Tang
Multipath TCP (MPTCP) can improve overall throughput of an end-to-end connection by leveraging different network paths. However, the heterogeneity of these paths can significantly hamper MPTCP’s performance. In this paper, we propose to send acknowledgments (ACKs) along the lowest-latency path. This can help improve the performance of MPTCP when subflow throughput is constrained by packet loss by reacting to loss events faster. An active probing module is also developed to dynamically select the lowest-latency path against the potential change of path condition. Experiments demonstrate that overall throughput improvement generally ranges from 10% to 50%.
{"title":"Acceleration of Multipath TCP by Letting ACKs Take the Shortest Path","authors":"Jiangnan Cheng, Jaehyun Hwang, A. Tang","doi":"10.1109/Sarnoff47838.2019.9067824","DOIUrl":"https://doi.org/10.1109/Sarnoff47838.2019.9067824","url":null,"abstract":"Multipath TCP (MPTCP) can improve overall throughput of an end-to-end connection by leveraging different network paths. However, the heterogeneity of these paths can significantly hamper MPTCP’s performance. In this paper, we propose to send acknowledgments (ACKs) along the lowest-latency path. This can help improve the performance of MPTCP when subflow throughput is constrained by packet loss by reacting to loss events faster. An active probing module is also developed to dynamically select the lowest-latency path against the potential change of path condition. Experiments demonstrate that overall throughput improvement generally ranges from 10% to 50%.","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124401449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/Sarnoff47838.2019.9067819
Nicolò Macaluso, R. Rojas-Cessa, M. Meo
In this paper, we propose a set of three media access control (MAC) schemes for an indirect diffused light free-space optical communications (ID-FSOCs). ID-FSOC has been recently proposed to establish wireless high-speed (i.e., ≥1 Gbps) network access using FSO from stations that have no line-of-sight (LOS) with the access point. ID-FSOC employs a diffuse reflector (DR) to uniformly reflect diffused light from an incident laser to all directions, except towards the DR. To establish a link, ID-FSOC requires LOS between the transmitter and the DR and between DR and the receiver. In this way, ID-FSOC relaxes the location of stations as long as they keep LOS to the DR. We analyze the performance and scalability of proposed schemes. We also consider the impact of the zoom-in time of a receiver in our evaluations. Our results show that our proposed MAC schemes achieve high channel utilization and higher throughput than carrier-sense multiple access schemes.
{"title":"Media Access Schemes for Indirect Diffused Free-Space Optical Networks","authors":"Nicolò Macaluso, R. Rojas-Cessa, M. Meo","doi":"10.1109/Sarnoff47838.2019.9067819","DOIUrl":"https://doi.org/10.1109/Sarnoff47838.2019.9067819","url":null,"abstract":"In this paper, we propose a set of three media access control (MAC) schemes for an indirect diffused light free-space optical communications (ID-FSOCs). ID-FSOC has been recently proposed to establish wireless high-speed (i.e., ≥1 Gbps) network access using FSO from stations that have no line-of-sight (LOS) with the access point. ID-FSOC employs a diffuse reflector (DR) to uniformly reflect diffused light from an incident laser to all directions, except towards the DR. To establish a link, ID-FSOC requires LOS between the transmitter and the DR and between DR and the receiver. In this way, ID-FSOC relaxes the location of stations as long as they keep LOS to the DR. We analyze the performance and scalability of proposed schemes. We also consider the impact of the zoom-in time of a receiver in our evaluations. Our results show that our proposed MAC schemes achieve high channel utilization and higher throughput than carrier-sense multiple access schemes.","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130544334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-09-01DOI: 10.1109/Sarnoff47838.2019.9067826
J. Sykes, Randy St. Fleur, Daler Norkulov, Z. Dong, R. Amineh
Using public transportation can be a major challenge for individuals with visual impairments. To navigate a mass transit system independently and safely, one needs to be able to gather information about their surroundings. We propose a Conscious GPS system to assist a user with visual impairment to navigate the public transit system. The system utilizes computer vision to autonomously record the users surroundings by taking various pictures in sequence and leveraging image processing techniques and machine learning to identify and extract information about key objects around the user. Our target object is the circular bus sign on an NYC MTA bus stop. We use Haar Cascade computer vision techniques to detect and locate the sign in an image through feature-based image classification. The proposed system experiences no misclassification after training the Haar Cascade classifier with a minimum hit rate of 0.99 and a maximum false alarm rate of 0.20 when navigating the daily city landscape and can accurately detect a bus stop sign.
{"title":"Conscious GPS: A System to Aid the Visually Impaired to Navigate Public Transportation","authors":"J. Sykes, Randy St. Fleur, Daler Norkulov, Z. Dong, R. Amineh","doi":"10.1109/Sarnoff47838.2019.9067826","DOIUrl":"https://doi.org/10.1109/Sarnoff47838.2019.9067826","url":null,"abstract":"Using public transportation can be a major challenge for individuals with visual impairments. To navigate a mass transit system independently and safely, one needs to be able to gather information about their surroundings. We propose a Conscious GPS system to assist a user with visual impairment to navigate the public transit system. The system utilizes computer vision to autonomously record the users surroundings by taking various pictures in sequence and leveraging image processing techniques and machine learning to identify and extract information about key objects around the user. Our target object is the circular bus sign on an NYC MTA bus stop. We use Haar Cascade computer vision techniques to detect and locate the sign in an image through feature-based image classification. The proposed system experiences no misclassification after training the Haar Cascade classifier with a minimum hit rate of 0.99 and a maximum false alarm rate of 0.20 when navigating the daily city landscape and can accurately detect a bus stop sign.","PeriodicalId":306134,"journal":{"name":"2019 IEEE 40th Sarnoff Symposium","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125096876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}