首页 > 最新文献

arXiv - CS - Networking and Internet Architecture最新文献

英文 中文
Two-Timescale Synchronization and Migration for Digital Twin Networks: A Multi-Agent Deep Reinforcement Learning Approach 数字孪生网络的双时标同步和迁移:多代理深度强化学习方法
Pub Date : 2024-09-02 DOI: arxiv-2409.01092
Wenshuai Liu, Yaru Fu, Yongna Guo, Fu Lee Wang, Wen Sun, Yan Zhang
Digital twins (DTs) have emerged as a promising enabler for representing thereal-time states of physical worlds and realizing self-sustaining systems. Inpractice, DTs of physical devices, such as mobile users (MUs), are commonlydeployed in multi-access edge computing (MEC) networks for the sake of reducinglatency. To ensure the accuracy and fidelity of DTs, it is essential for MUs toregularly synchronize their status with their DTs. However, MU mobilityintroduces significant challenges to DT synchronization. Firstly, MU mobilitytriggers DT migration which could cause synchronization failures. Secondly, MUsrequire frequent synchronization with their DTs to ensure DT fidelity.Nonetheless, DT migration among MEC servers, caused by MU mobility, may occurinfrequently. Accordingly, we propose a two-timescale DT synchronization andmigration framework with reliability consideration by establishing a non-convexstochastic problem to minimize the long-term average energy consumption of MUs.We use Lyapunov theory to convert the reliability constraints and reformulatethe new problem as a partially observable Markov decision-making process(POMDP). Furthermore, we develop a heterogeneous agent proximal policyoptimization with Beta distribution (Beta-HAPPO) method to solve it. Numericalresults show that our proposed Beta-HAPPO method achieves significantimprovements in energy savings when compared with other benchmarks.
数字孪生(DTs)已成为表示物理世界实时状态和实现自持系统的一种前景广阔的工具。在实践中,移动用户(MU)等物理设备的数字孪生通常部署在多接入边缘计算(MEC)网络中,以降低延迟。为了确保 DT 的准确性和保真度,MU 必须定期将其状态与 DT 同步。然而,MU 的移动性给 DT 同步带来了巨大挑战。首先,MU 移动会引发 DT 迁移,从而导致同步失败。其次,MU 需要与其 DT 频繁同步,以确保 DT 的保真度。然而,由 MU 移动性引起的 MEC 服务器之间的 DT 迁移可能会频繁发生。因此,我们通过建立一个非凸随机问题来最小化 MU 的长期平均能耗,从而提出了一个考虑可靠性的双时标 DT 同步和迁移框架。我们使用 Lyapunov 理论来转换可靠性约束,并将新问题重新表述为部分可观测马尔可夫决策过程(POMDP)。此外,我们还开发了一种采用 Beta 分布的异构代理近端策略优化(Beta-HAPPO)方法来解决该问题。数值结果表明,与其他基准相比,我们提出的 Beta-HAPPO 方法显著提高了节能效果。
{"title":"Two-Timescale Synchronization and Migration for Digital Twin Networks: A Multi-Agent Deep Reinforcement Learning Approach","authors":"Wenshuai Liu, Yaru Fu, Yongna Guo, Fu Lee Wang, Wen Sun, Yan Zhang","doi":"arxiv-2409.01092","DOIUrl":"https://doi.org/arxiv-2409.01092","url":null,"abstract":"Digital twins (DTs) have emerged as a promising enabler for representing the\u0000real-time states of physical worlds and realizing self-sustaining systems. In\u0000practice, DTs of physical devices, such as mobile users (MUs), are commonly\u0000deployed in multi-access edge computing (MEC) networks for the sake of reducing\u0000latency. To ensure the accuracy and fidelity of DTs, it is essential for MUs to\u0000regularly synchronize their status with their DTs. However, MU mobility\u0000introduces significant challenges to DT synchronization. Firstly, MU mobility\u0000triggers DT migration which could cause synchronization failures. Secondly, MUs\u0000require frequent synchronization with their DTs to ensure DT fidelity.\u0000Nonetheless, DT migration among MEC servers, caused by MU mobility, may occur\u0000infrequently. Accordingly, we propose a two-timescale DT synchronization and\u0000migration framework with reliability consideration by establishing a non-convex\u0000stochastic problem to minimize the long-term average energy consumption of MUs.\u0000We use Lyapunov theory to convert the reliability constraints and reformulate\u0000the new problem as a partially observable Markov decision-making process\u0000(POMDP). Furthermore, we develop a heterogeneous agent proximal policy\u0000optimization with Beta distribution (Beta-HAPPO) method to solve it. Numerical\u0000results show that our proposed Beta-HAPPO method achieves significant\u0000improvements in energy savings when compared with other benchmarks.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"70 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poster: Developing an O-RAN Security Test Lab 海报:开发 O-RAN 安全测试实验室
Pub Date : 2024-09-02 DOI: arxiv-2409.01107
Sotiris Michaelides, David Rupprecht, Katharina Kohls
Open Radio Access Networks (ORAN) is a new architectural approach, havingbeen proposed only a few years ago, and it is an expansion of the current NextGeneration Radio Access Networks (NG-RAN) of 5G. ORAN aims to break this closedRAN market that is controlled by a handful of vendors, by implementing openinterfaces between the different Radio Access Networks (RAN) components, and byintroducing modern technologies to the RAN like machine learning,virtualization, and disaggregation. However, the architectural design of ORANwas recently causing concerns and debates about its security, which isconsidered one of its major drawbacks. Several theoretical risk analysesrelated to ORAN have been conducted, but to the best of our knowledge, not evena single practical one has been performed yet. In this poster, we discuss andpropose a way for a minimal, future-proof deployment of an ORAN 5G network,able to accommodate various hands-on security analyses for its differentelements.
开放无线接入网(ORAN)是一种新的架构方法,几年前才被提出,是当前 5G 下一代无线接入网(NG-RAN)的扩展。ORAN 旨在通过在不同的无线接入网(RAN)组件之间实施开放接口,并在 RAN 中引入机器学习、虚拟化和分解等现代技术,打破由少数供应商控制的封闭式 RAN 市场。然而,ORAN的架构设计最近引起了人们对其安全性的担忧和争论,这被认为是其主要缺点之一。已经进行了几项与ORAN相关的理论风险分析,但据我们所知,还没有进行过任何一项实际分析。在本海报中,我们讨论并提出了一种最小化、面向未来的 ORAN 5G 网络部署方法,该方法能够适应针对其不同要素的各种实践性安全分析。
{"title":"Poster: Developing an O-RAN Security Test Lab","authors":"Sotiris Michaelides, David Rupprecht, Katharina Kohls","doi":"arxiv-2409.01107","DOIUrl":"https://doi.org/arxiv-2409.01107","url":null,"abstract":"Open Radio Access Networks (ORAN) is a new architectural approach, having\u0000been proposed only a few years ago, and it is an expansion of the current Next\u0000Generation Radio Access Networks (NG-RAN) of 5G. ORAN aims to break this closed\u0000RAN market that is controlled by a handful of vendors, by implementing open\u0000interfaces between the different Radio Access Networks (RAN) components, and by\u0000introducing modern technologies to the RAN like machine learning,\u0000virtualization, and disaggregation. However, the architectural design of ORAN\u0000was recently causing concerns and debates about its security, which is\u0000considered one of its major drawbacks. Several theoretical risk analyses\u0000related to ORAN have been conducted, but to the best of our knowledge, not even\u0000a single practical one has been performed yet. In this poster, we discuss and\u0000propose a way for a minimal, future-proof deployment of an ORAN 5G network,\u0000able to accommodate various hands-on security analyses for its different\u0000elements.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Convex Optimization for On-Board Routing in High-Throughput Satellites 高吞吐量卫星机载路由的在线凸优化
Pub Date : 2024-09-02 DOI: arxiv-2409.01488
Olivier Bélanger, Jean-Luc Lupien, Olfa Ben Yahia, Stéphane Martel, Antoine Lesage-Landry, Gunes Karabulut Kurt
The rise in low Earth orbit (LEO) satellite Internet services has led toincreasing demand, often exceeding available data rates and compromising thequality of service. While deploying more satellites offers a short-term fix,designing higher-performance satellites with enhanced transmission capabilitiesprovides a more sustainable solution. Achieving the necessary high capacityrequires interconnecting multiple modem banks within a satellite payload.However, there is a notable gap in research on internal packet routing withinextremely high-throughput satellites. To address this, we propose a real-timeoptimal flow allocation and priority queue scheduling method using onlineconvex optimization-based model predictive control. We model the problem as amulti-commodity flow instance and employ an online interior-point method tosolve the routing and scheduling optimization iteratively. This approachminimizes packet loss and supports real-time rerouting with low computationaloverhead. Our method is tested in simulation on a next-generation extremelyhigh-throughput satellite model, demonstrating its effectiveness compared to areference batch optimization and to traditional methods.
低地球轨道(LEO)卫星互联网服务的兴起导致需求不断增加,往往超出现有的数据传输速率,影响服务质量。虽然部署更多的卫星可以在短期内解决问题,但设计具有更强传输能力的高性能卫星则是一种更可持续的解决方案。然而,关于超高吞吐量卫星内部数据包路由的研究还存在明显空白。为了解决这个问题,我们提出了一种实时优化流量分配和优先队列调度方法,该方法使用基于在线凸优化的模型预测控制。我们将该问题建模为多商品流实例,并采用在线内点法迭代解决路由和调度优化问题。这种方法能最大限度地减少数据包丢失,并以较低的计算开销支持实时重新路由。我们的方法在下一代极高吞吐量卫星模型上进行了仿真测试,证明了它与批量优化和传统方法相比的有效性。
{"title":"Online Convex Optimization for On-Board Routing in High-Throughput Satellites","authors":"Olivier Bélanger, Jean-Luc Lupien, Olfa Ben Yahia, Stéphane Martel, Antoine Lesage-Landry, Gunes Karabulut Kurt","doi":"arxiv-2409.01488","DOIUrl":"https://doi.org/arxiv-2409.01488","url":null,"abstract":"The rise in low Earth orbit (LEO) satellite Internet services has led to\u0000increasing demand, often exceeding available data rates and compromising the\u0000quality of service. While deploying more satellites offers a short-term fix,\u0000designing higher-performance satellites with enhanced transmission capabilities\u0000provides a more sustainable solution. Achieving the necessary high capacity\u0000requires interconnecting multiple modem banks within a satellite payload.\u0000However, there is a notable gap in research on internal packet routing within\u0000extremely high-throughput satellites. To address this, we propose a real-time\u0000optimal flow allocation and priority queue scheduling method using online\u0000convex optimization-based model predictive control. We model the problem as a\u0000multi-commodity flow instance and employ an online interior-point method to\u0000solve the routing and scheduling optimization iteratively. This approach\u0000minimizes packet loss and supports real-time rerouting with low computational\u0000overhead. Our method is tested in simulation on a next-generation extremely\u0000high-throughput satellite model, demonstrating its effectiveness compared to a\u0000reference batch optimization and to traditional methods.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-local redundancy: Erasure coding and dispersed replicas for robust retrieval in the Swarm peer-to-peer network 非本地冗余:在 Swarm 点对点网络中进行擦除编码和分散复制以实现稳健检索
Pub Date : 2024-09-02 DOI: arxiv-2409.01259
Viktor Trón, Viktor Tóth, Callum Toner, Dan Nickless, Dániel A. Nagy, Áron Fischer, György Barabás
This paper describes in detail how erasure codes are implemented in the Swarmsystem. First, in Section 1, we introduce erasure codes, and show how to applythem to files in Swarm (Section 2). In Section 3, we introduce security levelsof data availability and derive their respective parameterisations. In Section4, we describe a construct that enables cross-neighbourhood redundancy forsingleton chunks and which completes erasure coding. Finally, in 5, we proposea number of retrieval strategies applicable to erasure-coded files.
本文详细介绍了如何在 Swarm 系统中实现擦除码。首先,在第 1 节中,我们介绍了擦除码,并展示了如何将它们应用于 Swarm 中的文件(第 2 节)。在第 3 节中,我们介绍了数据可用性的安全级别,并推导出它们各自的参数。在第 4 节中,我们介绍了一种结构,该结构可实现骨架块的跨邻域冗余,并完成擦除编码。最后,在第 5 节中,我们提出了一系列适用于擦除编码文件的检索策略。
{"title":"Non-local redundancy: Erasure coding and dispersed replicas for robust retrieval in the Swarm peer-to-peer network","authors":"Viktor Trón, Viktor Tóth, Callum Toner, Dan Nickless, Dániel A. Nagy, Áron Fischer, György Barabás","doi":"arxiv-2409.01259","DOIUrl":"https://doi.org/arxiv-2409.01259","url":null,"abstract":"This paper describes in detail how erasure codes are implemented in the Swarm\u0000system. First, in Section 1, we introduce erasure codes, and show how to apply\u0000them to files in Swarm (Section 2). In Section 3, we introduce security levels\u0000of data availability and derive their respective parameterisations. In Section\u00004, we describe a construct that enables cross-neighbourhood redundancy for\u0000singleton chunks and which completes erasure coding. Finally, in 5, we propose\u0000a number of retrieval strategies applicable to erasure-coded files.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Infiltrating the Sky: Data Delay and Overflow Attacks in Earth Observation Constellations 渗透天空:地球观测星座中的数据延迟和溢出攻击
Pub Date : 2024-09-02 DOI: arxiv-2409.00897
Xiaojian Wang, Ruozhou Yu, Dejun Yang, Guoliang Xue
Low Earth Orbit (LEO) Earth Observation (EO) satellites have changed the waywe monitor Earth. Acting like moving cameras, EO satellites are formed inconstellations with different missions and priorities, and capture vast datathat needs to be transmitted to the ground for processing. However, EOsatellites have very limited downlink communication capability, limited bytransmission bandwidth, number and location of ground stations, and smalltransmission windows due to high velocity satellite movement. To optimizeresource utilization, EO constellations are expected to share communicationspectrum and ground stations for maximum communication efficiency. In this paper, we investigate a new attack surface exposed by resourcecompetition in EO constellations, targeting the delay or drop of Earthmonitoring data using legitimate EO services. Specifically, an attacker caninject high-priority requests to temporarily preempt low-priority datatransmission windows. Furthermore, we show that by utilizing predictablesatellite dynamics, an attacker can intelligently target critical data fromlow-priority satellites, either delaying its delivery or irreversibly droppingthe data. We formulate two attacks, the data delay attack and the data overflowattack, design algorithms to assist attackers in devising attack strategies,and analyze their feasibility or optimality in typical scenarios. We thenconduct trace-driven simulations using real-world satellite images and orbitdata to evaluate the success probability of launching these attacks underrealistic satellite communication settings. We also discuss possible defensesagainst these attacks.
低地球轨道(LEO)地球观测(EO)卫星改变了我们监测地球的方式。地球观测卫星就像移动的照相机一样,根据不同的任务和优先事项组成不同的星群,并捕捉需要传输到地面进行处理的大量数据。然而,受传输带宽、地面站的数量和位置以及卫星高速移动造成的传输窗口小等因素的限制,EO 卫星的下行链路通信能力非常有限。为了优化资源利用,EO 星群需要共享通信频谱和地面站,以实现最高的通信效率。在本文中,我们研究了 EO 星群中的资源竞争所暴露出的新攻击面,目标是使用合法 EO 服务延迟或丢弃地球监测数据。具体来说,攻击者可以注入高优先级请求,临时抢占低优先级数据传输窗口。此外,我们还展示了通过利用可预测的卫星动态,攻击者可以智能地瞄准低优先级卫星的关键数据,要么延迟其传输,要么不可逆转地丢弃数据。我们提出了两种攻击方式--数据延迟攻击和数据溢出攻击,设计了帮助攻击者制定攻击策略的算法,并分析了它们在典型场景中的可行性或最优性。然后,我们利用真实世界的卫星图像和轨道数据进行了跟踪驱动模拟,以评估在现实的卫星通信环境下发动这些攻击的成功概率。我们还讨论了针对这些攻击可能采取的防御措施。
{"title":"Infiltrating the Sky: Data Delay and Overflow Attacks in Earth Observation Constellations","authors":"Xiaojian Wang, Ruozhou Yu, Dejun Yang, Guoliang Xue","doi":"arxiv-2409.00897","DOIUrl":"https://doi.org/arxiv-2409.00897","url":null,"abstract":"Low Earth Orbit (LEO) Earth Observation (EO) satellites have changed the way\u0000we monitor Earth. Acting like moving cameras, EO satellites are formed in\u0000constellations with different missions and priorities, and capture vast data\u0000that needs to be transmitted to the ground for processing. However, EO\u0000satellites have very limited downlink communication capability, limited by\u0000transmission bandwidth, number and location of ground stations, and small\u0000transmission windows due to high velocity satellite movement. To optimize\u0000resource utilization, EO constellations are expected to share communication\u0000spectrum and ground stations for maximum communication efficiency. In this paper, we investigate a new attack surface exposed by resource\u0000competition in EO constellations, targeting the delay or drop of Earth\u0000monitoring data using legitimate EO services. Specifically, an attacker can\u0000inject high-priority requests to temporarily preempt low-priority data\u0000transmission windows. Furthermore, we show that by utilizing predictable\u0000satellite dynamics, an attacker can intelligently target critical data from\u0000low-priority satellites, either delaying its delivery or irreversibly dropping\u0000the data. We formulate two attacks, the data delay attack and the data overflow\u0000attack, design algorithms to assist attackers in devising attack strategies,\u0000and analyze their feasibility or optimality in typical scenarios. We then\u0000conduct trace-driven simulations using real-world satellite images and orbit\u0000data to evaluate the success probability of launching these attacks under\u0000realistic satellite communication settings. We also discuss possible defenses\u0000against these attacks.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating Packet-Level Header Traces Using GNN-powered GAN 使用 GNN 驱动的 GAN 生成数据包级标头跟踪
Pub Date : 2024-09-02 DOI: arxiv-2409.01265
Zhen Xu
This study presents a novel method combining Graph Neural Networks (GNNs) andGenerative Adversarial Networks (GANs) for generating packet-level headertraces. By incorporating word2vec embeddings, this work significantly mitigatesthe dimensionality curse often associated with traditional one-hot encoding,thereby enhancing the training effectiveness of the model. Experimental resultsdemonstrate that word2vec encoding captures semantic relationships betweenfield values more effectively than one-hot encoding, improving the accuracy andnaturalness of the generated data. Additionally, the introduction of GNNsfurther boosts the discriminator's ability to distinguish between real andsynthetic data, leading to more realistic and diverse generated samples. Thefindings not only provide a new theoretical approach for network traffic datageneration but also offer practical insights into improving data synthesisquality through enhanced feature representation and model architecture. Futureresearch could focus on optimizing the integration of GNNs and GANs, reducingcomputational costs, and validating the model's generalizability on largerdatasets. Exploring other encoding methods and model structure improvements mayalso yield new possibilities for network data generation. This researchadvances the field of data synthesis, with potential applications in networksecurity and traffic analysis.
本研究提出了一种结合图神经网络(GNN)和生成对抗网络(GAN)的新方法,用于生成数据包级标题跟踪。通过结合 word2vec 嵌入,这项工作大大缓解了传统单次编码经常带来的维度诅咒,从而提高了模型的训练效果。实验结果表明,与单次编码相比,word2vec 编码能更有效地捕捉字段值之间的语义关系,从而提高了生成数据的准确性和自然度。此外,GNN 的引入进一步提高了判别器区分真实数据和合成数据的能力,从而生成更真实、更多样的样本。这些发现不仅为网络流量数据生成提供了一种新的理论方法,还为通过增强特征表示和模型架构来提高数据合成质量提供了实践启示。未来的研究重点可以放在优化 GNN 和 GAN 的集成、降低计算成本以及验证模型在更大数据集上的通用性上。探索其他编码方法和改进模型结构也可能为网络数据生成带来新的可能性。这项研究推动了数据合成领域的发展,并有可能应用于网络安全和流量分析。
{"title":"Generating Packet-Level Header Traces Using GNN-powered GAN","authors":"Zhen Xu","doi":"arxiv-2409.01265","DOIUrl":"https://doi.org/arxiv-2409.01265","url":null,"abstract":"This study presents a novel method combining Graph Neural Networks (GNNs) and\u0000Generative Adversarial Networks (GANs) for generating packet-level header\u0000traces. By incorporating word2vec embeddings, this work significantly mitigates\u0000the dimensionality curse often associated with traditional one-hot encoding,\u0000thereby enhancing the training effectiveness of the model. Experimental results\u0000demonstrate that word2vec encoding captures semantic relationships between\u0000field values more effectively than one-hot encoding, improving the accuracy and\u0000naturalness of the generated data. Additionally, the introduction of GNNs\u0000further boosts the discriminator's ability to distinguish between real and\u0000synthetic data, leading to more realistic and diverse generated samples. The\u0000findings not only provide a new theoretical approach for network traffic data\u0000generation but also offer practical insights into improving data synthesis\u0000quality through enhanced feature representation and model architecture. Future\u0000research could focus on optimizing the integration of GNNs and GANs, reducing\u0000computational costs, and validating the model's generalizability on larger\u0000datasets. Exploring other encoding methods and model structure improvements may\u0000also yield new possibilities for network data generation. This research\u0000advances the field of data synthesis, with potential applications in network\u0000security and traffic analysis.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"45 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142223989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Prototyping of Distributed Stream Processing Applications with stream2gym 利用 stream2gym 快速构建分布式流处理应用原型
Pub Date : 2024-09-01 DOI: arxiv-2409.00577
Md. Monzurul Amin Ifath, Miguel Neves, Israat Haque
Stream processing applications have been widely adopted due to real-time dataanalytics demands, e.g., fraud detection, video analytics, IoT applications.Unfortunately, prototyping and testing these applications is still a cumbersomeprocess for developers that usually requires an expensive testbed and deepmulti-disciplinary expertise, including in areas such as networking,distributed systems, and data engineering. As a result, it takes a long time todeploy stream processing applications into production and yet users faceseveral correctness and performance issues. In this paper, we presentstream2gym, a tool for the fast prototyping of large-scale distributed streamprocessing applications. stream2gym builds on Mininet, a widely adopted networkemulation platform, and provides a high-level interface to enable developers toeasily test their applications under various operating conditions. Wedemonstrate the benefits of stream2gym by prototyping and testing severalapplications as well as reproducing key findings from prior research work invideo analytics and network traffic monitoring. Moreover, we show stream2gympresents accurate results compared to a hardware testbed while consuming asmall amount of resources (enough to be supported in a single commodity laptopeven when emulating a dozen of processing nodes).
由于实时数据分析的需求,流处理应用已被广泛采用,例如欺诈检测、视频分析、物联网应用等。遗憾的是,对开发人员来说,原型开发和测试这些应用仍然是一个繁琐的过程,通常需要昂贵的测试平台和深厚的多学科专业知识,包括网络、分布式系统和数据工程等领域的知识。因此,将流处理应用部署到生产中需要很长时间,而用户却要面对平均正确性和性能问题。本文介绍了用于大规模分布式流处理应用快速原型开发的工具--stream2gym。stream2gym 建立在广泛采用的网络仿真平台 Mininet 上,提供了一个高级界面,使开发人员能够在各种运行条件下轻松测试他们的应用。我们通过原型开发和测试多个应用,以及重现先前在视频分析和网络流量监控方面的研究成果,展示了 stream2gym 的优势。此外,我们还展示了与硬件测试平台相比,stream2gym 在消耗少量资源(足以支持单个商品笔记本电脑,甚至在模拟十几个处理节点时也是如此)的情况下获得的精确结果。
{"title":"Fast Prototyping of Distributed Stream Processing Applications with stream2gym","authors":"Md. Monzurul Amin Ifath, Miguel Neves, Israat Haque","doi":"arxiv-2409.00577","DOIUrl":"https://doi.org/arxiv-2409.00577","url":null,"abstract":"Stream processing applications have been widely adopted due to real-time data\u0000analytics demands, e.g., fraud detection, video analytics, IoT applications.\u0000Unfortunately, prototyping and testing these applications is still a cumbersome\u0000process for developers that usually requires an expensive testbed and deep\u0000multi-disciplinary expertise, including in areas such as networking,\u0000distributed systems, and data engineering. As a result, it takes a long time to\u0000deploy stream processing applications into production and yet users face\u0000several correctness and performance issues. In this paper, we present\u0000stream2gym, a tool for the fast prototyping of large-scale distributed stream\u0000processing applications. stream2gym builds on Mininet, a widely adopted network\u0000emulation platform, and provides a high-level interface to enable developers to\u0000easily test their applications under various operating conditions. We\u0000demonstrate the benefits of stream2gym by prototyping and testing several\u0000applications as well as reproducing key findings from prior research work in\u0000video analytics and network traffic monitoring. Moreover, we show stream2gym\u0000presents accurate results compared to a hardware testbed while consuming a\u0000small amount of resources (enough to be supported in a single commodity laptop\u0000even when emulating a dozen of processing nodes).","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AirCompSim: A Discrete Event Simulator for Air Computing AirCompSim:用于空中计算的离散事件模拟器
Pub Date : 2024-09-01 DOI: arxiv-2409.00689
Baris Yamansavascilar, Atay Ozgovde, Cem Ersoy
Air components, including UAVs, planes, balloons, and satellites have beenwidely utilized since the fixed capacity of ground infrastructure cannot meetthe dynamic load of the users. However, since those air components should becoordinated in order to achieve the desired quality of service, severalnext-generation paradigms have been defined including air computing.Nevertheless, even though many studies and open research issues exist for aircomputing, there are limited test environments that cannot satisfy theperformance evaluation requirements of the dynamic environment. Therefore, inthis study, we introduce our discrete event simulator, AirCompSim, whichfulfills an air computing environment considering dynamically changingrequirements, loads, and capacities through its modular structure. To show itscapabilities, a dynamic capacity enhancement scenario is used for investigatingthe effect of the number of users, UAVs, and requirements of differentapplication types on the average task success rate, service time, and serverutilization. The results demonstrate that AirCompSim can be used forexperiments in air computing.
由于地面基础设施的固定容量无法满足用户的动态负载,包括无人机、飞机、气球和卫星在内的空中组件得到了广泛应用。然而,由于这些空中组件应相互协调,以实现所需的服务质量,因此已经定义了包括空中计算在内的几种下一代范例。然而,尽管存在许多关于空中计算的研究和公开研究课题,但测试环境有限,无法满足动态环境的性能评估要求。因此,在本研究中,我们介绍了离散事件模拟器 AirCompSim,它通过模块化结构满足了考虑动态变化的需求、负载和容量的空中计算环境。为了展示其能力,我们使用了一个动态容量增强场景来研究用户数量、无人机数量以及不同应用类型的需求对平均任务成功率、服务时间和服务器利用率的影响。结果表明,AirCompSim 可用于空中计算实验。
{"title":"AirCompSim: A Discrete Event Simulator for Air Computing","authors":"Baris Yamansavascilar, Atay Ozgovde, Cem Ersoy","doi":"arxiv-2409.00689","DOIUrl":"https://doi.org/arxiv-2409.00689","url":null,"abstract":"Air components, including UAVs, planes, balloons, and satellites have been\u0000widely utilized since the fixed capacity of ground infrastructure cannot meet\u0000the dynamic load of the users. However, since those air components should be\u0000coordinated in order to achieve the desired quality of service, several\u0000next-generation paradigms have been defined including air computing.\u0000Nevertheless, even though many studies and open research issues exist for air\u0000computing, there are limited test environments that cannot satisfy the\u0000performance evaluation requirements of the dynamic environment. Therefore, in\u0000this study, we introduce our discrete event simulator, AirCompSim, which\u0000fulfills an air computing environment considering dynamically changing\u0000requirements, loads, and capacities through its modular structure. To show its\u0000capabilities, a dynamic capacity enhancement scenario is used for investigating\u0000the effect of the number of users, UAVs, and requirements of different\u0000application types on the average task success rate, service time, and server\u0000utilization. The results demonstrate that AirCompSim can be used for\u0000experiments in air computing.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"81 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability-considered Multi-platoon's Groupcasting using the Resource Sharing Method 使用资源共享方法进行可靠性考虑的多排群播
Pub Date : 2024-09-01 DOI: arxiv-2409.00719
Chung-Ming Huang, Yen-Hung Wu, Duy-Tuan Dao
In the context of 5G platoon communications, the Platoon Leader Vehicle (PLV)employs groupcasting to transmit control messages to Platoon Member Vehicles(PMVs). Due to the restricted transmission power for groupcasting, it may needto pick one PMV as the Platoon Relay Vehicle (PRV) to be responsible forre-groupcasting messages of PLVs. To optimize the usage of limited spectrumresources, resource sharing can adopted to enhance spectrum efficiency withinthe platoon. This study proposes a resource allocation method, which is calledResource Sharing for Platoon Groupcasting (RSPG), for platoon groupcastingbased on transmission reliability. RSPG utilizes tripartite matching to assigna subchannel to either a PLV or PRV that shares the assigned subchannel withthe corresponding individual entity (IE), which does not belong to any platoon.The simulation results show that the proposed method performs better in termsof the QoS satisfaction rate of IEs, the number of allocated subchannels forplatoons, and spectral efficiency.
在 5G 排级通信中,排长车(PLV)采用群播向排级成员车(PMV)传输控制信息。由于群播的传输功率有限,因此可能需要挑选一辆 PMV 作为排中继车(PRV),负责对 PLV 的信息进行再群播。为了优化有限频谱资源的使用,可以采用资源共享的方式来提高排内的频谱效率。本研究提出了一种基于传输可靠性的排级群播资源分配方法,称为排级群播资源共享(Resource Sharing for Platoon Groupcasting,RSPG)。RSPG 利用三方匹配将子信道分配给 PLV 或 PRV,PLV 或 PRV 与相应的个体实体(IE)共享所分配的子信道,而个体实体不属于任何排。仿真结果表明,所提出的方法在 IE 的 QoS 满足率、为排分配的子信道数量和频谱效率方面都有更好的表现。
{"title":"Reliability-considered Multi-platoon's Groupcasting using the Resource Sharing Method","authors":"Chung-Ming Huang, Yen-Hung Wu, Duy-Tuan Dao","doi":"arxiv-2409.00719","DOIUrl":"https://doi.org/arxiv-2409.00719","url":null,"abstract":"In the context of 5G platoon communications, the Platoon Leader Vehicle (PLV)\u0000employs groupcasting to transmit control messages to Platoon Member Vehicles\u0000(PMVs). Due to the restricted transmission power for groupcasting, it may need\u0000to pick one PMV as the Platoon Relay Vehicle (PRV) to be responsible for\u0000re-groupcasting messages of PLVs. To optimize the usage of limited spectrum\u0000resources, resource sharing can adopted to enhance spectrum efficiency within\u0000the platoon. This study proposes a resource allocation method, which is called\u0000Resource Sharing for Platoon Groupcasting (RSPG), for platoon groupcasting\u0000based on transmission reliability. RSPG utilizes tripartite matching to assign\u0000a subchannel to either a PLV or PRV that shares the assigned subchannel with\u0000the corresponding individual entity (IE), which does not belong to any platoon.\u0000The simulation results show that the proposed method performs better in terms\u0000of the QoS satisfaction rate of IEs, the number of allocated subchannels for\u0000platoons, and spectral efficiency.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UAV-Enabled Wireless Networks for Integrated Sensing and Learning-Oriented Communication 用于综合传感和学习型通信的无人机无线网络
Pub Date : 2024-08-31 DOI: arxiv-2409.00405
Wenhao Zhuang, Xinyu He, Yuyi Mao, Juan Liu
Future wireless networks are envisioned to support both sensing andartificial intelligence (AI) services. However, conventional integrated sensingand communication (ISAC) networks may not be suitable due to the ignorance ofdiverse task-specific data utilities in different AI applications. In thisletter, a full-duplex unmanned aerial vehicle (UAV)-enabled wireless networkproviding sensing and edge learning services is investigated. To maximize thelearning performance while ensuring sensing quality, a convergence-guaranteediterative algorithm is developed to jointly determine the uplink timeallocation, as well as UAV trajectory and transmit power. Simulation resultsshow that the proposed algorithm significantly outperforms the baselines anddemonstrate the critical tradeoff between sensing and learning performance.
未来的无线网络将同时支持传感和人工智能(AI)服务。然而,传统的综合传感与通信(ISAC)网络可能并不适合,因为在不同的人工智能应用中,特定于任务的数据实用程序各不相同。本文研究了一种提供传感和边缘学习服务的全双工无人机(UAV)无线网络。为了在确保感知质量的同时最大限度地提高学习性能,本文开发了一种收敛性保证的iterative算法,用于共同确定上行链路时间分配、无人机轨迹和发射功率。仿真结果表明,所提出的算法明显优于基线算法,并证明了感知和学习性能之间的重要权衡。
{"title":"UAV-Enabled Wireless Networks for Integrated Sensing and Learning-Oriented Communication","authors":"Wenhao Zhuang, Xinyu He, Yuyi Mao, Juan Liu","doi":"arxiv-2409.00405","DOIUrl":"https://doi.org/arxiv-2409.00405","url":null,"abstract":"Future wireless networks are envisioned to support both sensing and\u0000artificial intelligence (AI) services. However, conventional integrated sensing\u0000and communication (ISAC) networks may not be suitable due to the ignorance of\u0000diverse task-specific data utilities in different AI applications. In this\u0000letter, a full-duplex unmanned aerial vehicle (UAV)-enabled wireless network\u0000providing sensing and edge learning services is investigated. To maximize the\u0000learning performance while ensuring sensing quality, a convergence-guaranteed\u0000iterative algorithm is developed to jointly determine the uplink time\u0000allocation, as well as UAV trajectory and transmit power. Simulation results\u0000show that the proposed algorithm significantly outperforms the baselines and\u0000demonstrate the critical tradeoff between sensing and learning performance.","PeriodicalId":501280,"journal":{"name":"arXiv - CS - Networking and Internet Architecture","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142183934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - CS - Networking and Internet Architecture
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1