Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365267
Reem Riyad Elyyan, Khalid A. Darabkh
Finding a cogent network architecture with efficient energy usage is essential given the rise of the Internet of Things (IoT), which poses a new barrier to the widespread use of IoT applications globally. This research investigates the suggested protocol in a novel simulation environment by dividing the network area into equal hexagonal cells and using the arithmetic optimization algorithm, a new meta-heuristic technique, to assist the cluster head assortment. The double mobile sinks are then deployed to travel along two constrained hexagonal itineraries in order to gather sensory data. Additionally, a cost-effective routing approach is suggested to prolong the lifespan of IoT sensor nodes. In the end, a comparison between the suggested protocol and the conventional techniques reveals a significant decrease in the average energy consumption of sensor nodes, hence extending the lifetime of the network. Particularly, as far as the mobility is concerned, the suggested protocol performs 372 times better than the energy-efficient geographic routing protocol and 669 times better than the rendezvous-based routing protocol in terms of the first node to die.
{"title":"A New IoT Power-Limited Wireless Sensor Networks Routing Protocol Utilizing Computational Intelligence","authors":"Reem Riyad Elyyan, Khalid A. Darabkh","doi":"10.1109/CommNet60167.2023.10365267","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365267","url":null,"abstract":"Finding a cogent network architecture with efficient energy usage is essential given the rise of the Internet of Things (IoT), which poses a new barrier to the widespread use of IoT applications globally. This research investigates the suggested protocol in a novel simulation environment by dividing the network area into equal hexagonal cells and using the arithmetic optimization algorithm, a new meta-heuristic technique, to assist the cluster head assortment. The double mobile sinks are then deployed to travel along two constrained hexagonal itineraries in order to gather sensory data. Additionally, a cost-effective routing approach is suggested to prolong the lifespan of IoT sensor nodes. In the end, a comparison between the suggested protocol and the conventional techniques reveals a significant decrease in the average energy consumption of sensor nodes, hence extending the lifetime of the network. Particularly, as far as the mobility is concerned, the suggested protocol performs 372 times better than the energy-efficient geographic routing protocol and 669 times better than the rendezvous-based routing protocol in terms of the first node to die.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"25 2","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Modern battlefields are experiencing an increased dependency on smart devices that can sense, process, and communicate data, also known as the Military Internet of Things (MIoT) architecture. While MIoT supports and enhances situation awareness, it opens up new cyber attacks that, when properly designed and deployed, can affect the safety of military operators.In this work, we discuss the trade-off between two opposite phenomena caused by the massive deployment of MIoT in modern battlefields: situational awareness and asymmetric advantage. We highlight how a resource-constrained adversary can resort to simple and effective tactics to deploy cyber attacks that can have either short-term effects or be detrimental to strategic military objectives.
{"title":"David and Goliath: Asymmetric Advantage in MIoT","authors":"Gabriele Oligeri, Savio Sciancalepore, Alireza Sadighian","doi":"10.1109/CommNet60167.2023.10365313","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365313","url":null,"abstract":"Modern battlefields are experiencing an increased dependency on smart devices that can sense, process, and communicate data, also known as the Military Internet of Things (MIoT) architecture. While MIoT supports and enhances situation awareness, it opens up new cyber attacks that, when properly designed and deployed, can affect the safety of military operators.In this work, we discuss the trade-off between two opposite phenomena caused by the massive deployment of MIoT in modern battlefields: situational awareness and asymmetric advantage. We highlight how a resource-constrained adversary can resort to simple and effective tactics to deploy cyber attacks that can have either short-term effects or be detrimental to strategic military objectives.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"19 2","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365265
Petr Horky, A. Prokeš, Radek Zavorka, Josef Vychodil, J. Kelner, C. Ziółkowski, A. Chandra
This paper introduces an approach to process channel sounder data acquired from Channel Impulse Response (CIR) of 60GHz and 80GHz channel sounder systems, through the integration of Long Short-Term Memory (LSTM) Neural Network (NN) and Fully Connected Neural Network (FCNN). The primary goal is to enhance and automate cluster detection within peaks from noised CIR data. The study initially compares the performance of LSTM NN and FCNN across different input sequence lengths. Notably, LSTM surpasses FCNN due to its incorporation of memory cells, which prove beneficial for handling longer series.Additionally, the paper investigates the robustness of LSTM NN through various architectural configurations. The findings suggest that robust neural networks tend to closely mimic the input function, whereas smaller neural networks are better at generalizing trends in time series data, which is desirable for anomaly detection, where function peaks are regarded as anomalies.Finally, the selected LSTM NN is compared with traditional signal filters, including Butterworth, Savitzky-Golay, Bessel/Thomson, and median filters. Visual observations indicate that the most effective methods for peak detection within channel impulse response data are either the LSTM NN or median filter, as they yield similar results.
本文介绍了一种通过整合长短期记忆(LSTM)神经网络(NN)和全连接神经网络(FCNN)来处理从 60GHz 和 80GHz 信道测深系统的信道脉冲响应(CIR)中获取的信道测深数据的方法。研究的主要目标是增强并自动检测噪声 CIR 数据中的峰值集群。研究初步比较了 LSTM NN 和 FCNN 在不同输入序列长度下的性能。值得注意的是,LSTM 超越了 FCNN,这是因为它加入了记忆单元,而记忆单元被证明有利于处理较长的序列。研究结果表明,鲁棒神经网络倾向于密切模仿输入函数,而较小的神经网络则更善于概括时间序列数据的趋势,这对于异常检测来说是可取的,因为在异常检测中,函数峰值被视为异常。最后,将所选的 LSTM NN 与传统信号滤波器进行了比较,包括巴特沃斯滤波器、萨维茨基-戈莱滤波器、贝塞尔/汤姆森滤波器和中值滤波器。直观观察表明,在信道脉冲响应数据中进行峰值检测的最有效方法是 LSTM NN 或中值滤波器,因为它们产生的结果相似。
{"title":"Channel Impulse Response Peak Clustering Using Neural Networks","authors":"Petr Horky, A. Prokeš, Radek Zavorka, Josef Vychodil, J. Kelner, C. Ziółkowski, A. Chandra","doi":"10.1109/CommNet60167.2023.10365265","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365265","url":null,"abstract":"This paper introduces an approach to process channel sounder data acquired from Channel Impulse Response (CIR) of 60GHz and 80GHz channel sounder systems, through the integration of Long Short-Term Memory (LSTM) Neural Network (NN) and Fully Connected Neural Network (FCNN). The primary goal is to enhance and automate cluster detection within peaks from noised CIR data. The study initially compares the performance of LSTM NN and FCNN across different input sequence lengths. Notably, LSTM surpasses FCNN due to its incorporation of memory cells, which prove beneficial for handling longer series.Additionally, the paper investigates the robustness of LSTM NN through various architectural configurations. The findings suggest that robust neural networks tend to closely mimic the input function, whereas smaller neural networks are better at generalizing trends in time series data, which is desirable for anomaly detection, where function peaks are regarded as anomalies.Finally, the selected LSTM NN is compared with traditional signal filters, including Butterworth, Savitzky-Golay, Bessel/Thomson, and median filters. Visual observations indicate that the most effective methods for peak detection within channel impulse response data are either the LSTM NN or median filter, as they yield similar results.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"42 3","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365308
Mounir El Mejjatti, Ahmed Habbani
The radiation pattern of an antenna is heavily contingent upon its physical attributes and the surroundings it operates within. However, the permanent integration of devices into the ground introduces inherent instability into the propagation medium, reliable to spatial and temporal fluctuations in dielectric permittivity. This research introduces a multivariable method that adeptly captures patterns within datasets, facilitating precise prognostication of maximum directivity deviations, reaching approximately 70%. This technique leans on the principles of multiple linear analysis and takes into account soil parameter values. Moreover, our study’s outcomes illustrate that among the four pivotal variables, volumetric moisture wields a pronounced impact on the main lobe magnitude, boasting a noteworthy correlation coefficient of -0.702. In contrast, temperature and bulk density exhibit coefficients of 0.106 and -0.133, respectively. Conversely, the influence of specific density seems to be of minor import. The results obtained fulfill the established aims of this investigation, furnishing designers with indispensable insights to tackle the predicaments that transmitters might confront in such scenarios.
{"title":"Innovative Model for Predicting Soil Impact on Patch Antenna Directivity","authors":"Mounir El Mejjatti, Ahmed Habbani","doi":"10.1109/CommNet60167.2023.10365308","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365308","url":null,"abstract":"The radiation pattern of an antenna is heavily contingent upon its physical attributes and the surroundings it operates within. However, the permanent integration of devices into the ground introduces inherent instability into the propagation medium, reliable to spatial and temporal fluctuations in dielectric permittivity. This research introduces a multivariable method that adeptly captures patterns within datasets, facilitating precise prognostication of maximum directivity deviations, reaching approximately 70%. This technique leans on the principles of multiple linear analysis and takes into account soil parameter values. Moreover, our study’s outcomes illustrate that among the four pivotal variables, volumetric moisture wields a pronounced impact on the main lobe magnitude, boasting a noteworthy correlation coefficient of -0.702. In contrast, temperature and bulk density exhibit coefficients of 0.106 and -0.133, respectively. Conversely, the influence of specific density seems to be of minor import. The results obtained fulfill the established aims of this investigation, furnishing designers with indispensable insights to tackle the predicaments that transmitters might confront in such scenarios.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"452 1","pages":"1-6"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365182
Abdellah Ouaguid, Mohamed Hanine, Z. Chiba, N. Abghour, Hassan Ghazal
No one can dispute the disruptive impact of blockchain technology, which has long been considered one of the major revolutions of contemporary times. Its integration into the healthcare ecosystem has helped overcome numerous difficulties and constraints faced by healthcare systems. This has been notably demonstrated in the meticulous management of electronic health records (EHR) and their access rights, as well as in its capabilities in terms of security, scalability, flexibility, and interoperability with other systems. This article undertakes the study and analysis of the most commonly adopted approaches in healthcare data management systems using blockchain technology. An evaluation is then conducted based on a set of observed common characteristics, distinguishing one approach from the others. The results of this analysis highlight the advantages and limitations of each approach, thus facilitating the choice of the method best suited to the readers’ specific case study. Furthermore, for effective implementation in the context of ehealth, we emphasize the existence of crucial challenges, such as the incomplete representation of major stakeholders in the blockchain network, the lack of regulatory flexibility to ensure legal interoperability by country, and the insufficient integration of an official regulatory authority ensuring compliance with ethical and legal standards. To address these challenges, it is necessary to establish close collaboration between regulators, technology developers, and healthcare stakeholders.
{"title":"Analysis of Blockchain Integration in the e-Healthcare Ecosystem","authors":"Abdellah Ouaguid, Mohamed Hanine, Z. Chiba, N. Abghour, Hassan Ghazal","doi":"10.1109/CommNet60167.2023.10365182","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365182","url":null,"abstract":"No one can dispute the disruptive impact of blockchain technology, which has long been considered one of the major revolutions of contemporary times. Its integration into the healthcare ecosystem has helped overcome numerous difficulties and constraints faced by healthcare systems. This has been notably demonstrated in the meticulous management of electronic health records (EHR) and their access rights, as well as in its capabilities in terms of security, scalability, flexibility, and interoperability with other systems. This article undertakes the study and analysis of the most commonly adopted approaches in healthcare data management systems using blockchain technology. An evaluation is then conducted based on a set of observed common characteristics, distinguishing one approach from the others. The results of this analysis highlight the advantages and limitations of each approach, thus facilitating the choice of the method best suited to the readers’ specific case study. Furthermore, for effective implementation in the context of ehealth, we emphasize the existence of crucial challenges, such as the incomplete representation of major stakeholders in the blockchain network, the lack of regulatory flexibility to ensure legal interoperability by country, and the insufficient integration of an official regulatory authority ensuring compliance with ethical and legal standards. To address these challenges, it is necessary to establish close collaboration between regulators, technology developers, and healthcare stakeholders.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"73 2","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/commnet60167.2023.10365285
{"title":"CommNet 2023 Preface","authors":"","doi":"10.1109/commnet60167.2023.10365285","DOIUrl":"https://doi.org/10.1109/commnet60167.2023.10365285","url":null,"abstract":"","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"175 1-4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/commnet60167.2023.10365247
Estabraq H. Makiyah, Nassr N. Kliamees
Point clouds with high density have been drawing attention for expressing attractive 3D visuals. Since these volumetric huge media need extensive bandwidth allocation, it would be problematic to stream to devices with restrained resources. In this paper, we propose the techniques of point cloud compression and streaming for large point clouds using a web server. To achieve reliability of streaming HTTP/2, protocol is suggested. Such techniques are built over web server. Storing large point cloud volumetric video in a web server allows users to present their data sets to the public without having to use additional applications or to send large volume data beforehand. HTTP/2 increases transmission efficiency by compressing headers in a binary format, and lowers latency by using one TCP session for sending many multiplexed requests. Our proposed system achieves lower average latency between successive frames resulting of an increased frame rate to 72.46 fps when streaming 4M points, 82.51 and 61 fps streaming 800K points compared to much lower rates in conventional work.
{"title":"Point Cloud Streaming over HTTP/2","authors":"Estabraq H. Makiyah, Nassr N. Kliamees","doi":"10.1109/commnet60167.2023.10365247","DOIUrl":"https://doi.org/10.1109/commnet60167.2023.10365247","url":null,"abstract":"Point clouds with high density have been drawing attention for expressing attractive 3D visuals. Since these volumetric huge media need extensive bandwidth allocation, it would be problematic to stream to devices with restrained resources. In this paper, we propose the techniques of point cloud compression and streaming for large point clouds using a web server. To achieve reliability of streaming HTTP/2, protocol is suggested. Such techniques are built over web server. Storing large point cloud volumetric video in a web server allows users to present their data sets to the public without having to use additional applications or to send large volume data beforehand. HTTP/2 increases transmission efficiency by compressing headers in a binary format, and lowers latency by using one TCP session for sending many multiplexed requests. Our proposed system achieves lower average latency between successive frames resulting of an increased frame rate to 72.46 fps when streaming 4M points, 82.51 and 61 fps streaming 800K points compared to much lower rates in conventional work.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"16 11","pages":"1-5"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139184329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365298
Hmidani Oussama, Ismaili Alaoui El Mehdi
In the field of computer vision, achieving real-time object detection through deep learning holds significant importance. Notable strides have been made in real-time object detection methods, particularly due to the rapid progress of deep convolutional neural networks (CNNs) compared to traditional approaches. It has been observed that existing real-time deep CNN-based object detectors face performance limitations, primarily stemming from the architecture of the underlying base network. This study introduces an improved framework for real-time object detection based on the Mask R-CNN model. To address the challenge of enhancing performance under stricter localization criteria, we replace the original Mask R-CNN’s Region of Interest Align (RoIAlign) with spatial interpolation. Additionally, in the final phase of the Mask R-CNN framework, we utilize the depthwise separable convolution architecture from EfficientNet-B7 to construct a classifier for proposal categorization and to adjust bounding boxes for detected objects. Experimental findings on both the COCO dataset and the ImageNet dataset demonstrate that our proposed approach surpasses the original Mask R-CNN in terms of detection accuracy and inference speed. Categorically, our method outperforms the original Mask R-CNN framework by 51.5% on the COCO test set and 46.2% on the ImageNet test set.
{"title":"Developing Mask R-CNN Framework for Real-Time Object Detection","authors":"Hmidani Oussama, Ismaili Alaoui El Mehdi","doi":"10.1109/CommNet60167.2023.10365298","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365298","url":null,"abstract":"In the field of computer vision, achieving real-time object detection through deep learning holds significant importance. Notable strides have been made in real-time object detection methods, particularly due to the rapid progress of deep convolutional neural networks (CNNs) compared to traditional approaches. It has been observed that existing real-time deep CNN-based object detectors face performance limitations, primarily stemming from the architecture of the underlying base network. This study introduces an improved framework for real-time object detection based on the Mask R-CNN model. To address the challenge of enhancing performance under stricter localization criteria, we replace the original Mask R-CNN’s Region of Interest Align (RoIAlign) with spatial interpolation. Additionally, in the final phase of the Mask R-CNN framework, we utilize the depthwise separable convolution architecture from EfficientNet-B7 to construct a classifier for proposal categorization and to adjust bounding boxes for detected objects. Experimental findings on both the COCO dataset and the ImageNet dataset demonstrate that our proposed approach surpasses the original Mask R-CNN in terms of detection accuracy and inference speed. Categorically, our method outperforms the original Mask R-CNN framework by 51.5% on the COCO test set and 46.2% on the ImageNet test set.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"21 6","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/CommNet60167.2023.10365282
Amath Ndao, Xavier Lagrange, Nicolas Huin, Géraldine Texier, L. Nuaymi
Open Radio Access Network (O-RAN) is the most promising solution for future RAN deployments. This attractive and efficient solution presents complex and new challenges w.r.t to cost, energy consumption and other performance indicators. In this work, we study function placement in the Open Radio Access Network (O-RAN) architecture. Our objective it to minimize the operating costs, while respecting other network constraints. We consider a RAN load that varies over the day and we study the ORAN-DUs (ORAN-Distributed Units) placement for different frequency bands. We use data obtained from real topology. First, we analyze the percentage of utilization, throughput and Modulation and Coding Scheme (MCS) selections of each frequency band for each hour of the day. Based on our analysis, we propose an Integer Linear Programming (ILP) model whose objective is to minimize computing and routing cost while respecting the delay and capacity constraints of ORAN interfaces. Our results analyse the cost savings of the proposed model w.r.t the DRAN (Distributed RAN), the solution prevailing before ORAN, during off-peak and peak hours.
开放式无线接入网(O-RAN)是未来无线接入网部署中最有前途的解决方案。这种极具吸引力的高效解决方案在成本、能耗和其他性能指标方面提出了复杂的新挑战。在这项工作中,我们研究了开放无线接入网(O-RAN)架构中的功能布局。我们的目标是在尊重其他网络约束条件的同时,最大限度地降低运营成本。我们考虑了全天变化的 RAN 负载,并研究了不同频段的 ORAN-DU(ORAN-分布式单元)布局。我们使用从实际拓扑结构中获得的数据。首先,我们分析了一天中每个小时每个频段的使用百分比、吞吐量以及调制和编码方案(MCS)选择。在分析的基础上,我们提出了一个整数线性规划(ILP)模型,其目标是在尊重 ORAN 接口的延迟和容量限制的同时,最大限度地降低计算和路由成本。我们的结果分析了所提模型在非高峰和高峰时段与 ORAN 之前的解决方案 DRAN(分布式 RAN)相比所节省的成本。
{"title":"Optimal DU placement in an O-RAN multi-band system","authors":"Amath Ndao, Xavier Lagrange, Nicolas Huin, Géraldine Texier, L. Nuaymi","doi":"10.1109/CommNet60167.2023.10365282","DOIUrl":"https://doi.org/10.1109/CommNet60167.2023.10365282","url":null,"abstract":"Open Radio Access Network (O-RAN) is the most promising solution for future RAN deployments. This attractive and efficient solution presents complex and new challenges w.r.t to cost, energy consumption and other performance indicators. In this work, we study function placement in the Open Radio Access Network (O-RAN) architecture. Our objective it to minimize the operating costs, while respecting other network constraints. We consider a RAN load that varies over the day and we study the ORAN-DUs (ORAN-Distributed Units) placement for different frequency bands. We use data obtained from real topology. First, we analyze the percentage of utilization, throughput and Modulation and Coding Scheme (MCS) selections of each frequency band for each hour of the day. Based on our analysis, we propose an Integer Linear Programming (ILP) model whose objective is to minimize computing and routing cost while respecting the delay and capacity constraints of ORAN interfaces. Our results analyse the cost savings of the proposed model w.r.t the DRAN (Distributed RAN), the solution prevailing before ORAN, during off-peak and peak hours.","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"43 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139183999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-11DOI: 10.1109/commnet60167.2023.10365301
{"title":"Copyright Page","authors":"","doi":"10.1109/commnet60167.2023.10365301","DOIUrl":"https://doi.org/10.1109/commnet60167.2023.10365301","url":null,"abstract":"","PeriodicalId":505542,"journal":{"name":"2023 6th International Conference on Advanced Communication Technologies and Networking (CommNet)","volume":"196 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139184083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}