首页 > 最新文献

Annals of Telecommunications最新文献

英文 中文
Low-latency remote-offloading system for accelerator 用于加速器的低延迟远程卸载系统
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-11-03 DOI: 10.1007/s12243-023-00994-3
Shogo Saito, Kei Fujimoto, Akinori Shiraga

Specific workloads are increasingly offloaded to accelerators such as a graphic processing unit (GPU) and field-programmable gate array (FPGA) for real-time processing and computing efficiency. Because accelerators are expensive and consume much power, it is desirable to increase the efficiency of accelerator utilization by sharing accelerators among multiple servers over a network. However, task offloading over a network has the problem of latency due to network processing overhead in remote offloading. This paper proposes a low-latency system for accelerator offloading over a network. To reduce the overhead of remote offloading, we propose a system composed of (1) fast recombination processing of chunked data with a simple protocol to reduce the number of memory copies, (2) polling-based packet receiving check to reduce overhead due to interrupts in interaction with a network interface card, and (3) a run-to-completion model in network processing and accelerator offloading to reduce overhead with context switching. We show that the system can improve performance by 66.40% compared with a simple implementation using kernel protocol stack and confirmed the performance improvement with a virtual radio access network use case as a low-latency application. Furthermore, we show that this performance can also be achieved in practical usage in data center networks.

为了实时处理和提高计算效率,越来越多的特定工作负载被卸载到图形处理器(GPU)和现场可编程门阵列(FPGA)等加速器上。由于加速器价格昂贵且耗电量大,通过网络在多台服务器之间共享加速器来提高加速器的利用效率是可取的。然而,通过网络卸载任务存在延迟问题,这是由于远程卸载时的网络处理开销造成的。本文提出了一种低延迟的网络加速器卸载系统。为了减少远程卸载的开销,我们提出了一个由以下部分组成的系统:(1) 采用简单的协议对分块数据进行快速重组处理,以减少内存副本的数量;(2) 基于轮询的数据包接收检查,以减少与网络接口卡交互时中断造成的开销;(3) 在网络处理和加速器卸载中采用运行到完成模型,以减少上下文切换造成的开销。我们的研究表明,与使用内核协议栈的简单实现相比,该系统的性能提高了 66.40%,并通过虚拟无线接入网络作为低延迟应用程序的使用案例证实了性能的提高。此外,我们还展示了在数据中心网络的实际应用中也能实现这一性能。
{"title":"Low-latency remote-offloading system for accelerator","authors":"Shogo Saito,&nbsp;Kei Fujimoto,&nbsp;Akinori Shiraga","doi":"10.1007/s12243-023-00994-3","DOIUrl":"10.1007/s12243-023-00994-3","url":null,"abstract":"<div><p>Specific workloads are increasingly offloaded to accelerators such as a graphic processing unit (GPU) and field-programmable gate array (FPGA) for real-time processing and computing efficiency. Because accelerators are expensive and consume much power, it is desirable to increase the efficiency of accelerator utilization by sharing accelerators among multiple servers over a network. However, task offloading over a network has the problem of latency due to network processing overhead in remote offloading. This paper proposes a low-latency system for accelerator offloading over a network. To reduce the overhead of remote offloading, we propose a system composed of (1) fast recombination processing of chunked data with a simple protocol to reduce the number of memory copies, (2) polling-based packet receiving check to reduce overhead due to interrupts in interaction with a network interface card, and (3) a run-to-completion model in network processing and accelerator offloading to reduce overhead with context switching. We show that the system can improve performance by 66.40% compared with a simple implementation using kernel protocol stack and confirmed the performance improvement with a virtual radio access network use case as a low-latency application. Furthermore, we show that this performance can also be achieved in practical usage in data center networks.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"179 - 196"},"PeriodicalIF":1.8,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-00994-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135869132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The role of SIC on the design of next generation multiple access SIC 对下一代多址接入设计的作用
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-10-12 DOI: 10.1007/s12243-023-00992-5
Asmad Bin Abdul Razzaque, Hassaan Khaliq Qureshi, Andrea Baiocchi

The interplay of physical layer enhancements and classic random access protocols is the objective of this paper. Successive interference cancellation (SIC) is among the major enhancements of the physical layer. Considering the classic representatives of random access protocols, Slotted ALOHA and Channel Sensing Multiple Access (CSMA), we show that two regimes can be identified as a function of the communication link spectral efficiency. In case of high levels of spectral efficiency, multi-packet reception enabled by SIC is of limited benefit. Sum-rate performance is dominated by the effectiveness of the Medium Access Control (MAC) protocol. On the contrary, for low spectral efficiency levels, sum-rate performance is essentially dependent on physical layer SIC capability, while the MAC protocol has a marginal impact. Limitations due to transmission power dynamic range are shown to induce unfairness among nodes. However, the unfairness issue fades away when the system is driven to work around the sum-rate peak achieved for low spectral efficiency. This can also be confirmed by looking at Age of Information (AoI) metric. The major finding of this work is that SIC can boost performance, while still maintaining a fair sharing of the communication channel among nodes. In this regime, the MAC protocol appears to play a marginal role, while multi-packet reception endowed by SIC is prominent to provide high sum-rate, low energy consumption, and low AoI.

物理层增强与经典随机存取协议的相互作用是本文的目标。连续干扰消除(SIC)是物理层的主要改进之一。考虑到随机接入协议的经典代表--插槽式 ALOHA 和信道感知多路访问 (CSMA),我们发现可以根据通信链路的频谱效率确定两种状态。在频谱效率较高的情况下,由 SIC 实现的多数据包接收效果有限。和速率性能主要取决于介质访问控制(MAC)协议的有效性。相反,在频谱效率较低的情况下,和速率性能基本上取决于物理层 SIC 的能力,而 MAC 协议的影响微乎其微。传输功率动态范围的限制导致了节点间的不公平。然而,当系统在低频谱效率下达到总速率峰值时,不公平问题就会消失。信息年龄(AoI)指标也证实了这一点。这项工作的主要发现是,SIC 可以提高性能,同时仍能保持节点间通信信道的公平共享。在这种情况下,MAC 协议的作用似乎微乎其微,而 SIC 赋予的多数据包接收功能则在提供高总和速率、低能耗和低 AoI 方面表现突出。
{"title":"The role of SIC on the design of next generation multiple access","authors":"Asmad Bin Abdul Razzaque,&nbsp;Hassaan Khaliq Qureshi,&nbsp;Andrea Baiocchi","doi":"10.1007/s12243-023-00992-5","DOIUrl":"10.1007/s12243-023-00992-5","url":null,"abstract":"<div><p>The interplay of physical layer enhancements and classic random access protocols is the objective of this paper. Successive interference cancellation (SIC) is among the major enhancements of the physical layer. Considering the classic representatives of random access protocols, Slotted ALOHA and Channel Sensing Multiple Access (CSMA), we show that two regimes can be identified as a function of the communication link spectral efficiency. In case of high levels of spectral efficiency, multi-packet reception enabled by SIC is of limited benefit. Sum-rate performance is dominated by the effectiveness of the Medium Access Control (MAC) protocol. On the contrary, for low spectral efficiency levels, sum-rate performance is essentially dependent on physical layer SIC capability, while the MAC protocol has a marginal impact. Limitations due to transmission power dynamic range are shown to induce unfairness among nodes. However, the unfairness issue fades away when the system is driven to work around the sum-rate peak achieved for low spectral efficiency. This can also be confirmed by looking at Age of Information (AoI) metric. The major finding of this work is that SIC can boost performance, while still maintaining a fair sharing of the communication channel among nodes. In this regime, the MAC protocol appears to play a marginal role, while multi-packet reception endowed by SIC is prominent to provide high sum-rate, low energy consumption, and low AoI.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"343 - 360"},"PeriodicalIF":1.8,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-00992-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136012551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approach for detecting multi-institution attacks 检测多机构攻击的方法
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-10-09 DOI: 10.1007/s12243-023-00993-4
Saif Zabarah, Omar Naman, Mohammad A. Salahuddin, Raouf Boutaba, Samer Al-Kiswany

We present Soteria, a data processing pipeline for detecting multi-institution attacks. Soteria uses a set of machine learning techniques to detect future attacks, predict their future targets, and rank attacks based on their predicted severity. Our evaluation with real data from Canada-wide academic institution networks shows that Soteria can predict future attacks with 95% recall rate, predict the next targets of an attack with 97% recall rate, and detect attacks in the first 20% of their life span. Soteria is deployed in production and is in use by tens of Canadian academic institutions that are part of the CANARIE IDS project.

我们介绍了用于检测多机构攻击的数据处理管道 Soteria。Soteria 使用一系列机器学习技术来检测未来攻击、预测未来攻击目标,并根据预测的严重程度对攻击进行排序。我们使用加拿大学术机构网络的真实数据进行的评估表明,Soteria 可以以 95% 的召回率预测未来攻击,以 97% 的召回率预测攻击的下一个目标,并在攻击生命周期的前 20% 检测到攻击。Soteria 已部署到生产中,并被 CANARIE IDS 项目中的数十家加拿大学术机构使用。
{"title":"An approach for detecting multi-institution attacks","authors":"Saif Zabarah,&nbsp;Omar Naman,&nbsp;Mohammad A. Salahuddin,&nbsp;Raouf Boutaba,&nbsp;Samer Al-Kiswany","doi":"10.1007/s12243-023-00993-4","DOIUrl":"10.1007/s12243-023-00993-4","url":null,"abstract":"<div><p>We present Soteria, a data processing pipeline for detecting multi-institution attacks. Soteria uses a set of machine learning techniques to detect future attacks, predict their future targets, and rank attacks based on their predicted severity. Our evaluation with real data from Canada-wide academic institution networks shows that Soteria can predict future attacks with 95% recall rate, predict the next targets of an attack with 97% recall rate, and detect attacks in the first 20% of their life span. Soteria is deployed in production and is in use by tens of Canadian academic institutions that are part of the CANARIE IDS project.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"257 - 270"},"PeriodicalIF":1.8,"publicationDate":"2023-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135095363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection 异构遥测适应数据基础设施:应用于基于 Netflow 的密码劫持检测
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-10-03 DOI: 10.1007/s12243-023-00991-6
Alejandro A. Moreno-Sancho, Antonio Pastor, Ignacio D. Martinez-Casanueva, Daniel González-Sánchez, Luis Bellido Triana

The increasing development of cryptocurrencies has brought cryptojacking as a new security threat in which attackers steal computing resources for cryptomining. The digitization of the supply chain is a potential major target for cryptojacking due to the large number of different infrastructures involved. These different infrastructures provide information sources that can be useful to detect cryptojacking, but with a wide variety of data formats and encodings. This paper describes the semantic data aggregator (SDA), a normalization and aggregation system based on data modelling and low-latency processing of data streams that facilitates the integration of heterogeneous information sources. As a use case, the paper describes a cryptomining detection system (CDS) based on network traffic flows processed by a machine learning engine. The results show how the SDA is leveraged in this use case to obtain aggregated information that improves the performance of the CDS.

加密货币的日益发展带来了加密劫持这一新的安全威胁,攻击者会窃取计算资源进行加密挖掘。由于涉及大量不同的基础设施,供应链数字化是加密劫持的潜在主要目标。这些不同的基础设施提供了有助于检测加密劫持的信息源,但其数据格式和编码却多种多样。本文介绍了语义数据聚合器(SDA),这是一种基于数据建模和低延迟数据流处理的规范化和聚合系统,有助于整合异构信息源。作为一个用例,本文介绍了基于机器学习引擎处理的网络流量的加密侦测系统(CDS)。结果表明,在该用例中如何利用 SDA 来获取汇总信息,从而提高 CDS 的性能。
{"title":"A data infrastructure for heterogeneous telemetry adaptation: application to Netflow-based cryptojacking detection","authors":"Alejandro A. Moreno-Sancho,&nbsp;Antonio Pastor,&nbsp;Ignacio D. Martinez-Casanueva,&nbsp;Daniel González-Sánchez,&nbsp;Luis Bellido Triana","doi":"10.1007/s12243-023-00991-6","DOIUrl":"10.1007/s12243-023-00991-6","url":null,"abstract":"<div><p>The increasing development of cryptocurrencies has brought cryptojacking as a new security threat in which attackers steal computing resources for cryptomining. The digitization of the supply chain is a potential major target for cryptojacking due to the large number of different infrastructures involved. These different infrastructures provide information sources that can be useful to detect cryptojacking, but with a wide variety of data formats and encodings. This paper describes the semantic data aggregator (SDA), a normalization and aggregation system based on data modelling and low-latency processing of data streams that facilitates the integration of heterogeneous information sources. As a use case, the paper describes a cryptomining detection system (CDS) based on network traffic flows processed by a machine learning engine. The results show how the SDA is leveraged in this use case to obtain aggregated information that improves the performance of the CDS.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"241 - 256"},"PeriodicalIF":1.8,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135697050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning-based sequential models for multi-user detection with M-PSK for downlink NOMA wireless communication systems 基于深度学习的顺序模型,用于下行 NOMA 无线通信系统的 M-PSK 多用户检测
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-09-25 DOI: 10.1007/s12243-023-00990-7
Bibekananda Panda, Poonam Singh

Non-orthogonal multiple access (NOMA) techniques have the potential to achieve large connectivity requirements for future-generation wireless communication. NOMA detection techniques require conventional successive interference cancellation (SIC) techniques for uplink and downlink transmissions on the receiver side to decode the transmitted signals. Multipath fading significantly impacts the SIC process and correct signal detection due to propagation delay and fading channel. Deep learning (DL) techniques can overcome conventional SIC detection limitations. Signal detection for a multi-user NOMA wireless communication system that relies on orthogonal frequency-division multiplexing (OFDM) is discussed using various DL approaches in this paper. For multi-user signal detection, different deep learning-based sequential model neural networks, gated recurrent unit (GRU), long short-term memory (LSTM), and bi-directional long short-term memory (Bi-LSTM) are applied. The deep neural network is initially trained offline with multi-user NOMA signals in the OFDM system and used to recover transmitted signals directly. DL-based sequential models with different cyclic prefixes and fast Fourier transforms with various M-phase shift keying (M-PSK) modulation schemes are discussed with deep learning optimization algorithms. In simulation results, the conventional SIC technique with minimum mean square error approach is compared to the effectiveness of DL-based models for signal detection of multi-user NOMA systems by their bit error rate performances. The root mean square error performance of different deep learning-based sequence models with other optimizers is also discussed. Moreover, the robustness of the Bi-LSTM is evaluated with the reliability of other DL-based sequential model applications in the multi-user downlink NOMA wireless communication systems.

非正交多址(NOMA)技术有可能满足未来新一代无线通信的大量连接要求。非正交多址检测技术要求接收端采用传统的上行和下行连续干扰消除(SIC)技术来解码传输信号。由于传播延迟和衰减信道,多径衰减严重影响了 SIC 过程和正确的信号检测。深度学习(DL)技术可以克服传统 SIC 检测的局限性。本文使用各种深度学习方法讨论了依赖于正交频分复用(OFDM)的多用户 NOMA 无线通信系统的信号检测。在多用户信号检测中,应用了不同的基于深度学习的序列模型神经网络、门控递归单元(GRU)、长短期记忆(LSTM)和双向长短期记忆(Bi-LSTM)。深度神经网络最初使用 OFDM 系统中的多用户 NOMA 信号进行离线训练,然后直接用于恢复传输信号。利用深度学习优化算法讨论了基于 DL 的序列模型,该模型具有不同的循环前缀和快速傅里叶变换,并采用了各种 M 相移键控(M-PSK)调制方案。在仿真结果中,采用最小均方误差方法的传统 SIC 技术与基于 DL 的模型在多用户 NOMA 系统信号检测中的误码率性能进行了比较。此外,还讨论了基于深度学习的不同序列模型与其他优化器的均方根误差性能。此外,还评估了 Bi-LSTM 的鲁棒性与其他基于 DL 的序列模型在多用户下行 NOMA 无线通信系统中应用的可靠性。
{"title":"Deep learning-based sequential models for multi-user detection with M-PSK for downlink NOMA wireless communication systems","authors":"Bibekananda Panda,&nbsp;Poonam Singh","doi":"10.1007/s12243-023-00990-7","DOIUrl":"10.1007/s12243-023-00990-7","url":null,"abstract":"<div><p>Non-orthogonal multiple access (NOMA) techniques have the potential to achieve large connectivity requirements for future-generation wireless communication. NOMA detection techniques require conventional successive interference cancellation (SIC) techniques for uplink and downlink transmissions on the receiver side to decode the transmitted signals. Multipath fading significantly impacts the SIC process and correct signal detection due to propagation delay and fading channel. Deep learning (DL) techniques can overcome conventional SIC detection limitations. Signal detection for a multi-user NOMA wireless communication system that relies on orthogonal frequency-division multiplexing (OFDM) is discussed using various DL approaches in this paper. For multi-user signal detection, different deep learning-based sequential model neural networks, gated recurrent unit (GRU), long short-term memory (LSTM), and bi-directional long short-term memory (Bi-LSTM) are applied. The deep neural network is initially trained offline with multi-user NOMA signals in the OFDM system and used to recover transmitted signals directly. DL-based sequential models with different cyclic prefixes and fast Fourier transforms with various M-phase shift keying (M-PSK) modulation schemes are discussed with deep learning optimization algorithms. In simulation results, the conventional SIC technique with minimum mean square error approach is compared to the effectiveness of DL-based models for signal detection of multi-user NOMA systems by their bit error rate performances. The root mean square error performance of different deep learning-based sequence models with other optimizers is also discussed. Moreover, the robustness of the Bi-LSTM is evaluated with the reliability of other DL-based sequential model applications in the multi-user downlink NOMA wireless communication systems.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"327 - 341"},"PeriodicalIF":1.8,"publicationDate":"2023-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135770455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental assessment of SDR-based 5G positioning: methodologies and insights 基于 SDR 的 5G 定位实验评估:方法和见解
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-09-15 DOI: 10.1007/s12243-023-00987-2
Ivan Palamà, Stefania Bartoletti, Giuseppe Bianchi, Nicola Blefari Melazzi

While GPS has traditionally been the primary positioning technology, 3GPP has more recently begun to include positioning services as native, built-in features of future-generation cellular networks. With Release 16 of the 3GPP, finalized in 2021, a significant standardization effort has taken place for positioning in 5G networks, especially in terms of physical layer signals, measurements, schemes, and architecture to meet the requirements of a wide range of regulatory, commercial and industrial use cases. However, experimentally driven research aiming to assess the real-world performance of 5G positioning is still lagging behind, root causes being (i) the slow integration of positioning technologies in open-source 5G frameworks, (ii) the complexity in setting up and properly configuring a 5G positioning testbed, and (iii) the cost of a multi-BS deployment. This paper sheds some light on all such aspects. After a brief overview of state of the art in 5G positioning and its support in open-source platforms based on software-defined radios (SDRs), we provide advice on how to set up positioning testbeds, and we demonstrate, via a set of real-world measurements, how to assess aspects such as reference signal configurations, localization algorithms, and network deployments. Our contribution further includes an assessment of the efficacy of utilizing measurements obtained from a single-link limited-size testbed to forecast localization performance in more elaborate (and hence more expensive) multi-node network settings. We posit that our methodological insights can assist in lowering the entry cost barriers associated with conducting 5G positioning experiments and, consequently, promote additional experimental research in this domain.

虽然 GPS 一直是主要的定位技术,但 3GPP 最近已开始将定位服务作为下一代蜂窝网络的原生内置功能。随着 3GPP 第 16 版于 2021 年定稿,针对 5G 网络定位的标准化工作已取得重大进展,特别是在物理层信号、测量、方案和架构方面,以满足各种监管、商业和工业用例的要求。然而,旨在评估 5G 定位实际性能的实验驱动型研究仍然滞后,其根本原因在于:(i) 定位技术在开源 5G 框架中的集成缓慢;(ii) 建立和正确配置 5G 定位测试平台的复杂性;以及 (iii) 多BS 部署的成本。本文对所有这些方面进行了阐述。在简要介绍了 5G 定位技术及其在基于软件定义无线电 (SDR) 的开源平台中的支持之后,我们就如何建立定位测试平台提供了建议,并通过一组实际测量演示了如何评估参考信号配置、定位算法和网络部署等方面。我们的贡献还包括评估利用从规模有限的单链路测试平台获得的测量结果预测更复杂(因而更昂贵)的多节点网络设置中的定位性能的有效性。我们认为,我们的方法论见解有助于降低与开展 5G 定位实验相关的入门成本门槛,从而促进该领域的更多实验研究。
{"title":"Experimental assessment of SDR-based 5G positioning: methodologies and insights","authors":"Ivan Palamà,&nbsp;Stefania Bartoletti,&nbsp;Giuseppe Bianchi,&nbsp;Nicola Blefari Melazzi","doi":"10.1007/s12243-023-00987-2","DOIUrl":"10.1007/s12243-023-00987-2","url":null,"abstract":"<div><p>While GPS has traditionally been the primary positioning technology, 3GPP has more recently begun to include positioning services as native, built-in features of future-generation cellular networks. With Release 16 of the 3GPP, finalized in 2021, a significant standardization effort has taken place for positioning in 5G networks, especially in terms of physical layer signals, measurements, schemes, and architecture to meet the requirements of a wide range of regulatory, commercial and industrial use cases. However, experimentally driven research aiming to assess the real-world performance of 5G positioning is still lagging behind, root causes being (i) the slow integration of positioning technologies in open-source 5G frameworks, (ii) the complexity in setting up and properly configuring a 5G positioning testbed, and (iii) the cost of a multi-BS deployment. This paper sheds some light on all such aspects. After a brief overview of state of the art in 5G positioning and its support in open-source platforms based on software-defined radios (SDRs), we provide advice on how to set up positioning testbeds, and we demonstrate, via a set of real-world measurements, how to assess aspects such as reference signal configurations, localization algorithms, and network deployments. Our contribution further includes an assessment of the efficacy of utilizing measurements obtained from a single-link limited-size testbed to forecast localization performance in more elaborate (and hence more expensive) multi-node network settings. We posit that our methodological insights can assist in lowering the entry cost barriers associated with conducting 5G positioning experiments and, consequently, promote additional experimental research in this domain.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"301 - 313"},"PeriodicalIF":1.8,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-00987-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135436293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semi-blind AF transmission in secure NOMA systems 安全 NOMA 系统中的半盲目自动对焦传输
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-09-13 DOI: 10.1007/s12243-023-00989-0
Wided Hadj Alouane

In the wireless channel state information (CSI)-assisted amplify-and-forward (AF) networks, an instantaneous CSI of the first hop is required to scale the amplification gain. However, the deployment of instantaneous CSI always remains difficult in real applications because it increases the CSI overhead and causes resources wastage such as power and bandwidth. In order to reduce the CSI overhead and the system complexity, we suggest the integration of semi-blind relay in secure non-orthogonal multiple access (NOMA) systems where only a statistical CSI of the first hop is used to generate the amplification gain. This paper addresses the performance analysis of the secure semi-blind AF-NOMA (S-SBAF-NOMA) schemes in which the base station communicates with a pair of users via a semi-blind relay node in the presence of one eavesdropper. First, we provide the expressions for the end-to-end signal-to-noise ratio (SNR) at each receiver node. We then derive new analytical and asymptotic expressions for strictly positive secrecy capacity (SPSC) and secrecy outage probability (SOP). To ensure the exactness and the tractability of mathematical analysis, we provide some numerical results obtained through simulation rounds in Matlab, and we compare them with those of secure CSI-assisted AF-NOMA (S-CSIAF-NOMA) networks. Our results show that the proposed S-SBAF-NOMA scheme achieves comparable secrecy performance/same performance bounds as compared to S-CSIAF-NOMA scheme at the gain of a decrease in processing complexity and system overhead. Numerical results also demonstrate that S-SBAF-NOMA networks achieve superior secrecy performance for lower values of target data rates and SNR of the illegal link.

在无线信道状态信息(CSI)辅助的放大-前向(AF)网络中,需要第一跳的瞬时 CSI 来扩展放大增益。然而,由于瞬时 CSI 会增加 CSI 开销并造成功率和带宽等资源浪费,因此在实际应用中部署瞬时 CSI 始终存在困难。为了减少 CSI 开销和系统复杂性,我们建议在安全非正交多址接入(NOMA)系统中集成半盲中继,只使用第一跳的统计 CSI 来产生放大增益。本文探讨了安全半盲 AF-NOMA(S-SBAF-NOMA)方案的性能分析,在这种方案中,基站通过一个半盲中继节点在有一个窃听者的情况下与一对用户通信。首先,我们提供了每个接收节点的端到端信噪比(SNR)表达式。然后,我们推导出严格正保密容量(SPSC)和保密中断概率(SOP)的新分析和渐近表达式。为了确保数学分析的精确性和可操作性,我们提供了一些在 Matlab 中进行仿真得到的数值结果,并将它们与安全 CSI 辅助 AF-NOMA (S-CSIAF-NOMA)网络的数值结果进行了比较。我们的结果表明,与 S-CSIAF-NOMA 方案相比,所提出的 S-SBAF-NOMA 方案在降低处理复杂度和系统开销的同时,还实现了与 S-CSIAF-NOMA 方案相当的保密性能/相同的性能边界。数值结果还表明,S-SBAF-NOMA 网络在目标数据速率和非法链路 SNR 值较低的情况下,也能实现出色的保密性能。
{"title":"Semi-blind AF transmission in secure NOMA systems","authors":"Wided Hadj Alouane","doi":"10.1007/s12243-023-00989-0","DOIUrl":"10.1007/s12243-023-00989-0","url":null,"abstract":"<div><p>In the wireless channel state information (CSI)-assisted amplify-and-forward (AF) networks, an instantaneous CSI of the first hop is required to scale the amplification gain. However, the deployment of instantaneous CSI always remains difficult in real applications because it increases the CSI overhead and causes resources wastage such as power and bandwidth. In order to reduce the CSI overhead and the system complexity, we suggest the integration of semi-blind relay in secure non-orthogonal multiple access (NOMA) systems where only a statistical CSI of the first hop is used to generate the amplification gain. This paper addresses the performance analysis of the secure semi-blind AF-NOMA (S-SBAF-NOMA) schemes in which the base station communicates with a pair of users via a semi-blind relay node in the presence of one eavesdropper. First, we provide the expressions for the end-to-end signal-to-noise ratio (SNR) at each receiver node. We then derive new analytical and asymptotic expressions for strictly positive secrecy capacity (SPSC) and secrecy outage probability (SOP). To ensure the exactness and the tractability of mathematical analysis, we provide some numerical results obtained through simulation rounds in Matlab, and we compare them with those of secure CSI-assisted AF-NOMA (S-CSIAF-NOMA) networks. Our results show that the proposed S-SBAF-NOMA scheme achieves comparable secrecy performance/same performance bounds as compared to S-CSIAF-NOMA scheme at the gain of a decrease in processing complexity and system overhead. Numerical results also demonstrate that S-SBAF-NOMA networks achieve superior secrecy performance for lower values of target data rates and SNR of the illegal link.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"315 - 325"},"PeriodicalIF":1.8,"publicationDate":"2023-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135734358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using packet trimming at the edge for in-network video quality adaption 利用边缘数据包修剪实现网络内视频质量自适应
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-09-11 DOI: 10.1007/s12243-023-00981-8
Mustafa Tüker, Emre Karakış, Müge Sayıt, Stuart Clayman

This paper describes the effects of running in-network quality adaption by trimming the packets of layered video streams at the edge. The video stream is transmitted using the BPP transport protocol, which is like UDP, but has been designed to be both amenable to trimming and to provide low-latency and high reliability. The traffic adaption uses the Packet Wash process of Big Packet Protocol (BPP) on the transmitted Scalable Video Coding (SVC) video streams as they pass through a network function which is BPP-aware and embedded at the edge. Our previous work has either demonstrated the use of Software Defined Networking (SDN) controllers to implement Packet Wash directly, or the use of a network function in the core of the network to do the same task. This paper presents our effort to deploy and evaluate such a process at the edge, highlighting the packet trimming algorithm and showing the packet trimming effects on the streams. We compare the performance of transmitting video using BPP and the Packet Wash trimming, against alternative transmission schemes, namely UDP and HTTP adaptive streaming (HAS), presenting a number of quality parameters. The results demonstrate that providing traffic engineering using in-network quality adaption using packet trimming, provides high quality at the receiver.

本文介绍了通过在边缘修剪分层视频流的数据包来实现网络内质量自适应的效果。视频流使用 BPP 传输协议进行传输,该协议与 UDP 相似,但其设计既便于修剪,又能提供低延迟和高可靠性。当传输的可扩展视频编码(SVC)视频流通过一个具有 BPP 感知并嵌入边缘的网络功能时,流量自适应将使用大数据包协议(BPP)的数据包清洗过程。我们以前的工作要么展示了使用软件定义网络(SDN)控制器直接实现数据包清洗,要么展示了使用网络核心中的网络功能完成相同的任务。本文介绍了我们在边缘部署和评估此类流程的工作,重点介绍了数据包修剪算法,并展示了数据包修剪对数据流的影响。我们将使用 BPP 和数据包清洗修剪的视频传输性能与其他传输方案(即 UDP 和 HTTP 自适应流媒体 (HAS))进行了比较,并提供了一些质量参数。结果表明,使用数据包修剪进行网络内质量自适应的流量工程可为接收器提供高质量。
{"title":"Using packet trimming at the edge for in-network video quality adaption","authors":"Mustafa Tüker,&nbsp;Emre Karakış,&nbsp;Müge Sayıt,&nbsp;Stuart Clayman","doi":"10.1007/s12243-023-00981-8","DOIUrl":"10.1007/s12243-023-00981-8","url":null,"abstract":"<div><p>This paper describes the effects of running in-network quality adaption by trimming the packets of layered video streams at the edge. The video stream is transmitted using the BPP transport protocol, which is like UDP, but has been designed to be both amenable to trimming and to provide low-latency and high reliability. The traffic adaption uses the Packet Wash process of Big Packet Protocol (BPP) on the transmitted Scalable Video Coding (SVC) video streams as they pass through a network function which is BPP-aware and embedded at the edge. Our previous work has either demonstrated the use of Software Defined Networking (SDN) controllers to implement Packet Wash directly, or the use of a network function in the core of the network to do the same task. This paper presents our effort to deploy and evaluate such a process at the edge, highlighting the packet trimming algorithm and showing the packet trimming effects on the streams. We compare the performance of transmitting video using BPP and the Packet Wash trimming, against alternative transmission schemes, namely UDP and HTTP adaptive streaming (HAS), presenting a number of quality parameters. The results demonstrate that providing traffic engineering using in-network quality adaption using packet trimming, provides high quality at the receiver.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 3-4","pages":"197 - 210"},"PeriodicalIF":1.8,"publicationDate":"2023-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-00981-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135980414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two level data centric aggregation scheme for wireless sensor networks 无线传感器网络的两级数据中心聚合方案
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-09-08 DOI: 10.1007/s12243-023-00984-5
Tahira Batool, Atiq Ahmed, Dominique Gaiti

Wireless sensor networks (WSNs) sense and collect information from a desired phenomenon with the help of sensor nodes that have limited computational power, battery, and memory. Several data aggregation approaches are proposed to make the sensor networks energy-efficient, increasing the network’s lifetime by controlling data redundancy at aggregator nodes. Redundant data is suppressed before transmission to the sink. In this work, our aim is to enhance the network lifetime by efficiently utilizing the network’s energy through controlled data redundancy and minimizing data transmission to the sink. Data aggregation occurs in two steps: firstly, within clusters where the cluster-head serves as the aggregation point, and secondly, at a central point in the network where the gateway node acts as the aggregation point. Experiments demonstrate that our proposed approach yields better results compared to a benchmark clustering protocol in terms of network stability, the number of data packets transferred to the destination, energy dissipation of nodes, and overall network lifetime.

无线传感器网络(WSN)借助计算能力、电池和内存有限的传感器节点来感知和收集所需现象的信息。为了提高传感器网络的能效,人们提出了几种数据聚合方法,通过控制聚合节点的数据冗余来延长网络的寿命。冗余数据在传输到汇集器之前会被抑制。在这项工作中,我们的目标是通过控制数据冗余,有效利用网络能量,尽量减少向网络汇传输数据,从而提高网络寿命。数据聚合分两步进行:第一步是在簇内,由簇头作为聚合点;第二步是在网络中心点,由网关节点作为聚合点。实验证明,与基准聚类协议相比,我们提出的方法在网络稳定性、传输到目的地的数据包数量、节点能量消耗和整体网络寿命方面都取得了更好的效果。
{"title":"Two level data centric aggregation scheme for wireless sensor networks","authors":"Tahira Batool,&nbsp;Atiq Ahmed,&nbsp;Dominique Gaiti","doi":"10.1007/s12243-023-00984-5","DOIUrl":"10.1007/s12243-023-00984-5","url":null,"abstract":"<div><p>Wireless sensor networks (WSNs) sense and collect information from a desired phenomenon with the help of sensor nodes that have limited computational power, battery, and memory. Several data aggregation approaches are proposed to make the sensor networks energy-efficient, increasing the network’s lifetime by controlling data redundancy at aggregator nodes. Redundant data is suppressed before transmission to the sink. In this work, our aim is to enhance the network lifetime by efficiently utilizing the network’s energy through controlled data redundancy and minimizing data transmission to the sink. Data aggregation occurs in two steps: firstly, within clusters where the cluster-head serves as the aggregation point, and secondly, at a central point in the network where the gateway node acts as the aggregation point. Experiments demonstrate that our proposed approach yields better results compared to a benchmark clustering protocol in terms of network stability, the number of data packets transferred to the destination, energy dissipation of nodes, and overall network lifetime.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"289 - 299"},"PeriodicalIF":1.8,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88306389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On estimating the interest satisfaction ratio in IEEE 802.15.4-based named-data networks 关于估计基于 IEEE 802.15.4 命名数据网络中的兴趣满足率
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-09-06 DOI: 10.1007/s12243-023-00983-6
Adel Salah Ould Khaoua, Abdelmadjid Boukra, Fella Bey

Named-Data Networking (NDN) over Low Power and Lossy Networks (LLNs), employing IEEE 802.15.4 communication technology, is projected to provide native support for mobility and efficient content delivery for the emerging Internet of Things (IoT). While many interest forwarding strategies have been proposed for NDNs over LLNs, most existing studies have relied on software simulations to evaluate their performance due to the lack of analytical modeling tools. This paper introduces the first analytical model for estimating the Interest Satisfaction Ratio (ISR) in NDN over LLNs, which is a crucial metric for assessing the effectiveness of interest forwarding strategies. We develop the analytical model specifically for the broadcast forwarding strategy, which has been extensively studied due to its simplicity and ease of implementation. Simulation results confirm that the proposed model predicts the ISR with reasonable accuracy. The model is then used to elucidate the strong interaction between the CSMA/CA parameters of the IEEE 802.15.4 standard and the achieved ISR.

采用 IEEE 802.15.4 通信技术的低功耗和有损网络(LLN)上的命名数据网络(NDN)预计将为新兴的物联网(IoT)提供移动性和高效内容交付的本地支持。虽然已经提出了许多通过 LLN 实现 NDN 的兴趣转发策略,但由于缺乏分析建模工具,大多数现有研究都依赖软件模拟来评估其性能。本文介绍了第一个用于估算 LLN 上 NDN 中兴趣满足率(ISR)的分析模型,这是评估兴趣转发策略有效性的一个重要指标。我们专门针对广播转发策略开发了该分析模型,广播转发策略因其简单和易于实施而被广泛研究。仿真结果证实,所提出的模型能合理准确地预测 ISR。然后,我们利用该模型阐明了 IEEE 802.15.4 标准的 CSMA/CA 参数与所实现的 ISR 之间的强烈相互作用。
{"title":"On estimating the interest satisfaction ratio in IEEE 802.15.4-based named-data networks","authors":"Adel Salah Ould Khaoua,&nbsp;Abdelmadjid Boukra,&nbsp;Fella Bey","doi":"10.1007/s12243-023-00983-6","DOIUrl":"10.1007/s12243-023-00983-6","url":null,"abstract":"<div><p>Named-Data Networking (NDN) over Low Power and Lossy Networks (LLNs), employing IEEE 802.15.4 communication technology, is projected to provide native support for mobility and efficient content delivery for the emerging Internet of Things (IoT). While many interest forwarding strategies have been proposed for NDNs over LLNs, most existing studies have relied on software simulations to evaluate their performance due to the lack of analytical modeling tools. This paper introduces the first analytical model for estimating the Interest Satisfaction Ratio (ISR) in NDN over LLNs, which is a crucial metric for assessing the effectiveness of interest forwarding strategies. We develop the analytical model specifically for the broadcast forwarding strategy, which has been extensively studied due to its simplicity and ease of implementation. Simulation results confirm that the proposed model predicts the ISR with reasonable accuracy. The model is then used to elucidate the strong interaction between the CSMA/CA parameters of the IEEE 802.15.4 standard and the achieved ISR.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 1-2","pages":"111 - 130"},"PeriodicalIF":1.8,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85790219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Annals of Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1