Pub Date : 2023-08-01DOI: 10.23919/JCN.2023.100029
{"title":"Information for authors","authors":"","doi":"10.23919/JCN.2023.100029","DOIUrl":"https://doi.org/10.23919/JCN.2023.100029","url":null,"abstract":"","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5449605/10251734/10251738.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49941924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.23919/JCN.2023.100030
{"title":"Open access publishing agreement","authors":"","doi":"10.23919/JCN.2023.100030","DOIUrl":"https://doi.org/10.23919/JCN.2023.100030","url":null,"abstract":"","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5449605/10251734/10251740.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49941922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-01DOI: 10.23919/JCN.2023.000029
Zequn Jia;Qiang Liu;Ying He;Qianqian Wu;Ren Ping Liu;Yantao Sun
Data centers play an essential role in the functioning of modern society. However, failures are unavoidable in data center networks (DCN) and will lead to negative impact on all applications. Therefore, researchers are interested in the rapid detection and localization of failures in DCNs. In this paper, we present a theoretical model to analyze the end-to-end failure detection methods in data center networks. Our numerical results verify that the proposed theoretical model is accurate. In addition, we propose an algorithm to construct probing matrices based on an enhanced probing path selection indicator. We also introduce deep reinforcement learning (DRL) method to solve the problem and propose a DRL-based probing matrix construction algorithm. Our experimental results show that both of the proposed algorithms for constructing probing matrices achieve better performance in detection accuracy than existing methods. We discussed different scenarios that the algorithms are applicable to that can improve detection accuracy or construction speed performance.
{"title":"Efficient end-to-end failure probing matrix construction in data center networks","authors":"Zequn Jia;Qiang Liu;Ying He;Qianqian Wu;Ren Ping Liu;Yantao Sun","doi":"10.23919/JCN.2023.000029","DOIUrl":"https://doi.org/10.23919/JCN.2023.000029","url":null,"abstract":"Data centers play an essential role in the functioning of modern society. However, failures are unavoidable in data center networks (DCN) and will lead to negative impact on all applications. Therefore, researchers are interested in the rapid detection and localization of failures in DCNs. In this paper, we present a theoretical model to analyze the end-to-end failure detection methods in data center networks. Our numerical results verify that the proposed theoretical model is accurate. In addition, we propose an algorithm to construct probing matrices based on an enhanced probing path selection indicator. We also introduce deep reinforcement learning (DRL) method to solve the problem and propose a DRL-based probing matrix construction algorithm. Our experimental results show that both of the proposed algorithms for constructing probing matrices achieve better performance in detection accuracy than existing methods. We discussed different scenarios that the algorithms are applicable to that can improve detection accuracy or construction speed performance.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5449605/10251734/10251737.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49941877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-21DOI: 10.23919/JCN.2022.000041
Byungju Lim;Ju-Hyung Lee;Jae-Hong Kwon;Ki-Hun Kim;Jong-Man Lee;Hyun Park;Young-Seok Ha;Young-Jin Han;Young-Chai Ko
Integrated access and backhaul (IAB) network is envisioned as a novel network architecture for increasing the network capacity and coverage. To facilitate the IAB network, the appropriate methods of wireless link association and resource management are required. In this paper, we investigate the joint optimization problem of association and resource allocation in terms of subchannel and power for IAB network. In particular, we handle the association and resource allocation problems for wireless backhaul and access links considering multi-hop backhauling. Since the optimization problem for IAB network is formulated as a mixed integer non-linear programming (MINLP), we divide it into three subproblems for association, subchannel allocation, and power allocation, respectively, and these subproblems are solved alternatively to obtain a local optimal solution. For the association problem, we adopt the Lagrangian duality approach to configure the backhaul and access links and successive convex approximation (SCA) approach is used to solve the subchannel and power allocation problems efficiently. Simulation results demonstrate that the proposed algorithm achieves better performance than single-hop (SH) backhauling based network and enhances the capacity and coverage by configuring the multi-hop (MH) backhauling.
{"title":"Joint association and resource allocation for multi-hop integrated access and backhaul (IAB) network","authors":"Byungju Lim;Ju-Hyung Lee;Jae-Hong Kwon;Ki-Hun Kim;Jong-Man Lee;Hyun Park;Young-Seok Ha;Young-Jin Han;Young-Chai Ko","doi":"10.23919/JCN.2022.000041","DOIUrl":"https://doi.org/10.23919/JCN.2022.000041","url":null,"abstract":"Integrated access and backhaul (IAB) network is envisioned as a novel network architecture for increasing the network capacity and coverage. To facilitate the IAB network, the appropriate methods of wireless link association and resource management are required. In this paper, we investigate the joint optimization problem of association and resource allocation in terms of subchannel and power for IAB network. In particular, we handle the association and resource allocation problems for wireless backhaul and access links considering multi-hop backhauling. Since the optimization problem for IAB network is formulated as a mixed integer non-linear programming (MINLP), we divide it into three subproblems for association, subchannel allocation, and power allocation, respectively, and these subproblems are solved alternatively to obtain a local optimal solution. For the association problem, we adopt the Lagrangian duality approach to configure the backhaul and access links and successive convex approximation (SCA) approach is used to solve the subchannel and power allocation problems efficiently. Simulation results demonstrate that the proposed algorithm achieves better performance than single-hop (SH) backhauling based network and enhances the capacity and coverage by configuring the multi-hop (MH) backhauling.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5449605/10251734/10190213.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49941936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-21DOI: 10.23919/JCN.2023.000025
Faranaksadat Solat;Tae Yeon Kim;Joohyung Lee
This study developed a novel group management scheme based on clustered federated learning (FL) for mobile traffic prediction (referred to as FedGM) in mobile edge computing (MEC) systems. In FedGM, to improve the convergence time during the FL procedure, we considered multiple MEC servers to first be clustered based on their geographic locations and augmented data patterns as references for clustering. In each cluster, by alleviating the straggler impact owing to the heterogeneity of MEC servers, we then designed a group management scheme that optimizes i) the number of groups to be created and ii) the group association of the MEC servers by minimizing their average idle time and group creation cost. For this purpose, we rigorously formulated analytical models for the computation time for local training and estimated the average idle time by applying different frequencies of local training over the MEC servers. The optimization problem was designed using a non-convex problem, and thus a genetic-based heuristic approach was devised for determining a suboptimal solution. By reducing the average idle time, thereby increasing the workload of the MEC servers, the experimental results for two real-world mobile traffic datasets show that FedGM surpasses previous state-of-the-art methods in terms of convergence speed with an acceptable accuracy loss.
{"title":"A novel group management scheme of clustered federated learning for mobile traffic prediction in mobile edge computing systems","authors":"Faranaksadat Solat;Tae Yeon Kim;Joohyung Lee","doi":"10.23919/JCN.2023.000025","DOIUrl":"https://doi.org/10.23919/JCN.2023.000025","url":null,"abstract":"This study developed a novel group management scheme based on clustered federated learning (FL) for mobile traffic prediction (referred to as FedGM) in mobile edge computing (MEC) systems. In FedGM, to improve the convergence time during the FL procedure, we considered multiple MEC servers to first be clustered based on their geographic locations and augmented data patterns as references for clustering. In each cluster, by alleviating the straggler impact owing to the heterogeneity of MEC servers, we then designed a group management scheme that optimizes i) the number of groups to be created and ii) the group association of the MEC servers by minimizing their average idle time and group creation cost. For this purpose, we rigorously formulated analytical models for the computation time for local training and estimated the average idle time by applying different frequencies of local training over the MEC servers. The optimization problem was designed using a non-convex problem, and thus a genetic-based heuristic approach was devised for determining a suboptimal solution. By reducing the average idle time, thereby increasing the workload of the MEC servers, the experimental results for two real-world mobile traffic datasets show that FedGM surpasses previous state-of-the-art methods in terms of convergence speed with an acceptable accuracy loss.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5449605/10251734/10190215.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49941933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-08DOI: 10.23919/JCN.2023.000023
Shih-Hsiung Lee;Jue-Zhi Liu
In the development of the intelligent Internet of things, edge computing plays a key role. Not only that it has the characteristics of a quick response, but it can also effectively reduce the burden of cloud computing. In addition, it can also extend the application of network edge through the coexistence and collaboration with the cloud system. However, with a large number of edge devices being deployed, the previous remote device management system will face the challenges of resource constraints and software firmware compatibility. In addition, implementing remote fault management, configuration management, accounting management, performance management, and security management through edge device management is a key task. Therefore, this study has designed and implemented a trusted edge device management system based on a microservice and a plug-and-play hardware management device. The running state of the edge device, the functions of remote device control, and system restart are monitored remotely by in- and out-of-band management modes. In addition, in terms of data transmission security, the design concept of a trusted platform module is introduced to realize data encryption and authentication, and ensure security and reliability. In this paper, the operational feasibility of management services based on containerized microservice in edge devices is verified with system benchmarking tools without affecting system performance. According to the experimental results, the proposed architecture in this study can be effective in edge device management.
{"title":"A pluggable module for enabling a trusted edge device management system based on microservice","authors":"Shih-Hsiung Lee;Jue-Zhi Liu","doi":"10.23919/JCN.2023.000023","DOIUrl":"https://doi.org/10.23919/JCN.2023.000023","url":null,"abstract":"In the development of the intelligent Internet of things, edge computing plays a key role. Not only that it has the characteristics of a quick response, but it can also effectively reduce the burden of cloud computing. In addition, it can also extend the application of network edge through the coexistence and collaboration with the cloud system. However, with a large number of edge devices being deployed, the previous remote device management system will face the challenges of resource constraints and software firmware compatibility. In addition, implementing remote fault management, configuration management, accounting management, performance management, and security management through edge device management is a key task. Therefore, this study has designed and implemented a trusted edge device management system based on a microservice and a plug-and-play hardware management device. The running state of the edge device, the functions of remote device control, and system restart are monitored remotely by in- and out-of-band management modes. In addition, in terms of data transmission security, the design concept of a trusted platform module is introduced to realize data encryption and authentication, and ensure security and reliability. In this paper, the operational feasibility of management services based on containerized microservice in edge devices is verified with system benchmarking tools without affecting system performance. According to the experimental results, the proposed architecture in this study can be effective in edge device management.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5449605/10190217/10146579.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49950802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.23919/JCN.2023.100023
{"title":"Information for authors","authors":"","doi":"10.23919/JCN.2023.100023","DOIUrl":"https://doi.org/10.23919/JCN.2023.100023","url":null,"abstract":"","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5449605/10190217/10190219.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49950805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.23919/JCN.2023.000030
Shalitha Wijethilaka;Madhusanka Liyanage
The traditional paradigm of connecting mobile devices over the telecommunication networks for voice communication has evolved to a myriad of novel applications with heterogeneous network requirements. The conventional telecommunication networks require a radical change to support these applications. Network slicing (NS) is one of the utilitarian technologies in future telecommunication networks to address this challenge by dividing the physical network into multiple logical networks with different network characteristics. The evolution in the applications and telecommunication networks intensifies the attention towards the security aspects. Since NS architecture is at its preliminary level, there is no security-specific element in the slicing architecture to perform security-related operations. Hence, we introduce the novel concept of security orchestrator for the NS architecture. This paper extensively discusses the expected advantages and design aspects of such a separate security orchestrator for an NS ecosystem. Moreover, the viability and the benefits of employing the proposed security orchestrator are demonstrated via a testbed implementation and relevant simulations. Finally, a set of potential future research directions related to the security orchestrator are introduced to further improve the proposed architecture's performance.
{"title":"The role of security orchestrator in network slicing for future networks","authors":"Shalitha Wijethilaka;Madhusanka Liyanage","doi":"10.23919/JCN.2023.000030","DOIUrl":"10.23919/JCN.2023.000030","url":null,"abstract":"The traditional paradigm of connecting mobile devices over the telecommunication networks for voice communication has evolved to a myriad of novel applications with heterogeneous network requirements. The conventional telecommunication networks require a radical change to support these applications. Network slicing (NS) is one of the utilitarian technologies in future telecommunication networks to address this challenge by dividing the physical network into multiple logical networks with different network characteristics. The evolution in the applications and telecommunication networks intensifies the attention towards the security aspects. Since NS architecture is at its preliminary level, there is no security-specific element in the slicing architecture to perform security-related operations. Hence, we introduce the novel concept of security orchestrator for the NS architecture. This paper extensively discusses the expected advantages and design aspects of such a separate security orchestrator for an NS ecosystem. Moreover, the viability and the benefits of employing the proposed security orchestrator are demonstrated via a testbed implementation and relevant simulations. Finally, a set of potential future research directions related to the security orchestrator are introduced to further improve the proposed architecture's performance.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5449605/10190217/10190218.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45583339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.23919/JCN.2023.100024
{"title":"Open access publishing agreement","authors":"","doi":"10.23919/JCN.2023.100024","DOIUrl":"https://doi.org/10.23919/JCN.2023.100024","url":null,"abstract":"","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5449605/10190217/10190221.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49950807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we investigate the Internet of bionano things (IoBNT) which pertains to networks formed by molecular communications. By providing a means of communication through the ubiquitously connected blood vessels (arteries, veins, and capillaries), molecular communication-based IoBNT enables a host of new eHealth applications. For example, an organ monitoring sensor can transfer internal body signals through the IoBNT to health-monitoring applications. We empirically show that blood vessel channels introduce a new set of challenges in the design of molecular communication systems in comparison to free-space channels. Then, we propose cylindrical duct channel models and discuss the corresponding system designs conforming to the channel characteristics. Furthermore, based on prototype implementations, we confirm that molecular communication techniques can be utilized for composing the IoBNT. We believe that the promising results presented in this work, together with the rich research challenges that lie ahead, are strong indicators that IoBNT with molecular communications can drive novel applications for emerging eHealth systems.
{"title":"The Internet of bio-nano things in blood vessels: System design and prototypes","authors":"Changmin Lee;Bon-Hong Koo;Chan-Byoung Chae;Robert Schober","doi":"10.23919/JCN.2023.000001","DOIUrl":"https://doi.org/10.23919/JCN.2023.000001","url":null,"abstract":"In this paper, we investigate the Internet of bionano things (IoBNT) which pertains to networks formed by molecular communications. By providing a means of communication through the ubiquitously connected blood vessels (arteries, veins, and capillaries), molecular communication-based IoBNT enables a host of new eHealth applications. For example, an organ monitoring sensor can transfer internal body signals through the IoBNT to health-monitoring applications. We empirically show that blood vessel channels introduce a new set of challenges in the design of molecular communication systems in comparison to free-space channels. Then, we propose cylindrical duct channel models and discuss the corresponding system designs conforming to the channel characteristics. Furthermore, based on prototype implementations, we confirm that molecular communication techniques can be utilized for composing the IoBNT. We believe that the promising results presented in this work, together with the rich research challenges that lie ahead, are strong indicators that IoBNT with molecular communications can drive novel applications for emerging eHealth systems.","PeriodicalId":54864,"journal":{"name":"Journal of Communications and Networks","volume":null,"pages":null},"PeriodicalIF":3.6,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/5449605/10127634/10102779.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49948842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}