Featured Researches

Networking And Internet Architecture

Blind Optimal User Association in Small-Cell Networks

We learn optimal user association policies for traffic from different locations to Access Points(APs), in the presence of unknown dynamic traffic demand. We aim at minimizing a broad family of α -fair cost functions that express various objectives in load assignment in the wireless downlink, such as total load or total delay minimization. Finding an optimal user association policy in dynamic environments is challenging because traffic demand fluctuations over time are non-stationary and difficult to characterize statistically, which obstructs the computation of cost-efficient associations. Assuming arbitrary traffic patterns over time, we formulate the problem of online learning of optimal user association policies using the Online Convex Optimization (OCO) framework. We introduce a periodic benchmark for OCO problems that generalizes state-of-the-art benchmarks. We exploit inherent properties of the online user association problem and propose PerOnE, a simple online learning scheme that dynamically adapts the association policy to arbitrary traffic demand variations. We compare PerOnE against our periodic benchmark and prove that it enjoys the no-regret property, with additional sublinear dependence of the network size. To the best of our knowledge, this is the first work that introduces a periodic benchmark for OCO problems and a no-regret algorithm for the online user association problem. Our theoretical findings are validated through results on a real-trace dataset.

Read more
Networking And Internet Architecture

Blockchain-based Privacy Preservation for 5G-enabled Drone Communications

5G-enabled drones have potential applications in a variety of both military and civilian settings (e.g., monitoring and tracking of individuals in demonstrations and/or enforcing of social / physical distancing during pandemics such as COVID-19). Such applications generally involve the collection and dissemination of (massive) data from the drones to remote data centres for storage and analysis, for example via 5G networks. Consequently, there are security and privacy considerations underpinning 5G-enabled drone communications. We posit the potential of leveraging blockchain to facilitate privacy preservation, and therefore in this article we will review existing blockchain-based solutions after introducing the architecture for 5G-enabled drone communications and blockchain. We will also review existing legislation and data privacy regulations that need to be considered in the design of blockchain-based solutions, as well as identifying potential challenges and open issues which will hopefully inform future research agenda.

Read more
Networking And Internet Architecture

Blockchain-empowered Data-driven Networks: A Survey and Outlook

The paths leading to future networks are pointing towards a data-driven paradigm to better cater to the explosive growth of mobile services as well as the increasing heterogeneity of mobile devices, many of which generate and consume large volumes and variety of data. These paths are also hampered by significant challenges in terms of security, privacy, services provisioning, and network management. Blockchain, which is a technology for building distributed ledgers that provide an immutable log of transactions recorded in a distributed network, has become prominent recently as the underlying technology of cryptocurrencies and is revolutionizing data storage and processing in computer network systems. For future data-driven networks (DDNs), blockchain is considered as a promising solution to enable the secure storage, sharing, and analytics of data, privacy protection for users, robust, trustworthy network control, and decentralized routing and resource managements. However, many important challenges and open issues remain to be addressed before blockchain can be deployed widely to enable future DDNs. In this article, we present a survey on the existing research works on the application of blockchain technologies in computer networks, and identify challenges and potential solutions in the applications of blockchains in future DDNs. We identify application scenarios in which future blockchain-empowered DDNs could improve the efficiency and security, and generally the effectiveness of network services.

Read more
Networking And Internet Architecture

Boosting performance for software defined networks from traffic engineering perspective

Paths selection algorithms and rate adaptation objective functions are usually studied separately. In contrast, this paper evaluates some traffic engineering (TE) systems for software defined networking obtained by combining path selection techniques with average delay and load balancing, the two most popular TE objective functions. Based on TE simulation results, the best TE system suitable for software defined networks is a system where the paths are calculated using an oblivious routing model and its adaptation rate calculated using an average delay objective function. Thus, we propose the RACKE+AD system combining path sets computed using Racke's oblivious routing and traffic splitting objective function using average delay. This model outperforms current state-of-the-art models, maximizes throughput, achieves better network resource utilization, and minimizes delay. The proposed system outperformed SMORE and SWAN by 4.2% and 9.6% respectively, achieving 27% better utilization and delivering 34% more traffic with 50% less latency compared with both systems on a GEANT network.

Read more
Networking And Internet Architecture

Browselite: A Private Data Saving Solution for the Web

The median webpage has increased in size by more than 80% in the last 4 years. This extra complexity allows for a rich browsing experience, but it hurts the majority of mobile users which still pay for their traffic. This has motivated several data-saving solutions, which aim at reducing the complexity of webpages by transforming their content. Despite each method being unique, they either reduce user privacy by further centralizing web traffic through data-saving middleboxes or introduce web compatibility (Webcompat) issues by removing content that breaks pages in unpredictable ways. In this paper, we argue that data-saving is still possible without impacting either users privacy or Webcompat. Our main observation is that Web images make up a large portion of Web traffic and have negligible impact on Webcompat. To this end we make two main contributions. First, we quantify the potential savings that image manipulation, such as dimension resizing, quality compression, and transcoding, enables at large scale: 300 landing and 880 internal pages. Next, we design and build Browselite, an entirely client-side tool that achieves such data savings through opportunistically instrumenting existing server-side tooling to perform image compression, while simultaneously reducing the total amount of image data fetched. The effect of Browselite on the user experience is quantified using standard page load metrics and a real user study of over 200 users across 50 optimized web pages. Browselite allows for similar savings to middlebox approaches, while offering additional security, privacy, and Webcompat guarantees.

Read more
Networking And Internet Architecture

Byzantine-Fault-Tolerant Consensus via Reinforcement Learning for Permissioned Blockchain Implemented in a V2X Network

Blockchain has been forming the central piece of various types of vehicle-to-everything (V2X) network for trusted data exchange. Recently, permissioned blockchains garner particular attention thanks to their improved scalability and diverse needs from different organizations. One representative example of permissioned blockchain is Hyperledger Fabric ("Fabric"). Due to its unique execute-order procedure, there is a critical need for a client to select an optimal number of peers. The interesting problem that this paper targets to address is the tradeoff in the number of peers: a too large number will degrade scalability while a too small number will make the network vulnerable to faulty nodes. This optimization issue gets especially challenging in V2X networks due to mobility of nodes: a transaction must be executed and the associated block must be committed before the vehicle leaves a network. To this end, this paper proposes an optimal peers selection mechanism based on reinforcement learning (RL) to keep a Fabric-empowered V2X network impervious to dynamicity due to mobility. We model the RL as a contextual multi-armed bandit (MAB) problem. The results demonstrate the outperformance of the proposed scheme.

Read more
Networking And Internet Architecture

CFLMEC: Cooperative Federated Learning for Mobile Edge Computing

We investigate a cooperative federated learning framework among devices for mobile edge computing, named CFLMEC, where devices co-exist in a shared spectrum with interference. Keeping in view the time-average network throughput of cooperative federated learning framework and spectrum scarcity, we focus on maximize the admission data to the edge server or the near devices, which fills the gap of communication resource allocation for devices with federated learning. In CFLMEC, devices can transmit local models to the corresponding devices or the edge server in a relay race manner, and we use a decomposition approach to solve the resource optimization problem by considering maximum data rate on sub-channel, channel reuse and wireless resource allocation in which establishes a primal-dual learning framework and batch gradient decent to learn the dynamic network with outdated information and predict the sub-channel condition. With aim at maximizing throughput of devices, we propose communication resource allocation algorithms with and without sufficient sub-channels for strong reliance on edge servers (SRs) in cellular link, and interference aware communication resource allocation algorithm for less reliance on edge servers (LRs) in D2D link. Extensive simulation results demonstrate the CFLMEC can achieve the highest throughput of local devices comparing with existing works, meanwhile limiting the number of the sub-channels.

Read more
Networking And Internet Architecture

CMIP: Clone Mobile-agent Itinerary Planning Approach for Enhancing Event-to-Sink Throughput in Wireless Sensor Networks

In order to mitigate the problem of data congestion, increased latency, and high energy consumption in Wireless Sensor Networks (WSNs), Mobile Agent (MA) has been proven to be a viable alternative to the traditional client-server data gathering model. MA has the ability to migrate among network nodes based on an assigned itinerary, which can be formed via Single Itinerary Planning (SIP) or Multiple Itinerary Planning (MIP). MIP-based data gathering approach solves problems associated with SIP in terms of task duration, energy consumption, and reliability. However, the majority of existing MIP approaches focus only on reducing energy consumption and task duration, while the Event-to-sink throughput has not been considered. In this paper, a Clone Mobile-agent Itinerary Planning approach (CMIP) is proposed to reduce task duration while improving the Event-to-sink throughput in real-time applications, especially when the MA is assigned to visit a large number of source nodes. Simulation results show that the CMIP approach outperforms both Central Location-based MIP (CL-MIP) and Greatest Information in Greatest Memory-based MIP (GIGM-MIP) in terms of reducing task duration by about 56% and 16%, respectively. Furthermore, CMIP improves the Event-to-sink throughput by about 93% and 22% as compared to both CL-MIP and GIGM-MIP approaches, respectively.

Read more
Networking And Internet Architecture

COMONet: Community Mobile Network

The density of mobile phones has increased rapidly in recent years. One drawback of the current mobile telephone technology is that it forces all the calls to go through cellular base stations even if the caller and the callee are within the radio range of each other. Hybrid cellular networks and Unlicensed Mobile Access (UMA) have been proposed as solutions that enable mobile phone users to bypass cellular base stations. However, these technologies either require special hardware or in some cases have to rely on the service providers. We identified that most of the Commodity-off-the-Shelf mobile phones are Wi-Fi (and Bluetooth) enabled. We propose a Community Mobile Network (COMONet) which utilizes Wi-Fi (and Bluetooth) to build ad hoc network among mobile phone users to bypass GSM base stations whenever possible. COMONet does not depend on special noncommodity hardware and it is a software based solution. COMONet monitors all the available paths over the ad hoc network and it transparently switches to the regular path over the service provider's GSM base station if a path is not available over the ad hoc network. In COMONet the caller and the callee do not have to be within the Wi-Fi or Bluetooth range of each other to make a call since the COMONet is capable of routing calls through the other mobile nodes that are participating in the COMONet.

Read more
Networking And Internet Architecture

CONVERGE -- Future IRS-Infrastructures as Open Service Networks

In the past years there has been significant progress in Intelligent Transport Systems in the domains of traffic management, driver assistance and driver information. Within the German research project COmmunication Network VEhicle Road Global Extension (CONVERGE), a system architecture for the flexible interaction between different service providers and communication network operators will be designed and implemented, called Car2X Systems Network architecture. The Car2X Systems Network will establish a completely new open communication-, services-, and organization architecture that reflects state of the art communication technologies and IT security. Through well-defined access methods, service providers like traffic control centers or vehicle manufacturers can be integrated into the open and secure system network. The ultimate goal is the decentralized and dynamic coupling of all systems and actors across national and organizational borders. This paper is focusing on the requirements and the concept of a service-oriented architecture for publishing and finding services inside the system with intelligent information distribution based on geographical and organizational conditions.

Read more

Ready to get started?

Join us today