Next Issue
Volume 1, December
Previous Issue
Volume 1, June
 
 

Network, Volume 1, Issue 2 (September 2021) – 9 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Select all
Export citation of selected articles as:
18 pages, 8061 KiB  
Article
Valid Statements by the Crowd: Statistical Measures for Precision in Crowdsourced Mobile Measurements
by Florian Wamser, Anika Seufert, Andrew Hall, Stefan Wunderer and Tobias Hoßfeld
Network 2021, 1(2), 215-232; https://doi.org/10.3390/network1020013 - 13 Sep 2021
Cited by 2 | Viewed by 3242
Abstract
Crowdsourced network measurements (CNMs) are becoming increasingly popular as they assess the performance of a mobile network from the end user’s perspective on a large scale. Here, network measurements are performed directly on the end-users’ devices, thus taking advantage of the real-world conditions [...] Read more.
Crowdsourced network measurements (CNMs) are becoming increasingly popular as they assess the performance of a mobile network from the end user’s perspective on a large scale. Here, network measurements are performed directly on the end-users’ devices, thus taking advantage of the real-world conditions end-users encounter. However, this type of uncontrolled measurement raises questions about its validity and reliability. The problem lies in the nature of this type of data collection. In CNMs, mobile network subscribers are involved to a large extent in the measurement process, and collect data themselves for the operator. The collection of data on user devices in arbitrary locations and at uncontrolled times requires means to ensure validity and reliability. To address this issue, our paper defines concepts and guidelines for analyzing the precision of CNMs; specifically, the number of measurements required to make valid statements. In addition to the formal definition of the aspect, we illustrate the problem and use an extensive sample data set to show possible assessment approaches. This data set consists of more than 20.4 million crowdsourced mobile measurements from across France, measured by a commercial data provider. Full article
Show Figures

Figure 1

24 pages, 1266 KiB  
Article
Mobility- and Energy-Aware Cooperative Edge Offloading for Dependent Computation Tasks
by Mahshid Mehrabi, Shiwei Shen, Yilun Hai, Vincent Latzko, George P. Koudouridis, Xavier Gelabert, Martin Reisslein and Frank H. P. Fitzek
Network 2021, 1(2), 191-214; https://doi.org/10.3390/network1020012 - 4 Sep 2021
Cited by 16 | Viewed by 4459
Abstract
Cooperative edge offloading to nearby end devices via Device-to-Device (D2D) links in edge networks with sliced computing resources has mainly been studied for end devices (helper nodes) that are stationary (or follow predetermined mobility paths) and for independent computation tasks. However, end devices [...] Read more.
Cooperative edge offloading to nearby end devices via Device-to-Device (D2D) links in edge networks with sliced computing resources has mainly been studied for end devices (helper nodes) that are stationary (or follow predetermined mobility paths) and for independent computation tasks. However, end devices are often mobile, and a given application request commonly requires a set of dependent computation tasks. We formulate a novel model for the cooperative edge offloading of dependent computation tasks to mobile helper nodes. We model the task dependencies with a general task dependency graph. Our model employs the state-of-the-art deep-learning-based PECNet mobility model and offloads a task only when the sojourn time in the coverage area of a helper node or Multi-access Edge Computing (MEC) server is sufficiently long. We formulate the minimization problem for the consumed battery energy for task execution, task data transmission, and waiting for offloaded task results on end devices. We convert the resulting non-convex mixed integer nonlinear programming problem into an equivalent quadratically constrained quadratic programming (QCQP) problem, which we solve via a novel Energy-Efficient Task Offloading (EETO) algorithm. The numerical evaluations indicate that the EETO approach consistently reduces the battery energy consumption across a wide range of task complexities and task completion deadlines and can thus extend the battery lifetimes of mobile devices operating with sliced edge computing resources. Full article
(This article belongs to the Special Issue Network Slicing)
Show Figures

Figure 1

26 pages, 3611 KiB  
Article
QoE Modeling on Split Features with Distributed Deep Learning
by Selim Ickin, Markus Fiedler and Konstantinos Vandikas
Network 2021, 1(2), 165-190; https://doi.org/10.3390/network1020011 - 28 Aug 2021
Cited by 6 | Viewed by 3654
Abstract
The development of Quality of Experience (QoE) models using Machine Learning (ML) is challenging, since it can be difficult to share datasets between research entities to protect the intellectual property of the ML model and the confidentiality of user studies in compliance with [...] Read more.
The development of Quality of Experience (QoE) models using Machine Learning (ML) is challenging, since it can be difficult to share datasets between research entities to protect the intellectual property of the ML model and the confidentiality of user studies in compliance with data protection regulations such as General Data Protection Regulation (GDPR). This makes distributed machine learning techniques that do not necessitate sharing of data or attribute names appealing. One suitable use case in the scope of QoE can be the task of mapping QoE indicators for the perception of quality such as Mean Opinion Scores (MOS), in a distributed manner. In this article, we present Distributed Ensemble Learning (DEL), and Vertical Federated Learning (vFL) to address this context. Both approaches can be applied to datasets that have different feature sets, i.e., split features. The DEL approach is ML model-agnostic and achieves up to 12% accuracy improvement of ensembling various generic and specific models. The vFL approach is based on neural networks and achieves on-par accuracy with a conventional Fully Centralized machine learning model, while exhibiting statistically significant performance that is superior to that of the Isolated local models with an average accuracy improvement of 26%. Moreover, energy-efficient vFL with reduced network footprint and training time is obtained by further tuning the model hyper-parameters. Full article
Show Figures

Figure 1

19 pages, 1188 KiB  
Review
Wireless Caching: Making Radio Access Networks More than Bit-Pipelines
by Wei Chen and H. Vincent Poor
Network 2021, 1(2), 146-164; https://doi.org/10.3390/network1020010 - 16 Aug 2021
Cited by 1 | Viewed by 3239
Abstract
Caching has attracted much attention recently because it holds the promise of scaling the service capability of radio access networks (RANs). We envision that caching will ultimately make next-generation RANs more than bit-pipelines and emerge as a multi-disciplinary area via the union with [...] Read more.
Caching has attracted much attention recently because it holds the promise of scaling the service capability of radio access networks (RANs). We envision that caching will ultimately make next-generation RANs more than bit-pipelines and emerge as a multi-disciplinary area via the union with communications, pricing, recommendation, compression, and computation units. By summarizing cutting-edge caching policies, we trace a common root of their gains to the prolonged transmission time, which is then traded for higher spectral or energy efficiency. To realize caching, the physical layer and higher layers have to function together, with the aid of prediction and memory units, which substantially broadens the concept of cross-layer design to a multi-unit collaboration methodology. We revisit caching from a generalized cross-layer perspective, with a focus on its emerging opportunities, challenges, and theoretical performance limits. To motivate the application and evolution of caching, we conceive a hierarchical pricing infrastructure that provides incentives to network operators and users. To make RANs even more proactive, we design caching and recommendation jointly, showing a user what it might be interested in and what has been done for it. Furthermore, the user-specific demand prediction motivates edge compression and proactive MEC as new applications. The beyond-bit-pipeline RAN is a paradigm shift that brings with it many cross-disciplinary research opportunities. Full article
Show Figures

Figure 1

14 pages, 1641 KiB  
Article
Communication Network Standards for Smart Grid Infrastructures
by Konstantinos Demertzis, Konstantinos Tsiknas, Dimitrios Taketzis, Dimitrios N. Skoutas, Charalabos Skianis, Lazaros Iliadis and Kyriakos E. Zoiros
Network 2021, 1(2), 132-145; https://doi.org/10.3390/network1020009 - 3 Aug 2021
Cited by 18 | Viewed by 7776
Abstract
Upgrading the existing energy infrastructure to a smart grid necessarily goes through the provision of integrated technological solutions that ensure the interoperability of business processes and reduce the risk of devaluation of systems already in use. Considering the heterogeneity of the current infrastructures, [...] Read more.
Upgrading the existing energy infrastructure to a smart grid necessarily goes through the provision of integrated technological solutions that ensure the interoperability of business processes and reduce the risk of devaluation of systems already in use. Considering the heterogeneity of the current infrastructures, and in order to keep pace with the dynamics of their operating environment, we should aim to the reduction of their architectural complexity and the addition of new and more efficient technologies and procedures. Furthermore, the integrated management of the overall ecosystem requires a collaborative integration strategy which should ensure the end-to-end interconnection under specific quality standards together with the establishment of strict security policies. In this respect, every design detail can be critical to the success or failure of a costly and ambitious project, such as that of smart energy networks. This work presents and classifies the communication network standards that have been established for smart grids and should be taken into account in the process of planning and implementing new infrastructures. Full article
Show Figures

Figure 1

16 pages, 464 KiB  
Article
A Cognitive Anycast Routing Method for Delay-Tolerant Networks
by Ricardo Lent
Network 2021, 1(2), 116-131; https://doi.org/10.3390/network1020008 - 30 Jul 2021
Cited by 2 | Viewed by 2814
Abstract
A cognitive networking approach to the anycast routing problem for delay-tolerant networking (DTN) is proposed. The method is suitable for the space–ground and other domains where communications are recurrently challenged by diverse link impairments, including long propagation delays, communication asymmetry, and lengthy disruptions. [...] Read more.
A cognitive networking approach to the anycast routing problem for delay-tolerant networking (DTN) is proposed. The method is suitable for the space–ground and other domains where communications are recurrently challenged by diverse link impairments, including long propagation delays, communication asymmetry, and lengthy disruptions. The proposed method delivers data bundles achieving low delays by avoiding, whenever possible, link congestion and long wait times for contacts to become active, and without the need of duplicating data bundles. Network gateways use a spiking neural network (SNN) to decide the optimal outbound link for each bundle. The SNN is regularly updated to reflect the expected cost of the routing decisions, which helps to fine-tune future decisions. The method is decentralized and selects both the anycast group member to be used as the sink and the path to reach that node. A series of experiments were carried out on a network testbed to evaluate the method. The results demonstrate its performance advantage over unicast routing, as anycast routing is not yet supported by the current DTN standard (Contact Graph Routing). The proposed approach yields improved performance for space applications that require as-fast-as-possible data returns. Full article
Show Figures

Figure 1

21 pages, 3351 KiB  
Review
Can Blockchain Strengthen the Energy Internet?
by Charithri Yapa, Chamitha de Alwis and Madhusanka Liyanage
Network 2021, 1(2), 95-115; https://doi.org/10.3390/network1020007 - 26 Jul 2021
Cited by 12 | Viewed by 5304
Abstract
Emergence of the Energy Internet (EI) demands restructuring of traditional electricity grids to integrate heterogeneous energy sources, distribution network management with grid intelligence and big data management. This paradigm shift is considered to be a breakthrough in the energy industry towards facilitating autonomous [...] Read more.
Emergence of the Energy Internet (EI) demands restructuring of traditional electricity grids to integrate heterogeneous energy sources, distribution network management with grid intelligence and big data management. This paradigm shift is considered to be a breakthrough in the energy industry towards facilitating autonomous and decentralized grid operations while maximizing the utilization of Distributed Generation (DG). Blockchain has been identified as a disruptive technology enabler for the realization of EI to facilitate reliable, self-operated energy delivery. In this paper, we highlight six key directions towards utilizing blockchain capabilities to realize the envisaged EI. We elaborate the challenges in each direction and highlight the role of blockchain in addressing them. Furthermore, we summarize the future research directive in achieving fully autonomous and decentralized electricity distribution networks, which will be known as Energy Internet. Full article
Show Figures

Figure 1

20 pages, 645 KiB  
Article
DCSS Protocol for Data Caching and Sharing Security in a 5G Network
by Ed Kamya Kiyemba Edris, Mahdi Aiash and Jonathan Loo
Network 2021, 1(2), 75-94; https://doi.org/10.3390/network1020006 - 7 Jul 2021
Cited by 1 | Viewed by 3890
Abstract
Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to [...] Read more.
Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted. Full article
Show Figures

Figure 1

25 pages, 1561 KiB  
Article
Multi-Domain Communication Systems and Networks: A Tensor-Based Approach
by Divyanshu Pandey, Adithya Venugopal and Harry Leib
Network 2021, 1(2), 50-74; https://doi.org/10.3390/network1020005 - 7 Jul 2021
Cited by 4 | Viewed by 5427
Abstract
Most modern communication systems, such as those intended for deployment in IoT applications or 5G and beyond networks, utilize multiple domains for transmission and reception at the physical layer. Depending on the application, these domains can include space, time, frequency, users, code sequences, [...] Read more.
Most modern communication systems, such as those intended for deployment in IoT applications or 5G and beyond networks, utilize multiple domains for transmission and reception at the physical layer. Depending on the application, these domains can include space, time, frequency, users, code sequences, and transmission media, to name a few. As such, the design criteria of future communication systems must be cognizant of the opportunities and the challenges that exist in exploiting the multi-domain nature of the signals and systems involved for information transmission. Focussing on the Physical Layer, this paper presents a novel mathematical framework using tensors, to represent, design, and analyze multi-domain systems. Various domains can be integrated into the transceiver design scheme using tensors. Tools from multi-linear algebra can be used to develop simultaneous signal processing techniques across all the domains. In particular, we present tensor partial response signaling (TPRS) which allows the introduction of controlled interference within elements of a domain and also across domains. We develop the TPRS system using the tensor contracted convolution to generate a multi-domain signal with desired spectral and cross-spectral properties across domains. In addition, by studying the information theoretic properties of the multi-domain tensor channel, we present the trade-off between different domains that can be harnessed using this framework. Numerical examples for capacity and mean square error are presented to highlight the domain trade-off revealed by the tensor formulation. Furthermore, an application of the tensor framework to MIMO Generalized Frequency Division Multiplexing (GFDM) is also presented. Full article
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop