-
Evaluation of a Multi-Molecule Molecular Communication Testbed Based on Spectral Sensing
Authors:
Alexander Wietfeld,
Sebastian Schmidt,
Wolfgang Kellerer
Abstract:
This work presents a novel flow-based molecular communication (MC) testbed using spectral sensing and ink concentration estimation to enable real-time multi-molecule (MUMO) transmission. MUMO communication opens up crucial opportunities for increased throughput as well as implementing more complex coding, modulation, and resource allocation strategies for MC testbeds. A concentration estimator usi…
▽ More
This work presents a novel flow-based molecular communication (MC) testbed using spectral sensing and ink concentration estimation to enable real-time multi-molecule (MUMO) transmission. MUMO communication opens up crucial opportunities for increased throughput as well as implementing more complex coding, modulation, and resource allocation strategies for MC testbeds. A concentration estimator using non-invasive spectral sensing at the receiver is proposed based on a simple absorption model. We conduct in-depth channel impulse response (CIR) measurements and a preliminary communication performance evaluation. Additionally, a simple analytical model is used to check the consistency of the CIRs. The results indicate that by utilizing MUMO transmission, on-off-keying, and a simple difference detector, the testbed can achieve up to 3 bits per second for near-error-free communication, which is on par with comparable testbeds that utilize more sophisticated coding or detection methods. Our platform lays the ground for implementing MUMO communication and evaluating various physical layer and networking techniques based on multiple molecule types in future MC testbeds in real time.
△ Less
Submitted 16 May, 2024;
originally announced May 2024.
-
OpenAirLink: Reproducible Wireless Channel Emulation using Software Defined Radios
Authors:
Yash Deshpande,
Xianglong Wang,
Wolfgang Kellerer
Abstract:
This paper presents OpenAirLink(OAL), an open-source channel emulator for reproducible testing of wireless scenarios. OAL is implemented on off-the-shelf software-defined radios (SDR) and presents a smaller-scale alternative to expensive commercially available channel emulators. Path loss and propagation delay are the fundamental aspects of emulating a wireless channel. OAL provides a simple metho…
▽ More
This paper presents OpenAirLink(OAL), an open-source channel emulator for reproducible testing of wireless scenarios. OAL is implemented on off-the-shelf software-defined radios (SDR) and presents a smaller-scale alternative to expensive commercially available channel emulators. Path loss and propagation delay are the fundamental aspects of emulating a wireless channel. OAL provides a simple method to change these aspects in real-time. The emulator is implemented using a finite impulse response (FIR) filter. The FIR filter is written in Verilog and flashed on the SDRs Field Programmable Gate Array (FPGA). Most processing transpires on the FPGA, so OAL does not require high-performance computing hardware and SDRs. We validate the performance of OAL and demonstrate the utility of such a channel emulation tool using two examples. We believe that open-source channel emulators such as OAL can make reproducible wireless experiments accessible to many researchers in the scientific community.
△ Less
Submitted 15 April, 2024;
originally announced April 2024.
-
Evaluation and Optimization of Positional Accuracy for Maritime Positioning Systems
Authors:
Atilla Alpay Nalcaci,
Fidan Mehmeti,
Wolfgang Kellerer,
Florian Schiegg
Abstract:
Navigation and trajectorial estimation of maritime vessels are contingent upon the context of positional accuracy. Even the smallest deviations in the estimation of a given vessel may result in detrimental consequences in terms of economic and ecologic quotients. To ensure an agile and precise environment for maritime vessel positional estimation, preexisting marine radar technologies can be utili…
▽ More
Navigation and trajectorial estimation of maritime vessels are contingent upon the context of positional accuracy. Even the smallest deviations in the estimation of a given vessel may result in detrimental consequences in terms of economic and ecologic quotients. To ensure an agile and precise environment for maritime vessel positional estimation, preexisting marine radar technologies can be utilized in a way that ensures a higher level of precision compared to GNSS-based identification and positioning. In this paper, we present a positional optimization for radarbased vessel navigation systems that utilize the installment of vessel detection sensors. The main objective of this research is to employ as fewer sensors as possible while preserving the attainable error threshold for positioning that is defined by International Maritime Organization (IMO). Our approach leads most of the time to a positioning error of up to 5 m along shorelines and rivers and up to 50 m along open coastal regions.
△ Less
Submitted 6 April, 2024;
originally announced April 2024.
-
Enabling Communication and Control Co-Design in 6G Networks
Authors:
Onur Ayan,
Nikolaos Pappas,
Miguel Angel Gutierrez Estevez,
Xueli An,
Wolfgang Kellerer
Abstract:
Networked control systems (NCSs), which are feedback control loops closed over a communication network, have been a popular research topic over the past decades. Numerous works in the literature propose novel algorithms and protocols with joint consideration of communication and control. However, the vast majority of the recent research results, which have shown remarkable performance improvements…
▽ More
Networked control systems (NCSs), which are feedback control loops closed over a communication network, have been a popular research topic over the past decades. Numerous works in the literature propose novel algorithms and protocols with joint consideration of communication and control. However, the vast majority of the recent research results, which have shown remarkable performance improvements if a cross-layer methodology is followed, have not been widely adopted by the industry. In this work, we review the shortcomings of today's mobile networks that render cross-layer solutions, such as semantic and goal-oriented communications, very challenging in practice. To tackle this, we propose a new framework for 6G user plane design that simplifies the adoption of recent research results in networked control, thereby facilitating the joint communication and control design in next-generation mobile networks.
△ Less
Submitted 26 February, 2024;
originally announced February 2024.
-
A Mobility Analysis of UE-Side Beamforming for Multi-Panel User Equipment with Hand Blockage
Authors:
Subhyal Bin Iqbal,
Salman Nadaf,
Umur Karabulut,
Philipp Schulz,
Anna Prado,
Gerhard P. Fettweis,
Wolfgang Kellerer
Abstract:
The hand blockage effect of the human hand around the user equipment (UE) is too considerable to be ignored in frequency range 2 (FR2). This adds another layer of complexity to the link budget design in FR2 for 5G networks, which already suffer from high path and diffraction loss. More recently, multipanel UEs (MPUEs) have been proposed as a way to address this problem, whereby multiple distinct a…
▽ More
The hand blockage effect of the human hand around the user equipment (UE) is too considerable to be ignored in frequency range 2 (FR2). This adds another layer of complexity to the link budget design in FR2 for 5G networks, which already suffer from high path and diffraction loss. More recently, multipanel UEs (MPUEs) have been proposed as a way to address this problem, whereby multiple distinct antenna panels are integrated into the UE body as a way to leverage gains from antenna directivity. MPUEs also enhance the Rx-beamforming gain because it is now subject to each individual antenna panel. In this paper, the mobility performance of hand blockage induced by three practical hand grips is analyzed in a system-level simulation, where in each grip both the UE orientation and the hand positioning around the UE is different. It is seen that each hand grip has a significant impact on mobility performance of the network, where in the worst case mobility failures increase by 43% compared to the non-hand blockage case. Moreover, a detailed analysis of the tradeoff between the mobility key performance indicators and the panel and Rx beam switching frequency is also studied. Results have shown that both the panel and Rx beam switches can be reduced considerably without compromising on the mobility performance. This is beneficial because it helps in reducing UE power consumption.
△ Less
Submitted 16 January, 2024;
originally announced January 2024.
-
Evaluation of NR-Sidelink for Cooperative Industrial AGVs
Authors:
Shubhangi Bhadauria,
Klea Plaku,
Yash Deshpande,
Wolfgang Kellerer
Abstract:
Industry 4.0 has brought to attention the need for a connected, flexible, and autonomous production environment. The New Radio (NR)-sidelink, which was introduced by the third-generation partnership project (3GPP) in Release 16, can be particularly helpful for factories that need to facilitate cooperative and close-range communication. Automated Guided Vehicles (AGVs) are important for material ha…
▽ More
Industry 4.0 has brought to attention the need for a connected, flexible, and autonomous production environment. The New Radio (NR)-sidelink, which was introduced by the third-generation partnership project (3GPP) in Release 16, can be particularly helpful for factories that need to facilitate cooperative and close-range communication. Automated Guided Vehicles (AGVs) are important for material handling and carriage within these environments, and using NR-sidelink communication can further enhance their performance. An efficient resource allocation mechanism is required to ensure reliable communication and avoid interference between AGVs and other wireless systems in the factory using NR-sidelink. This work evaluates the 3GPP standardized resource allocation algorithm for NR-sidelink for a use case of cooperative carrying AGVs. We suggest further improvements that are tailored to the quality of service (QoS) requirements of an indoor factory communication scenario with cooperative AGVs.The use of NR-sidelink communication has the potential to help meet the QoS requirements for different Industry 4.0 use cases. This work can be a foundation for further improvements in NR-sidelink in 3GPP Release 18 and beyond.
△ Less
Submitted 6 September, 2023;
originally announced September 2023.
-
An Advanced Tree Algorithm with Interference Cancellation in Uplink and Downlink
Authors:
Quirin Vogel,
Yash Deshpande,
Čedomir Stefanović,
Wolfgang Kellerer
Abstract:
In this paper, we propose Advanced Tree-algorithm with Interference Cancellation (ATIC), a variant of binary tree-algorithm with successive interference cancellation (SICTA) introduced by Yu and Giannakis. ATIC assumes that Interference Cancellation (IC) can be performed both by the access point (AP), as in SICTA, but also by the users. Specifically, after every collision slot, the AP broadcasts t…
▽ More
In this paper, we propose Advanced Tree-algorithm with Interference Cancellation (ATIC), a variant of binary tree-algorithm with successive interference cancellation (SICTA) introduced by Yu and Giannakis. ATIC assumes that Interference Cancellation (IC) can be performed both by the access point (AP), as in SICTA, but also by the users. Specifically, after every collision slot, the AP broadcasts the observed collision as feedback. Users who participated in the collision then attempt to perform IC by subtracting their transmissions from the collision signal. This way, the users can resolve collisions of degree 2 and, using a simple distributed arbitration algorithm based on user IDs, ensure that the next slot will contain just a single transmission. We show that ATIC reaches the asymptotic throughput of 0.924 as the number of initially collided users tends to infinity and reduces the number of collisions and packet delay. We also compare ATIC with other tree algorithms and indicate the extra feedback resources it requires.
△ Less
Submitted 22 November, 2023; v1 submitted 29 August, 2023;
originally announced August 2023.
-
On the Mobility Analysis of UE-Side Beamforming for Multi-Panel User Equipment in 5G-Advanced
Authors:
Subhyal Bin Iqbal,
Salman Nadaf,
Umur Karabulut,
Philipp Schulz,
Anna Prado,
Gerhard P. Fettweis,
Wolfgang Kellerer
Abstract:
Frequency range 2 (FR2) has become an integral part of 5G networks to fulfill the ever-increasing demand for data hungry-applications. However, radio signals in FR2 experience high path and diffraction loss, which also pronounces the problem of inter and intra-cell interference. As a result, both the serving and target links are affected, leading to radio link failures (RLFs) and handover failures…
▽ More
Frequency range 2 (FR2) has become an integral part of 5G networks to fulfill the ever-increasing demand for data hungry-applications. However, radio signals in FR2 experience high path and diffraction loss, which also pronounces the problem of inter and intra-cell interference. As a result, both the serving and target links are affected, leading to radio link failures (RLFs) and handover failures (HOFs), respectively. To address this issue, multi-panel user equipment (MPUE) is proposed for 5G-Advanced whereby multiple spatially distinct antenna panels are integrated into the UE to leverage gains from antenna directivity. It also opens the possibility of using UE-side Rx-beamforming for each panel. In this paper, three different Rx-beamforming approaches are proposed to improve the serving link, the target link, and the handover process for an MPUE equipped with three directional panels. Thereafter, the mobility performance is analyzed in a system-level simulation for a multi-beam FR2 network. Results have shown that the proposed schemes can help reduce RLFs by 53\% and HOFs by 90\%.
△ Less
Submitted 26 June, 2023;
originally announced June 2023.
-
Experimental Study of Transport Layer Protocols for Wireless Networked Control Systems
Authors:
Polina Kutsevol,
Onur Ayan,
Nikolaos Pappas,
Wolfgang Kellerer
Abstract:
In Wireless Networked Control Systems (WNCSs), the feedback control loops are closed over a wireless communication network. The proliferation of WNCSs requires efficient network resource management mechanisms since the control performance is significantly affected by the impairments caused by network limitations. In conventional communication networks, the amount of transmitted data is one of the…
▽ More
In Wireless Networked Control Systems (WNCSs), the feedback control loops are closed over a wireless communication network. The proliferation of WNCSs requires efficient network resource management mechanisms since the control performance is significantly affected by the impairments caused by network limitations. In conventional communication networks, the amount of transmitted data is one of the key performance indicators. In contrast, in WNCSs, the efficiency of the network is measured by its ability to facilitate control applications, and the data transmission rate should be limited to avoid network congestion. In this work, we consider an experimental setup where multiple control loops share a wireless communication network. Our testbed comprises up to five control loops that include Zolertia Re-Mote devices implementing IEEE 802.15.4 standard. We propose a novel relevance- and network-aware transport layer (TL) scheme for WNCSs. The proposed scheme admits the most important measurements for the control process into the network while taking current network conditions into account. Moreover, we propose a mechanism for the scheme parameters adaptation in dynamic scenarios with unknown network statistics. Unlike the conventional TL mechanisms failing to provide adequate control performance due to either congestion in the network or inefficient utilization of available resources, our method prevents network congestion while kee** the control performance high. We argue that relevance- and network-awareness are critical components of network protocol design to avoid control performance degradation in practice.
△ Less
Submitted 21 June, 2023; v1 submitted 18 June, 2023;
originally announced June 2023.
-
Analysis of d-ary Tree Algorithms with Successive Interference Cancellation
Authors:
Quirin Vogel,
Yash Deshpande,
Cedomir Stefanović,
Wolfgang Kellerer
Abstract:
In this article, we calculate the mean throughput, number of collisions, successes, and idle slots for random tree algorithms with successive interference cancellation. Except for the case of the throughput for the binary tree, all the results are new. We furthermore disprove the claim that only the binary tree maximises throughput. Our method works with many observables and can be used as a bluep…
▽ More
In this article, we calculate the mean throughput, number of collisions, successes, and idle slots for random tree algorithms with successive interference cancellation. Except for the case of the throughput for the binary tree, all the results are new. We furthermore disprove the claim that only the binary tree maximises throughput. Our method works with many observables and can be used as a blueprint for further analysis.
△ Less
Submitted 16 February, 2023;
originally announced February 2023.
-
Towards Semantic-Aware Transport Layer Protocols: A Control Performance Perspective
Authors:
Polina Kutsevol,
Onur Ayan,
Wolfgang Kellerer
Abstract:
Networked control systems (NCSs) are an example of task-oriented communication systems, where the purpose of communication is real-time control of processes over a network. In the context of NCSs, with the processes sending their state measurements to the remote controllers, the deterioration of control performance due to the network congestion can be partly mitigated by sha** the traffic inject…
▽ More
Networked control systems (NCSs) are an example of task-oriented communication systems, where the purpose of communication is real-time control of processes over a network. In the context of NCSs, with the processes sending their state measurements to the remote controllers, the deterioration of control performance due to the network congestion can be partly mitigated by sha** the traffic injected into the network at the transport layer (TL). In this work, we conduct an extensive performance evaluation of selected TL protocols and show that existing approaches from communication and control theories fail to deliver sufficient control performance in realistic network scenarios. Moreover, we propose a new semantic-aware TL policy, which uses the process state information to filter the most relevant updates and the network state information to prevent delays due to network congestion. The proposed mechanism is shown to outperform all the considered TL protocols with respect to control performance.
△ Less
Submitted 31 January, 2023;
originally announced January 2023.
-
On d-ary tree algorithms with successive interference cancellation
Authors:
Yash Deshpande,
Cedomir Stefanovic,
H. Murat Gürsu,
Wolfgang Kellerer
Abstract:
In this paper, we outline the approach for the derivation of the length of the collision resolution interval for d-ary tree algorithms (TA) with gated access and successive interference cancellation (SIC), conditioned on the number of the contending users. This is the basic performance parameter for TA with gated access. We identify the deficiencies of the analysis performed in the seminal paper o…
▽ More
In this paper, we outline the approach for the derivation of the length of the collision resolution interval for d-ary tree algorithms (TA) with gated access and successive interference cancellation (SIC), conditioned on the number of the contending users. This is the basic performance parameter for TA with gated access. We identify the deficiencies of the analysis performed in the seminal paper on TA with SIC by Yu and Giannakis, showing that their analysis is correct only for binary splitting, i.e. for d=2. We also provide some insightful results on the stable throughput that can be achieved for different values of d.
△ Less
Submitted 8 August, 2022;
originally announced August 2022.
-
Design and Optimization of Aerial-Aided Multi-Access Edge Computing towards 6G
Authors:
Jörg von Mankowski,
Emre Durmaz,
Arled Papa,
Hansini Vijayaraghavan,
Wolfgang Kellerer
Abstract:
Ubiquity in network coverage is one of the main features of 5G and is expected to be extended to the computing domain in 6G. In order to provide this holistic approach of ubiquity in communication and computation, an integration of satellite, aerial and terrestrial networks is foreseen. In particular, the rising amount of applications such as In-Flight Entertainment and Connectivity Services (IFEC…
▽ More
Ubiquity in network coverage is one of the main features of 5G and is expected to be extended to the computing domain in 6G. In order to provide this holistic approach of ubiquity in communication and computation, an integration of satellite, aerial and terrestrial networks is foreseen. In particular, the rising amount of applications such as In-Flight Entertainment and Connectivity Services (IFECS) and SDN-enabled satellites renders network management more challenging. Moreover, due to the stringent Quality of Service (QoS) requirements edge computing gains in importance for these applications. Here, network performance can be boosted by considering components of the aerial network, like aircrafts, as potential Multi-Access Edge Computing (MEC) nodes. Thus, we propose an Aerial-Aided Multi-Access Edge Computing (AA-MEC) architecture that provides a framework for optimal management of computing resources and internet-based services in the sky. Furthermore, we formulate optimization problems to minimize the network latency for the two use cases of providing IFECS to other aircrafts in the sky and providing services for offloading AI/ML-tasks from satellites. Due to the dynamic nature of the satellite and aerial networks, we propose a re-configurable optimization. For the transforming network we continuously identify the optimal MEC node for each application and the optimal path to the destination MEC node. In summary, our results demonstrate that using AA-MEC improves network latency performance by 10.43% compared to the traditional approach of using only terrestrial MEC nodes for latency-critical applications such as online gaming. Furthermore, while comparing our proposed dynamic approach with a static one, we record a benefit of at least 6.7% decrease in flow latency for IFECS and 56.03% decrease for computation offloading.
△ Less
Submitted 29 June, 2022;
originally announced June 2022.
-
6G opens up a New Era for Aeronautical Communication and Services
Authors:
Arled Papa,
Jörg von Mankowski,
Hansini Vijayaraghavan,
Babak Mafakheri,
Leonardo Goratti,
Wolfgang Kellerer
Abstract:
While 5G delivers high quality services mostly in a two dimensional terrestrial area covering our planet's surface, with 6G we aim at a full exploitation of three dimensions. In this way, 6G includes all kinds of non-terrestrial networks. In particular, Unmanned Aerial Vehicles (UAVs), High-Altitude Platforms (HAPs), (self-)flying taxis and civil aircrafts are new additions to already existing sat…
▽ More
While 5G delivers high quality services mostly in a two dimensional terrestrial area covering our planet's surface, with 6G we aim at a full exploitation of three dimensions. In this way, 6G includes all kinds of non-terrestrial networks. In particular, Unmanned Aerial Vehicles (UAVs), High-Altitude Platforms (HAPs), (self-)flying taxis and civil aircrafts are new additions to already existing satellite networks complementing the cellular terrestrial network. Their integration to 6G is promising with respect to service coverage, but also challenging due to the so far rather closed systems. Emerging technology concepts such as Mobile Edge Computing (MEC) and Software-Defined Networking (SDN) can provide a basis for a full integration of aeronautical systems into the terrestrial counterpart. However, these technologies render the management and orchestration of aeronautical systems complex. As a step towards the integration of aeronautical communication and services into 6G, we propose a framework for the collection, monitoring and distribution of resources in the sky among heterogeneous flying objects. This enables high-performance services for a new era of 6G aeronautical applications. Based on our aeronautical framework, we introduce emerging application use-cases including Aeronautical Edge Computing (AEC), aircraft-as-a-sensor, and in-cabin networks.
△ Less
Submitted 23 June, 2022;
originally announced June 2022.
-
Six Insights into 6G: Orientation and Input for Develo** Your Strategic 6G Research Plan
Authors:
Kimberley Parsons Trommler,
Matthias Hafner,
Wolfgang Kellerer,
Peter Merz,
Sigurd Schuster,
Josef Urban,
Uwe Baeder,
Bertram Gunzelmann,
Andreas Kornbichler
Abstract:
This paper is a summary of the findings from a series of workshops which were held by Thinknet 6G and MUENCHNER KREIS in 2021, with the goal to provide orientation and input for develo** a strategic 6G research plan. The topics selected for the workshops are aspects of 6G that we expect will have a significant impact on other industries and on society:
- 6G as both a communication infrastructu…
▽ More
This paper is a summary of the findings from a series of workshops which were held by Thinknet 6G and MUENCHNER KREIS in 2021, with the goal to provide orientation and input for develo** a strategic 6G research plan. The topics selected for the workshops are aspects of 6G that we expect will have a significant impact on other industries and on society:
- 6G as both a communication infrastructure and a sensing infrastructure
- The extensive use of artificial intelligence in 6G
- The security and resilience of 6G
This paper does not go into the technical details of how to develop and implement 6G. Rather, it provides input from experts from both the wireless industry as well as from other sectors about (mostly) non-technical topics that will need to be addressed in parallel with the technical developments, such as new use cases, regulation, communication with the public, and cross-industry cooperation.
We have identified six areas that will have a significant impact on the development and use of 6G, and that organizations must consider as they begin their plans and designs for 6G. Based on these six impact areas and on the discussion in the workshops, we compiled a list of the top 10 recommendations for specific areas where organizations should place their focus when develo** their strategic plan for 6G. In addition, for our readers who are involved in 6G research, be it at a university, at a research institute or in industrial research, we also included a summary of the top 10 areas that require additional research, again based on the input received in the workshops.
A version of this paper is also available at www.thinknet-6g.de.
If you had a copy of the preview version of this paper, the text is exactly the same. Only the layout and graphics have changed.
△ Less
Submitted 20 May, 2022; v1 submitted 24 March, 2022;
originally announced March 2022.
-
Improving AoI via Learning-based Distributed MAC in Wireless Networks
Authors:
Yash Deshpande,
Onur Ayan,
Wolfgang Kellerer
Abstract:
In this work, we consider a remote monitoring scenario in which multiple sensors share a wireless channel to deliver their status updates to a process monitor via an access point (AP). Moreover, we consider that the sensors randomly arrive and depart from the network as they become active and inactive. The goal of the sensors is to devise a medium access strategy to collectively minimize the long-…
▽ More
In this work, we consider a remote monitoring scenario in which multiple sensors share a wireless channel to deliver their status updates to a process monitor via an access point (AP). Moreover, we consider that the sensors randomly arrive and depart from the network as they become active and inactive. The goal of the sensors is to devise a medium access strategy to collectively minimize the long-term mean network \ac{AoI} of their respective processes at the remote monitor. For this purpose, we propose specific modifications to ALOHA-QT algorithm, a distributed medium access algorithm that employs a policy tree (PT) and reinforcement learning (RL) to achieve high throughput. We provide the upper bound on the mean network Age of Information (AoI) for the proposed algorithm along with pointers for selecting its key parameter. The results reveal that the proposed algorithm reduces mean network \ac{AoI} by more than 50 percent for state of the art stationary randomized policies while successfully adjusting to a changing number of active users in the network. The algorithm needs less memory and computation than ALOHA-QT while performing better in terms of AoI.
△ Less
Submitted 18 February, 2022;
originally announced February 2022.
-
Task-oriented Scheduling for Networked Control Systems: An Age of Information-Aware Implementation on Software-defined Radios
Authors:
Onur Ayan,
Polina Kutsevol,
Hasan Yağız Özkan,
Wolfgang Kellerer
Abstract:
Networked control systems (NCSs) are feedback control loops that are closed over a communication network. Emerging applications, such as telerobotics, drones and autonomous driving are the most prominent examples of such systems. Regular and timely information sharing between the components of NCSs is essential to fulfill the desired control tasks, as stale information can lead to performance degr…
▽ More
Networked control systems (NCSs) are feedback control loops that are closed over a communication network. Emerging applications, such as telerobotics, drones and autonomous driving are the most prominent examples of such systems. Regular and timely information sharing between the components of NCSs is essential to fulfill the desired control tasks, as stale information can lead to performance degradation or even physical damage. In this work, we consider multiple heterogeneous NCSs that transmit their system state over a shared physical wireless channel towards a gateway node. We conduct a comprehensive experimental study on selected MAC protocols using software-defined radios with state-of-the-art (SotA) solutions that have been designed to increase information freshness and control performance. As a significant improvement over the SotA, we propose a novel contention-free algorithm that is able to outperform the existing solutions by combining their strengths in one protocol. In addition, we propose a new metric called normalized mean squared error that maps the age of information to a dimensionless quantity that captures the expected value of a control system's next transmission. We demonstrate its adoption and effectiveness for wireless resource scheduling in a case study involving multiple inverted pendulums. From our experimental study and results, we observe that value-aware prioritization of the sub-systems contributes to minimizing the negative effects of information staleness on control performance. In particular, as the number of devices increases, the benefit of control-awareness to the quality of control stands out when compared to protocols that focus solely on maximizing information freshness.
△ Less
Submitted 22 September, 2022; v1 submitted 18 February, 2022;
originally announced February 2022.
-
Six Questions about 6G
Authors:
Kimberley Parsons Trommler,
Matthias Hafner,
Wolfgang Kellerer,
Peter Merz,
Sigurd Schuster,
Josef Urban,
Uwe Baeder,
Bertram Gunzelmann,
Andreas Kornbichler
Abstract:
Although 5G (Fifth Generation) mobile technology is still in the rollout phase, research and development of 6G (Sixth Generation) wireless have already begun. This paper is an introduction to 6G wireless networks, covering the main drivers for 6G, some of the expected use cases, some of the technical challenges in 6G, example areas that will require research and new technologies, the expected time…
▽ More
Although 5G (Fifth Generation) mobile technology is still in the rollout phase, research and development of 6G (Sixth Generation) wireless have already begun. This paper is an introduction to 6G wireless networks, covering the main drivers for 6G, some of the expected use cases, some of the technical challenges in 6G, example areas that will require research and new technologies, the expected timeline for 6G development and rollout, and a list of some important 6G initiatives world-wide. It was compiled as part of a series of workshops about 6G held by Thinknet 6G and MUENCHNER KREIS in 2021.
△ Less
Submitted 7 February, 2022; v1 submitted 28 January, 2022;
originally announced January 2022.
-
Tree-Algorithms with Multi-Packet Reception and Successive Interference Cancellation
Authors:
Cedomir Stefanović,
Yash Deshpande,
H. Murat Gürsu,
Wolfgang Kellerer
Abstract:
In this paper, we perform a thorough analysis of tree-algorithms with multi-packet reception (MPR) and successive interference cancellation (SIC), showing a number of novel results. We first derive the basic performance parameters, which are the expected length of the collision resolution interval and the normalized throughput, conditioned on the number of contending users. We then study their asy…
▽ More
In this paper, we perform a thorough analysis of tree-algorithms with multi-packet reception (MPR) and successive interference cancellation (SIC), showing a number of novel results. We first derive the basic performance parameters, which are the expected length of the collision resolution interval and the normalized throughput, conditioned on the number of contending users. We then study their asymptotic behaviour, identifying an oscillatory component that amplifies with the increase in MPR. In the next step, we derive the throughput for the gated and windowed access, assuming Poisson arrivals. We show that for windowed access, the bound on maximum stable normalized throughput increases with the increase in MPR. his implies that investing in advanced physical capabilities, i.e., MPR and SIC pays off from the perspective of the medium access control algorithm.
△ Less
Submitted 10 August, 2022; v1 submitted 2 August, 2021;
originally announced August 2021.
-
SEER: Performance-Aware Leader Election in Single-Leader Consensus
Authors:
Ermin Sakic,
Petra Vizarreta,
Wolfgang Kellerer
Abstract:
Modern stateful web services and distributed SDN controllers rely on log replication to omit data loss in case of fail-stop failures. In single-leader execution, the leader replica is responsible for ordering log updates and the initiation of distributed commits, in order to guarantee log consistency. Network congestions, resource-heavy computation, and imbalanced resource allocations may, however…
▽ More
Modern stateful web services and distributed SDN controllers rely on log replication to omit data loss in case of fail-stop failures. In single-leader execution, the leader replica is responsible for ordering log updates and the initiation of distributed commits, in order to guarantee log consistency. Network congestions, resource-heavy computation, and imbalanced resource allocations may, however, result in inappropriate leader election and increased cluster response times.
We present SEER, a logically centralized approach to performance prediction and efficient leader election in leader-based consensus systems. SEER autonomously identifies the replica that minimizes the average cluster response time, using prediction models trained dynamically at runtime. To balance the exploration and exploitation, SEER explores replicas' performance and updates their prediction models only after detecting significant system changes. We evaluate SEER in a traffic management scenario comprising [3..7] Raft replicas, and well-known data-center and WAN topologies. Compared to the Raft's uniform leader election, SEER decreases the mean control plane response time by up to ~32%. The benefit comes at the expense of the minimal adaptation of Raft election procedure and a slight increase in leader reconfiguration frequency, the latter being tunable with a guaranteed upper bound. No safety properties of Raft are invalidated by SEER.
△ Less
Submitted 3 April, 2021;
originally announced April 2021.
-
Scheduling of Wireless Edge Networks for Feedback-Based Interactive Applications
Authors:
Samuele Zoppi,
Jaya Prakash Champati,
James Gross,
Wolfgang Kellerer
Abstract:
Interactive applications with automated feedback will largely influence the design of future networked infrastructures. In such applications, status information about an environment of interest is captured and forwarded to a compute node, which analyzes the information and generates a feedback message. Timely processing and forwarding must ensure the feedback information to be still applicable; th…
▽ More
Interactive applications with automated feedback will largely influence the design of future networked infrastructures. In such applications, status information about an environment of interest is captured and forwarded to a compute node, which analyzes the information and generates a feedback message. Timely processing and forwarding must ensure the feedback information to be still applicable; thus, the quality-of-service parameter for such applications is the end-to-end latency over the entire loop. By modelling the communication of a feedback loop as a two-hop network, we address the problem of allocating network resources in order to minimize the delay violation probability (DVP), i.e. the probability of the end-to-end latency exceeding a target value. We investigate the influence of the network queue states along the network path on the performance of semi-static and dynamic scheduling policies. The former determine the schedule prior to the transmission of the packet, while the latter benefit from feedback on the queue states as time evolves and reallocate time slots depending on the queue's evolution. The performance of the proposed policies is evaluated for variations in several system parameters and comparison baselines. Results show that the proposed semi-static policy achieves close-to-optimal DVP and the dynamic policy outperforms the state-of-the-art algorithms.
△ Less
Submitted 27 March, 2021;
originally announced March 2021.
-
Distributed Resource Allocation with Multi-Agent Deep Reinforcement Learning for 5G-V2V Communication
Authors:
Alperen Gündogan,
H. Murat Gürsu,
Volker Pauli,
Wolfgang Kellerer
Abstract:
We consider the distributed resource selection problem in Vehicle-to-vehicle (V2V) communication in the absence of a base station. Each vehicle autonomously selects transmission resources from a pool of shared resources to disseminate Cooperative Awareness Messages (CAMs). This is a consensus problem where each vehicle has to select a unique resource. The problem becomes more challenging when---du…
▽ More
We consider the distributed resource selection problem in Vehicle-to-vehicle (V2V) communication in the absence of a base station. Each vehicle autonomously selects transmission resources from a pool of shared resources to disseminate Cooperative Awareness Messages (CAMs). This is a consensus problem where each vehicle has to select a unique resource. The problem becomes more challenging when---due to mobility---the number of vehicles in vicinity of each other is changing dynamically. In a congested scenario, allocation of unique resources for each vehicle becomes infeasible and a congested resource allocation strategy has to be developed. The standardized approach in 5G, namely semi-persistent scheduling (SPS) suffers from effects caused by spatial distribution of the vehicles. In our approach, we turn this into an advantage. We propose a novel DIstributed Resource Allocation mechanism using multi-agent reinforcement Learning (DIRAL) which builds on a unique state representation. One challenging issue is to cope with the non-stationarity introduced by concurrently learning agents which causes convergence problems in multi-agent learning systems. We aimed to tackle non-stationarity with unique state representation. Specifically, we deploy view-based positional distribution as a state representation to tackle non-stationarity and perform complex joint behavior in a distributed fashion. Our results showed that DIRAL improves PRR by 20% compared to SPS in challenging congested scenarios.
△ Less
Submitted 11 October, 2020;
originally announced October 2020.
-
Analysis of Tree-Algorithms with Multi-Packet Reception
Authors:
Cedomir Stefanović,
H. Murat Gürsu,
Yash Deshpande,
Wolfgang Kellerer
Abstract:
In this paper, we analyze binary-tree algorithms in a setup in which the receiver can perform multi-packet reception (MPR) of up to and including K packets simultaneously. The analysis addresses both traffic-independent performance as well as performance under Poisson arrivals. For the former case, we show that the throughput, when normalized with respect to the assumed linear increase in resource…
▽ More
In this paper, we analyze binary-tree algorithms in a setup in which the receiver can perform multi-packet reception (MPR) of up to and including K packets simultaneously. The analysis addresses both traffic-independent performance as well as performance under Poisson arrivals. For the former case, we show that the throughput, when normalized with respect to the assumed linear increase in resources required to achieve K-MPR capability, tends to the same value that holds for the single-reception setup. However, when coupled with Poisson arrivals in the windowed access scheme, the normalized throughput increases with K, and we present evidence that it asymptotically tends to 1. We also provide performance results for the modified tree algorithm with K-MPR in the clipped access scheme. To the best of our knowledge, this is the first paper that provides an analytical treatment and a number of fundamental insights in the performance of tree-algorithms with MPR.
△ Less
Submitted 4 February, 2021; v1 submitted 28 May, 2020;
originally announced May 2020.
-
AoI-based Finite Horizon Scheduling for Heterogeneous Networked Control Systems
Authors:
Onur Ayan,
H. Murat Gürsu,
Sandra Hirche,
Wolfgang Kellerer
Abstract:
Age of information (AoI) measures information freshness at the receiver. AoI may provide insights into quality of service in communication systems. For this reason, it has been used as a cross-layer metric for wireless communication protocols. In this work, we employ AoI to calculate penalty functions for a centralized resource scheduling problem. We consider a single wireless link shared by multi…
▽ More
Age of information (AoI) measures information freshness at the receiver. AoI may provide insights into quality of service in communication systems. For this reason, it has been used as a cross-layer metric for wireless communication protocols. In this work, we employ AoI to calculate penalty functions for a centralized resource scheduling problem. We consider a single wireless link shared by multiple, heterogeneous control systems where each sub-system has a time-varying packet loss probability. Sub-systems are competing for network resources to improve the accuracy of their remote estimation process. In order to cope with the dynamically changing conditions of the wireless link, we define a finite horizon age-penalty minimization problem and propose a scheduler that takes optimal decisions by looking $H$ slots into the future. The proposed algorithm has a worst-case complexity that grows exponentially with $H$. However, by narrowing down our search space within the constrained set of actions, we are able to decrease the complexity significantly without losing optimality. On the contrary, we show by simulations that the benefit of increasing $H$ w.r.t. remote state estimation performance diminishes after a certain $H$ value.
△ Less
Submitted 5 May, 2020;
originally announced May 2020.
-
Rational Agent-Based Decision Algorithm for Strategic Converged Network Migration Planning
Authors:
Sai Kireet Patri,
Elena Grigoreva,
Wolfgang Kellerer,
Carmen Mas Machuca
Abstract:
To keep up with constantly growing user demands for services with higher quality and bandwidth requirements, telecommunication operators are forced to upgrade their networks. This upgrade, or migration of the network to a new technology, is a complex strategic network planning problem that involves techno-economic evaluations over multiple periods of time. The state-of-the-art approaches consider…
▽ More
To keep up with constantly growing user demands for services with higher quality and bandwidth requirements, telecommunication operators are forced to upgrade their networks. This upgrade, or migration of the network to a new technology, is a complex strategic network planning problem that involves techno-economic evaluations over multiple periods of time. The state-of-the-art approaches consider migrations to a concrete architecture and do not take uncertainties, such as user churn, into account. This results in migration cost underestimations and profitability over-estimations. In this paper, we propose a generic migration algorithm derived from a search based rational agent decision process that can deal with uncertainties and provides the migration path using a maximized utility function. The algorithm maximizes the migration project profitability, measured as accumulated Net Present Value (NPV). This flexible and generic methodology has been evaluated on the example of migration from existing copper networks to the future-proof Passive Optical Network (PON) architectures. Our proposed flexible migration algorithm is validated over pure residential and converged scenarios in a fully reproducible case study. The results yield that the migration flexibility is a key to the profit maximization.
△ Less
Submitted 27 March, 2020;
originally announced March 2020.
-
Veni Vidi Dixi: Reliable Wireless Communication with Depth Images
Authors:
Serkut Ayvaşık,
H. Murat Gürsu,
Wolfgang Kellerer
Abstract:
The upcoming industrial revolution requires deployment of critical wireless sensor networks for automation and monitoring purposes. However, the reliability of the wireless communication is rendered unpredictable by mobile elements in the communication environment such as humans or mobile robots which lead to dynamically changing radio environments. Changes in the wireless channel can be monitored…
▽ More
The upcoming industrial revolution requires deployment of critical wireless sensor networks for automation and monitoring purposes. However, the reliability of the wireless communication is rendered unpredictable by mobile elements in the communication environment such as humans or mobile robots which lead to dynamically changing radio environments. Changes in the wireless channel can be monitored with frequent pilot transmission. However, that would stress the battery life of sensors. In this work a new wireless channel estimation technique, Veni Vidi Dixi, VVD, is proposed. VVD leverages the redundant information in depth images obtained from the surveillance cameras in the communication environment and utilizes Convolutional Neural Networks CNNs to map the depth images of the communication environment to complex wireless channel estimations. VVD increases the wireless communication reliability without the need for frequent pilot transmission and with no additional complexity on the receiver. The proposed method is tested by conducting measurements in an indoor environment with a single mobile human. Up to authors best knowledge our work is the first to obtain complex wireless channel estimation from only depth images without any pilot transmission. The collected wireless trace, depth images and codes are publicly available.
△ Less
Submitted 4 December, 2019;
originally announced December 2019.
-
Probability Analysis of Age of Information in Multi-hop Networks
Authors:
Onur Ayan,
H. Murat Gürsu,
Arled Papa,
Wolfgang Kellerer
Abstract:
Age-of-information (AoI) is a metric quantifying information freshness at the receiver. It captures the delay together with packet loss and packet generation rate. However, the existing literature focuses on average or peak AoI and neglects the complete distribution. In this work, we consider a N-hop network with time-invariant packet loss probabilities on each link. We derive closed form equation…
▽ More
Age-of-information (AoI) is a metric quantifying information freshness at the receiver. It captures the delay together with packet loss and packet generation rate. However, the existing literature focuses on average or peak AoI and neglects the complete distribution. In this work, we consider a N-hop network with time-invariant packet loss probabilities on each link. We derive closed form equations for the probability mass function of AoI. We verify our findings with simulations. Our results show that the performance indicators considered in the literature such as average or peak AoI may give misleading insights into the real AoI performance.
△ Less
Submitted 26 February, 2020; v1 submitted 22 November, 2019;
originally announced November 2019.
-
Boost Your CotS IEEE 802.15.4 Network with Inter-Slot Interference Cancellation for Industrial IoT
Authors:
H. Murat Gürsu,
Hansini Vijayaraghavan,
Wolfgang Kellerer
Abstract:
The current cellular standardization for 5G is working towards wireless advances to enable further productivity for industrial automation. However, this development will take several years. Meanwhile, the capabilities of the currently available standards should be pushed to their limits. To this end, in this work, we present results from the first inter-slot successive interference cancellation te…
▽ More
The current cellular standardization for 5G is working towards wireless advances to enable further productivity for industrial automation. However, this development will take several years. Meanwhile, the capabilities of the currently available standards should be pushed to their limits. To this end, in this work, we present results from the first inter-slot successive interference cancellation testbed using commercial off the shelf IEEE 802.15.4 sensors. Through our implementation, we have measured a throughput of $0.72$ packets per slot which doubles the currently used contention-based access, Slotted ALOHA, with a limit of $0.36$ packets per slot. The hardware effects of the boards, which degrade the successive interference cancellation performance from the theoretical limit of $1$ packet per slot, are modeled and validated through measurements. We also propose a model that can be used to calculate the expected successive interference cancellation throughput with the specific hardware available in a factory. Furthermore, our proposed model should replace the perfect physical layer assumptions for researchers to design new MAC algorithms taking practical limitations into account.
△ Less
Submitted 5 November, 2019;
originally announced November 2019.
-
Joint Cross-layer Optimization in Real-Time Networked Control Systems
Authors:
Markus Klügel,
Mohammad H. Mamduhi,
Onur Ayan,
Mikhail Vilgelm,
Karl H. Johansson,
Sandra Hirche,
Wolfgang Kellerer
Abstract:
Networked control system (NCS) refer to a set of control loops that are closed over a communication network. In this article, the joint operation of control and networking for NCS is investigated wherein the network serves the sensor-to-controller communication links for multiple stochastic linear time-invariant (LTI) sub-systems. The sensors sample packets based on the observed plant state, which…
▽ More
Networked control system (NCS) refer to a set of control loops that are closed over a communication network. In this article, the joint operation of control and networking for NCS is investigated wherein the network serves the sensor-to-controller communication links for multiple stochastic linear time-invariant (LTI) sub-systems. The sensors sample packets based on the observed plant state, which they send over a shared multi-hop network. The network has limited communication resources, which need to be assigned to competing links to support proper control loop operation. In this set-up, we formulate an optimization problem to minimize the weighted-sum linear-quadratic-Gaussian (LQG) cost of all loops, taking into account the admissible sampling, control, congestion control and scheduling policies. Under some mild assumptions on the sampling frequencies of the control loops and the communication network, we find the joint optimal solution to be given by a certainty equivalence control with threshold-based sampling policy, as well as a back-pressure type scheduler with a simple pass-through congestion control. The interface between network and control loops is identified to be the buffer state of the sensor node, which can be interpreted as network price for sampling a packet from control perspective. We validate our theoretical claims by simulating NCSs comprising of multiple LTI stochastic control loops communicating over a two-hop cellular network.
△ Less
Submitted 10 October, 2019;
originally announced October 2019.
-
Optimal Scheduling for Discounted Age Penalty Minimization in Multi-Loop Networked Control
Authors:
Onur Ayan,
Mikhail Vilgelm,
Wolfgang Kellerer
Abstract:
Age-of-information (AoI) is a metric quantifying information freshness at the receiver. Since AoI combines packet generation frequency, packet loss, and delay into a single metric, it has received a lot of research attention as an interface between communication network and application. In this work, we apply AoI to the problem of wireless scheduling for multi-loop networked control systems (NCS),…
▽ More
Age-of-information (AoI) is a metric quantifying information freshness at the receiver. Since AoI combines packet generation frequency, packet loss, and delay into a single metric, it has received a lot of research attention as an interface between communication network and application. In this work, we apply AoI to the problem of wireless scheduling for multi-loop networked control systems (NCS), i.e., feedback control loops closed over a shared wireless network. We model the scheduling problem as a Markov decision process (MDP) with AoI as its observable states and derive a relation of control system error and AoI. We further derive a stationary scheduling policy to minimize control error over an infinite horizon. We show that our scheduler outperforms the state-of-the-art scheduling policies for NCS. To the best of our knowledge, this is the first work proposing an AoI-based wireless scheduling policy that minimizes the control error over an infinite horizon for multi-loop NCS.
△ Less
Submitted 22 November, 2019; v1 submitted 5 August, 2019;
originally announced August 2019.
-
Transmission Power Control for Remote State Estimation in Industrial Wireless Sensor Networks
Authors:
Samuele Zoppi,
Touraj Soleymani,
Markus Klügel,
Mikhail Vilgelm,
Sandra Hirche,
Wolfgang Kellerer
Abstract:
Novel low-power wireless technologies and IoT applications open the door to the Industrial Internet of Things (IIoT). In this new paradigm, Wireless Sensor Networks (WSNs) must fulfil, despite energy and transmission power limitations, the challenging communication requirements of advanced manufacturing processes and technologies. In industrial networks, this is possible thanks to the availability…
▽ More
Novel low-power wireless technologies and IoT applications open the door to the Industrial Internet of Things (IIoT). In this new paradigm, Wireless Sensor Networks (WSNs) must fulfil, despite energy and transmission power limitations, the challenging communication requirements of advanced manufacturing processes and technologies. In industrial networks, this is possible thanks to the availability of network infrastructure and the presence of a network coordinator that efficiently allocates the available radio resources. In this work, we consider a WSN that simultaneously transmits measurements of Networked Control Systems' (NCSs) dynamics to remote state estimators over a shared packet-erasure channel. We develop a minimum transmission power control (TPC) policy for the coordination of the wireless medium by formulating an infinite horizon Markov decision process (MDP) optimization problem. We compute the policy using an approximate value iteration algorithm and provide an extensive evaluation of its parameters in different interference scenarios and NCSs dynamics. The evaluation results present a comprehensive characterization of the algorithm's performance, proving that it can flexibly adapt to arbitrary use cases.
△ Less
Submitted 16 July, 2019;
originally announced July 2019.
-
P4BFT: Hardware-Accelerated Byzantine-Resilient Network Control Plane
Authors:
Ermin Sakic,
Nemanja Deric,
Endri Goshi,
Wolfgang Kellerer
Abstract:
Byzantine Fault Tolerance (BFT) enables correct operation of distributed, i.e., replicated applications in the face of malicious take-over and faulty/buggy individual instances. Recently, BFT designs have gained traction in the context of Software Defined Networking (SDN). In SDN, controller replicas are distributed and their state replicated for high availability purposes. Malicious controller re…
▽ More
Byzantine Fault Tolerance (BFT) enables correct operation of distributed, i.e., replicated applications in the face of malicious take-over and faulty/buggy individual instances. Recently, BFT designs have gained traction in the context of Software Defined Networking (SDN). In SDN, controller replicas are distributed and their state replicated for high availability purposes. Malicious controller replicas, however, may destabilize the control plane and manipulate the data plane, thus motivating the BFT requirement. Nonetheless, deploying BFT in practice comes at a disadvantage of increased traffic load stemming from replicated controllers, as well as a requirement for proprietary switch functionalities, thus putting strain on switches' control plane where particular BFT actions must be executed in software.
P4BFT leverages an optimal strategy to decrease the total amount of messages transmitted to switches that are the configuration targets of SDN controllers. It does so by means of message comparison and deduction of correct messages in the determined optimal locations in the data plane. In terms of the incurred control plane load, our P4-based data plane extensions outperform the existing solutions by ~33.2% and ~40.2% on average, in random 128-switch and Fat-Tree/Internet2 topologies, respectively. To validate the correctness and performance gains of P4BFT, we deploy bmv2 and Netronome Agilio SmartNIC-based topologies. The advantages of P4BFT can thus be reproduced both with software switches and "commodity" P4-enabled hardware. A hardware-accelerated controller packet comparison procedure results in an average 96.4% decrease in processing delay per request compared to existing software approaches.
△ Less
Submitted 14 August, 2019; v1 submitted 10 May, 2019;
originally announced May 2019.
-
Dynamic Binary Countdown for Massive IoT Random Access in Dense 5G Networks
Authors:
Mikhail Vilgelm,
Sergio Rueda Linares,
Wolfgang Kellerer
Abstract:
Massive connectivity for Internet of Things applications is expected to challenge the way access reservation protocols are designed in 5G networks. Since the number of devices and their density are envisioned to be orders of magnitude larger, state-of-the-art access reservation, Random Access (RA) procedure, might be a bottleneck for end-to-end delay. This would be especially challenging for burst…
▽ More
Massive connectivity for Internet of Things applications is expected to challenge the way access reservation protocols are designed in 5G networks. Since the number of devices and their density are envisioned to be orders of magnitude larger, state-of-the-art access reservation, Random Access (RA) procedure, might be a bottleneck for end-to-end delay. This would be especially challenging for burst arrival scenarios: Semi-synchronous triggering of a large number of devices due to a common event (blackout, emergency alarm, etc.). In this article, to improve RA procedure scalability, we propose to combine Binary Countdown Contention Resolution (BCCR) with the state-of-the-art Access Class Barring (ACB). We present a joint analysis of ACB and BCCR and apply a framework for treating RA as a bi-objective optimization, minimizing the resource consumption and maximizing the throughput of the procedure in every contention round. We use this framework to devise dynamic load-adaptive algorithm and simulatively illustrate that the proposed algorithm reduces the burst resolution delay while consuming less resources compared to the state-of-the-art techniques.
△ Less
Submitted 18 April, 2019;
originally announced April 2019.
-
Admission Control based Traffic-Agnostic Delay-Constrained Random Access (AC/DC-RA) for M2M Communication
Authors:
H. Murat Gürsu,
Mikhail Vilgelm,
Alberto M. Alba,
Matteo Berioli,
Wolfgang Kellerer
Abstract:
The problem of wireless M2M communication is twofold: the reliability aspect and the scalability aspect. The solution of this problem demands a delay constrained random access protocol. To this end we propose Admission Control based Traffic Agnostic Delay Constrained Random Access (AC/DC-RA) protocol. Our main contribution is enabling the stochastic delay constraints agnostic to the traffic, such…
▽ More
The problem of wireless M2M communication is twofold: the reliability aspect and the scalability aspect. The solution of this problem demands a delay constrained random access protocol. To this end we propose Admission Control based Traffic Agnostic Delay Constrained Random Access (AC/DC-RA) protocol. Our main contribution is enabling the stochastic delay constraints agnostic to the traffic, such that the stochastic delay constraint is valid with respect to varying number of arrivals. We achieve this with an admission control decision that uses a novel collision estimation algorithm for active number of arrivals per contention resource. We use an adaptive contention resolution algorithm to react to the varying number of arrivals. Using these tools, the admission control solves the stability problem. We show with simulations that AC/DC-RA provide stochastic delay constrained random access in a traffic agnostic way to sustain a stable performance against Poisson and Beta arrivals without any modification to the protocol.
△ Less
Submitted 27 March, 2019;
originally announced March 2019.
-
Age-of-Information vs. Value-of-Information Scheduling for Cellular Networked Control Systems
Authors:
Onur Ayan,
Mikhail Vilgelm,
Markus Klügel,
Sandra Hirche,
Wolfgang Kellerer
Abstract:
Age-of-Information (AoI) is a recently introduced metric for network operation with sensor applications which quantifies the freshness of data. In the context of networked control systems (NCSs), we compare the worth of the AoI metric with the value-of-information (VoI) metric, which is related to the uncertainty reduction in stochastic processes. First, we show that the uncertainty propagates non…
▽ More
Age-of-Information (AoI) is a recently introduced metric for network operation with sensor applications which quantifies the freshness of data. In the context of networked control systems (NCSs), we compare the worth of the AoI metric with the value-of-information (VoI) metric, which is related to the uncertainty reduction in stochastic processes. First, we show that the uncertainty propagates non-linearly over time depending on system dynamics. Next, we define the value of a new update of the process of interest as a function of AoI and system parameters of the NCSs. We use the aggregated update value as a utility for the centralized scheduling problem in a cellular NCS composed of multiple heterogeneous control loops. By conducting a simulative analysis, we show that prioritizing transmissions with higher VoI improves performance of the NCSs compared with providing fair data freshness to all sub-systems equally.
△ Less
Submitted 13 March, 2019;
originally announced March 2019.
-
Bounded Dijkstra (BD): Search Space Reduction for Expediting Shortest Path Subroutines
Authors:
Amaury Van Bemten,
Jochen W. Guck,
Carmen Mas Machuca,
Wolfgang Kellerer
Abstract:
The shortest path (SP) and shortest paths tree (SPT) problems arise both as direct applications and as subroutines of overlay algorithms solving more complex problems such as the constrained shortest path (CSP) or the constrained minimum Steiner tree (CMST) problems. Often, such algorithms do not use the result of an SP subroutine if its total cost is greater than a given bound. For example, for d…
▽ More
The shortest path (SP) and shortest paths tree (SPT) problems arise both as direct applications and as subroutines of overlay algorithms solving more complex problems such as the constrained shortest path (CSP) or the constrained minimum Steiner tree (CMST) problems. Often, such algorithms do not use the result of an SP subroutine if its total cost is greater than a given bound. For example, for delay-constrained problems, paths resulting from a least-delay SP run and whose delay is greater than the delay constraint of the original problem are not used by the overlay algorithm to construct its solution. As a result of the existence of these bounds, and because the Dijkstra SP algorithm discovers paths in increasing order of cost, we can terminate the SP search earlier, i.e., once it is known that paths with a greater total cost will not be considered by the overlay algorithm. This early termination allows to reduce the runtime of the SP subroutine, thereby reducing the runtime of the overlay algorithm without impacting its final result. We refer to this adaptation of Dijkstra for centralized implementations as bounded Dijkstra (BD). On the example of CSP algorithms, we confirm the usefulness of BD by showing that it can reduce the runtime of some algorithms by 75% on average.
△ Less
Submitted 6 March, 2019; v1 submitted 1 March, 2019;
originally announced March 2019.
-
Hard Latency-Constraints for High-Throughput Random Access: SICQTA
Authors:
H. Murat Gürsu,
Fuqi Guan,
Wolfgang Kellerer
Abstract:
Enabling closed control loops via wireless communication has attracted a lot of interest recently and is investigated under the name cyber-physical systems. Under cyber-physical systems one challenging scenario is multiple loops sharing a wireless medium, and the age of the control information has to be minimized without sacrificing reliability to guarantee the control stability. The number of tra…
▽ More
Enabling closed control loops via wireless communication has attracted a lot of interest recently and is investigated under the name cyber-physical systems. Under cyber-physical systems one challenging scenario is multiple loops sharing a wireless medium, and the age of the control information has to be minimized without sacrificing reliability to guarantee the control stability. The number of transmitting devices depends on the control parameters thus, it is stochastic. Wireless uplink resource allocation given low latency constraints for unknown number of devices is a hard problem. For this problem, random access is the most prominent way to minimize latency, but reliability is sacrificed. However, as reliability is also critical for such applications, improved random access algorithms with hard latency guarantees are needed. Currently available random access algorithms with hard latency guarantees have low throughput and some of them are limited to low number of active devices. In this work, we provide a high-throughput random access algorithm with hard latency-constraints (SICQTA) that scales to any number of active devices. This algorithm, making use of feedback, has a varying throughput between $0.69$ and $1$ depending on the number of devices, which is unprecedented in the state of the art up to our best knowledge.
△ Less
Submitted 21 February, 2019;
originally announced February 2019.
-
On Throughput Maximization of Grant-Free Access with Reliability-Latency Constraints
Authors:
H. Murat Gürsu,
Wolfgang Kellerer,
Cedomir Stefanović
Abstract:
Enabling autonomous driving and industrial automation with wireless networks poses many challenges, which are typically abstracted through reliability and latency requirements. One of the main contributors to latency in cellular networks is the reservation-based access, which involves lengthy and resource-inefficient signaling exchanges. An alternative is to use grant-free access, in which there i…
▽ More
Enabling autonomous driving and industrial automation with wireless networks poses many challenges, which are typically abstracted through reliability and latency requirements. One of the main contributors to latency in cellular networks is the reservation-based access, which involves lengthy and resource-inefficient signaling exchanges. An alternative is to use grant-free access, in which there is no resource reservation. A handful of recent works investigated how to fulfill reliability and latency requirements with different flavors of grant-free solutions. However, the resource efficiency, i.e., the throughput, has been only the secondary focus. In this work, we formulate the throughput of grant-free access under reliability-latency constraints, when the actual number of arrived users or only the arrival distribution are known. We investigate how these different levels of knowledge about the arrival process influence throughput performance of framed slotted ALOHA with $K$-multipacket reception, for the Poisson and Beta arrivals. We show that the throughput under reliability-latency requirements can be significantly improved for the higher expected load of the access network, if the actual number of arrived users is known. This insight motivates the use of techniques for the estimation of the number of arrived users, as this knowledge is not readily available in grant-free access. We also asses the impact of estimation error, showing that for high reliability-latency requirements the gains in throughput are still considerable.
△ Less
Submitted 21 February, 2019;
originally announced February 2019.
-
HNLB: Utilizing Hardware Matching Capabilities of NICs for Offloading Stateful Load Balancers
Authors:
Raphael Durner,
Amir Varasteh,
Max Stephan,
Carmen Mas Machuca,
Wolfgang Kellerer
Abstract:
In order to scale web or other services, the load on single instances of the respective service has to be balanced. Many services are stateful such that packets belonging to the same connection must be delivered to the same instance. This requires stateful load balancers which are mostly implemented in software. On the one hand, modern packet processing frameworks supporting software load balancer…
▽ More
In order to scale web or other services, the load on single instances of the respective service has to be balanced. Many services are stateful such that packets belonging to the same connection must be delivered to the same instance. This requires stateful load balancers which are mostly implemented in software. On the one hand, modern packet processing frameworks supporting software load balancers, such as the Data Plane Development Kit (DPDK), deliver high performance compared to older approaches. On the other hand, common Network Interface Cards (NICs) provide additional matching capabilities that can be utilized for increasing the performance even further and in turn reduce the necessary server resources. In fact, offloading the packet matching to hardware can free up CPU cycles of the servers.
Therefore, in this work, we propose the Hybrid NIC-offloading Load Balancer (HNLB), a high performance hybrid hardware-software load balancer, utilizing the NIC-offloading hardware matching capabilities. The results of our performance evaluations show that the throughput using NIC offloading can be increased by up to 50%, compared to a high performance software-only implementation. Furthermore, we investigated the limitations of our proposed approach, e.g., the limited number of possible concurrent connections.
△ Less
Submitted 9 February, 2019;
originally announced February 2019.
-
Towards adaptive state consistency in distributed SDN control plane
Authors:
Ermin Sakic,
Fragkiskos Sardis,
Jochen W. Guck,
Wolfgang Kellerer
Abstract:
State synchronisation in clustered Software Defined Networking controller deployments ensures that all instances of the controller have the same state information in order to provide redundancy. Current implementations of controllers use a strong consistency model, where configuration changes must be synchronised across a number of instances before they are applied on the network infrastructure. F…
▽ More
State synchronisation in clustered Software Defined Networking controller deployments ensures that all instances of the controller have the same state information in order to provide redundancy. Current implementations of controllers use a strong consistency model, where configuration changes must be synchronised across a number of instances before they are applied on the network infrastructure. For large deployments, this blocking process increases the delay of state synchronisation across cluster members and consequently has a detrimental effect on network operations that require rapid response, such as fast failover and Quality of Service applications. In this paper, we introduce an adaptive consistency model for SDN Controllers that employs concepts of eventual consistency models along with a novel `cost-based' approach where strict synchronisation is employed for critical operations that affect a large portion of the network resources while less critical changes are periodically propagated across cluster nodes. We use simulation to evaluate our model and demonstrate the potential gains in performance.
△ Less
Submitted 7 February, 2019;
originally announced February 2019.
-
MORPH: An Adaptive Framework for Efficient and Byzantine Fault-Tolerant SDN Control Plane
Authors:
Ermin Sakic,
Nemanja Ðerić,
Wolfgang Kellerer
Abstract:
Current approaches to tackle the single point of failure in SDN entail a distributed operation of SDN controller instances. Their state synchronization process is reliant on the assumption of a correct decision-making in the controllers. Successful introduction of SDN in the critical infrastructure networks also requires catering to the issue of unavailable, unreliable (e.g. buggy), and malicious…
▽ More
Current approaches to tackle the single point of failure in SDN entail a distributed operation of SDN controller instances. Their state synchronization process is reliant on the assumption of a correct decision-making in the controllers. Successful introduction of SDN in the critical infrastructure networks also requires catering to the issue of unavailable, unreliable (e.g. buggy), and malicious controller failures. We propose MORPH, a framework tolerant to unavailability and Byzantine failures, which distinguishes and localizes faulty controller instances and appropriately reconfigures the control plane. Our controller-switch connection assignment leverages the awareness of the source of failure to optimize the number of active controllers and minimize the controller and switch reconfiguration delays. The proposed re-assignment executes dynamically after each successful failure identification. We require 2FM + FA +1 controllers to tolerate FM malicious and FA availability-induced failures. After a successful detection of FM malicious controllers, MORPH reconfigures the control plane to require a single controller message to forward the system state. Moreover, we outline and present a solution to the practical correctness issues related to the statefulness of the distributed SDN controller applications, previously ignored in the literature. We base our performance analysis on a resource-aware routing application, deployed in an emulated testbed comprising up to 16 controllers and up to 34 switches, so to tolerate up to 5 unique Byzantine and additional 5 availability-induced controller failures (a total of 10 unique controller failures). We quantify and highlight the dynamic decrease in the packet and CPU load and the response time after each successful failure detection.
△ Less
Submitted 7 February, 2019;
originally announced February 2019.
-
Impact of Adaptive Consistency on Distributed SDN Applications: An Empirical Study
Authors:
Ermin Sakic,
Wolfgang Kellerer
Abstract:
Scalability of the control plane in a software-defined network (SDN) is enabled by means of decentralization of the decision-making logic, i.e., by replication of controller functions to physically or virtually dislocated controller replicas. Replication of a centralized controller state also enables the protection against controller failures by means of primary and backup replicas responsible for…
▽ More
Scalability of the control plane in a software-defined network (SDN) is enabled by means of decentralization of the decision-making logic, i.e., by replication of controller functions to physically or virtually dislocated controller replicas. Replication of a centralized controller state also enables the protection against controller failures by means of primary and backup replicas responsible for managing the underlying SDN data plane devices. In this paper, we investigate the effect of the deployed consistency model on scalability and correctness metrics of the SDN control plane. In particular, we compare the strong and eventual consistency, and make a case for a novel adaptive consistency approach. The existing controller platforms rely on either strong or eventual consistency mechanisms in their state distribution. We show how an adaptive consistency model offers the scalability benefits in terms of the total request-handling throughput and response time, in contrast to the strong consistency model. We also outline how the adaptive consistency approach can provide for correctness semantics that are unachievable with the eventual consistency paradigm in practice. The adaptability of our approach provides a balanced and tunable tradeoff of scalability and correctness for the SDN application implemented on top of the adaptive framework. To validate our assumptions, we evaluate and compare the different approaches in an emulated testbed with an example of a load balancer controller application. The experimental setup comprises up to five extended OpenDaylight controller instances and two network topologies from the area of service provider and data center networks.
△ Less
Submitted 7 February, 2019;
originally announced February 2019.
-
Response Time and Availability Study of RAFT Consensus in Distributed SDN Control Plane
Authors:
Ermin Sakic,
Wolfgang Kellerer
Abstract:
Software defined networking (SDN) promises unprecedented flexibility and ease of network operations. While flexibility is an important factor when leveraging advantages of a new technology, critical infrastructure networks also have stringent requirements on network robustness and control plane delays. Robustness in the SDN control plane is realized by deploying multiple distributed controllers, f…
▽ More
Software defined networking (SDN) promises unprecedented flexibility and ease of network operations. While flexibility is an important factor when leveraging advantages of a new technology, critical infrastructure networks also have stringent requirements on network robustness and control plane delays. Robustness in the SDN control plane is realized by deploying multiple distributed controllers, formed into clusters for durability and fast-failover purposes. However, the effect of the controller clustering on the total system response time is not well investigated in current literature. Hence, in this work we provide a detailed analytical study of the distributed consensus algorithm RAFT, implemented in OpenDaylight and ONOS SDN controller platforms. In those controllers, RAFT implements the data-store replication, leader election after controller failures and controller state recovery on successful repairs. To evaluate its performance, we introduce a framework for numerical analysis of various SDN cluster organizations w.r.t. their response time and availability metrics. We use Stochastic Activity Networks for modeling the RAFT operations, failure injection and cluster recovery processes, and using real-world experiments, we collect the rate parameters to provide realistic inputs for a representative cluster recovery model. We also show how a fast rejuvenation mechanism for the treatment of failures induced by software errors can minimize the total response time experienced by the controller clients, while guaranteeing a higher system availability in the long-term.
△ Less
Submitted 7 February, 2019;
originally announced February 2019.
-
BFT Protocols for Heterogeneous Resource Allocations in Distributed SDN Control Plane
Authors:
Ermin Sakic,
Wolfgang Kellerer
Abstract:
Distributed Software Defined Networking (SDN) controllers aim to solve the issue of single-point-of-failure and improve the scalability of the control plane. Byzantine and faulty controllers, however, may enforce incorrect configurations and thus endanger the control plane correctness. Multiple Byzantine Fault Tolerance (BFT) approaches relying on Replicated State Machine (RSM) execution have been…
▽ More
Distributed Software Defined Networking (SDN) controllers aim to solve the issue of single-point-of-failure and improve the scalability of the control plane. Byzantine and faulty controllers, however, may enforce incorrect configurations and thus endanger the control plane correctness. Multiple Byzantine Fault Tolerance (BFT) approaches relying on Replicated State Machine (RSM) execution have been proposed in the past to cater for this issue. The scalability of such solutions is, however, limited. Additionally, the interplay between progressing the state of the distributed controllers and the consistency of the external reconfigurations of the forwarding devices has not been thoroughly investigated. In this work, we propose an agreement-and-execution group-based approach to increase the overall throughput of a BFT-enabled distributed SDN control plane. We adapt a proven sequencing-based BFT protocol, and introduce two optimized BFT protocols that preserve the uniform agreement, causality and liveness properties. A state-hashing approach which ensures causally ordered switch reconfigurations is proposed, that enables an opportunistic RSM execution without relying on strict sequencing. The proposed designs are implemented and validated for two realistic topologies, a path computation application and a set of KPIs: switch reconfiguration (response) time, signaling overhead, and acceptance rates. We show a clear decrease in the system response time and communication overhead with the proposed models, compared to a state-of-the-art approach.
△ Less
Submitted 22 February, 2019; v1 submitted 7 February, 2019;
originally announced February 2019.
-
The Dagstuhl Beginners Guide to Reproducibility for Experimental Networking Research
Authors:
Vaibhav Bajpai,
Anna Brunstrom,
Anja Feldmann,
Wolfgang Kellerer,
Aiko Pras,
Henning Schulzrinne,
Georgios Smaragdakis,
Matthias Wählisch,
Klaus Wehrle
Abstract:
Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.
Reproducibility is one of the key characteristics of good science, but hard to achieve for experimental disciplines like Internet measurements and networked systems. This guide provides advice to researchers, particularly those new to the field, on designing experiments so that their work is more likely to be reproducible and to serve as a foundation for follow-on work by others.
△ Less
Submitted 12 January, 2019;
originally announced February 2019.
-
Mobility-Aware Joint Service Placement and Routing in Space-Air-Ground Integrated Networks
Authors:
Amir Varasteh,
Sandra Hofmann,
Nemanja Deric,
Mu He,
Dominic Schupke,
Wolfgang Kellerer,
Carmen Mas Machuca
Abstract:
People desire to be connected, no matter where they are. Recently, providing Internet access to on-board passengers has received a lot of attention from both industry and academia. However, in order to guarantee an acceptable Quality of Service (QoS) for the passenger services with low incurred cost, the path to route the services, as well as the datacenter (DC) to deploy the services should be ca…
▽ More
People desire to be connected, no matter where they are. Recently, providing Internet access to on-board passengers has received a lot of attention from both industry and academia. However, in order to guarantee an acceptable Quality of Service (QoS) for the passenger services with low incurred cost, the path to route the services, as well as the datacenter (DC) to deploy the services should be carefully determined. This problem is challenging, due to different types of Air-to-Ground (A2G) connections, i.e., satellites and Direct-Air-to-Ground (DA2G) links. These A2G connection types differ in terms of cost, bandwidth, and latency. Furthermore, due to the flights' movements, it is important to consider adapting the service location accordingly. In this work, we formulate two Mixed Integer Linear Programs (MILPs) for the problem of Joint Service Placement and Routing (JSPR): i) Static (S-JSPR), and ii) Mobility-Aware~(MA-JSPR) in Space-Air-Ground Integrated Networks (SAGIN), with the objective of minimizing the total cost. We compare S-JSPR and MA-JSPR using comprehensive evaluations in a realistic European-based SAGIN. The obtained results show that the MA-JSPR model, by considering the future flight positions and using a service migration control, reduces the long-term total cost notably. Also, we show S-JSPR benefits from a low time-complexity and it achieves lower end-to-end delays comparing to MA-JSPR model.
△ Less
Submitted 4 May, 2019; v1 submitted 5 February, 2019;
originally announced February 2019.
-
Design of a Networked Controller for a Two-Wheeled Inverted Pendulum Robot
Authors:
Zenit Music,
Fabio Molinari,
Sebastian Gallenmüller,
Onur Ayan,
Samuele Zoppi,
Wolfgang Kellerer,
Georg Carle,
Thomas Seel,
Jörg Raisch
Abstract:
The topic of this paper is to use an intuitive model-based approach to design a networked controller for a recent benchmark scenario. The benchmark problem is to remotely control a two-wheeled inverted pendulum robot via W-LAN communication. The robot has to keep a vertical upright position. Incorporating wireless communication in the control loop introduces multiple uncertainties and affects syst…
▽ More
The topic of this paper is to use an intuitive model-based approach to design a networked controller for a recent benchmark scenario. The benchmark problem is to remotely control a two-wheeled inverted pendulum robot via W-LAN communication. The robot has to keep a vertical upright position. Incorporating wireless communication in the control loop introduces multiple uncertainties and affects system performance and stability. The proposed networked control scheme employs model predictive techniques and deliberately extends delays in order to make them constant and deterministic. The performance of the resulting networked control system is evaluated experimentally with a predefined benchmarking experiment and is compared to local control involving no delays.
△ Less
Submitted 23 May, 2019; v1 submitted 7 December, 2018;
originally announced December 2018.
-
Scalable Application- and User-aware Resource Allocation in Enterprise Networks Using End-host Pacing
Authors:
Christian Sieber,
Susanna Schwarzmann,
Andreas Blenk,
Thomas Zinner,
Wolfgang Kellerer
Abstract:
Scalable user- and application-aware resource allocation for heterogeneous applications sharing an enterprise network is still an unresolved problem. The main challenges are: (i) How to define user- and application-aware shares of resources? (ii) How to determine an allocation of shares of network resources to applications? (iii) How to allocate the shares per application in heterogeneous networks…
▽ More
Scalable user- and application-aware resource allocation for heterogeneous applications sharing an enterprise network is still an unresolved problem. The main challenges are: (i) How to define user- and application-aware shares of resources? (ii) How to determine an allocation of shares of network resources to applications? (iii) How to allocate the shares per application in heterogeneous networks at scale? In this paper we propose solutions to the three challenges and introduce a system design for enterprise deployment. Defining the necessary resource shares per application is hard, as the intended use case and user's preferences influence the resource demand. Utility functions based on user experience enable a map** of network resources in terms of throughput and latency budget to a common user-level utility scale. A multi-objective MILP is formulated to solve the throughput- and delay-aware embedding of each utility function for a max-min fairness criteria. The allocation of resources in traditional networks with policing and scheduling cannot distinguish large numbers of classes. We propose a resource allocation system design for enterprise networks based on Software-Defined Networking principles to achieve delay-constrained routing in the network and application pacing at the end-hosts. The system design is evaluated against best effort networks with applications competing for the throughput of a constrained link. The competing applications belong to the five application classes web browsing, file download, remote terminal work, video streaming, and Voice-over-IP. The results show that the proposed methodology improves the minimum and total utility, minimizes packet loss and queuing delay at bottlenecks, establishes fairness in terms of utility between applications, and achieves predictable application performance at high link utilization.
△ Less
Submitted 25 February, 2020; v1 submitted 6 November, 2018;
originally announced November 2018.
-
On the Resource Consumption of M2M Random Access: Efficiency and Pareto Optimality
Authors:
Mikhail Vilgelm,
Sergio Rueda Linares,
Wolfgang Kellerer
Abstract:
The advent of Machine-to-Machine communication has sparked a new wave of interest to random access protocols, especially in application to LTE Random Access (RA). By analogy with classical slotted ALOHA, state-of-the-art models LTE RA as a multi-channel slotted ALOHA. In this letter, we direct the attention to the resource consumption of RA. We show that the consumption is a random variable depend…
▽ More
The advent of Machine-to-Machine communication has sparked a new wave of interest to random access protocols, especially in application to LTE Random Access (RA). By analogy with classical slotted ALOHA, state-of-the-art models LTE RA as a multi-channel slotted ALOHA. In this letter, we direct the attention to the resource consumption of RA. We show that the consumption is a random variable dependent on the contention parameters. We consider two approaches to include the consumption into RA optimization: by defining resource efficiency and by the means of a bi-objective optimization, where resource consumption and throughput are the competing objectives. We then develop the algorithm to obtain Pareto-optimal RA configuration under resource constraint. We show that the algorithm achieves lower burst resolution delay and higher throughput than the state-of-the-art.
△ Less
Submitted 18 December, 2018; v1 submitted 6 November, 2018;
originally announced November 2018.
-
Towards Machine Learning-Based Optimal HAS
Authors:
Christian Sieber,
Korbinian Hagn,
Christian Moldovan,
Tobias Hoßfeld,
Wolfgang Kellerer
Abstract:
Mobile video consumption is increasing and sophisticated video quality adaptation strategies are required to deal with mobile throughput fluctuations. These adaptation strategies have to keep the switching frequency low, the average quality high and prevent stalling occurrences to ensure customer satisfaction. This paper proposes a novel methodology for the design of machine learning-based adaptat…
▽ More
Mobile video consumption is increasing and sophisticated video quality adaptation strategies are required to deal with mobile throughput fluctuations. These adaptation strategies have to keep the switching frequency low, the average quality high and prevent stalling occurrences to ensure customer satisfaction. This paper proposes a novel methodology for the design of machine learning-based adaptation logics named HASBRAIN. Furthermore, the performance of a trained neural network against two algorithms from the literature is evaluated. We first use a modified existing optimization formulation to calculate optimal adaptation paths with a minimum number of quality switches for a wide range of videos and for challenging mobile throughput patterns. Afterwards we use the resulting optimal adaptation paths to train and compare different machine learning models. The evaluation shows that an artificial neural network-based model can reach a high average quality with a low number of switches in the mobile scenario. The proposed methodology is general enough to be extended for further designs of machine learning-based algorithms and the provided model can be deployed in on-demand streaming scenarios or be further refined using reward-based mechanisms such as reinforcement learning. All tools, models and datasets created during the work are provided as open-source software.
△ Less
Submitted 24 August, 2018;
originally announced August 2018.